Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 )
ANSSI-CC-2023/57
IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01)
ANSSI-CC-2020/52-R01
name IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01)
not_valid_after 09.02.2029 10.11.2028
not_valid_before 09.02.2024 10.11.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_57fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_52-R01.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_57fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_52-R01fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_57en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_52-R01en.pdf
manufacturer THALES DIS FRANCE SA Idemia
manufacturer_web https://www.thalesgroup.com/en/europe/france https://www.idemia.com
dgst cecfb5207379a342 ae1a3fd4952c639d
heuristics/cert_id ANSSI-CC-2023/57 ANSSI-CC-2020/52-R01
heuristics/extracted_sars ALC_DVS.2, AVA_VAN.5 ADV_ARC.1, ALC_DVS.2, AGD_OPE.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.5
heuristics/extracted_versions 4.1, 1.1.1, 1.1, 4.4.2 8.2, 1.3
heuristics/report_references/directly_referencing ANSSI-CC-2023/30, ANSSI-CC-2023/20 ANSSI-CC-2020/26-R01, BSI-DSZ-CC-1059-V5-2022
heuristics/report_references/indirectly_referencing ANSSI-CC-2023/30, ANSSI-CC-2023/20 ANSSI-CC-2020/26-R01, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V4-2021, BSI-DSZ-CC-1059-V5-2022, BSI-DSZ-CC-1059-V3-2019
heuristics/scheme_data
  • cert_id: ANSSI-CC-2023/57
  • description: Le produit évalué est la « IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1, version IAS 4.4.2.A, version MOC Server 1.1.1A » développé par THALES DIS FRANCE SAS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD1).
  • developer: THALES DIS FRANCE SAS
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2023/57
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_57fr.pdf
    • certification_date: 09.02.2024
    • developer: THALES DIS FRANCE SAS
    • evaluation_facility: SERMA SAFETY & SECURITY
    • expiration_date: 09.02.2029
    • level: EAL5+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_57fr.pdf
    • sponsor: THALES DIS FRANCE SAS
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_57en.pdf
  • expiration_date: 09.02.2029
  • level: EAL5+
  • product: IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A
  • sponsor: THALES DIS FRANCE SAS
  • url: https://cyber.gouv.fr/produits-certifies/ias-classic-v442-moc-server-11-multiapp-v41-version-ias-442a-version-moc-server
  • cert_id: ANSSI-CC-2020/52-R01
  • description: Le produit évalué est « IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VB, Identification de l’application : F0 02 02 13 » développé par IDEMIA et masquée sur le composant NXP P6022M VB développé par NXP SEMICONDUCTORS GMBH
  • developer: IDEMIA et NXP SEMICONDUCTORS GMBH
  • enhanced:
  • expiration_date: 10.11.2028
  • level: EAL5+
  • product: IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VB Identification de l’application : F0 02 02 13
  • sponsor: IDEMIA
  • url: https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-configuration-3-id-one-cosmo-v82-open-platform-nxp-p6022m
heuristics/st_references/directly_referencing ANSSI-CC-2023/20 {}
heuristics/st_references/indirectly_referencing ANSSI-CC-2023/20 {}
protection_profiles






pdf_data/cert_filename Certificat-CC-2023_57fr.pdf Certificat-CC-2020_52-R01.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/57: 2
  • FR:
    • ANSSI-CC-2020/52-R01: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0075-2012: 1
pdf_data/cert_keywords/vendor
  • Idemia:
    • IDEMIA: 2
  • NXP:
    • NXP: 2
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 1
pdf_data/cert_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/cert_metadata
  • /Author:
  • /Category:
  • /Comments: ANSSI-CC-CER-F-14_v14.8
  • /Company: SGDSN
  • /CreationDate: D:20240215115407+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords: version x.x, révision x
  • /ModDate: D:20240215115408+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • /SourceModified: D:20240215105356
  • /Title: ANSSI-CC-2023/57
  • pdf_file_size_bytes: 122264
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20231117171637+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20231117172055+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 158272
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2023_57fr.pdf ANSSI-CC-2020_52-R01fr.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/20: 1
    • ANSSI-CC-2023/30: 1
    • ANSSI-CC-2023/57: 2
  • DE:
    • BSI-DSZ-CC-1059-V5-2022: 2
  • FR:
    • ANSSI-CC-2020/26-R01: 1
    • ANSSI-CC-2020/52-R01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 2
    • BSI-CC-PP-0071-2012: 2
    • BSI-CC-PP-0075-2012: 2
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_CPS: 2
    • AGD_OPE: 1
    • AGD_USE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_OPE: 1
    • ADV_PRE: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 4
    • AGD_QUA: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Idemia:
    • IDEMIA: 4
  • NXP:
    • NXP: 10
    • NXP Semiconductors: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 9
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
pdf_data/st_filename ANSSI-cible-CC-2023_57en.pdf ANSSI-cible-CC-2020_52-R01en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/20: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
  • FR:
    • ANSSI-CC-2020/26-R1: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
  • other:
    • PP-SSCD: 6
    • PP-SSCD-: 1
    • PP-SSCD-KG: 41
    • PP-SSCD-KI: 30
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0075: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_TDS: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE: 11
    • AGD_OPE.1: 2
    • AGD_PRE: 14
    • AGD_PRE_PLT: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 7
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 2
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 47
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 2
    • FCS_COP: 26
    • FCS_COP.1: 6
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 28
    • FDP_ACC.1.1: 4
    • FDP_ACF: 32
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_AFC: 1
    • FDP_DAU: 10
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC.1: 18
    • FDP_ITC: 11
    • FDP_ITC.1: 8
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 2
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
    • FDP_SDI: 17
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 17
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 5
    • FIA_API.1: 14
    • FIA_API.1.1: 2
    • FIA_UAU: 20
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 20
    • FIA_UID.1: 10
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 62
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4: 3
    • FMT_MSA.4.1: 2
    • FMT_MTD: 16
    • FMT_MTD.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ICT: 2
    • FTP_ITC: 38
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
    • FTP_TRP.1: 4
  • FAU:
    • FAU_ARP.1: 2
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 34
    • FCS_CKM.1: 41
    • FCS_CKM.2: 8
    • FCS_CKM.3: 6
    • FCS_CKM.4: 60
    • FCS_CKM.4.1: 1
    • FCS_COP: 104
    • FCS_COP.1: 38
    • FCS_COP.1.1: 3
    • FCS_RNG: 4
    • FCS_RNG.1: 19
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC: 70
    • FDP_ACC.1: 38
    • FDP_ACF: 49
    • FDP_ACF.1: 36
    • FDP_CKM: 4
    • FDP_CKM.1: 1
    • FDP_DAU: 6
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_ETC: 5
    • FDP_ETC.1: 2
    • FDP_IFC.1: 20
    • FDP_ITC: 21
    • FDP_ITC.1: 42
    • FDP_ITC.2: 35
    • FDP_RIP: 11
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 3
    • FDP_ROL: 1
    • FDP_SDI: 15
    • FDP_SDI.1: 2
    • FDP_SDI.2: 6
    • FDP_UCT: 7
    • FDP_UCT.1: 1
  • FIA:
    • FIA_AFL: 22
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_API: 5
    • FIA_API.1: 9
    • FIA_API.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 30
    • FMT_MSA.1: 7
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 8
    • FMT_MSA.4.1: 1
    • FMT_MTD: 40
    • FMT_MTD.1: 6
    • FMT_SMF.1: 43
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 43
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 3
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 9
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 2
    • FPT_FLS: 5
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP: 2
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_RCV: 2
    • FPT_TST: 1
    • FPT_TST.1: 13
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 18
    • FTP_ITC.1: 8
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 2
    • A.CGA: 3
    • A.CSP: 4
    • A.SCA: 3
    • A.VERIFICATION: 2
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.HID_VAD: 1
    • OE.HI_VAD: 2
    • OE.VERIFICATION: 4
  • A:
    • A.APPLET: 1
    • A.CGA: 5
    • A.CSP: 5
    • A.PLT: 1
    • A.SCA: 3
    • A.VERIFICATION: 1
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.CODE_EVIDENCE: 2
    • OE.HID_VAD: 4
    • OE.PLT: 2
    • OE.VERIFICATION: 4
  • OSP:
    • OSP.PLT: 2
    • OSP.VERIFICATION: 1
  • T:
    • T.CONFID_APPLI_DATA: 3
    • T.INTEG_APPLI_DATA: 6
    • T.OBJ_DELETION: 3
    • T.PHYSICAL: 3
    • T.RESSOURCES: 3
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Samsung:
    • Samsung: 7
  • Thales:
    • Thales: 12
    • Thales Group: 62
  • Idemia:
    • IDEMIA: 21
  • Morpho:
    • Morpho: 1
  • NXP:
    • NXP: 4
  • Oberthur:
    • Oberthur Technologies: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 17
  • DES:
    • 3DES:
      • TDES: 3
    • DES:
      • DES: 10
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 34
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-224: 2
      • SHA-256: 5
      • SHA-384: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 2
  • RNG:
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 1
    • fault injection: 1
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • Leak-Inherent: 1
    • SPA: 1
    • timing attacks: 1
  • FI:
    • DFA: 2
    • fault injection: 2
    • physical tampering: 5
  • SCA:
    • DPA: 1
    • SPA: 1
    • side channel: 1
    • timing attacks: 1
  • other:
    • JIL: 1
    • JIL-COMP: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS197: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 3
  • FIPS:
    • FIPS 180-3: 1
    • FIPS PUB 180-3: 1
    • FIPS180-3: 1
  • ISO:
    • ISO/IEC 9796-2: 4
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 3
    • PKCS#15: 2
    • PKCS#3: 3
  • SCP:
    • SCP02: 2
    • SCP03: 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • by authorized users. The functionalities of IAS Classic V4.4.2 other than the ones from SSCD are out of scope of the TOE perimeter. MOC Server application provides biometric authentication of the signatory: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: D1418852
  • /CreationDate: D:20230928155442+02'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /Keywords: 16-03-2018
  • /ModDate: D:20230928155442+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: 1.1
  • /Title: MultiApp V4.1: IAS EN Core & Extensions Security Target
  • pdf_file_size_bytes: 1252729
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /Author: IDEMIA
  • /CreationDate: D:20230922152616+02'00'
  • /Creator: Microsoft® Word pour Microsoft 365
  • /Keywords: Quality
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application: Microsoft Azure Information Protection
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled: True
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method: Automatic
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name: Public
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner: [email protected]
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Ref: https://api.informationprotection.azure.com/api/7694d41c-5504-43d9-9e40-cb254ad755ec
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate: 2019-08-02T11:40:31.1231964+02:00
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
  • /ModDate: D:20230922152616+02'00'
  • /Producer: Microsoft® Word pour Microsoft 365
  • /Subject: FQR standard
  • pdf_file_size_bytes: 1869456
  • pdf_hyperlinks: ftp://ftp.itc.1/SCD, ftp://ftp.itc.1/SVD
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different