This page was not yet optimized for use on mobile devices.
Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04)
CSV information ?
Status | active |
---|---|
Valid from | 12.02.2025 |
Valid until | 12.02.2030 |
Scheme | 🇫🇷 FR |
Manufacturer | THALES DIS FRANCE SA |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL4+, ALC_DVS.2, ALC_FLR.1 |
Heuristics summary ?
Certificate ID: ANSSI-CC-2025/04
Certificate ?
Extracted keywords
Vendor
ThalesSecurity level
EAL4, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5Certificates
ANSSI-CC-2025/04, 2020-37-INF-3429- v1Evaluation facilities
Serma Safety & SecurityFile metadata
Creation date | D:20250213155808+01'00' |
---|---|
Modification date | D:20250213155922+01'00' |
Pages | 2 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESVendor
ThalesSecurity level
EAL4, EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ALC_FLR, AVA_VAN.5, AVA_VANCertificates
ANSSI-CC-2025/04, NSCIB-CC-2300182-01, 2020-37-INF-3429- v1Evaluation facilities
SERMA, CESTIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20250213155846+01'00' |
---|---|
Modification date | D:20250213155921+01'00' |
Pages | 16 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
References
Outgoing- NSCIB-CC-2300182-01-CR - active - STMicroelectronics ST54L A02
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES128, DES, TDES, 3DES, HMAC, KMAC, CMAC, CBC-MACAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA224, SHA256, SHA384, SHA512, SHA-224, SHA3-224, SHA3-256, SHA3-384, SHA3-512Schemes
MAC, Key Exchange, Key Agreement, Key agreementProtocols
TLS, PACE, PGPRandomness
RNG, RNDBlock cipher modes
ECB, CBC, CTR, GCM, CCMTLS cipher suites
TLS_PSK_WITH_AES_128_CBC_S, TLS_PSK_WITH_NULL_SHA, TLS_PSK_WITH_NULL_SHA256JavaCard versions
Java Card 3.1.0, Global Platform 2.3.1JavaCard API constants
ALG_DES_CBC_NOPAD, ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_ISO9797_M2, ALG_DES_CBC_PKCS5, ALG_DES_ECB_NOPAD, ALG_DES_ECB_ISO9797_M1, ALG_DES_ECB_ISO9797_M2, ALG_DES_ECB_PKCS5, ALG_DES_MAC4_ISO9797_1_M1_ALG3, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC4_PKCS5, ALG_DES_MAC4_NOPAD, ALG_DES_MAC8_ISO9797_1_M1_ALG3, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_DES_MAC8_ISO9797_M1, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_PKCS5, ALG_DES_MAC8_NOPAD, ALG_RSA_SHA_224_PKCS1, ALG_RSA_SHA_224_PKCS1_PSS, ALG_RSA_SHA_256_PKCS1, ALG_RSA_SHA_256_PKCS1_PSS, ALG_RSA_SHA_384_PKCS1, ALG_RSA_SHA_384_PKCS1_PSS, ALG_RSA_SHA_512_PKCS1, ALG_RSA_SHA_512_PKCS1_PSS, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_ISO9796_MR, ALG_RSA_SHA_PKCS1, ALG_RSA_SHA_PKCS1_PSS, ALG_RSA_SHA_RFC2409, ALG_RSA_NOPAD, ALG_RSA_PKCS1_OAEP, ALG_RSA_PKCS1, ALG_ECDSA_SHA, ALG_ECDSA_SHA_224, ALG_ECDSA_SHA_256, ALG_ECDSA_SHA_384, ALG_ECDSA_SHA_512, ALG_AES_BLOCK_128_CBC_NOPAD, ALG_AES_CBC_ISO9797_M1, ALG_AES_CBC_ISO9797_M2, ALG_AES_CBC_PKCS5, ALG_AES_BLOCK_128_ECB_NOPAD, ALG_AES_ECB_ISO9797_M1, ALG_AES_ECB_ISO9797_M2, ALG_AES_ECB_PKCS5, ALG_AES_CTR, ALG_AES_CCM, ALG_AES_GCM, ALG_AES_MAC_128_NOPAD, ALG_AES_CMAC_128, ALG_AES_MAC_192_NOPAD, ALG_AES_MAC_256_NOPAD, ALG_HMAC_SHA1, ALG_HMAC_SHA_256, ALG_HMAC_SHA_384, ALG_HMAC_SHA_512, ALG_EC_FP, ALG_EC_SVDP_DH_KDF, ALG_EC_SVDP_DH_PLAIN_XY, ALG_EC_SVDP_DHC_KDF, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC_PLAIN, ALG_SHA_224, ALG_SHA_256, ALG_SHA_384, ALG_SHA_512, ALG_SHA3_224, ALG_SHA3_256, ALG_SHA3_384, ALG_SHA3_512, ALG_ISO3309_CRC16, ALG_ISO3309_CRC32, SIG_CIPHER_DES_MAC4, SIG_CIPHER_DES_MAC8, SIG_CIPHER_AES_MAC128, SIG_CIPHER_AES_CMAC128, SIG_CIPHER_RSA, SIG_CIPHER_ECDSA, SIG_CIPHER_ECDSA_PLAIN, SIG_CIPHER_HMAC, CIPHER_AES_CCM, CIPHER_AES_GCM, PAD_PKCS1_OAEP, PAD_PKCS1_OAEP_SHA256, PAD_PKCS1_OAEP_SHA3_256, PAD_PKCS1_OAEP_SHA3_512, PAD_PKCS1_OAEP_SHA512, TYPE_ACCESS, TYPE_EC_FP_PRIVATE, TYPE_EC_FP_PRIVATE_TRANSIENT_RESET, TYPE_HMAC_TRANSIENT_RESET, TYPE_HMAC, LENGTH_EC_FP_160, LENGTH_EC_FP_192, LENGTH_EC_FP_224, LENGTH_EC_FP_256, LENGTH_EC_FP_384, LENGTH_EC_FP_521, LENGTH_HMAC_SHA_1_BLOCK_64, LENGTH_HMAC_SHA_256_BLOCK_64, LENGTH_HMAC_SHA_384_BLOCK_64, LENGTH_HMAC_SHA_384_BLOCK_128, LENGTH_HMAC_SHA_512_BLOCK_64, LENGTH_HMAC_SHA_512_BLOCK_128, LENGTH_RSA_1024, LENGTH_RSA_1536, LENGTH_RSA_2048, LENGTH_SHA, LENGTH_AES_128, LENGTH_SHA_224, LENGTH_SHA_384, LENGTH_SHA3_224, LENGTH_SHA3_384, BRAINPOOLP192R1, BRAINPOOLP224R1, BRAINPOOLP256R1, BRAINPOOLP320R1, BRAINPOOLP384R1, BRAINPOOLP512R1, BRAINPOOLP256T1, BRAINPOOLP320T1, BRAINPOOLP384T1, BRAINPOOLP512T1, SECP192R1, SECP256R1, SECP521R1, SECP384R1Trusted Execution Environments
SEVendor
STMicroelectronics, ThalesSecurity level
EAL4+, EAL4, EAL6+, EAL4 augmentedClaims
D.ISD_KEYS, D.APP_KEYS, D.APSD_KEYS, D.CASD_KEYS, D.GP_REGISTRY, D.GP_CODE, D.TOE_IDENTIFIER, D.CLFDB-DK, D.GS-PARAMETERS, D.CVM_PIN, D.CVM_MGMT_STATE, D.TOKEN-, D.RECEIPT-, D.CONFIRMATION-, D.DAP_BLOCK, D.APSD_DAP_KEYS, D.CASD_DAP_KEYS, D.CCCM_KEYS, D.CTL_REGISTRY, D.CTL_PRO, D.OLD_ELF, D.NEW_ELF, D.ELF_AID, D.ELF_SESSION_ST, D.ELF_APP_INS, D.ELF_RG_DATA, D.OS-, D.OS-UPDATE_DEC-, D.OS-UPDATE-CODE-, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.RECEIPT-GENERATION-KEY, D.CONFIRMATION-DATA, D.TOKEN-VERIFICATION-KEY, D.OS-UPDATE_ADDITIONALCODE, D.OS-UPDATE_SGNVER-KEY, D.OS, D.OS-UPDATE-CODE-ID, D.OS-UPDATE_DEC-KEY, O.KEY-MNGT, O.CARD-, O.DOMAIN-RIGHTS, O.APPLI-AUTH, O.SECURITY-, O.COMM-AUTH, O.COMM-INTEGRITY, O.COMM-, O.NO-KEY-REUSE, O.PRIVILEGES-, O.LC-MANAGEMENT, O.CLFDB-DECIPHER, O.GLOBAL-CVM, O.CVM-BLOCK, O.CVM-MGMT, O.RECEIPT, O.TOKEN, O.CCCM, O.CTL_REGISTRY, O.CTL_SC, O.CRS_PRIVILEGES, O.CRS_COUNTERS, O.ELF_AUTHORISED, O.ELF_INTEGRITY, O.ELF_APP_DATA, O.ELF_SESSION, O.ELF_DELE_IRR, O.ELF_DATA_PRO, O.SECURE_LOAD_AC, O.SECURE_AC_ACTIV, O.TOE_IDENTIFICATI, O.CONFID-OS-, O.SID, O.FIREWALL, O.GLOBAL_ARRAY, O.ARRAY_VIEWS_, O.ARRAY_VIEWS_I, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.SENSITIVE_ARR, O.SENSITIVE_RES, O.MTC-CTR-MNGT, O.CRT-MNGT, O.CARD-MANAGEMENT, O.COMM-CONFIDENTIALITY, O.PRIVILEGES-MANAGEMENT, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, O.GLOBAL_ARRAYS_CONFID, O.ARRAY_VIEWS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEWS_INTEG, O.MTC-CTR-, O.SENSITIVE_ARRAYS_INTEG, O.SENSITIVE_RESULTS_INTEG, O.SECURITY-DOMAINS, O.RND, O.TOE-, O.PIN-, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.JAVAOB, O.JAVAO, O.CODE_, O.JAVAOBJE, O.CODE_PKG, T.UNAUTHORISED-, T.LIFE-CYCLE, T.COM-EXPLOIT, T.BRUTE-FORCE-SCP, T.CLFDB-DISC, T.CVM-IMPERSONATE, T.CVM-UPDATE, T.BRUTE-FORCE-CVM, T.RECEIPT, T.TOKEN, T.CTL-REGISTRY-, T.COUNTERS-FREEZE, T.CTL-AUTH-FORGE, T.CRS-BYPASS, T.ELF-UNAUTHORISED, T.ELF-VERSION, T.ELF-DATA-ACCESS, T.ELF-DATA-INTEGRITY, T.ELF-SESSION, T.ELF-ILL-COMMAND, T.ELF-RES-DATA, T.UNAUTHORISED-TOE-, T.FAKE-SGNVER-KEY, T.WRONG-UPDATE-, T.INTEG-OS-UPDATE-, T.CONFID-OS-UPDATE-, T.CONFID-APPLI-, T.CONFID-JCS-, T.INTEG-APPLI-, T.INTEG-JCS-, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.UNAUTHORISED-CARD-MGMT, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.RND, T.CONFID-APPLI-DATA, T.INTEG-APPLI-DATA, T.CTL-REGISTRY-OVERWRITE, T.UNAUTHORISED-TOE-CODE-, T.WRONG-UPDATE-STATE, T.INTEG-OS-UPDATE-LOAD, T.CONFID-OS-UPDATE-LOAD, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.UNAUTHORISED-TOE-CODE-UPDATE, A.ISSUER, A.ADMIN, A.APPS-PROVIDER, A.VERIFICATION-, A.KEY-ESCROW, A.PERSONALISER, A.CONTROLLING-, A.PRODUCTION, A.SCP-SUPP, A.KEYS-PROT, A.OS-UPDATE-, A.SECURE_ACODE_, A.CAP_FILE, A.VERIFICA, A.VERIFICATION-AUTHORITY, A.CONTROLLING-AUTHORITY, A.OS-UPDATE-EVIDENCE, A.SECURE_ACODE_MANAGEMENT, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_ALOAD, OP.ARRAY_T_ASTORE, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUTFIELD, OP.PUTSTATIC, OP.PUT, OE.SCP, OE.OS-UPDATE-ENCRYPTION, OE.ISSUER, OE.ADMIN, OE.APPS-PROVIDER, OE.VERIFICATION-, OE.KEY-ESCROW, OE.PERSONALISER, OE.CONTROLLING-, OE.SCP-SUPP, OE.KEYS-PROT, OE.PRODUCTION, OE.APPLICATIONS, OE.AID-MANAGEMENT, OE.LOADING, OE.SERVERS, OE.AP-KEYS, OE.ISD-KEYS, OE.KEY-GENERATION, OE.CA-KEYS, OE.KEY-CHANGE, OE.CLFDB-ENC-PR, OE.TOKEN-GEN, OE.RECEIPT-VER, OE.DAP_BLOCK_GEN, OE.OS-UPDATE-EVIDENCE, OE.OS-UPDATE-, OE.SECURE_ACODE_MANA, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-, OE.CODE-EVIDENCE, OE.VERIFICATION-AUTHORITY, OE.CONTROLLING-AUTHORITY, OE.SECURE_ACODE_MANAGEMENT, OSP.AID-MANAGEMENT, OSP.LOADING, OSP.SERVERS, OSP.APSD-KEYS, OSP.ISD-KEYS, OSP.KEY-GENERATION, OSP.CASD-KEYS, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.APPLICATIONS, OSP.CLFDB-ENC-PR, OSP.TOKEN-GEN, OSP.RECEIPT-VER, OSP.DAP_BLOCK_GEN, OSP.CCCM, OSP.ELF_DELE_OP, OSP.ATOMIC_ACTIVATION, OSP.TOE_IDENTIFICATION, OSP.ADDITIONAL_CODE_SIG, OSP.ADDITIONAL_CODE_EN, OSP.VERIFICATION, OSP.ADDITIONAL_CODE_SIGNING, OSP.ADDITIONAL_CODE_ENCRYPTIONSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FAU_SAR, FAU_SAS, FCO_NRO, FCO_NRO.2, FCO_NRR, FCO_NRR.1, FCS_RNG.1, FCS_CKM.5, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.5.1, FCS_COP, FCS_CKM.4.1, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_ITC, FDP_ITC.2, FDP_UIT, FDP_UIT.1, FDP_ROL, FDP_ROL.1, FDP_UCT, FDP_UCT.1, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACC.2, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_SDI, FDP_SDI.2, FDP_SDI.2.2, FDP_ITC.1, FDP_SDC.1, FDP_ITT.1, FIA_UID, FIA_UID.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_API.1, FMT_MTD, FMT_MTD.1, FMT_MSA, FMT_MSA.1, FMT_SMR, FMT_MSA.3, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD.3, FMT_MSA.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_RCV, FPT_RCV.3, FPT_FLS, FPT_FLS.1, FPT_TDC, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.4, FPT_STM, FPT_STM.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_TRP, FTP_TRP.1, FTP_ITC, FTP_ITC.1Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014Certificates
CC-1, CC-2, CC-3, NSCIB-CC-2300182-01Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, physical tampering, malfunction, Malfunction, JILCertification process
out of scope, GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1, of software patches (GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1. ▪ Integrated mapping (DH and ECDH). ▪ Generic mapping (DH) ▪ PACE and mEAC, protection of the confidentiality and integrity of user data, and for entity authentication. CSP is out of scope of the TOE. CSP provides service, including: Connected eSE 5.3.4 v1.2 Platform Security Target, v1.2 Platform Security Target Lite © Copyright Thales DIS France SAS - 2024 Page: 62 / 171 point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT areStandards
FIPS PUB 180-4, FIPS PUB 186-4, FIPS 197, FIPS PUB 197, FIPS 198, FIPS 180, FIPS 197126, FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 186-4184, FIPS 180-4, FIPS 202, PKCS#1, PKCS #1, PKCS#5157, PKCS#5161, PKCS#5, AIS20, AIS31, RFC2104, RFC 5758, RFC3610165, RFC2409174, RFC2409, RFC 5246, RFC 5869, ISO/IEC 10116, ISO/IEC 14888-2, ISO/IEC 18032, ISO/IEC 18033-3, ISO/IEC 9797-1, ISO/IEC 9797-2, ISO/IEC 9796-2, ISO/IEC 3309206, ISO/IEC 18032:2020, ICAO, X.509, SCP11, SCP02, SCP80, SCP81, SCP03, SCP10, SCP22, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20241031112531+01'00' |
---|---|
Modification date | D:20241031112531+01'00' |
Pages | 171 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
References
Outgoing- NSCIB-CC-2300182-01-CR - active - STMicroelectronics ST54L A02
Heuristics ?
Certificate ID: ANSSI-CC-2025/04
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.5Similar certificates
Showing 5 out of 109.
References ?
Updates ?
-
03.03.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e8e0d6a32cb00a81ceec3b7faa5e79edfd8a79a6b141f118aa62d009838f2266', 'txt_hash': '437dc0a8767059f61a2e30ddb6f240c62089f2ebfb8470650ed81c4850c1785c'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5b67c154f7da0aaf487dfca5d460deeca0392ad1d4230a08f1ca40806e2f6b9d', 'txt_hash': '19b92ec941cea4d6da6dc1c7fc181ef0ddcc9694f3e6e5dbad7b06a6b42ec373'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2bb32f3f339c9d50ac17a3a7b85f32f7453914fe79baac9582cd89d8943c6774', 'txt_hash': 'c23e75fd2a2a6b847f53a18de667f495aa8abdc770cb06836cf573037289f4b1'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 361570, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20250213155846+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250213155921+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/', 'mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 2293709, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 171, '/Creator': 'Microsoft® Word for Microsoft 365', '/CreationDate': "D:20241031112531+01'00'", '/ModDate': "D:20241031112531+01'00'", '/Producer': 'Microsoft® Word for Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 169332, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20250213155808+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20250213155922+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2025/04': 3}, 'NL': {'NSCIB-CC-2300182-01': 1}, 'ES': {'2020-37-INF-3429- v1': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 2, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Thales': {'Thales': 7}}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 3, 'NSCIB-CC-2300182-01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-V2-2020': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 4, 'EAL6+': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.4': 9, 'ADV_TDS.3': 5, 'ADV_IMP.1': 4, 'ADV_FSP.2': 2, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 9, 'AGD_PRE.1': 3}, 'ALC': {'ALC_DVS.2': 4, 'ALC_FLR.1': 4, 'ALC_FLR.2': 1, 'ALC_TAT.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 5, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 4, 'ASE_REQ.1': 2, 'ASE_REQ.2': 1, 'ASE_OBJ.2': 2, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_ARP.1': 15, 'FAU_ARP.1.1': 2, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1, 'FAU_SAR': 2, 'FAU_SAS': 1}, 'FCO': {'FCO_NRO': 28, 'FCO_NRO.2': 9, 'FCO_NRR': 5, 'FCO_NRR.1': 3}, 'FCS': {'FCS_RNG.1': 11, 'FCS_CKM.5': 7, 'FCS_RNG': 1, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 72, 'FCS_CKM.1': 31, 'FCS_CKM.2': 9, 'FCS_COP.1': 31, 'FCS_CKM.4': 65, 'FCS_CKM.5.1': 1, 'FCS_COP': 160, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_IFC': 67, 'FDP_IFC.2': 6, 'FDP_IFF': 53, 'FDP_IFF.1': 27, 'FDP_ITC': 32, 'FDP_ITC.2': 33, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_ROL': 32, 'FDP_ROL.1': 11, 'FDP_UCT': 6, 'FDP_UCT.1': 1, 'FDP_ACC': 66, 'FDP_ACC.1': 27, 'FDP_ACF': 58, 'FDP_ACF.1': 38, 'FDP_ACC.2': 5, 'FDP_IFC.1': 23, 'FDP_RIP': 127, 'FDP_RIP.1': 9, 'FDP_SDI': 25, 'FDP_SDI.2': 10, 'FDP_SDI.2.2': 1, 'FDP_ITC.1': 23, 'FDP_SDC.1': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_UID': 34, 'FIA_UID.1': 14, 'FIA_UAU': 27, 'FIA_UAU.1': 4, 'FIA_UAU.4': 1, 'FIA_AFL': 11, 'FIA_AFL.1': 8, 'FIA_ATD': 13, 'FIA_ATD.1': 3, 'FIA_UID.2': 1, 'FIA_USB': 7, 'FIA_USB.1': 3, 'FIA_API.1': 1}, 'FMT': {'FMT_MTD': 38, 'FMT_MTD.1': 5, 'FMT_MSA': 189, 'FMT_MSA.1': 19, 'FMT_SMR': 82, 'FMT_MSA.3': 30, 'FMT_SMR.1': 43, 'FMT_SMF': 78, 'FMT_SMF.1': 28, 'FMT_MTD.3': 2, 'FMT_MSA.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM': 6}, 'FPR': {'FPR_UNO': 12, 'FPR_UNO.1': 14, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_RCV': 24, 'FPT_RCV.3': 10, 'FPT_FLS': 58, 'FPT_FLS.1': 7, 'FPT_TDC': 9, 'FPT_TDC.1': 9, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_RCV.4': 1, 'FPT_STM': 3, 'FPT_STM.1': 5, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_TRP': 10, 'FTP_TRP.1': 11, 'FTP_ITC': 34, 'FTP_ITC.1': 13}}, 'cc_claims': {'D': {'D.ISD_KEYS': 3, 'D.APP_KEYS': 9, 'D.APSD_KEYS': 3, 'D.CASD_KEYS': 1, 'D.GP_REGISTRY': 6, 'D.GP_CODE': 1, 'D.TOE_IDENTIFIER': 1, 'D.CLFDB-DK': 1, 'D.GS-PARAMETERS': 1, 'D.CVM_PIN': 3, 'D.CVM_MGMT_STATE': 3, 'D.TOKEN-': 1, 'D.RECEIPT-': 1, 'D.CONFIRMATION-': 1, 'D.DAP_BLOCK': 1, 'D.APSD_DAP_KEYS': 1, 'D.CASD_DAP_KEYS': 1, 'D.CCCM_KEYS': 1, 'D.CTL_REGISTRY': 5, 'D.CTL_PRO': 5, 'D.OLD_ELF': 3, 'D.NEW_ELF': 3, 'D.ELF_AID': 3, 'D.ELF_SESSION_ST': 2, 'D.ELF_APP_INS': 3, 'D.ELF_RG_DATA': 1, 'D.OS-': 3, 'D.OS-UPDATE_DEC-': 1, 'D.OS-UPDATE-CODE-': 1, 'D.APP_CODE': 7, 'D.APP_C_DATA': 5, 'D.APP_I_DATA': 9, 'D.PIN': 6, 'D.API_DATA': 3, 'D.CRYPTO': 4, 'D.JCS_CODE': 6, 'D.JCS_DATA': 10, 'D.SEC_DATA': 8, 'D.RECEIPT-GENERATION-KEY': 1, 'D.CONFIRMATION-DATA': 1, 'D.TOKEN-VERIFICATION-KEY': 1, 'D.OS-UPDATE_ADDITIONALCODE': 3, 'D.OS-UPDATE_SGNVER-KEY': 1, 'D.OS': 1, 'D.OS-UPDATE-CODE-ID': 1, 'D.OS-UPDATE_DEC-KEY': 1}, 'O': {'O.KEY-MNGT': 9, 'O.CARD-': 11, 'O.DOMAIN-RIGHTS': 9, 'O.APPLI-AUTH': 5, 'O.SECURITY-': 2, 'O.COMM-AUTH': 10, 'O.COMM-INTEGRITY': 10, 'O.COMM-': 1, 'O.NO-KEY-REUSE': 5, 'O.PRIVILEGES-': 1, 'O.LC-MANAGEMENT': 6, 'O.CLFDB-DECIPHER': 5, 'O.GLOBAL-CVM': 5, 'O.CVM-BLOCK': 9, 'O.CVM-MGMT': 9, 'O.RECEIPT': 5, 'O.TOKEN': 5, 'O.CCCM': 9, 'O.CTL_REGISTRY': 5, 'O.CTL_SC': 5, 'O.CRS_PRIVILEGES': 5, 'O.CRS_COUNTERS': 5, 'O.ELF_AUTHORISED': 5, 'O.ELF_INTEGRITY': 5, 'O.ELF_APP_DATA': 7, 'O.ELF_SESSION': 7, 'O.ELF_DELE_IRR': 5, 'O.ELF_DATA_PRO': 5, 'O.SECURE_LOAD_AC': 1, 'O.SECURE_AC_ACTIV': 1, 'O.TOE_IDENTIFICATI': 1, 'O.CONFID-OS-': 1, 'O.SID': 15, 'O.FIREWALL': 19, 'O.GLOBAL_ARRAY': 2, 'O.ARRAY_VIEWS_': 1, 'O.ARRAY_VIEWS_I': 1, 'O.NATIVE': 11, 'O.OPERATE': 23, 'O.REALLOCATION': 7, 'O.RESOURCES': 7, 'O.ALARM': 16, 'O.CIPHER': 9, 'O.RNG': 8, 'O.PIN-MNGT': 7, 'O.TRANSACTION': 7, 'O.OBJ-DELETION': 5, 'O.DELETION': 5, 'O.LOAD': 11, 'O.INSTALL': 11, 'O.SCP': 45, 'O.SENSITIVE_ARR': 1, 'O.SENSITIVE_RES': 1, 'O.MTC-CTR-MNGT': 4, 'O.CRT-MNGT': 5, 'O.CARD-MANAGEMENT': 22, 'O.COMM-CONFIDENTIALITY': 7, 'O.PRIVILEGES-MANAGEMENT': 4, 'O.SECURE_LOAD_ACODE': 10, 'O.SECURE_AC_ACTIVATION': 6, 'O.TOE_IDENTIFICATION': 6, 'O.CONFID-OS-UPDATE': 6, 'O.GLOBAL_ARRAYS_CONFID': 6, 'O.ARRAY_VIEWS_CONFID': 4, 'O.GLOBAL_ARRAYS_INTEG': 6, 'O.ARRAY_VIEWS_INTEG': 4, 'O.MTC-CTR-': 1, 'O.SENSITIVE_ARRAYS_INTEG': 4, 'O.SENSITIVE_RESULTS_INTEG': 4, 'O.SECURITY-DOMAINS': 3, 'O.RND': 1, 'O.TOE-': 1, 'O.PIN-': 1, 'O.APPLET': 16, 'O.CODE_CAP_FILE': 12, 'O.JAVAOBJECT': 42, 'O.JAVAOB': 4, 'O.JAVAO': 1, 'O.CODE_': 1, 'O.JAVAOBJE': 1, 'O.CODE_PKG': 1}, 'T': {'T.UNAUTHORISED-': 1, 'T.LIFE-CYCLE': 4, 'T.COM-EXPLOIT': 4, 'T.BRUTE-FORCE-SCP': 3, 'T.CLFDB-DISC': 3, 'T.CVM-IMPERSONATE': 3, 'T.CVM-UPDATE': 3, 'T.BRUTE-FORCE-CVM': 3, 'T.RECEIPT': 3, 'T.TOKEN': 3, 'T.CTL-REGISTRY-': 1, 'T.COUNTERS-FREEZE': 3, 'T.CTL-AUTH-FORGE': 3, 'T.CRS-BYPASS': 3, 'T.ELF-UNAUTHORISED': 3, 'T.ELF-VERSION': 3, 'T.ELF-DATA-ACCESS': 3, 'T.ELF-DATA-INTEGRITY': 3, 'T.ELF-SESSION': 3, 'T.ELF-ILL-COMMAND': 3, 'T.ELF-RES-DATA': 3, 'T.UNAUTHORISED-TOE-': 1, 'T.FAKE-SGNVER-KEY': 3, 'T.WRONG-UPDATE-': 1, 'T.INTEG-OS-UPDATE-': 1, 'T.CONFID-OS-UPDATE-': 1, 'T.CONFID-APPLI-': 1, 'T.CONFID-JCS-': 2, 'T.INTEG-APPLI-': 4, 'T.INTEG-JCS-': 1, 'T.INTEG-JCS-DATA': 3, 'T.SID': 8, 'T.EXE-CODE': 7, 'T.NATIVE': 3, 'T.RESOURCES': 3, 'T.DELETION': 4, 'T.UNAUTHORISED-CARD-MGMT': 4, 'T.INSTALL': 4, 'T.OBJ-DELETION': 3, 'T.PHYSICAL': 9, 'T.RND': 1, 'T.CONFID-APPLI-DATA': 3, 'T.INTEG-APPLI-DATA': 5, 'T.CTL-REGISTRY-OVERWRITE': 2, 'T.UNAUTHORISED-TOE-CODE-': 1, 'T.WRONG-UPDATE-STATE': 2, 'T.INTEG-OS-UPDATE-LOAD': 2, 'T.CONFID-OS-UPDATE-LOAD': 2, 'T.CONFID-JCS-CODE': 2, 'T.CONFID-JCS-DATA': 2, 'T.INTEG-APPLI-CODE': 4, 'T.INTEG-JCS-CODE': 2, 'T.UNAUTHORISED-TOE-CODE-UPDATE': 1}, 'A': {'A.ISSUER': 3, 'A.ADMIN': 3, 'A.APPS-PROVIDER': 3, 'A.VERIFICATION-': 1, 'A.KEY-ESCROW': 3, 'A.PERSONALISER': 3, 'A.CONTROLLING-': 1, 'A.PRODUCTION': 4, 'A.SCP-SUPP': 3, 'A.KEYS-PROT': 3, 'A.OS-UPDATE-': 1, 'A.SECURE_ACODE_': 1, 'A.CAP_FILE': 4, 'A.VERIFICA': 1, 'A.VERIFICATION-AUTHORITY': 2, 'A.CONTROLLING-AUTHORITY': 2, 'A.OS-UPDATE-EVIDENCE': 2, 'A.SECURE_ACODE_MANAGEMENT': 2, 'A.VERIFICATION': 2}, 'R': {'R.JAVA': 12}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 4, 'OP.ARRAY_T_ALOAD': 3, 'OP.ARRAY_T_ASTORE': 3, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_CAP_FILE': 3, 'OP.DELETE_CAP_FILE_APPLET': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1, 'OP.PUT': 5}, 'OE': {'OE.SCP': 3, 'OE.OS-UPDATE-ENCRYPTION': 4, 'OE.ISSUER': 3, 'OE.ADMIN': 3, 'OE.APPS-PROVIDER': 3, 'OE.VERIFICATION-': 1, 'OE.KEY-ESCROW': 3, 'OE.PERSONALISER': 3, 'OE.CONTROLLING-': 1, 'OE.SCP-SUPP': 3, 'OE.KEYS-PROT': 3, 'OE.PRODUCTION': 4, 'OE.APPLICATIONS': 3, 'OE.AID-MANAGEMENT': 3, 'OE.LOADING': 3, 'OE.SERVERS': 3, 'OE.AP-KEYS': 3, 'OE.ISD-KEYS': 3, 'OE.KEY-GENERATION': 3, 'OE.CA-KEYS': 3, 'OE.KEY-CHANGE': 3, 'OE.CLFDB-ENC-PR': 3, 'OE.TOKEN-GEN': 3, 'OE.RECEIPT-VER': 3, 'OE.DAP_BLOCK_GEN': 3, 'OE.OS-UPDATE-EVIDENCE': 3, 'OE.OS-UPDATE-': 1, 'OE.SECURE_ACODE_MANA': 1, 'OE.CAP_FILE': 6, 'OE.VERIFICATION': 35, 'OE.CODE-': 5, 'OE.CODE-EVIDENCE': 12, 'OE.VERIFICATION-AUTHORITY': 2, 'OE.CONTROLLING-AUTHORITY': 2, 'OE.SECURE_ACODE_MANAGEMENT': 2}, 'OSP': {'OSP.AID-MANAGEMENT': 3, 'OSP.LOADING': 3, 'OSP.SERVERS': 3, 'OSP.APSD-KEYS': 3, 'OSP.ISD-KEYS': 3, 'OSP.KEY-GENERATION': 3, 'OSP.CASD-KEYS': 3, 'OSP.KEY-CHANGE': 3, 'OSP.SECURITY-DOMAINS': 3, 'OSP.APPLICATIONS': 3, 'OSP.CLFDB-ENC-PR': 3, 'OSP.TOKEN-GEN': 3, 'OSP.RECEIPT-VER': 3, 'OSP.DAP_BLOCK_GEN': 3, 'OSP.CCCM': 3, 'OSP.ELF_DELE_OP': 3, 'OSP.ATOMIC_ACTIVATION': 3, 'OSP.TOE_IDENTIFICATION': 3, 'OSP.ADDITIONAL_CODE_SIG': 1, 'OSP.ADDITIONAL_CODE_EN': 1, 'OSP.VERIFICATION': 3, 'OSP.ADDITIONAL_CODE_SIGNING': 2, 'OSP.ADDITIONAL_CODE_ENCRYPTION': 2}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 20}, 'Thales': {'Thales': 208}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 40, 'AES128': 2}}, 'DES': {'DES': {'DES': 5}, '3DES': {'TDES': 49, '3DES': 11}}, 'constructions': {'MAC': {'HMAC': 15, 'KMAC': 3, 'CMAC': 4, 'CBC-MAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 19}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 9}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'DH': 4, 'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4, 'SHA1': 7}, 'SHA2': {'SHA-256': 5, 'SHA-384': 5, 'SHA-512': 4, 'SHA224': 3, 'SHA256': 4, 'SHA384': 4, 'SHA512': 4, 'SHA-224': 1}, 'SHA3': {'SHA3-224': 1, 'SHA3-256': 1, 'SHA3-384': 1, 'SHA3-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 18}, 'KEX': {'Key Exchange': 1}, 'KA': {'Key Agreement': 8, 'Key agreement': 5}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}, 'PACE': {'PACE': 1}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RNG': 10, 'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 8}, 'CBC': {'CBC': 32}, 'CTR': {'CTR': 1}, 'GCM': {'GCM': 3}, 'CCM': {'CCM': 13}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_PSK_WITH_AES_128_CBC_S': 1, 'TLS_PSK_WITH_NULL_SHA': 1, 'TLS_PSK_WITH_NULL_SHA256': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 3, 'Physical Probing': 2, 'physical probing': 3, 'side channel': 1, 'DPA': 1}, 'FI': {'physical tampering': 1, 'malfunction': 4, 'Malfunction': 5}, 'other': {'JIL': 8}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 16}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 1, 'FIPS PUB 186-4': 2, 'FIPS 197': 4, 'FIPS PUB 197': 3, 'FIPS 198': 2, 'FIPS 180': 1, 'FIPS 197126': 1, 'FIPS PUB 46-3': 2, 'FIPS PUB 81': 2, 'FIPS PUB 186-4184': 1, 'FIPS 180-4': 5, 'FIPS 202': 4}, 'PKCS': {'PKCS#1': 9, 'PKCS #1': 1, 'PKCS#5157': 1, 'PKCS#5161': 1, 'PKCS#5': 1}, 'BSI': {'AIS20': 2, 'AIS31': 6}, 'RFC': {'RFC2104': 2, 'RFC 5758': 2, 'RFC3610165': 1, 'RFC2409174': 1, 'RFC2409': 1, 'RFC 5246': 2, 'RFC 5869': 2}, 'ISO': {'ISO/IEC 10116': 4, 'ISO/IEC 14888-2': 2, 'ISO/IEC 18032': 4, 'ISO/IEC 18033-3': 2, 'ISO/IEC 9797-1': 7, 'ISO/IEC 9797-2': 2, 'ISO/IEC 9796-2': 1, 'ISO/IEC 3309206': 2, 'ISO/IEC 18032:2020': 1}, 'ICAO': {'ICAO': 4}, 'X509': {'X.509': 4}, 'SCP': {'SCP11': 13, 'SCP02': 16, 'SCP80': 12, 'SCP81': 11, 'SCP03': 13, 'SCP10': 2, 'SCP22': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {'JavaCard': {'Java Card 3.1.0': 4}, 'GlobalPlatform': {'Global Platform 2.3.1': 1}}, 'javacard_api_const': {'ALG': {'DES': {'ALG_DES_CBC_NOPAD': 2, 'ALG_DES_CBC_ISO9797_M1': 2, 'ALG_DES_CBC_ISO9797_M2': 2, 'ALG_DES_CBC_PKCS5': 2, 'ALG_DES_ECB_NOPAD': 2, 'ALG_DES_ECB_ISO9797_M1': 2, 'ALG_DES_ECB_ISO9797_M2': 2, 'ALG_DES_ECB_PKCS5': 2, 'ALG_DES_MAC4_ISO9797_1_M1_ALG3': 2, 'ALG_DES_MAC4_ISO9797_1_M2_ALG3': 2, 'ALG_DES_MAC4_ISO9797_M1': 2, 'ALG_DES_MAC4_ISO9797_M2': 2, 'ALG_DES_MAC4_PKCS5': 2, 'ALG_DES_MAC4_NOPAD': 2, 'ALG_DES_MAC8_ISO9797_1_M1_ALG3': 2, 'ALG_DES_MAC8_ISO9797_1_M2_ALG3': 2, 'ALG_DES_MAC8_ISO9797_M1': 2, 'ALG_DES_MAC8_ISO9797_M2': 2, 'ALG_DES_MAC8_PKCS5': 2, 'ALG_DES_MAC8_NOPAD': 2}, 'RSA': {'ALG_RSA_SHA_224_PKCS1': 2, 'ALG_RSA_SHA_224_PKCS1_PSS': 2, 'ALG_RSA_SHA_256_PKCS1': 2, 'ALG_RSA_SHA_256_PKCS1_PSS': 2, 'ALG_RSA_SHA_384_PKCS1': 2, 'ALG_RSA_SHA_384_PKCS1_PSS': 2, 'ALG_RSA_SHA_512_PKCS1': 2, 'ALG_RSA_SHA_512_PKCS1_PSS': 2, 'ALG_RSA_SHA_ISO9796': 2, 'ALG_RSA_SHA_ISO9796_MR': 2, 'ALG_RSA_SHA_PKCS1': 2, 'ALG_RSA_SHA_PKCS1_PSS': 2, 'ALG_RSA_SHA_RFC2409': 2, 'ALG_RSA_NOPAD': 2, 'ALG_RSA_PKCS1_OAEP': 2, 'ALG_RSA_PKCS1': 1}, 'ECDSA': {'ALG_ECDSA_SHA': 2, 'ALG_ECDSA_SHA_224': 2, 'ALG_ECDSA_SHA_256': 2, 'ALG_ECDSA_SHA_384': 2, 'ALG_ECDSA_SHA_512': 2}, 'AES': {'ALG_AES_BLOCK_128_CBC_NOPAD': 2, 'ALG_AES_CBC_ISO9797_M1': 2, 'ALG_AES_CBC_ISO9797_M2': 2, 'ALG_AES_CBC_PKCS5': 2, 'ALG_AES_BLOCK_128_ECB_NOPAD': 2, 'ALG_AES_ECB_ISO9797_M1': 2, 'ALG_AES_ECB_ISO9797_M2': 2, 'ALG_AES_ECB_PKCS5': 2, 'ALG_AES_CTR': 2, 'ALG_AES_CCM': 2, 'ALG_AES_GCM': 2, 'ALG_AES_MAC_128_NOPAD': 2, 'ALG_AES_CMAC_128': 4, 'ALG_AES_MAC_192_NOPAD': 1, 'ALG_AES_MAC_256_NOPAD': 1}, 'HMAC': {'ALG_HMAC_SHA1': 8, 'ALG_HMAC_SHA_256': 8, 'ALG_HMAC_SHA_384': 2, 'ALG_HMAC_SHA_512': 2}, 'EC': {'ALG_EC_FP': 6, 'ALG_EC_SVDP_DH_KDF': 2, 'ALG_EC_SVDP_DH_PLAIN_XY': 2, 'ALG_EC_SVDP_DHC_KDF': 2, 'ALG_EC_SVDP_DH_PLAIN': 1, 'ALG_EC_SVDP_DHC_PLAIN': 1}, 'SHA': {'ALG_SHA_224': 4, 'ALG_SHA_256': 6, 'ALG_SHA_384': 4, 'ALG_SHA_512': 4}, 'SHA3': {'ALG_SHA3_224': 4, 'ALG_SHA3_256': 4, 'ALG_SHA3_384': 4, 'ALG_SHA3_512': 4}, 'ISO3309': {'ALG_ISO3309_CRC16': 2, 'ALG_ISO3309_CRC32': 2}}, 'misc': {'SIG_CIPHER_DES_MAC4': 2, 'SIG_CIPHER_DES_MAC8': 2, 'SIG_CIPHER_AES_MAC128': 2, 'SIG_CIPHER_AES_CMAC128': 2, 'SIG_CIPHER_RSA': 2, 'SIG_CIPHER_ECDSA': 2, 'SIG_CIPHER_ECDSA_PLAIN': 2, 'SIG_CIPHER_HMAC': 2, 'CIPHER_AES_CCM': 2, 'CIPHER_AES_GCM': 2, 'PAD_PKCS1_OAEP': 1, 'PAD_PKCS1_OAEP_SHA256': 1, 'PAD_PKCS1_OAEP_SHA3_256': 1, 'PAD_PKCS1_OAEP_SHA3_512': 1, 'PAD_PKCS1_OAEP_SHA512': 1, 'TYPE_ACCESS': 5, 'TYPE_EC_FP_PRIVATE': 6, 'TYPE_EC_FP_PRIVATE_TRANSIENT_RESET': 1, 'TYPE_HMAC_TRANSIENT_RESET': 1, 'TYPE_HMAC': 6, 'LENGTH_EC_FP_160': 3, 'LENGTH_EC_FP_192': 2, 'LENGTH_EC_FP_224': 3, 'LENGTH_EC_FP_256': 2, 'LENGTH_EC_FP_384': 3, 'LENGTH_EC_FP_521': 2, 'LENGTH_HMAC_SHA_1_BLOCK_64': 1, 'LENGTH_HMAC_SHA_256_BLOCK_64': 1, 'LENGTH_HMAC_SHA_384_BLOCK_64': 1, 'LENGTH_HMAC_SHA_384_BLOCK_128': 1, 'LENGTH_HMAC_SHA_512_BLOCK_64': 1, 'LENGTH_HMAC_SHA_512_BLOCK_128': 1, 'LENGTH_RSA_1024': 1, 'LENGTH_RSA_1536': 1, 'LENGTH_RSA_2048': 1, 'LENGTH_SHA': 8, 'LENGTH_AES_128': 2, 'LENGTH_SHA_224': 2, 'LENGTH_SHA_384': 2, 'LENGTH_SHA3_224': 2, 'LENGTH_SHA3_384': 2}, 'curves': {'BRAINPOOLP192R1': 1, 'BRAINPOOLP224R1': 1, 'BRAINPOOLP256R1': 2, 'BRAINPOOLP320R1': 2, 'BRAINPOOLP384R1': 2, 'BRAINPOOLP512R1': 2, 'BRAINPOOLP256T1': 1, 'BRAINPOOLP320T1': 1, 'BRAINPOOLP384T1': 1, 'BRAINPOOLP512T1': 1, 'SECP192R1': 1, 'SECP256R1': 2, 'SECP521R1': 2, 'SECP384R1': 1}}, 'javacard_packages': {'javacard': {'javacard.framework': 5, 'javacard.security': 8}, 'javacardx': {'javacardx.security': 3, 'javacardx.security.util': 2, 'javacardx.security.cert': 1, 'javacardx.crypto': 1, 'javacardx.framework.time': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 3, 'GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1': 1, 'of software patches (GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1. ▪ Integrated mapping (DH and ECDH). ▪ Generic mapping (DH) ▪ PACE and mEAC': 1, 'protection of the confidentiality and integrity of user data, and for entity authentication. CSP is out of scope of the TOE. CSP provides service, including: Connected eSE 5.3.4 v1.2 Platform Security Target': 1, 'v1.2 Platform Security Target Lite © Copyright Thales DIS France SAS - 2024 Page: 62 / 171 point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2025/04': 2}, 'ES': {'2020-37-INF-3429- v1': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Thales': {'Thales': 2}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2025_04fr.pdf
. - The st_filename property was set to
Cible-ANSSI-CC-2025_04en.pdf
. - The cert_filename property was set to
Certificat-ANSSI-CC-2025_04fr.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2025/04
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-2300182-01-CR']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-2300182-01-CR']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-2300182-01-CR']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-2300182-01-CR']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]}
values added.
- The report property was updated, with the
-
24.02.2025 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_04fr.pdf",
"dgst": "d0c4cec3c348cb26",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2025/04",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.3.4",
"1.2",
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300182-01-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300182-01-CR"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300182-01-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300182-01-CR"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "THALES DIS FRANCE SA",
"manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
"name": "Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04)",
"not_valid_after": "2030-02-12",
"not_valid_before": "2025-02-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certificat-ANSSI-CC-2025_04fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2020-37-INF-3429- v1": 1
},
"FR": {
"ANSSI-CC-2025/04": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR.1": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Safety \u0026 Security": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Thales": {
"Thales": 2
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20250213155808+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20250213155922+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 169332,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2025_04fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2020-37-INF-3429- v1": 2
},
"FR": {
"ANSSI-CC-2025/04": 3
},
"NL": {
"NSCIB-CC-2300182-01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 2
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL4": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"Serma": {
"SERMA": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Thales": {
"Thales": 7
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20250213155846+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20250213155921+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 361570,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]",
"http://www.commoncriteriaportal.org/",
"http://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "Cible-ANSSI-CC-2025_04en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 11
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 9
}
},
"FF": {
"DH": {
"DH": 4,
"Diffie-Hellman": 4
}
},
"RSA": {
"RSA 1024": 19
}
},
"cc_cert_id": {
"NL": {
"CC-1": 2,
"CC-2": 3,
"CC-3": 3,
"NSCIB-CC-2300182-01": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.APPS-PROVIDER": 3,
"A.CAP_FILE": 4,
"A.CONTROLLING-": 1,
"A.CONTROLLING-AUTHORITY": 2,
"A.ISSUER": 3,
"A.KEY-ESCROW": 3,
"A.KEYS-PROT": 3,
"A.OS-UPDATE-": 1,
"A.OS-UPDATE-EVIDENCE": 2,
"A.PERSONALISER": 3,
"A.PRODUCTION": 4,
"A.SCP-SUPP": 3,
"A.SECURE_ACODE_": 1,
"A.SECURE_ACODE_MANAGEMENT": 2,
"A.VERIFICA": 1,
"A.VERIFICATION": 2,
"A.VERIFICATION-": 1,
"A.VERIFICATION-AUTHORITY": 2
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 7,
"D.APP_C_DATA": 5,
"D.APP_I_DATA": 9,
"D.APP_KEYS": 9,
"D.APSD_DAP_KEYS": 1,
"D.APSD_KEYS": 3,
"D.CASD_DAP_KEYS": 1,
"D.CASD_KEYS": 1,
"D.CCCM_KEYS": 1,
"D.CLFDB-DK": 1,
"D.CONFIRMATION-": 1,
"D.CONFIRMATION-DATA": 1,
"D.CRYPTO": 4,
"D.CTL_PRO": 5,
"D.CTL_REGISTRY": 5,
"D.CVM_MGMT_STATE": 3,
"D.CVM_PIN": 3,
"D.DAP_BLOCK": 1,
"D.ELF_AID": 3,
"D.ELF_APP_INS": 3,
"D.ELF_RG_DATA": 1,
"D.ELF_SESSION_ST": 2,
"D.GP_CODE": 1,
"D.GP_REGISTRY": 6,
"D.GS-PARAMETERS": 1,
"D.ISD_KEYS": 3,
"D.JCS_CODE": 6,
"D.JCS_DATA": 10,
"D.NEW_ELF": 3,
"D.OLD_ELF": 3,
"D.OS": 1,
"D.OS-": 3,
"D.OS-UPDATE-CODE-": 1,
"D.OS-UPDATE-CODE-ID": 1,
"D.OS-UPDATE_ADDITIONALCODE": 3,
"D.OS-UPDATE_DEC-": 1,
"D.OS-UPDATE_DEC-KEY": 1,
"D.OS-UPDATE_SGNVER-KEY": 1,
"D.PIN": 6,
"D.RECEIPT-": 1,
"D.RECEIPT-GENERATION-KEY": 1,
"D.SEC_DATA": 8,
"D.TOE_IDENTIFIER": 1,
"D.TOKEN-": 1,
"D.TOKEN-VERIFICATION-KEY": 1
},
"O": {
"O.ALARM": 16,
"O.APPLET": 16,
"O.APPLI-AUTH": 5,
"O.ARRAY_VIEWS_": 1,
"O.ARRAY_VIEWS_CONFID": 4,
"O.ARRAY_VIEWS_I": 1,
"O.ARRAY_VIEWS_INTEG": 4,
"O.CARD-": 11,
"O.CARD-MANAGEMENT": 22,
"O.CCCM": 9,
"O.CIPHER": 9,
"O.CLFDB-DECIPHER": 5,
"O.CODE_": 1,
"O.CODE_CAP_FILE": 12,
"O.CODE_PKG": 1,
"O.COMM-": 1,
"O.COMM-AUTH": 10,
"O.COMM-CONFIDENTIALITY": 7,
"O.COMM-INTEGRITY": 10,
"O.CONFID-OS-": 1,
"O.CONFID-OS-UPDATE": 6,
"O.CRS_COUNTERS": 5,
"O.CRS_PRIVILEGES": 5,
"O.CRT-MNGT": 5,
"O.CTL_REGISTRY": 5,
"O.CTL_SC": 5,
"O.CVM-BLOCK": 9,
"O.CVM-MGMT": 9,
"O.DELETION": 5,
"O.DOMAIN-RIGHTS": 9,
"O.ELF_APP_DATA": 7,
"O.ELF_AUTHORISED": 5,
"O.ELF_DATA_PRO": 5,
"O.ELF_DELE_IRR": 5,
"O.ELF_INTEGRITY": 5,
"O.ELF_SESSION": 7,
"O.FIREWALL": 19,
"O.GLOBAL-CVM": 5,
"O.GLOBAL_ARRAY": 2,
"O.GLOBAL_ARRAYS_CONFID": 6,
"O.GLOBAL_ARRAYS_INTEG": 6,
"O.INSTALL": 11,
"O.JAVAO": 1,
"O.JAVAOB": 4,
"O.JAVAOBJE": 1,
"O.JAVAOBJECT": 42,
"O.KEY-MNGT": 9,
"O.LC-MANAGEMENT": 6,
"O.LOAD": 11,
"O.MTC-CTR-": 1,
"O.MTC-CTR-MNGT": 4,
"O.NATIVE": 11,
"O.NO-KEY-REUSE": 5,
"O.OBJ-DELETION": 5,
"O.OPERATE": 23,
"O.PIN-": 1,
"O.PIN-MNGT": 7,
"O.PRIVILEGES-": 1,
"O.PRIVILEGES-MANAGEMENT": 4,
"O.REALLOCATION": 7,
"O.RECEIPT": 5,
"O.RESOURCES": 7,
"O.RND": 1,
"O.RNG": 8,
"O.SCP": 45,
"O.SECURE_AC_ACTIV": 1,
"O.SECURE_AC_ACTIVATION": 6,
"O.SECURE_LOAD_AC": 1,
"O.SECURE_LOAD_ACODE": 10,
"O.SECURITY-": 2,
"O.SECURITY-DOMAINS": 3,
"O.SENSITIVE_ARR": 1,
"O.SENSITIVE_ARRAYS_INTEG": 4,
"O.SENSITIVE_RES": 1,
"O.SENSITIVE_RESULTS_INTEG": 4,
"O.SID": 15,
"O.TOE-": 1,
"O.TOE_IDENTIFICATI": 1,
"O.TOE_IDENTIFICATION": 6,
"O.TOKEN": 5,
"O.TRANSACTION": 7
},
"OE": {
"OE.ADMIN": 3,
"OE.AID-MANAGEMENT": 3,
"OE.AP-KEYS": 3,
"OE.APPLICATIONS": 3,
"OE.APPS-PROVIDER": 3,
"OE.CA-KEYS": 3,
"OE.CAP_FILE": 6,
"OE.CLFDB-ENC-PR": 3,
"OE.CODE-": 5,
"OE.CODE-EVIDENCE": 12,
"OE.CONTROLLING-": 1,
"OE.CONTROLLING-AUTHORITY": 2,
"OE.DAP_BLOCK_GEN": 3,
"OE.ISD-KEYS": 3,
"OE.ISSUER": 3,
"OE.KEY-CHANGE": 3,
"OE.KEY-ESCROW": 3,
"OE.KEY-GENERATION": 3,
"OE.KEYS-PROT": 3,
"OE.LOADING": 3,
"OE.OS-UPDATE-": 1,
"OE.OS-UPDATE-ENCRYPTION": 4,
"OE.OS-UPDATE-EVIDENCE": 3,
"OE.PERSONALISER": 3,
"OE.PRODUCTION": 4,
"OE.RECEIPT-VER": 3,
"OE.SCP": 3,
"OE.SCP-SUPP": 3,
"OE.SECURE_ACODE_MANA": 1,
"OE.SECURE_ACODE_MANAGEMENT": 2,
"OE.SERVERS": 3,
"OE.TOKEN-GEN": 3,
"OE.VERIFICATION": 35,
"OE.VERIFICATION-": 1,
"OE.VERIFICATION-AUTHORITY": 2
},
"OP": {
"OP.ARRAY_AASTORE": 3,
"OP.ARRAY_ACCESS": 4,
"OP.ARRAY_LENGTH": 4,
"OP.ARRAY_T_ALOAD": 3,
"OP.ARRAY_T_ASTORE": 3,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_CAP_FILE": 3,
"OP.DELETE_CAP_FILE_APPLET": 3,
"OP.INSTANCE_FIELD": 3,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.PUT": 5,
"OP.PUTFIELD": 1,
"OP.PUTSTATIC": 1,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.ADDITIONAL_CODE_EN": 1,
"OSP.ADDITIONAL_CODE_ENCRYPTION": 2,
"OSP.ADDITIONAL_CODE_SIG": 1,
"OSP.ADDITIONAL_CODE_SIGNING": 2,
"OSP.AID-MANAGEMENT": 3,
"OSP.APPLICATIONS": 3,
"OSP.APSD-KEYS": 3,
"OSP.ATOMIC_ACTIVATION": 3,
"OSP.CASD-KEYS": 3,
"OSP.CCCM": 3,
"OSP.CLFDB-ENC-PR": 3,
"OSP.DAP_BLOCK_GEN": 3,
"OSP.ELF_DELE_OP": 3,
"OSP.ISD-KEYS": 3,
"OSP.KEY-CHANGE": 3,
"OSP.KEY-GENERATION": 3,
"OSP.LOADING": 3,
"OSP.RECEIPT-VER": 3,
"OSP.SECURITY-DOMAINS": 3,
"OSP.SERVERS": 3,
"OSP.TOE_IDENTIFICATION": 3,
"OSP.TOKEN-GEN": 3,
"OSP.VERIFICATION": 3
},
"R": {
"R.JAVA": 12
},
"T": {
"T.BRUTE-FORCE-CVM": 3,
"T.BRUTE-FORCE-SCP": 3,
"T.CLFDB-DISC": 3,
"T.COM-EXPLOIT": 4,
"T.CONFID-APPLI-": 1,
"T.CONFID-APPLI-DATA": 3,
"T.CONFID-JCS-": 2,
"T.CONFID-JCS-CODE": 2,
"T.CONFID-JCS-DATA": 2,
"T.CONFID-OS-UPDATE-": 1,
"T.CONFID-OS-UPDATE-LOAD": 2,
"T.COUNTERS-FREEZE": 3,
"T.CRS-BYPASS": 3,
"T.CTL-AUTH-FORGE": 3,
"T.CTL-REGISTRY-": 1,
"T.CTL-REGISTRY-OVERWRITE": 2,
"T.CVM-IMPERSONATE": 3,
"T.CVM-UPDATE": 3,
"T.DELETION": 4,
"T.ELF-DATA-ACCESS": 3,
"T.ELF-DATA-INTEGRITY": 3,
"T.ELF-ILL-COMMAND": 3,
"T.ELF-RES-DATA": 3,
"T.ELF-SESSION": 3,
"T.ELF-UNAUTHORISED": 3,
"T.ELF-VERSION": 3,
"T.EXE-CODE": 7,
"T.FAKE-SGNVER-KEY": 3,
"T.INSTALL": 4,
"T.INTEG-APPLI-": 4,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 5,
"T.INTEG-JCS-": 1,
"T.INTEG-JCS-CODE": 2,
"T.INTEG-JCS-DATA": 3,
"T.INTEG-OS-UPDATE-": 1,
"T.INTEG-OS-UPDATE-LOAD": 2,
"T.LIFE-CYCLE": 4,
"T.NATIVE": 3,
"T.OBJ-DELETION": 3,
"T.PHYSICAL": 9,
"T.RECEIPT": 3,
"T.RESOURCES": 3,
"T.RND": 1,
"T.SID": 8,
"T.TOKEN": 3,
"T.UNAUTHORISED-": 1,
"T.UNAUTHORISED-CARD-MGMT": 4,
"T.UNAUTHORISED-TOE-": 1,
"T.UNAUTHORISED-TOE-CODE-": 1,
"T.UNAUTHORISED-TOE-CODE-UPDATE": 1,
"T.WRONG-UPDATE-": 1,
"T.WRONG-UPDATE-STATE": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0099-V2-2020": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_IMP.1": 4,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 5
},
"AGD": {
"AGD_OPE.1": 9,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR.1": 4,
"ALC_FLR.2": 1,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 4,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 1,
"ASE_SPD.1": 3,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 5
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 4,
"EAL4 augmented": 2,
"EAL4+": 2,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 15,
"FAU_ARP.1.1": 2,
"FAU_GEN": 1,
"FAU_SAA.1": 3,
"FAU_SAR": 2,
"FAU_SAS": 1,
"FAU_SAS.1": 1
},
"FCO": {
"FCO_NRO": 28,
"FCO_NRO.2": 9,
"FCO_NRR": 5,
"FCO_NRR.1": 3
},
"FCS": {
"FCS_CKM": 72,
"FCS_CKM.1": 31,
"FCS_CKM.2": 9,
"FCS_CKM.4": 65,
"FCS_CKM.4.1": 1,
"FCS_CKM.5": 7,
"FCS_CKM.5.1": 1,
"FCS_COP": 160,
"FCS_COP.1": 31,
"FCS_RNG": 1,
"FCS_RNG.1": 11,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 66,
"FDP_ACC.1": 27,
"FDP_ACC.2": 5,
"FDP_ACF": 58,
"FDP_ACF.1": 38,
"FDP_IFC": 67,
"FDP_IFC.1": 23,
"FDP_IFC.2": 6,
"FDP_IFF": 53,
"FDP_IFF.1": 27,
"FDP_ITC": 32,
"FDP_ITC.1": 23,
"FDP_ITC.2": 33,
"FDP_ITT.1": 1,
"FDP_RIP": 127,
"FDP_RIP.1": 9,
"FDP_ROL": 32,
"FDP_ROL.1": 11,
"FDP_SDC.1": 1,
"FDP_SDI": 25,
"FDP_SDI.2": 10,
"FDP_SDI.2.2": 1,
"FDP_UCT": 6,
"FDP_UCT.1": 1,
"FDP_UIT": 9,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 11,
"FIA_AFL.1": 8,
"FIA_API.1": 1,
"FIA_ATD": 13,
"FIA_ATD.1": 3,
"FIA_UAU": 27,
"FIA_UAU.1": 4,
"FIA_UAU.4": 1,
"FIA_UID": 34,
"FIA_UID.1": 14,
"FIA_UID.2": 1,
"FIA_USB": 7,
"FIA_USB.1": 3
},
"FMT": {
"FMT_LIM": 6,
"FMT_MSA": 189,
"FMT_MSA.1": 19,
"FMT_MSA.2": 2,
"FMT_MSA.3": 30,
"FMT_MTD": 38,
"FMT_MTD.1": 5,
"FMT_MTD.3": 2,
"FMT_SMF": 78,
"FMT_SMF.1": 28,
"FMT_SMF.1.1": 1,
"FMT_SMR": 82,
"FMT_SMR.1": 43,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO": 12,
"FPR_UNO.1": 14,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 58,
"FPT_FLS.1": 7,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_RCV": 24,
"FPT_RCV.3": 10,
"FPT_RCV.4": 1,
"FPT_STM": 3,
"FPT_STM.1": 5,
"FPT_TDC": 9,
"FPT_TDC.1": 9,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 34,
"FTP_ITC.1": 13,
"FTP_TRP": 10,
"FTP_TRP.1": 11
}
},
"certification_process": {
"OutOfScope": {
"GemActivate). The platform implements the following modes, but they are out of scope of the TOE: \u25aa mEAC v1": 1,
"of software patches (GemActivate). The platform implements the following modes, but they are out of scope of the TOE: \u25aa mEAC v1. \u25aa Integrated mapping (DH and ECDH). \u25aa Generic mapping (DH) \u25aa PACE and mEAC": 1,
"out of scope": 3,
"protection of the confidentiality and integrity of user data, and for entity authentication. CSP is out of scope of the TOE. CSP provides service, including: Connected eSE 5.3.4 v1.2 Platform Security Target": 1,
"v1.2 Platform Security Target Lite \u00a9 Copyright Thales DIS France SAS - 2024 Page: 62 / 171 point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 32
},
"CCM": {
"CCM": 13
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 8
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
},
"PGP": {
"PGP": 1
},
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 8,
"Key agreement": 5
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 18
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4,
"SHA1": 7
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 5,
"SHA-384": 5,
"SHA-512": 4,
"SHA224": 3,
"SHA256": 4,
"SHA384": 4,
"SHA512": 4
},
"SHA3": {
"SHA3-224": 1,
"SHA3-256": 1,
"SHA3-384": 1,
"SHA3-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"ALG": {
"AES": {
"ALG_AES_BLOCK_128_CBC_NOPAD": 2,
"ALG_AES_BLOCK_128_ECB_NOPAD": 2,
"ALG_AES_CBC_ISO9797_M1": 2,
"ALG_AES_CBC_ISO9797_M2": 2,
"ALG_AES_CBC_PKCS5": 2,
"ALG_AES_CCM": 2,
"ALG_AES_CMAC_128": 4,
"ALG_AES_CTR": 2,
"ALG_AES_ECB_ISO9797_M1": 2,
"ALG_AES_ECB_ISO9797_M2": 2,
"ALG_AES_ECB_PKCS5": 2,
"ALG_AES_GCM": 2,
"ALG_AES_MAC_128_NOPAD": 2,
"ALG_AES_MAC_192_NOPAD": 1,
"ALG_AES_MAC_256_NOPAD": 1
},
"DES": {
"ALG_DES_CBC_ISO9797_M1": 2,
"ALG_DES_CBC_ISO9797_M2": 2,
"ALG_DES_CBC_NOPAD": 2,
"ALG_DES_CBC_PKCS5": 2,
"ALG_DES_ECB_ISO9797_M1": 2,
"ALG_DES_ECB_ISO9797_M2": 2,
"ALG_DES_ECB_NOPAD": 2,
"ALG_DES_ECB_PKCS5": 2,
"ALG_DES_MAC4_ISO9797_1_M1_ALG3": 2,
"ALG_DES_MAC4_ISO9797_1_M2_ALG3": 2,
"ALG_DES_MAC4_ISO9797_M1": 2,
"ALG_DES_MAC4_ISO9797_M2": 2,
"ALG_DES_MAC4_NOPAD": 2,
"ALG_DES_MAC4_PKCS5": 2,
"ALG_DES_MAC8_ISO9797_1_M1_ALG3": 2,
"ALG_DES_MAC8_ISO9797_1_M2_ALG3": 2,
"ALG_DES_MAC8_ISO9797_M1": 2,
"ALG_DES_MAC8_ISO9797_M2": 2,
"ALG_DES_MAC8_NOPAD": 2,
"ALG_DES_MAC8_PKCS5": 2
},
"EC": {
"ALG_EC_FP": 6,
"ALG_EC_SVDP_DHC_KDF": 2,
"ALG_EC_SVDP_DHC_PLAIN": 1,
"ALG_EC_SVDP_DH_KDF": 2,
"ALG_EC_SVDP_DH_PLAIN": 1,
"ALG_EC_SVDP_DH_PLAIN_XY": 2
},
"ECDSA": {
"ALG_ECDSA_SHA": 2,
"ALG_ECDSA_SHA_224": 2,
"ALG_ECDSA_SHA_256": 2,
"ALG_ECDSA_SHA_384": 2,
"ALG_ECDSA_SHA_512": 2
},
"HMAC": {
"ALG_HMAC_SHA1": 8,
"ALG_HMAC_SHA_256": 8,
"ALG_HMAC_SHA_384": 2,
"ALG_HMAC_SHA_512": 2
},
"ISO3309": {
"ALG_ISO3309_CRC16": 2,
"ALG_ISO3309_CRC32": 2
},
"RSA": {
"ALG_RSA_NOPAD": 2,
"ALG_RSA_PKCS1": 1,
"ALG_RSA_PKCS1_OAEP": 2,
"ALG_RSA_SHA_224_PKCS1": 2,
"ALG_RSA_SHA_224_PKCS1_PSS": 2,
"ALG_RSA_SHA_256_PKCS1": 2,
"ALG_RSA_SHA_256_PKCS1_PSS": 2,
"ALG_RSA_SHA_384_PKCS1": 2,
"ALG_RSA_SHA_384_PKCS1_PSS": 2,
"ALG_RSA_SHA_512_PKCS1": 2,
"ALG_RSA_SHA_512_PKCS1_PSS": 2,
"ALG_RSA_SHA_ISO9796": 2,
"ALG_RSA_SHA_ISO9796_MR": 2,
"ALG_RSA_SHA_PKCS1": 2,
"ALG_RSA_SHA_PKCS1_PSS": 2,
"ALG_RSA_SHA_RFC2409": 2
},
"SHA": {
"ALG_SHA_224": 4,
"ALG_SHA_256": 6,
"ALG_SHA_384": 4,
"ALG_SHA_512": 4
},
"SHA3": {
"ALG_SHA3_224": 4,
"ALG_SHA3_256": 4,
"ALG_SHA3_384": 4,
"ALG_SHA3_512": 4
}
},
"curves": {
"BRAINPOOLP192R1": 1,
"BRAINPOOLP224R1": 1,
"BRAINPOOLP256R1": 2,
"BRAINPOOLP256T1": 1,
"BRAINPOOLP320R1": 2,
"BRAINPOOLP320T1": 1,
"BRAINPOOLP384R1": 2,
"BRAINPOOLP384T1": 1,
"BRAINPOOLP512R1": 2,
"BRAINPOOLP512T1": 1,
"SECP192R1": 1,
"SECP256R1": 2,
"SECP384R1": 1,
"SECP521R1": 2
},
"misc": {
"CIPHER_AES_CCM": 2,
"CIPHER_AES_GCM": 2,
"LENGTH_AES_128": 2,
"LENGTH_EC_FP_160": 3,
"LENGTH_EC_FP_192": 2,
"LENGTH_EC_FP_224": 3,
"LENGTH_EC_FP_256": 2,
"LENGTH_EC_FP_384": 3,
"LENGTH_EC_FP_521": 2,
"LENGTH_HMAC_SHA_1_BLOCK_64": 1,
"LENGTH_HMAC_SHA_256_BLOCK_64": 1,
"LENGTH_HMAC_SHA_384_BLOCK_128": 1,
"LENGTH_HMAC_SHA_384_BLOCK_64": 1,
"LENGTH_HMAC_SHA_512_BLOCK_128": 1,
"LENGTH_HMAC_SHA_512_BLOCK_64": 1,
"LENGTH_RSA_1024": 1,
"LENGTH_RSA_1536": 1,
"LENGTH_RSA_2048": 1,
"LENGTH_SHA": 8,
"LENGTH_SHA3_224": 2,
"LENGTH_SHA3_384": 2,
"LENGTH_SHA_224": 2,
"LENGTH_SHA_384": 2,
"PAD_PKCS1_OAEP": 1,
"PAD_PKCS1_OAEP_SHA256": 1,
"PAD_PKCS1_OAEP_SHA3_256": 1,
"PAD_PKCS1_OAEP_SHA3_512": 1,
"PAD_PKCS1_OAEP_SHA512": 1,
"SIG_CIPHER_AES_CMAC128": 2,
"SIG_CIPHER_AES_MAC128": 2,
"SIG_CIPHER_DES_MAC4": 2,
"SIG_CIPHER_DES_MAC8": 2,
"SIG_CIPHER_ECDSA": 2,
"SIG_CIPHER_ECDSA_PLAIN": 2,
"SIG_CIPHER_HMAC": 2,
"SIG_CIPHER_RSA": 2,
"TYPE_ACCESS": 5,
"TYPE_EC_FP_PRIVATE": 6,
"TYPE_EC_FP_PRIVATE_TRANSIENT_RESET": 1,
"TYPE_HMAC": 6,
"TYPE_HMAC_TRANSIENT_RESET": 1
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 5,
"javacard.security": 8
},
"javacardx": {
"javacardx.crypto": 1,
"javacardx.framework.time": 1,
"javacardx.security": 3,
"javacardx.security.cert": 1,
"javacardx.security.util": 2
}
},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.3.1": 1
},
"JavaCard": {
"Java Card 3.1.0": 4
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 10
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 5,
"malfunction": 4,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 3,
"Physical Probing": 2,
"physical probing": 3,
"side channel": 1
},
"other": {
"JIL": 8
}
},
"standard_id": {
"BSI": {
"AIS20": 2,
"AIS31": 6
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 180": 1,
"FIPS 180-4": 5,
"FIPS 197": 4,
"FIPS 197126": 1,
"FIPS 198": 2,
"FIPS 202": 4,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 2,
"FIPS PUB 186-4184": 1,
"FIPS PUB 197": 3,
"FIPS PUB 46-3": 2,
"FIPS PUB 81": 2
},
"ICAO": {
"ICAO": 4
},
"ISO": {
"ISO/IEC 10116": 4,
"ISO/IEC 14888-2": 2,
"ISO/IEC 18032": 4,
"ISO/IEC 18032:2020": 1,
"ISO/IEC 18033-3": 2,
"ISO/IEC 3309206": 2,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9797-1": 7,
"ISO/IEC 9797-2": 2
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 9,
"PKCS#5": 1,
"PKCS#5157": 1,
"PKCS#5161": 1
},
"RFC": {
"RFC 5246": 2,
"RFC 5758": 2,
"RFC 5869": 2,
"RFC2104": 2,
"RFC2409": 1,
"RFC2409174": 1,
"RFC3610165": 1
},
"SCP": {
"SCP02": 16,
"SCP03": 13,
"SCP10": 2,
"SCP11": 13,
"SCP22": 2,
"SCP80": 12,
"SCP81": 11
},
"X509": {
"X.509": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 40,
"AES128": 2
}
},
"DES": {
"3DES": {
"3DES": 11,
"TDES": 49
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CBC-MAC": 2,
"CMAC": 4,
"HMAC": 15,
"KMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 16
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_PSK_WITH_AES_128_CBC_S": 1,
"TLS_PSK_WITH_NULL_SHA": 1,
"TLS_PSK_WITH_NULL_SHA256": 1
}
},
"vendor": {
"STMicroelectronics": {
"STMicroelectronics": 20
},
"Thales": {
"Thales": 208
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20241031112531+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20241031112531+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 2293709,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 171
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_04fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL4+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-ANSSI-CC-2025_04en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2bb32f3f339c9d50ac17a3a7b85f32f7453914fe79baac9582cd89d8943c6774",
"txt_hash": "c23e75fd2a2a6b847f53a18de667f495aa8abdc770cb06836cf573037289f4b1"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e8e0d6a32cb00a81ceec3b7faa5e79edfd8a79a6b141f118aa62d009838f2266",
"txt_hash": "437dc0a8767059f61a2e30ddb6f240c62089f2ebfb8470650ed81c4850c1785c"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5b67c154f7da0aaf487dfca5d460deeca0392ad1d4230a08f1ca40806e2f6b9d",
"txt_hash": "19b92ec941cea4d6da6dc1c7fc181ef0ddcc9694f3e6e5dbad7b06a6b42ec373"
}
},
"status": "active"
}