This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
NATEK NSM GUI v2.4.1 with NSM SERVER v2.3.9 0.01/TSE-CCCS-030 |
MS6001 embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèque Wear Levelling version 06.03.02.02 (révision E) ( ANSSI-CC-2018/02-R01) ANSSI-CC-2018/02-R01 |
|
---|---|---|
name | NATEK NSM GUI v2.4.1 with NSM SERVER v2.3.9 | MS6001 embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèque Wear Levelling version 06.03.02.02 (révision E) ( ANSSI-CC-2018/02-R01) |
category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | TR | FR |
status | archived | active |
not_valid_after | 22.06.2018 | 30.03.2030 |
not_valid_before | 22.06.2015 | 30.03.2025 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2018_02-R01fr.pdf | |
report_link | https://www.commoncriteriaportal.org/files/epfiles/NATEK%20Network%20and%20System%20Manager%20NSM%20GUI%202%204%201%20with%20NSM%20SERVER%202%203%209%20%20Certification%20Report%20v1%200.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018_02-R01fr.pdf |
st_link | https://www.commoncriteriaportal.org/files/epfiles/NATEK%20Network%20and%20System%20Manager%20NSM%20GUI%202%204%201%20with%20NSM%20SERVER%202%203%209%20ST%20v1%2013.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2018_02-R01.pdf |
manufacturer | NATEK BİLİŞİM | SEALSQ France |
manufacturer_web | https://www.sealsq.com/ | |
security_level | EAL3 | AVA_VAN.5, EAL5+, ALC_DVS.2 |
dgst | cb097d67d75e4a7d | ec30d9d5e231d788 |
heuristics/cert_id | 0.01/TSE-CCCS-030 | ANSSI-CC-2018/02-R01 |
heuristics/extracted_sars | AGD_OPE.1, ASE_ECD.1, ADV_TDS.2, ATE_DPT.1, ADV_FSP.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ALC_CMC.3, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_IND.2, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, AGD_PRE.1, ALC_CMS.3 | ALC_CMS.5, AGD_OPE.1, ALC_TAT.2, ASE_ECD.1, ADV_TDS.4, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ADV_IMP.1, ASE_SPD.1, ADV_INT.2, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_DPT.3, ATE_IND.2, ASE_TSS.1, AVA_VAN.5, ATE_COV.2, ATE_FUN.1, ALC_DVS.2, ADV_FSP.5, ALC_CMC.4, AGD_PRE.1 |
heuristics/extracted_versions | 2.4.1, 2.3.9 | 06.03.02.02, 06.04.01.07 |
heuristics/protection_profiles | {} | cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename | certificat-CC-2018_02-R01fr.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | NATEK Network and System Manager NSM GUI 2 4 1 with NSM SERVER 2 3 9 Certification Report v1 0.pdf | ANSSI-CC-2018_02-R01fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | NATEK Network and System Manager NSM GUI 2 4 1 with NSM SERVER 2 3 9 ST v1 13.pdf | ANSSI-cible-CC-2018_02-R01.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |