Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 )
ANSSI-CC-2023/57
MultiApp V4.2 ID version 4.2.1
ANSSI-CC-2021/41
name IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) MultiApp V4.2 ID version 4.2.1
not_valid_after 09.02.2029 23.09.2026
not_valid_before 09.02.2024 23.09.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_57fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_41.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_57fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_41.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_57en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_41en.pdf
dgst cecfb5207379a342 53d5d1f076fd2e78
heuristics/cert_id ANSSI-CC-2023/57 ANSSI-CC-2021/41
heuristics/extracted_sars ALC_DVS.2, AVA_VAN.5 ADV_FSP.5, AGD_PRE.1, ADV_ARC.1, ATE_COV.2, ATE_FUN.1, ALC_DEL.1, ADV_IMP.1, ATE_IND.2, ALC_TAT.2, ALC_LCD.1, ATE_DPT.3, ADV_TDS.4, ALC_DVS.2, AGD_OPE.1, ADV_INT.2, AVA_VAN.5, ALC_CMC.4
heuristics/extracted_versions 4.1, 1.1.1, 1.1, 4.4.2 4.2.1, 4.2
heuristics/report_references/directly_referencing ANSSI-CC-2023/30, ANSSI-CC-2023/20 ANSSI-CC-2020/65
heuristics/report_references/indirectly_referencing ANSSI-CC-2023/30, ANSSI-CC-2023/20 ANSSI-CC-2020/65
heuristics/scheme_data
  • cert_id: ANSSI-CC-2023/57
  • description: Le produit évalué est la « IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1, version IAS 4.4.2.A, version MOC Server 1.1.1A » développé par THALES DIS FRANCE SAS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD1).
  • developer: THALES DIS FRANCE SAS
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2023/57
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_57fr.pdf
    • certification_date: 09.02.2024
    • developer: THALES DIS FRANCE SAS
    • evaluation_facility: SERMA SAFETY & SECURITY
    • expiration_date: 09.02.2029
    • level: EAL5+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_57fr.pdf
    • sponsor: THALES DIS FRANCE SAS
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_57en.pdf
  • expiration_date: 09.02.2029
  • level: EAL5+
  • product: IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A
  • sponsor: THALES DIS FRANCE SAS
  • url: https://cyber.gouv.fr/produits-certifies/ias-classic-v442-moc-server-11-multiapp-v41-version-ias-442a-version-moc-server
  • cert_id: ANSSI-CC-2021/41
  • description: Le produit évalué est « MultiApp V4.2 ID, version 4.2.1 » développé par THALES DIS et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soient « sensibles » ou « basiques ») et peuvent être chargées et instanciées av
  • developer: THALES DIS & INFINEON TECHNOLOGIES AG
  • enhanced:
  • expiration_date: 23.09.2026
  • level: EAL5+
  • product: MultiApp V4.2 ID version 4.2.1
  • sponsor: THALES DIS & INFINEON TECHNOLOGIES AG
  • url: https://cyber.gouv.fr/produits-certifies/multiapp-v42-id-version-421
heuristics/st_references/directly_referencing ANSSI-CC-2023/20 BSI-DSZ-CC-1079-V2-2020
heuristics/st_references/indirectly_referencing ANSSI-CC-2023/20 BSI-DSZ-CC-1079-V2-2020
protection_profiles




pdf_data/cert_filename Certificat-CC-2023_57fr.pdf certificat-2021_41.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/57: 2
  • FR:
    • ANSSI-CC-2021/41: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
  • BSI:
    • BSI-PP-0099-2017: 1
pdf_data/cert_metadata
  • /Author:
  • /Category:
  • /Comments: ANSSI-CC-CER-F-14_v14.8
  • /Company: SGDSN
  • /CreationDate: D:20240215115407+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords: version x.x, révision x
  • /ModDate: D:20240215115408+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • /SourceModified: D:20240215105356
  • /Title: ANSSI-CC-2023/57
  • pdf_file_size_bytes: 122264
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20210929150802+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210929150802+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 293541
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2023_57fr.pdf anssi-cc-2021_41.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/20: 1
    • ANSSI-CC-2023/30: 1
    • ANSSI-CC-2023/57: 2
  • DE:
    • BSI-DSZ-CC-1079-V2-: 1
  • FR:
    • ANSSI-CC-2020/65: 2
    • ANSSI-CC-2021/41: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 1
  • BSI:
    • BSI-CC-PP-0099-2017: 1
    • BSI-PP-0084-2014: 1
    • BSI-PP-0099-2017: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_CPS: 2
    • AGD_OPE: 1
    • AGD_USE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 2
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Gemalto:
    • Gemalto: 5
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
  • Serma:
    • SERMA: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 2
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 3
pdf_data/report_keywords/javacard_packages
  • com:
    • com.gemalto.emvapi: 1
    • com.gemalto.javacard.filesystem: 1
    • com.gemalto.javacard.iasclassic: 1
    • com.gemalto.javacard.ism: 1
    • com.gemalto.javacard.mspnp: 1
    • com.gemalto.javacard.open: 1
    • com.gemalto.javacard.securemessaging.builde: 1
    • com.gemalto.javacard.securemessaging.intern: 1
    • com.gemalto.javacard.security: 1
    • com.gemalto.javacard.util: 1
    • com.gemalto.javacardx: 1
    • com.gemalto.javacardx.biometry: 1
    • com.gemalto.javacardx.biometry.biocfg: 1
    • com.gemalto.javacardx.crypto: 1
    • com.gemalto.javacardx.crypto.asymmetric.rsa: 1
    • com.gemalto.javacardx.gapplet: 1
    • com.gemalto.moc.server: 1
  • java:
    • java.io: 1
    • java.lang: 1
  • javacard:
    • javacard.conformance: 1
    • javacard.filesystem: 1
    • javacard.framework: 1
    • javacard.gpimage: 1
    • javacard.iasclassic: 1
    • javacard.icao: 1
    • javacard.internal: 1
    • javacard.ism: 1
    • javacard.mspnp: 1
    • javacard.open: 1
    • javacard.securemessaging: 1
    • javacard.securemessaging.builde: 1
    • javacard.securemessaging.intern: 1
    • javacard.security: 1
    • javacard.tlv: 1
    • javacard.util: 1
  • javacardx:
    • javacardx.apdu: 1
    • javacardx.apdu.util: 1
    • javacardx.biometry: 2
    • javacardx.biometry.biocfg: 1
    • javacardx.crypto: 2
    • javacardx.crypto.asymmetric.ecc: 1
    • javacardx.crypto.asymmetric.rsa: 1
    • javacardx.gap: 1
    • javacardx.gapplet: 1
    • javacardx.gdp: 1
  • org:
    • org.globalplatform: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20210929150643+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210929150643+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 165392
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename ANSSI-cible-CC-2023_57en.pdf anssi-cible-cc-2021_41en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/20: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
  • DE:
    • BSI-DSZ-CC-1079-V2-2020: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
  • other:
    • PP-SSCD: 6
    • PP-SSCD-: 1
    • PP-SSCD-KG: 41
    • PP-SSCD-KI: 30
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-2017: 1
    • BSI-PP- 0055-2009: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
  • EAL:
    • EAL 5+: 1
    • EAL 6+: 1
    • EAL5: 6
    • EAL5 augmented: 2
    • EAL5+: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 7
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 4
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 7
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 7
    • AGD_PRE: 2
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 47
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 2
    • FCS_COP: 26
    • FCS_COP.1: 6
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 28
    • FDP_ACC.1.1: 4
    • FDP_ACF: 32
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_AFC: 1
    • FDP_DAU: 10
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC.1: 18
    • FDP_ITC: 11
    • FDP_ITC.1: 8
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 2
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
    • FDP_SDI: 17
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 17
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 5
    • FIA_API.1: 14
    • FIA_API.1.1: 2
    • FIA_UAU: 20
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 20
    • FIA_UID.1: 10
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 62
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4: 3
    • FMT_MSA.4.1: 2
    • FMT_MTD: 16
    • FMT_MTD.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ICT: 2
    • FTP_ITC: 38
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
    • FTP_TRP.1: 4
  • FAU:
    • FAU_ARP.1: 16
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 43
    • FCS_CKM.1: 25
    • FCS_CKM.1.1: 3
    • FCS_CKM.4: 19
    • FCS_CKM.4.1: 2
    • FCS_COP: 27
    • FCS_COP.1: 24
    • FCS_COP.1.1: 4
    • FCS_RNG: 18
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC: 34
    • FDP_ACC.1: 14
    • FDP_ACC.2: 6
    • FDP_ACF: 29
    • FDP_ACF.1: 16
    • FDP_IFC: 20
    • FDP_IFC.1: 12
    • FDP_IFC.2: 2
    • FDP_IFF: 13
    • FDP_IFF.1: 17
    • FDP_ITC: 10
    • FDP_ITC.1: 10
    • FDP_ITC.2: 15
    • FDP_RIP: 92
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 13
    • FDP_ROL.1: 5
    • FDP_SDI: 5
    • FDP_SDI.2: 3
    • FDP_UIT: 5
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD: 7
    • FIA_ATD.1: 2
    • FIA_UAU: 50
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 33
    • FIA_UID.1: 18
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 18
    • FMT_LIM.1: 15
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 14
    • FMT_LIM.2.1: 3
    • FMT_MSA: 73
    • FMT_MSA.1: 11
    • FMT_MSA.2: 2
    • FMT_MSA.3: 17
    • FMT_MTD: 31
    • FMT_MTD.1: 9
    • FMT_MTD.3: 1
    • FMT_SMF: 50
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 2
    • FMT_SMR: 62
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 12
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 34
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 2
    • FPT_ITT: 5
    • FPT_ITT.1: 1
    • FPT_PHP: 5
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 7
    • FPT_RCV.4: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 7
    • FPT_TST.1: 13
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 2
    • A.CGA: 3
    • A.CSP: 4
    • A.SCA: 3
    • A.VERIFICATION: 2
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.HID_VAD: 1
    • OE.HI_VAD: 2
    • OE.VERIFICATION: 4
  • A:
    • A.APPLET: 5
    • A.DELETION: 4
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 14
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 2
    • O.CARD_MANAGEMENT: 16
    • O.CIPHER: 10
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 6
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 8
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 9
    • O.JAVAOBJECT: 66
    • O.KEY-MNGT: 7
    • O.KEY_MNGT: 2
    • O.LOAD: 8
    • O.NATIVE: 10
    • O.OBJ-DELETION: 4
    • O.OBJ_DELETION: 1
    • O.OPERATE: 15
    • O.PIN-: 1
    • O.PIN-MNGT: 6
    • O.PIN_MNGT: 1
    • O.REALLOCATION: 5
    • O.RESOURCES: 8
    • O.RND: 3
    • O.RNG: 8
    • O.SCP: 28
    • O.SID: 12
    • O.TDES: 1
    • O.TRANSACTION: 7
  • OE:
    • OE.APPLET: 4
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.RND: 3
    • OSP.RNG: 1
    • OSP.VERIFICATION: 4
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 10
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 3
    • T.EXE-CODE: 8
    • T.INSTALL: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.RESOURCES: 3
    • T.SID: 8
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Samsung:
    • Samsung: 7
  • Thales:
    • Thales: 12
    • Thales Group: 62
  • Gemalto:
    • Gemalto: 6
  • Idemia:
    • IDEMIA: 3
    • Idemia: 5
  • Infineon:
    • Infineon: 15
    • Infineon Technologies AG: 1
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 35
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Safety & Security: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 30
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 15
      • Triple-DES: 3
    • DES:
      • DES: 21
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 2
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-224: 4
      • SHA-256: 4
      • SHA-384: 2
      • SHA-512: 4
      • SHA2: 1
      • SHA224: 2
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
    • SHA3:
      • SHA3: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 3
    • Key agreement: 2
  • MAC:
    • MAC: 16
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 3
  • PACE:
    • PACE: 163
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 2
  • RNG:
    • RND: 6
    • RNG: 31
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 1
    • fault injection: 1
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • Leak-Inherent: 1
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Malfunction: 9
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 5
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS197: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 3
  • BSI:
    • AIS 31: 1
    • AIS31: 4
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS180-4: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 7816-2: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS#5: 5
  • SCP:
    • SCP01: 6
    • SCP02: 6
    • SCP03: 5
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.5: 5
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
    • javacard.security: 3
  • javacardx:
    • javacardx.crypto: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • by authorized users. The functionalities of IAS Classic V4.4.2 other than the ones from SSCD are out of scope of the TOE perimeter. MOC Server application provides biometric authentication of the signatory: 1
    • out of scope: 1
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: D1418852
  • /CreationDate: D:20230928155442+02'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /Keywords: 16-03-2018
  • /ModDate: D:20230928155442+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: 1.1
  • /Title: MultiApp V4.1: IAS EN Core & Extensions Security Target
  • pdf_file_size_bytes: 1252729
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /Author: D1539135
  • /CreationDate: D:20210630101801+02'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: 11-05-2021
  • /ModDate: D:20210630101801+02'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: 1.2
  • /Title: MultiApp V4.2 ID: JCS Security Target
  • pdf_file_size_bytes: 2424458
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 156
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different