Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ID-One Cosmo v8.2 embedding VITALE application (Version 2.0.83)
ANSSI-CC-2019/41
ID-One Cosmo X embedding VITALE application version 2.1.5
ANSSI-CC-2022/34v2
name ID-One Cosmo v8.2 embedding VITALE application (Version 2.0.83) ID-One Cosmo X embedding VITALE application version 2.1.5
status archived active
not_valid_after 25.10.2024 23.12.2027
not_valid_before 25.10.2019 19.04.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_34v2.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_41fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_34v2fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_41en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_34v2en.pdf
dgst f0903c8be1918c14 1c606ff7bbc93162
heuristics/cert_id ANSSI-CC-2019/41 ANSSI-CC-2022/34v2
heuristics/cert_lab CEA []
heuristics/extracted_versions 8.2, 2.0.83 2.1.5
heuristics/prev_certificates {} ANSSI-CC-2022/34
heuristics/report_references/directly_referenced_by ANSSI-CC-2022/33 {}
heuristics/report_references/directly_referencing ANSSI-CC-2019/28, BSI-DSZ-CC-1059-2018 ANSSI-CC-2022/34, BSI-DSZ-CC-1107-V3-2022, ANSSI-CC-2021/29, ANSSI-CC-2021/29-S01v2
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2022/33 {}
heuristics/report_references/indirectly_referencing ANSSI-CC-2019/28, BSI-DSZ-CC-0973-2016, ANSSI-CC-2017/49, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-V2-2016 ANSSI-CC-2022/34, BSI-DSZ-CC-1107-V3-2022, ANSSI-CC-2021/29, BSI-DSZ-CC-1107-2020, ANSSI-CC-2021/29-S01v2
heuristics/scheme_data
  • cert_id: ANSSI-CC-2019/41
  • description: Le produit évalué est la carte à puce « ID-One Cosmo v8.2 embedding VITALE application, Version 2.0.83 », disposant d’une interface contact, développée par Idemia et masquée sur le composant NXP P60D145 développé par NXP Semiconductors GmbH. Ce produit offre des services de signature électronique (SSCD) aux travers des applications ADELE, VITALE1 et VITALE2, conformes aux profils de protections l
  • developer: Idemia, NXP Semiconductors GmbH
  • enhanced:
  • level: EAL4+
  • product: ID-One Cosmo v8.2 embedding VITALE application Version 2.0.83
  • sponsor: Idemia
  • url: https://cyber.gouv.fr/produits-certifies/id-one-cosmo-v82-embedding-vitale-application-version-2083
  • cert_id: ANSSI-CC-2022/34v2
  • description: Le produit évalué est « ID-One Cosmo X embedding VITALE application, version 2.1.5 », dont le logiciel embarqué est développé par IDEMIA, sur un microcontrôleur développé par INFINEON TECHNOLOGIES AG.Ce produit offre des services de signature électronique (SSCD1) au travers des applications ADELE, VITALE1 et VITALE2, conformes aux profils de protection listés dans le paragraphe 1.2.1 ci-dessous.
  • developer: IDEMIA / INFINEON TECHNOLOGIES AG
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2022/34v2
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2022_34v2.pdf
    • certification_date: 19.04.2023
    • developer: IDEMIA / INFINEON TECHNOLOGIES AG
    • evaluation_facility: CEA - LETI
    • expiration_date: 19.04.2028
    • level: EAL4+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Profil de protection : Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.
    • sponsor: IDEMIA
  • expiration_date: 19.04.2028
  • level: EAL4+
  • product: ID-One Cosmo X embedding VITALE application version 2.1.5
  • sponsor: IDEMIA
  • url: https://cyber.gouv.fr/produits-certifies/id-one-cosmo-x-embedding-vitale-application-version-215-0
heuristics/st_references/directly_referencing ANSSI-CC-2019/28, BSI-DSZ-CC-1059-2018 {}
heuristics/st_references/indirectly_referencing ANSSI-CC-2019/28, BSI-DSZ-CC-1059-2018 {}
protection_profiles








pdf_data/cert_filename certificat-anssi-cc-2022_34v2.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2022/34v2: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Idemia:
    • IDEMIA: 2
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/report_filename anssi-cc-2019_41fr.pdf anssi-cc-2022_34v2fr.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2019/41
    • cert_item: ID-One Cosmo v8.2 embedding VITALE application
    • cert_item_version: Version 2.0.83
    • cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France NXP Semiconductors GmbH Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013
  • FR:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1059-2018: 2
  • FR:
    • ANSSI-CC-2019/28: 2
    • ANSSI-CC-2019/41: 19
    • ANSSI-CC-PP-2010/03-M01: 1
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 1
  • FR:
    • ANSSI-CC-2021/29: 2
    • ANSSI-CC-2021/29-S01v2: 2
    • ANSSI-CC-2022/34: 2
    • ANSSI-CC-2022/34v2: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-: 1
    • BSI-CC-PP-0076-2013: 1
  • other:
    • PP-SSCD-: 5
    • PP-SSCD-Part2: 1
    • PP-SSCD-Part3: 1
    • PP-SSCD-Part4: 1
    • PP-SSCD-Part5: 1
    • PP-SSCD-Part6: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 1
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL2: 2
    • EAL4: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
  • AGD:
    • AGD_OPE: 4
    • AGD_PRE: 4
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 15
    • Idemia: 4
  • Morpho:
    • Morpho: 1
  • NXP:
    • NXP: 8
    • NXP Semiconductors: 2
  • Idemia:
    • IDEMIA: 11
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • CESTI:
    • CESTI: 3
  • Serma:
    • SERMA: 5
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 4
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • /Author: DUCLOS Charlene
  • /CreationDate: D:20191029154905+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.29
