name |
ID-One Cosmo v9.1 embedding VITALE application version 2.1.4 |
ID-One Cosmo X embedding VITALE application(version 2.1.5 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
archived |
not_valid_after |
06.09.2027 |
19.04.2023 |
not_valid_before |
06.09.2022 |
23.12.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_33.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_34.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_33.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_34fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_33en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_34en.pdf |
manufacturer |
Idemia |
Idemia |
manufacturer_web |
https://www.idemia.com |
https://www.idemia.com |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
dgst |
e7198a866b44d208 |
6b9be5f63e42392c |
heuristics/cert_id |
ANSSI-CC-2022/33 |
ANSSI-CC-2022/34 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_TAT.1, ATE_FUN.1, ADV_IMP.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_CMS.4, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ADV_FSP.4, ATE_COV.2, ASE_REQ.2, ALC_CMC.4, ADV_ARC.1, ALC_DEL.1, ATE_DPT.1, ADV_TDS.3, AGD_OPE.1, ALC_LCD.1, ASE_ECD.1 |
ASE_INT.1, ALC_TAT.1, ATE_FUN.1, ADV_IMP.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_CMS.4, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ADV_FSP.4, ATE_COV.2, ASE_REQ.2, ALC_CMC.4, ADV_ARC.1, ALC_DEL.1, ATE_DPT.1, ADV_TDS.3, AGD_OPE.1, ALC_LCD.1, ASE_ECD.1 |
heuristics/extracted_versions |
9.1, 2.1.4 |
2.1.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
ANSSI-CC-2022/34v2 |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2022/34v2 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2020/07, ANSSI-CC-2019/41 |
BSI-DSZ-CC-1107-V3-2022, ANSSI-CC-2021/29 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2022/34v2 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2019/28, ANSSI-CC-2020/07, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0945-2017, ANSSI-CC-2017/49, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2019/41, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-1110-V4-2021 |
BSI-DSZ-CC-1107-V3-2022, BSI-DSZ-CC-1107-2020, ANSSI-CC-2021/29 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2022/33
- description: Le produit évalué est « ID-One Cosmo v9.1 embedding VITALE application, version 2.1.4 », dont le logiciel embarqué est développé par IDEMIA, sur un microcontrôleur développé par INFINEON TECHNOLOGIES AG. Ce produit offre des services de signature électronique (SSCD1) aux travers des applications ADELE, VITALE1 et VITALE2, conformes aux profils de protections listés dans le paragraphe 1.2.1 ci-des
- developer: IDEMIA / INFINEON TECHNOLOGIES AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2022/33
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2022_33_0.pdf
- certification_date: 06.09.2022
- developer: IDEMIA / INFINEON TECHNOLOGIES AG
- evaluation_facility: CEA - LETI
- expiration_date: 06.09.2027
- level: EAL4+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.
- sponsor: IDEMIA
- expiration_date: 06.09.2027
- level: EAL4+
- product: ID-One Cosmo v9.1 embedding VITALE application (version 2.1.4)
- sponsor: IDEMIA
- url: https://cyber.gouv.fr/produits-certifies/id-one-cosmo-v91-embedding-vitale-application-version-214
|
- cert_id: ANSSI-CC-2022/34
- description: Le produit évalué est « ID-One Cosmo X embedding VITALE application, version 2.1.5 », dont le logiciel embarqué est développé par IDEMIA, sur un microcontrôleur développé par INFINEON TECHNOLOGIES AG.Ce produit offre des services de signature électronique (SSCD1) au travers des applications ADELE, VITALE1 et VITALE2, conformes aux profils de protection listés dans le paragraphe 1.2.1 ci-dessous.
- developer: IDEMIA / INFINEON TECHNOLOGIES AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2022/34
- certification_date: 23.12.2022
- developer: IDEMIA / INFINEON TECHNOLOGIES AG
- evaluation_facility: CEA - LETI
- level: EAL4+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.
- sponsor: IDEMIA
- level: EAL4+
- product: ID-One Cosmo X embedding VITALE application(version 2.1.5
- sponsor: IDEMIA
- url: https://cyber.gouv.fr/produits-certifies/id-one-cosmo-x-embedding-vitale-applicationversion-215
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2020/07 |
ANSSI-CC-2021/29 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2020/07, BSI-DSZ-CC-1110-V2-2019 |
ANSSI-CC-2021/29 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-anssi-cc-2022_33.pdf |
certificat-anssi-cc-2022_34.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0072-2012-MA-01: 1
- BSI-CC-PP- 0076-2013-MA-01: 1
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0075-2012-MA-01: 1
|
- BSI:
- BSI-CC-PP- 0072-2012-MA-01: 1
- BSI-CC-PP- 0076-2013-MA-01: 1
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0075-2012-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: DUCLOS Charlene
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.7
- /Company: SGDSN
- /CreationDate: D:20220914162244+02'00'
- /Creator: Acrobat PDFMaker 21 pour Word
- /Keywords: code SAAAAR : 41 63 06
- /ModDate: D:20220914162244+02'00'
- /Producer: Adobe PDF Library 21.11.71
- /SourceModified: D:20220914142231
- /Title: ANSSI-CC-2022/33
- pdf_file_size_bytes: 148112
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: DUCLOS Charlene
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.7
- /Company: SGDSN
- /CreationDate: D:20230103095310+01'00'
- /Creator: Acrobat PDFMaker 22 pour Word
- /Keywords: code SAAAAR : 41 63 06
- /ModDate: D:20230103095311+01'00'
- /Producer: Adobe PDF Library 22.3.39
- /SourceModified: D:20230103085247
- /Title: ANSSI-CC-2022/34
- pdf_file_size_bytes: 154771
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
anssi-cc-2022_33.pdf |
anssi-cc-2022_34fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V4-2021: 1
- FR:
- ANSSI-CC-2019/41: 2
- ANSSI-CC-2020/07: 1
- ANSSI-CC-2020/07-M02: 1
- ANSSI-CC-2022/33: 2
- ANSSI-CC-2022/33-S01: 1
|
- DE:
- BSI-DSZ-CC-1107-V3-2022: 1
- FR:
- ANSSI-CC-2021/29: 1
- ANSSI-CC-2021/29-M01: 1
- ANSSI-CC-2022/34: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 1
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 1
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
anssi-cible-cc-2022_33en.pdf |
anssi-cible-cc-2022_34en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V4-2021: 1
- FR:
- ANSSI-CC-2020/07: 4
- ANSSI-CC-2020/07-M02: 1
- ANSSI-CC-2020/07-S01: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-: 1
- BSI-CC-PP-0071-: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- other:
- PP-SSCD2: 14
- PP-SSCD3: 11
- PP-SSCD4: 12
- PP-SSCD5: 16
- PP-SSCD6: 10
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- other:
- PP-SSCD2: 14
- PP-SSCD3: 13
- PP-SSCD4: 14
- PP-SSCD5: 16
- PP-SSCD6: 11
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5+: 1
- EAL 6+: 1
- EAL4: 7
- EAL4 augmented: 5
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5+: 1
- EAL 6+: 1
- EAL4: 7
- EAL4 augmented: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE: 5
- AGD_OPE.1: 5
- AGD_PRE: 7
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE: 6
- AGD_OPE.1: 5
- AGD_PRE: 8
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 48
- FDP_ACC.1: 15
- FDP_ACF: 36
- FDP_ACF.1: 20
- FDP_DAU: 8
- FDP_DAU.2: 2
- FDP_IFC.1: 7
- FDP_ITC: 10
- FDP_ITC.1: 5
- FDP_ITC.2: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI: 18
- FDP_SDI.2: 4
- FDP_UCT: 11
- FDP_UCT.1: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 3
- FIA_API.1: 13
- FIA_API.1.1: 2
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 17
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_EMS.1: 1
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 19
- FMT_MSA.1: 4
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 20
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 12
- FMT_MSA.4.1: 1
- FMT_MTD: 16
- FMT_MTD.1: 2
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 22
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 11
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 39
- FTP_ITC.1: 14
- FTP_TRP.1: 2
|
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 48
- FDP_ACC.1: 15
- FDP_ACF: 36
- FDP_ACF.1: 20
- FDP_DAU: 8
- FDP_DAU.2: 2
- FDP_IFC.1: 7
- FDP_ITC: 10
- FDP_ITC.1: 5
- FDP_ITC.2: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI: 18
- FDP_SDI.2: 4
- FDP_UCT: 11
- FDP_UCT.1: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 3
- FIA_API.1: 13
- FIA_API.1.1: 2
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 17
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_EMS.1: 1
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 19
- FMT_MSA.1: 4
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 20
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 12
- FMT_MSA.4.1: 1
- FMT_MTD: 16
- FMT_MTD.1: 2
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 22
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 11
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 39
- FTP_ITC.1: 14
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA: 6
- A.CSP: 8
- A.SCA: 5
- A.SEC_PERSO: 8
- D:
- D.RAD: 3
- D.SCD: 2
- D.SECRET: 3
- D.SVD: 2
- D.VAD: 3
- OE:
- OE: 1
- OE.HID_VAD: 7
- OE.HI_VAD: 2
- OE.SEC_PERSO: 10
|
- A:
- A.CGA: 6
- A.CSP: 8
- A.SCA: 5
- A.SEC_PERS: 1
- A.SEC_PERSO: 7
- D:
- D.RAD: 3
- D.SCD: 2
- D.SECRET: 3
- D.SVD: 2
- D.VAD: 3
- OE:
- OE: 1
- OE.HID_VAD: 7
- OE.HI_VAD: 2
- OE.SEC_PERSO: 10
|
pdf_data/st_keywords/vendor |
- Idemia:
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 1
- Morpho:
- Oberthur:
|
- Idemia:
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 5
- SCA:
- DPA: 3
- SPA: 3
- physical probing: 1
- side channel: 1
- timing attacks: 2
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 5
- SCA:
- DPA: 3
- SPA: 3
- physical probing: 1
- side channel: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816-4: 1
- ISO/IEC 9797-1: 1
- NIST:
- NIST SP 800-90: 4
- NIST SP 800-90A: 1
- PKCS:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816-4: 1
- ISO/IEC 9797-1: 1
- NIST:
- NIST SP 800-90: 3
- NIST SP 800-90A: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: MESTIRI Sarra;[email protected]
- /CreationDate: D:20220620145955+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220620145955+02'00'
- /Producer: Microsoft® Word 2016
- /Title: Title
- pdf_file_size_bytes: 3279967
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
- /Author: HAJJ Mohamad
- /CreationDate: D:20220923092347+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220923092347+02'00'
- /Producer: Microsoft® Word 2016
- /Title: Title
- pdf_file_size_bytes: 3021036
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 100
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |