Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145
ANSSI-CC-2020/26
IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB
ANSSI-CC-2018/15
name Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB
not_valid_before 2020-06-16 2018-05-04
not_valid_after 2025-06-16 2026-06-09
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_26en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_15en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_26fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_15fr.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_anssi-cc-2018_15-s02fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': frozenset({'ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2020, 10, 20), 'maintenance_title': 'ANSSI-CC-2020/26-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_26-m01fr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-26en.pdf'}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2021, 6, 9), 'maintenance_title': 'Reassessment report: ANSSI-CC-2018/15-S02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_15-s02fr.pdf', 'maintenance_st_link': None})
state/cert/convert_garbage False True
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 3869d0650d7be2127cd1b1d1b851e0cc1a1e1d9bc1a2b31bf1017eeba9df2fd0
state/cert/txt_hash None 5fc966d16df7b043f6d0f0d7be8481b5225ae55fde3db940623b63a2e87e81eb
state/report/pdf_hash 810183e5acf14d8e66dc28037841d05aa90256b8e466ffee4281bfe7b0dbdbed 4bf84fe2f2e21184d2074505b56d29728e52bfafffd3d6992d10739a93ea5217
state/report/txt_hash bf5c67f94ddee3c4c3ffde18edceca94dda413968ea9ac542c911664e43ff26d f816dd494f076f4aea223b380fe19abfef4993ef4d0f3c3db8954ca2018cbd2d
state/st/pdf_hash 7ae5caaa15da5cc1f7c647b78d0703011f7ab9f038b67a0ef3a06e61532f2758 b2e59380b0a8edf409b13c13cec17d23ad5d26c387a5041b6852a55b8150edd3
state/st/txt_hash 155973df0a2daf52533b3d05047abdd947661882ae689d1377938b8942f040f3 dca35257f2be923a7976363dd88b1bb85e5c788aaf73473a2febe889a639cf53
heuristics/cert_id ANSSI-CC-2020/26 ANSSI-CC-2018/15
heuristics/extracted_versions 8.2 8.1
heuristics/report_references/directly_referenced_by ANSSI-CC-2020/52, ANSSI-CC-2020/50, ANSSI-CC-2020/36, ANSSI-CC-2020/38, ANSSI-CC-2020/35, ANSSI-CC-2020/51, ANSSI-CC-2020/37, ANSSI-CC-2020/53 None
heuristics/report_references/directly_referencing ANSSI-CC-2019/28, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018 ANSSI-CC-2017/49
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2020/52, ANSSI-CC-2020/50, ANSSI-CC-2020/36, ANSSI-CC-2020/38, ANSSI-CC-2020/35, ANSSI-CC-2020/51, ANSSI-CC-2020/37, ANSSI-CC-2020/53 None
heuristics/scheme_data/cert_id 2020/26 2018/18
heuristics/scheme_data/description Le produit évalué est « Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145, identification du matériel : 091121, identification du patch : 094222 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur NXP P60D145 développé et fabriqué par NXP SEMICONDUCTORS GMBH. Le produit dispose d'interfaces avec et sans contact. Il est destiné à héberger et exécuter une ou plus Le produit certifié est « IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB, Identification E0 02 02 0A » développé par IDEMIA et NXP SEMICONDUCTORS GMBH. Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2, et d’un microcontrôleur sécurisés. Il est destiné à être uti
heuristics/scheme_data/developer Idemia, NXP Semiconductors GmnH Idemia, NXP Semiconductors GmbH
heuristics/scheme_data/enhanced
  • cert_id: 2020/26
  • certification_date: 16/06/2020
  • expiration_date: 16/06/2025
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: Idemia, NXP Semiconductors GmnH
  • sponsor: Idemia
  • evaluation_facility: CEA-Leti
  • level: EAL5+
  • protection_profile: Java Card Protection Profile Open Configuration, version 3.0
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • report_link: https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cc-2020_26fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cible-cc-2020_26en.pdf
  • cert_id: 2018/18
  • certification_date: 04/05/2018
  • expiration_date: 09/06/2026
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r4
  • developer: Idemia, NXP Semiconductors GmbH
  • sponsor: Idemia
  • evaluation_facility: CEA - LETI
  • level: EAL5+
  • protection_profile: PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • target_link: https://cyber.gouv.fr/sites/default/files/2018/05/anssi-cible-cc-2018_18en.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/2018/05/anssi-cc-2018_18fr.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/2018/05/certificat_anssi-cc-2018_18-s02fr.pdf
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r5 Critères Communs version 3.1r4
heuristics/scheme_data/enhanced/cert_id 2020/26 2018/18
heuristics/scheme_data/enhanced/certification_date 16/06/2020 04/05/2018
heuristics/scheme_data/enhanced/developer Idemia, NXP Semiconductors GmnH Idemia, NXP Semiconductors GmbH
heuristics/scheme_data/enhanced/evaluation_facility CEA-Leti CEA - LETI
heuristics/scheme_data/enhanced/expiration_date 16/06/2025 09/06/2026
heuristics/scheme_data/enhanced/protection_profile Java Card Protection Profile Open Configuration, version 3.0 PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cc-2020_26fr.pdf https://cyber.gouv.fr/sites/default/files/2018/05/anssi-cc-2018_18fr.pdf
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cible-cc-2020_26en.pdf https://cyber.gouv.fr/sites/default/files/2018/05/anssi-cible-cc-2018_18en.pdf
heuristics/scheme_data/expiration_date 16 Juin 2025 9 Juin 2026
heuristics/scheme_data/product Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v82-masquee-sur-le-composant-nxp-p60d145-0 https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-en-configuration-4-en-composition-sur-la-plateforme-ouverte-id-one
heuristics/st_references/directly_referenced_by ANSSI-CC-2020/52, ANSSI-CC-2020/50, ANSSI-CC-2020/36, ANSSI-CC-2020/38, ANSSI-CC-2020/35, ANSSI-CC-2020/51, ANSSI-CC-2020/37, ANSSI-CC-2020/53 None
heuristics/st_references/directly_referencing None ANSSI-CC-2017/49
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2020/52, ANSSI-CC-2020/50, ANSSI-CC-2020/36, ANSSI-CC-2020/38, ANSSI-CC-2020/35, ANSSI-CC-2020/51, ANSSI-CC-2020/37, ANSSI-CC-2020/53 None
heuristics/st_references/indirectly_referencing None ANSSI-CC-2017/49, BSI-DSZ-CC-0955-V2-2016
pdf_data/cert_filename None certificat_anssi-cc-2018_15-s02fr.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2018/15-S02: 2
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0059-2009-MA-01: 1
  • cc_security_level:
    • EAL:
      • EAL5: 1
  • cc_sar:
  • cc_sfr:
  • cc_claims:
  • vendor:
    • NXP:
      • NXP: 2
    • Idemia:
      • IDEMIA: 1
  • eval_facility:
    • CEA-LETI:
      • CEA-LETI: 2
  • symmetric_crypto:
  • asymmetric_crypto:
    • ECC:
      • ECC:
        • ECC: 1
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
    • TLS:
      • SSL:
        • SSL: 1
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 601743
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20210611115432+02'00'
  • /ModDate: D:20210611115432+02'00'
  • pdf_hyperlinks:
pdf_data/report_filename anssi-cc-2020_26fr.pdf anssi-cc-2018_15fr.pdf
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 5 Critères Communs version 3.1 révision 4
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2020/26 ANSSI-CC-2018/15
pdf_data/report_frontpage/FR/cert_item Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB
pdf_data/report_frontpage/FR/cert_item_version Identification du matériel : 091121 Identification du patch : 094222 Identification E0 02 02 0A
pdf_data/report_frontpage/FR/cert_lab CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
pdf_data/report_frontpage/FR/developer Idemia 2 place Samuel de Champlain 92400 Courbevoie, France NXP Semiconductors GmbH Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire Idemia 2 place Samuel de Champlain 92400 Courbevoie, France Idemia 420 rue d’Estienne D’Orves 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101 22539 Hamburg, Allemagne Commanditaire Idemia 420 rue d’Estienne D’Orves, 92700 Colombes, France
pdf_data/report_frontpage/FR/ref_protection_profiles PP JCS-O] Java Card Protection Profile Open Configuration, version 3.0 Protection profiles for secure signature creation device [PP-SSCD-Part2] Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; [PP-SSCD-Part3] Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; [PP-SSCD-Part4] Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; [PP-SSCD-Part5] Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; [PP-SSCD-Part6] Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 3 26
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1059-V3-2019: 2
    • BSI-DSZ-CC-1059-2018: 1
  • FR:
    • ANSSI-CC-2020/26: 19
    • ANSSI-CC-2019/28: 3
    • ANSSI-CC-2019/28-M01: 1
  • FR:
    • ANSSI-CC-2018/15: 17
    • ANSSI-CC-2017/49: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2020/26: 19
  • ANSSI-CC-2019/28: 3
  • ANSSI-CC-2019/28-M01: 1
  • ANSSI-CC-2018/15: 17
  • ANSSI-CC-2017/49: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03M01: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP-0076-: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03-: 1
  • other:
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 1
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 2
    • PP-SSCD-: 6
pdf_data/report_keywords/cc_protection_profile_id/ANSSI
  • ANSSI-CC-PP-2010/03M01: 1
  • ANSSI-CC-PP-2010/03-: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0084-2014: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0071-2012: 1
  • BSI-CC-PP-0072-2012: 1
  • BSI-CC-PP-0076-2013: 1
  • BSI-CC-PP- 0059-2009-MA-01: 1
  • BSI-CC-PP- 0075-2012: 1
  • BSI-CC-PP- 0071-2012: 1
  • BSI-CC-PP- 0072-2012: 1
  • BSI-CC-PP-0076-: 1
pdf_data/report_keywords/cc_sar/AGD
  • AGD_PRE: 3
  • AGD_OPE: 4
  • AGD_ALP: 4
  • AGD_PRE: 6
  • AGD_OPE: 4
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 3 6
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR.1: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 2 3
pdf_data/report_keywords/cc_sar/ASE
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 4 5
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL2: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
pdf_data/report_keywords/vendor/Idemia/IDEMIA 14 9
pdf_data/report_keywords/vendor/NXP/NXP 35 27
pdf_data/report_keywords/vendor/NXP/NXP Semiconductors 3 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 714501
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /CreationDate: D:20200617145110+02'00'
  • /ModDate: D:20200617145110+02'00'
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_file_size_bytes: 622215
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /CreationDate: D:20180514091621+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.026
  • /ModDate: D:20180515181030+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject:
  • /Title:
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/report_metadata//CreationDate D:20200617145110+02'00' D:20180514091621+02'00'
pdf_data/report_metadata//ModDate D:20200617145110+02'00' D:20180515181030+02'00'
pdf_data/report_metadata/pdf_file_size_bytes 714501 622215
pdf_data/report_metadata/pdf_number_of_pages 18 16
pdf_data/st_filename anssi-cible-cc-2020_26en.pdf anssi-cible-cc-2018_15en.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 2
  • ECDSA:
    • ECDSA: 4
  • ECC:
    • ECC: 8
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 35
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 8 35
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 4 2
pdf_data/st_keywords/asymmetric_crypto/FF
  • DH:
    • Diffie-Hellman: 5
  • DH:
    • DH: 5
    • Diffie-Hellman: 1
  • DSA:
    • DSA: 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH
  • Diffie-Hellman: 5
  • DH: 5
  • Diffie-Hellman: 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 5 1
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1059: 2
  • FR:
    • ANSSI-CC-2017/49: 1
    • ANSSI-CC-2017/49-M01: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.BIO: 12
    • D.CONFIG: 4
    • D.SENSITIVE_DATA: 2
    • D.ARRAY: 5
    • D.JCS_KEYS: 6
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 9
    • D.API_DATA: 3
    • D.CRYPTO: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
    • D.A: 1
    • D.NB_REMAINTRYGLB: 1
  • O:
    • O.CARD_MANAGEMENT: 51
    • O.SCP: 54
    • O.RESIDENT_APPLICATION: 23
    • O.SECURE_COMPARE: 10
    • O.PATCH_LOADING: 26
    • O.BIO-: 8
    • O.SID: 33
    • O.FIREWALL: 64
    • O.GLOBAL_ARRAYS_CONFID: 19
    • O.GLOBAL_ARRAYS_INTEG: 10
    • O.NATIVE: 14
    • O.OPERATE: 36
    • O.REALLOCATION: 17
    • O.RESOURCES: 24
    • O.ALARM: 21
    • O.CIPHER: 19
    • O.KEY-MNGT: 26
    • O.PIN-MNGT: 28
    • O.BIO-MNGT: 17
    • O.TRANSACTION: 19
    • O.OBJ-DELETION: 8
    • O.DELETION: 15
    • O.LOAD: 16
    • O.INSTALL: 18
    • O.PIN-: 2
    • O.APPLET: 15
    • O.CODE_PKG: 20
    • O.JAVAOBJECT: 47
    • O.REMOTE_MTHD: 1
    • O.REMOTE_OBJ: 1
    • O.ROR: 1
    • O.APPI: 1
    • O.COIPKG: 1
    • O.JAVAOBJE: 1
  • T:
    • T.CONFIGURATION: 5
    • T.CONF_DATA_APPLET: 5
    • T.PATCH_LOADING: 5
    • T.CONFID-APPLI-DATA: 18
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 5
    • T.INTEG-APPLI-CODE: 9
    • T.INTEG-APPLI-DATA: 15
    • T.INTEG-JCS-CODE: 6
    • T.INTEG-JCS-DATA: 5
    • T.SID: 18
    • T.EXE-CODE: 9
    • T.NATIVE: 6
    • T.RESOURCES: 8
    • T.DELETION: 6
    • T.INSTALL: 6
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.INTEG-APPLI-: 13
    • T.CONFID-JCS-: 8
    • T.INTEG-JCS-: 7
    • T.INTEG-: 2
  • A:
    • A.DELETION: 3
    • A.APPLET: 5
    • A.VERIFICATION: 5
  • R:
    • R.JAVA: 9
  • OP:
    • OP.ARRAY_ACCESS: 9
    • OP.CREATE: 6
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.FLOW: 3
    • OP.IMPORT_KEY: 1
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
    • OP.PUT: 6
    • OP.RET_RORD: 1
    • OP.STATIC_FIELD: 3
    • OP.CRE: 1
    • OP.OPERAND_STACK_ACCESS: 2
    • OP.LOCAL_STACK_ACCESS: 2
  • OE:
    • OE.VERIFICATION: 38
    • OE.CODE-: 3
    • OE.CARD_MANAGEMENT: 3
    • OE.SCP: 6
    • OE.CODE-EVIDENCE: 18
    • OE.APPLET: 8
  • OSP:
    • OSP.VERIFICATION: 5
  • T:
    • T.CONFID_APPLI_DATA: 3
    • T.RESSOURCES: 3
    • T.OBJ_DELETION: 3
    • T.PHYSICAL: 3
    • T.INTEG_APPLI_DATA: 6
  • A:
    • A.CGA: 4
    • A.SCA: 3
    • A.CSP: 4
    • A.PLT: 2
    • A.APPLET: 1
    • A.VERIFICATION: 1
  • OE:
    • OE.PLT: 2
    • OE.VERIFICATION: 4
    • OE.CODE_EVIDENCE: 2
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
  • OSP:
    • OSP.PLT: 2
    • OSP.VERIFICATION: 1
pdf_data/st_keywords/cc_claims/A
  • A.DELETION: 3
  • A.APPLET: 5
  • A.VERIFICATION: 5
  • A.CGA: 4
  • A.SCA: 3
  • A.CSP: 4
  • A.PLT: 2
  • A.APPLET: 1
  • A.VERIFICATION: 1
pdf_data/st_keywords/cc_claims/A/A.APPLET 5 1
pdf_data/st_keywords/cc_claims/A/A.VERIFICATION 5 1
pdf_data/st_keywords/cc_claims/OE
  • OE.VERIFICATION: 38
  • OE.CODE-: 3
  • OE.CARD_MANAGEMENT: 3
  • OE.SCP: 6
  • OE.CODE-EVIDENCE: 18
  • OE.APPLET: 8
  • OE.PLT: 2
  • OE.VERIFICATION: 4
  • OE.CODE_EVIDENCE: 2
  • OE.APPLET: 1
  • OE.CODE-EVIDENCE: 1
pdf_data/st_keywords/cc_claims/OE/OE.APPLET 8 1
pdf_data/st_keywords/cc_claims/OE/OE.CODE-EVIDENCE 18 1
pdf_data/st_keywords/cc_claims/OE/OE.VERIFICATION 38 4
pdf_data/st_keywords/cc_claims/OSP
  • OSP.VERIFICATION: 5
  • OSP.PLT: 2
  • OSP.VERIFICATION: 1
pdf_data/st_keywords/cc_claims/OSP/OSP.VERIFICATION 5 1
pdf_data/st_keywords/cc_claims/T
  • T.CONFIGURATION: 5
  • T.CONF_DATA_APPLET: 5
  • T.PATCH_LOADING: 5
  • T.CONFID-APPLI-DATA: 18
  • T.CONFID-JCS-CODE: 4
  • T.CONFID-JCS-DATA: 5
  • T.INTEG-APPLI-CODE: 9
  • T.INTEG-APPLI-DATA: 15
  • T.INTEG-JCS-CODE: 6
  • T.INTEG-JCS-DATA: 5
  • T.SID: 18
  • T.EXE-CODE: 9
  • T.NATIVE: 6
  • T.RESOURCES: 8
  • T.DELETION: 6
  • T.INSTALL: 6
  • T.OBJ-DELETION: 4
  • T.PHYSICAL: 4
  • T.INTEG-APPLI-: 13
  • T.CONFID-JCS-: 8
  • T.INTEG-JCS-: 7
  • T.INTEG-: 2
  • T.CONFID_APPLI_DATA: 3
  • T.RESSOURCES: 3
  • T.OBJ_DELETION: 3
  • T.PHYSICAL: 3
  • T.INTEG_APPLI_DATA: 6
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 4 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03_M01: 1
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0072: 1
    • BSI-CC-PP-0076: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075: 1
  • BSI-CC-PP-0071: 1
  • BSI-CC-PP-0072: 1
  • BSI-CC-PP-0076: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 6
  • ADV_FSP.1: 4
  • ADV_TDS.1: 2
  • ADV_FSP.5: 8
  • ADV_TDS.4: 8
  • ADV_IMP.1: 9
  • ADV_TDS.3: 4
  • ADV_FSP.2: 2
  • ADV_FSP.4: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_TDS: 1
  • ADV_ARC.1: 2
  • ADV_TDS.3: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 6 2
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 4 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_PRE: 12
  • AGD_OPE: 2
  • AGD_OPE.1: 10
  • AGD_PRE.1: 6
  • AGD_PRE: 25
  • AGD_OPE: 27
  • AGD_PRE_PLT: 3
  • AGD_OPE.1: 2
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE 2 27
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 10 2
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE 12 25
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 11
  • ALC_FLR.1: 1
  • ALC_DVS: 1
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 7
  • ALC_DVS: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_LCD: 1
  • ALC_TAT: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 11 7
pdf_data/st_keywords/cc_sar/ASE
  • ASE_TSS.2: 1
  • ASE_CCL.1: 1
  • ASE_ECD.1: 4
  • ASE_INT.1: 5
  • ASE_REQ.1: 2
  • ASE_REQ.2: 2
  • ASE_OBJ.2: 3
  • ASE_SPD.1: 2
  • ASE_TSS.1: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_TSS: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 3
  • ATE_FUN.1: 6
  • ATE_COV.1: 2
  • ATE_DPT.1: 1
  • ATE_DPT.3: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
  • ATE_DPT.1: 2
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.1 1 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN 1 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 11 8
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 4
  • EAL6: 1
  • EAL5: 5
  • EAL5 augmented: 1
  • EAL5: 6
  • EAL 5: 2
  • EAL4: 1
  • EAL5 augmented: 2
  • EAL4 augmented: 1
  • EAL 5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 5 6
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_STG.2: 10
    • FAU_ARP.1: 20
    • FAU_ARP.1.1: 1
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_SAA.1: 3
    • FAU_GEN.1: 2
  • FCO:
    • FCO_NRO: 19
    • FCO_NRO.2: 8
  • FCS:
    • FCS_RNG: 11
    • FCS_COP: 29
    • FCS_CKM: 23
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 12
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 10
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 22
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 16
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 84
    • FDP_ACF: 69
    • FDP_UCT: 13
    • FDP_ITC: 28
    • FDP_UIT: 19
    • FDP_ACC.2: 13
    • FDP_ACF.1: 34
    • FDP_IFC: 31
    • FDP_IFC.1: 21
    • FDP_IFF: 24
    • FDP_IFF.1: 16
    • FDP_RIP: 151
    • FDP_RIP.1: 10
    • FDP_ROL.1: 5
    • FDP_ROL: 17
    • FDP_SDI.2: 12
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC.2: 16
    • FDP_IFC.2: 2
    • FDP_UIT.1: 4
    • FDP_UCT.1: 1
    • FDP_ITC.1: 10
    • FDP_ACC.1: 24
  • FIA:
    • FIA_AFL: 49
    • FIA_UAU: 66
    • FIA_UID: 37
    • FIA_ATD: 20
    • FIA_ATD.1: 3
    • FIA_UID.2: 1
    • FIA_USB: 10
    • FIA_USB.1: 3
    • FIA_UID.1: 16
    • FIA_AFL.1: 10
    • FIA_UAU.1: 11
    • FIA_UAU.4: 2
    • FIA_UAU.7: 2
  • FMT:
    • FMT_SMR: 68
    • FMT_MSA: 215
    • FMT_SMF: 73
    • FMT_MOF: 12
    • FMT_MTD: 51
    • FMT_MSA.1: 20
    • FMT_MSA.2: 4
    • FMT_MSA.3: 26
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 57
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.3: 1
    • FMT_SMR.2: 6
    • FMT_MOF.1: 1
    • FMT_MTD.2: 2
  • FPR:
    • FPR_UNO: 29
    • FPR_UNO.1: 17
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_TST.1: 13
    • FPT_TDC: 9
    • FPT_PHP: 9
    • FPT_FLS: 57
    • FPT_RCV: 39
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 2
    • FPT_TDC.1: 12
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV.3: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3: 1
    • FPT_RCV.4: 1
  • FRU:
    • FRU_FLT: 9
    • FRU_FLT.1: 1
  • FTP:
    • FTP_ITC: 28
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
  • FAU:
    • FAU_GEN: 1
    • FAU_ARP.1: 2
  • FCS:
    • FCS_RNG: 4
    • FCS_CKM.1: 41
    • FCS_CKM: 34
    • FCS_COP: 104
    • FCS_RNG.1: 19
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.2: 8
    • FCS_COP.1: 38
    • FCS_CKM.4: 60
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 3
    • FCS_CKM.3: 7
  • FDP:
    • FDP_ACC: 71
    • FDP_ACF: 49
    • FDP_ETC: 5
    • FDP_ITC: 21
    • FDP_ITC.1: 42
    • FDP_ITC.2: 35
    • FDP_ACF.1: 36
    • FDP_ACC.1: 40
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 3
    • FDP_SDI: 15
    • FDP_SDI.1: 2
    • FDP_SDI.2: 6
    • FDP_IFC.1: 22
    • FDP_UCT: 7
    • FDP_UCT.1: 1
    • FDP_DAU: 6
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_UIT: 5
    • FDP_UIT.1: 2
    • FDP_ETC.1: 2
    • FDP_CKM: 4
    • FDP_CKM.1: 1
    • FDP_RIP: 11
    • FDP_ROL: 1
  • FIA:
    • FIA_API: 5
    • FIA_API.1: 9
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.1: 16
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_API.1.1: 1
    • FIA_AFL.1: 3
    • FIA_AFL: 22
    • FIA_AFL.1.1: 1
  • FMT:
    • FMT_MSA: 31
    • FMT_MTD: 39
    • FMT_MSA.3: 31
    • FMT_SMR.1: 43
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 43
    • FMT_SMF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 8
    • FMT_MSA.4.1: 1
    • FMT_MTD.1: 6
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
  • FPR:
    • FPR_UNO.1: 1
    • FPR_UNO: 3
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 9
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 2
    • FPT_TST.1: 13
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_TST: 1
    • FPT_FLS: 5
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_RCV: 2
    • FPT_PHP: 2
  • FTP:
    • FTP_ITC.1: 16
    • FTP_TRP.1: 4
    • FTP_ITC: 31
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.2: 10
  • FAU_ARP.1: 20
  • FAU_ARP.1.1: 1
  • FAU_STG.2.1: 1
  • FAU_STG.2.2: 1
  • FAU_STG.2.3: 1
  • FAU_SAA.1: 3
  • FAU_GEN.1: 2
  • FAU_GEN: 1
  • FAU_ARP.1: 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_ARP.1 20 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 11
  • FCS_COP: 29
  • FCS_CKM: 23
  • FCS_RNG.1: 4
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM.1: 23
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 12
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 10
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 22
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 16
  • FCS_COP.1.1: 1
  • FCS_RNG: 4
  • FCS_CKM.1: 41
  • FCS_CKM: 34
  • FCS_COP: 104
  • FCS_RNG.1: 19
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.2: 8
  • FCS_COP.1: 38
  • FCS_CKM.4: 60
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 3
  • FCS_CKM.3: 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 23 34
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 23 41
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 12 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.3 10 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 22 60
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 29 104
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 16 38
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 1 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 11 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 4 19
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 1 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 1 3
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 84
  • FDP_ACF: 69
  • FDP_UCT: 13
  • FDP_ITC: 28
  • FDP_UIT: 19
  • FDP_ACC.2: 13
  • FDP_ACF.1: 34
  • FDP_IFC: 31
  • FDP_IFC.1: 21
  • FDP_IFF: 24
  • FDP_IFF.1: 16
  • FDP_RIP: 151
  • FDP_RIP.1: 10
  • FDP_ROL.1: 5
  • FDP_ROL: 17
  • FDP_SDI.2: 12
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC.2: 16
  • FDP_IFC.2: 2
  • FDP_UIT.1: 4
  • FDP_UCT.1: 1
  • FDP_ITC.1: 10
  • FDP_ACC.1: 24
  • FDP_ACC: 71
  • FDP_ACF: 49
  • FDP_ETC: 5
  • FDP_ITC: 21
  • FDP_ITC.1: 42
  • FDP_ITC.2: 35
  • FDP_ACF.1: 36
  • FDP_ACC.1: 40
  • FDP_RIP.1: 10
  • FDP_RIP.1.1: 3
  • FDP_SDI: 15
  • FDP_SDI.1: 2
  • FDP_SDI.2: 6
  • FDP_IFC.1: 22
  • FDP_UCT: 7
  • FDP_UCT.1: 1
  • FDP_DAU: 6
  • FDP_DAU.1: 1
  • FDP_DAU.2: 2
  • FDP_UIT: 5
  • FDP_UIT.1: 2
  • FDP_ETC.1: 2
  • FDP_CKM: 4
  • FDP_CKM.1: 1
  • FDP_RIP: 11
  • FDP_ROL: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 84 71
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 24 40
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 69 49
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 34 36
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 21 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 28 21
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 42
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 16 35
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 151 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL 17 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 12 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 13 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 19 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 4 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL: 49
  • FIA_UAU: 66
  • FIA_UID: 37
  • FIA_ATD: 20
  • FIA_ATD.1: 3
  • FIA_UID.2: 1
  • FIA_USB: 10
  • FIA_USB.1: 3
  • FIA_UID.1: 16
  • FIA_AFL.1: 10
  • FIA_UAU.1: 11
  • FIA_UAU.4: 2
  • FIA_UAU.7: 2
  • FIA_API: 5
  • FIA_API.1: 9
  • FIA_UID.1: 17
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.1: 16
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_API.1.1: 1
  • FIA_AFL.1: 3
  • FIA_AFL: 22
  • FIA_AFL.1.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 49 22
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 10 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 11 16
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 16 17
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR: 68
  • FMT_MSA: 215
  • FMT_SMF: 73
  • FMT_MOF: 12
  • FMT_MTD: 51
  • FMT_MSA.1: 20
  • FMT_MSA.2: 4
  • FMT_MSA.3: 26
  • FMT_SMF.1: 31
  • FMT_SMF.1.1: 1
  • FMT_SMR.1: 57
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 5
  • FMT_MTD.3: 1
  • FMT_SMR.2: 6
  • FMT_MOF.1: 1
  • FMT_MTD.2: 2
  • FMT_MSA: 31
  • FMT_MTD: 39
  • FMT_MSA.3: 31
  • FMT_SMR.1: 43
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 43
  • FMT_SMF.1.1: 1
  • FMT_MSA.1: 7
  • FMT_MSA.2: 9
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.4: 8
  • FMT_MSA.4.1: 1
  • FMT_MTD.1: 6
  • FMT_MOF.1: 7
  • FMT_MOF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 1 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 215 31
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 4 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 26 31
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 51 39
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 5 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 31 43
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 57 43
pdf_data/st_keywords/cc_sfr/FPR
  • FPR_UNO: 29
  • FPR_UNO.1: 17
  • FPR_UNO.1.1: 1
  • FPR_UNO.1: 1
  • FPR_UNO: 3
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO 29 3
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 17 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST.1: 13
  • FPT_TDC: 9
  • FPT_PHP: 9
  • FPT_FLS: 57
  • FPT_RCV: 39
  • FPT_FLS.1: 21
  • FPT_FLS.1.1: 2
  • FPT_TDC.1: 12
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV.3: 11
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3: 1
  • FPT_RCV.4: 1
  • FPT_EMS: 7
  • FPT_EMS.1: 9
  • FPT_EMS.1.1: 4
  • FPT_EMS.1.2: 2
  • FPT_TST.1: 13
  • FPT_FLS.1: 10
  • FPT_FLS.1.1: 1
  • FPT_TST: 1
  • FPT_FLS: 5
  • FPT_PHP.1: 5
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 7
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_RCV: 2
  • FPT_PHP: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 57 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 21 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 2 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP 9 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 1 7
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV 39 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 28 31
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 10 16
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 10
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_scheme/MAC/MAC 2 8
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 4
    • SHA1: 1
  • SHA2:
    • SHA-224: 2
    • SHA-384: 1
    • SHA-256: 2
    • SHA-512: 1
  • SHA3:
    • SHA3-224: 2
    • SHA3-384: 2
    • SHA3-512: 2
    • SHA3-256: 1
    • SHA-3: 3
  • SHA1:
    • SHA-1: 7
  • SHA2:
    • SHA-256: 5
    • SHA-224: 2
    • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 4
  • SHA1: 1
  • SHA-1: 7
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 4 7
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 2
  • SHA-384: 1
  • SHA-256: 2
  • SHA-512: 1
  • SHA-256: 5
  • SHA-224: 2
  • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 2 5
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 1 2
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.se: 1
    • javacard.crypto: 1
    • javacard.security: 3
    • javacard.framework: 4
  • javacardx:
    • javacardx.biometry: 1
    • javacardx.crypto: 2
    • javacardx.security: 1
    • javacardx.framework.util: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 4
  • GlobalPlatform:
    • Global Platform 2.2.1: 2
pdf_data/st_keywords/randomness/RNG/RNG 14 6
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 4
    • DPA: 2
    • SPA: 1
  • FI:
    • physical tampering: 2
    • malfunction: 2
    • fault injection: 1
  • SCA:
    • side channel: 1
    • SPA: 1
    • DPA: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 5
    • DFA: 2
    • fault injection: 2
  • other:
    • JIL: 1
    • JIL-COMP: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 2
  • malfunction: 2
  • fault injection: 1
  • physical tampering: 5
  • DFA: 2
  • fault injection: 2
pdf_data/st_keywords/side_channel_analysis/FI/fault injection 1 2
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 2 5
pdf_data/st_keywords/side_channel_analysis/SCA
  • physical probing: 4
  • DPA: 2
  • SPA: 1
  • side channel: 1
  • SPA: 1
  • DPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 2 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-3: 4
    • FIPS PUB 81: 6
    • FIPS PUB 197: 4
    • FIPS PUB 202: 3
    • FIPS 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-3: 1
  • NIST:
    • NIST SP 800-90: 2
  • PKCS:
    • PKCS#1: 3
  • BSI:
    • AIS31: 1
  • ISO:
    • ISO/IEC 7816: 2
    • ISO/IEC 14443: 2
    • ISO/IEC 9797: 8
    • ISO/IEC 9796-: 1
    • ISO/IEC 7816-6: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC 9797-1: 1
  • SCP:
    • SCP02: 4
    • SCP03: 5
  • FIPS:
    • FIPS180-3: 1
    • FIPS PUB 180-3: 1
    • FIPS 180-3: 1
  • PKCS:
    • PKCS#1: 3
    • PKCS #1: 1
    • PKCS#3: 3
    • PKCS#15: 2
  • ISO:
    • ISO/IEC 9796-2: 4
  • SCP:
    • SCP03: 7
    • SCP02: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 46-3: 4
  • FIPS PUB 81: 6
  • FIPS PUB 197: 4
  • FIPS PUB 202: 3
  • FIPS 140-2: 1
  • FIPS PUB 180-3: 1
  • FIPS PUB 186-3: 1
  • FIPS180-3: 1
  • FIPS PUB 180-3: 1
  • FIPS 180-3: 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816: 2
  • ISO/IEC 14443: 2
  • ISO/IEC 9797: 8
  • ISO/IEC 9796-: 1
  • ISO/IEC 7816-6: 1
  • ISO/IEC 9796-1: 1
  • ISO/IEC 9797-1: 1
  • ISO/IEC 9796-2: 4
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 3
  • PKCS#1: 3
  • PKCS #1: 1
  • PKCS#3: 3
  • PKCS#15: 2
pdf_data/st_keywords/standard_id/SCP/SCP02 4 2
pdf_data/st_keywords/standard_id/SCP/SCP03 5 7
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 22 17
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 10 3
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 16 10
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 2
  • CMAC: 3
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 10
  • Idemia:
    • IDEMIA: 52
  • NXP:
    • NXP: 1
  • Oberthur:
    • Oberthur Technologies: 2
    • Oberthur: 1
  • Idemia:
    • IDEMIA: 16
  • Morpho:
    • Morpho: 1
pdf_data/st_keywords/vendor/Idemia/IDEMIA 52 16
pdf_data/st_keywords/vendor/NXP/NXP 10 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 3856796
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 202
  • /Title: Security Target ERATO
  • /Author: Sarra MESTIRI
  • /Subject: ST cosmo V8
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20200603093031+02'00'
  • /ModDate: D:20200603093031+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 2312206
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 128
  • /CreationDate: D:20180425111850+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20180515180601+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks: ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD
pdf_data/st_metadata//CreationDate D:20200603093031+02'00' D:20180425111850+02'00'
pdf_data/st_metadata//ModDate D:20200603093031+02'00' D:20180515180601+02'00'
pdf_data/st_metadata/pdf_file_size_bytes 3856796 2312206
pdf_data/st_metadata/pdf_hyperlinks ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD
pdf_data/st_metadata/pdf_number_of_pages 202 128
dgst f343a98bc35eaae5 c01ae04f3515c379