  • /ModDate: D:20191029154905+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: ID-One Cosmo v8.2 embedding VITALE application
  • /Title: ANSSI-CC-2019/41
  • pdf_file_size_bytes: 567773
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename anssi-cible-cc-2019_41en.pdf anssi-cible-cc-2022_34v2en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1059-2018: 2
  • FR:
    • ANSSI-CC-2019/28: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-CC-PP-0084-2014: 1
  • other:
    • PP-SSCD2: 12
    • PP-SSCD3: 11
    • PP-SSCD4: 14
    • PP-SSCD5: 18
    • PP-SSCD6: 11
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
  • other:
    • PP-SSCD2: 14
    • PP-SSCD3: 13
    • PP-SSCD4: 14
    • PP-SSCD5: 16
    • PP-SSCD6: 11
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 9
    • ADV_IMP.1: 4
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 8
  • AGD:
    • AGD_OPE: 4
    • AGD_OPE.1: 5
    • AGD_PRE: 6
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 3
    • ALC_TAT.1: 3
  • APE:
    • APE_SRE: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 8
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 9
    • ADV_IMP.1: 4
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 8
  • AGD:
    • AGD_OPE: 6
    • AGD_OPE.1: 5
    • AGD_PRE: 8
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 3
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 13
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 56
    • FDP_ACC.1: 15
    • FDP_ACF: 44
    • FDP_ACF.1: 20
    • FDP_DAU: 10
    • FDP_DAU.2: 2
    • FDP_IFC.1: 7
    • FDP_ITC: 12
    • FDP_ITC.1: 5
    • FDP_ITC.2: 2
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
    • FDP_SDI: 22
    • FDP_SDI.2: 4
    • FDP_UCT: 13
    • FDP_UCT.1: 1
    • FDP_UIT: 9
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 3
    • FIA_API.1: 12
    • FIA_API.1.1: 2
    • FIA_UAU.1: 17
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA: 23
    • FMT_MSA.1: 4
    • FMT_MSA.2: 12
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 14
    • FMT_MSA.4.1: 1
    • FMT_MTD: 20
    • FMT_MTD.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 47
    • FTP_ITC.1: 14
    • FTP_TRP.1: 2
  • FCS:
    • FCS_CKM.1: 16
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 48
    • FDP_ACC.1: 15
    • FDP_ACF: 36
    • FDP_ACF.1: 20
    • FDP_DAU: 8
    • FDP_DAU.2: 2
    • FDP_IFC.1: 7
    • FDP_ITC: 10
    • FDP_ITC.1: 5
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_SDI: 18
    • FDP_SDI.2: 4
    • FDP_UCT: 11
    • FDP_UCT.1: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 3
    • FIA_API.1: 13
    • FIA_API.1.1: 2
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_EMS.1: 1
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 19
    • FMT_MSA.1: 4
    • FMT_MSA.2: 10
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 12
    • FMT_MSA.4.1: 1
    • FMT_MTD: 16
    • FMT_MTD.1: 2
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 22
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 8
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 12
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 39
    • FTP_ITC.1: 14
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 6
    • A.CSP: 8
    • A.SCA: 5
    • A.SEC_PERSO: 8
  • D:
    • D.RAD: 3
    • D.SCD: 2
    • D.SECRET: 3
    • D.SVD: 2
    • D.VAD: 3
  • OE:
    • OE: 1
    • OE.HID_VAD: 7
    • OE.HI_VAD: 2
    • OE.SEC_PERSO: 10
  • A:
    • A.CGA: 6
    • A.CSP: 8
    • A.SCA: 5
    • A.SEC_PERS: 1
    • A.SEC_PERSO: 7
  • D:
    • D.RAD: 3
    • D.SCD: 2
    • D.SECRET: 3
    • D.SVD: 2
    • D.VAD: 3
  • OE:
    • OE: 1
    • OE.HID_VAD: 7
    • OE.HI_VAD: 2
    • OE.SEC_PERSO: 10
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 15
  • NXP:
    • NXP: 13
  • Idemia:
    • IDEMIA: 116
  • Infineon:
    • Infineon: 7
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 28
  • DES:
    • 3DES:
      • 3DES: 6
      • TDES: 19
  • constructions:
    • MAC:
      • CMAC: 7
  • AES_competition:
    • AES:
      • AES: 23
  • DES:
    • 3DES:
      • 3DES: 4
      • TDES: 18
  • constructions:
    • MAC:
      • CMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-2: 2
      • SHA-256: 8
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-2: 2
      • SHA-256: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 8
  • SCA:
    • DPA: 3
    • SPA: 3
    • physical probing: 1
    • side channel: 1
    • timing attacks: 2
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 5
  • SCA:
    • DPA: 3
    • SPA: 3
    • physical probing: 1
    • side channel: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 180-2: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15408:2005: 2
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9797-1: 2
  • NIST:
    • NIST SP 800-90: 5
  • PKCS:
    • PKCS#1: 7
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS PUB 180-2: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15408:2005: 2
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9797-1: 1
  • NIST:
    • NIST SP 800-90: 3
    • NIST SP 800-90A: 1
  • PKCS:
    • PKCS#1: 6
pdf_data/st_metadata
  • /Author: HAJJ Mohamad
  • /CreationDate: D:20191010103730+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20191010103730+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Title
  • pdf_file_size_bytes: 2084649
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 102
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/extract_ok True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different