This page was not yet optimized for use on mobile
devices.
Cryhod Version Q2021.2
CSV information
| Status | active |
|---|---|
| Valid from | 27.08.2022 |
| Valid until | 27.06.2027 |
| Scheme | 🇫🇷 FR |
| Manufacturer | PrimX Technologies |
| Category | Data Protection |
| Security level | AVA_VAN.3, EAL3+, ALC_FLR.3 |
| Protection profiles |
Heuristics summary
Certificate ID: ANSSI-CC-2022/35
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL3, EAL2Security Assurance Requirements (SAR)
ALC_FLR.3, AVA_VAN.3Certificates
ANSSI-CC-2022/35Evaluation facilities
OPPIDACertification report
Extracted keywords
Symmetric Algorithms
AES, DESHash functions
SHA-256Security level
EAL 3, EAL2, EAL3, EAL4, EAL3+, ITSEC E3 ElémentaireSecurity Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLR, AVA_VAN.3Certificates
ANSSI-CC-2022/35Evaluation facilities
OPPIDAStandards
PKCS#1, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Title | ANSSI-CC-2022/35 |
|---|---|
| Subject | Cryhod |
| Author | [email protected] |
| Creation date | D:20220707135625+02'00' |
| Modification date | D:20220707135630+02'00' |
| Pages | 13 |
| Creator | Acrobat PDFMaker 21 pour Word |
| Producer | Adobe PDF Library 21.11.71 |
Security target
Extracted keywords
Symmetric Algorithms
AES, HMACHash functions
SHA-256, SHA-512Block cipher modes
CBC, XTSVendor
MicrosoftSecurity level
EAL3+, EAL3, EAL 8Claims
D.DONNEES_UTILISATEUR, D.ID_ADMIN, D.CLES_PAR, D.FONC, D.ID_FONC, D.PROGRAMMES, D.CONFIGURATION, D.CLES_ACCES, D.HIBER, D.CLE_PAR, O.ACCES, O.PROTECTION_DES_, O.ROLES, O.CRYPTO, O.CLES_CHIFFREMENT, O.RECOUVREMENT, O.COLLECTE, O.AUDIT, O.ADM_DISQUES, O.HIBERNATION, O.INT_POLICIES, O.ARRET_UTILISATEUR, O.PROTECTION_DES_DONNEES_ENREGISTREES, O.ROBUSTESSE, O.INT_POLICIE, T.ACCES_DONNEES, T.MODIF_FIC_FONC, T.ACCES_MEMOIRES, T.ACCES_, A.NON_OBSERV, A.ENV_OPERATIONNEL, A.FIRMWARE, A.PORT_DMA, A.CONFIANCE_ADM_TOE, A.CONSERVATION_CLES, A.CERTIFICATS, A.ADMIN_WINDOWS, A.FIDELE_ENV, A.ENV_ALEA, A.CRYPTO_EXT, A.NON_REMANENCE, OE.ENV_OPERATIONNEL, OE.SO_CONF, OE.CONSERV_CLES, OE.ENV_FIRMWARE, OE.PORT_DMA, OE.HORODATAGE, OE.ENV_ALEA, OE.FORMATION, OE.CRYPTO_EXT, OE.CERTIFICATS, OE.ADM_ROOT_WINDOWS, OSP.VERIF_POLICIES, OSP.DISQUE, OSP.ADMIN_DISQUES, OSP.ACCES, OSP.RECOUVREMENT, OSP.COLLECTE, OSP.HIBERNATION, OSP.REPRISE, OSP.AUDIT, OSP.CRYPTO, OSP.ADMIN_ACCESSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_GEN, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.1.1, FCS_COP.1, FCS_COP, FCS_CKM, FCS_CKM.4, FCS_CKM.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1, FDP_RIP.1.1, FDP_ACF.1, FDP_ACC, FDP_ACF, FDP_RIP, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1, FIA_UID.1.1, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA, FMT_MSA.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR, FMT_MOF, FMT_MTD, FMT_SMF, FPT_SDI_EXT, FPT_FLS.1, FPT_FLS.1.1, FPT_SDI_EXT.2, FPT_SDI_EXT.2.1, FPT_SDI_EXT.2.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST_TST.1, FPT_TST, FPT_STM.1Standards
SP 800-90A, PKCS#5, PKCS#1, PKCS#12, PKCS#11, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Author | José Lavancier [Prim'X Technologies] |
|---|---|
| Creation date | D:20220615163133+02'00' |
| Modification date | D:20220615163141+02'00' |
| Pages | 61 |
| Creator | Acrobat PDFMaker 11 pour Word |
| Producer | Adobe PDF Library 11.0 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2022/35Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3CPE matches
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Data Protection",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_35.pdf",
"dgst": "efd8a81838a16e1b",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2022/35",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:a:primx:cryhod:2021.2:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL3+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2021.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"cca4a3e4d77c8c4d"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "PrimX Technologies",
"manufacturer_web": "https://www.primx.eu/en/index.aspx",
"name": "Cryhod Version Q2021.2",
"not_valid_after": "2027-06-27",
"not_valid_before": "2022-08-27",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "certificat-cc-2022_35.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2022/35": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL3": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "anssi-cc-2022_35fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2022/35": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 1,
"EAL2": 2,
"EAL3": 1,
"EAL3+": 1,
"EAL4": 1
},
"ITSEC": {
"ITSEC E3 El\u00e9mentaire": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"PKCS": {
"PKCS#1": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "[email protected]",
"/Category": "Version Q2021.2",
"/Comments": "ANSSI-CC-CER-F-07_v31.2",
"/Company": "PRIM\u2019X TECHNOLOGIES",
"/CreationDate": "D:20220707135625+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 21 pour Word",
"/Keywords": "",
"/ModDate": "D:20220707135630+02\u002700\u0027",
"/Producer": "Adobe PDF Library 21.11.71",
"/SourceModified": "D:20220707115614",
"/Subject": "Cryhod",
"/Title": "ANSSI-CC-2022/35",
"pdf_file_size_bytes": 370844,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"http://www.commoncriteriaportal.org/",
"mailto:[email protected]",
"http://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "anssi-cible-2022_35fr.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN_WINDOWS": 3,
"A.CERTIFICATS": 3,
"A.CONFIANCE_ADM_TOE": 4,
"A.CONSERVATION_CLES": 5,
"A.CRYPTO_EXT": 4,
"A.ENV_ALEA": 3,
"A.ENV_OPERATIONNEL": 4,
"A.FIDELE_ENV": 3,
"A.FIRMWARE": 4,
"A.NON_OBSERV": 3,
"A.NON_REMANENCE": 1,
"A.PORT_DMA": 4
},
"D": {
"D.CLES_ACCES": 3,
"D.CLES_PAR": 2,
"D.CLE_PAR": 1,
"D.CONFIGURATION": 3,
"D.DONNEES_UTILISATEUR": 7,
"D.FONC": 4,
"D.HIBER": 2,
"D.ID_ADMIN": 3,
"D.ID_FONC": 2,
"D.PROGRAMMES": 3
},
"O": {
"O.ACCES": 15,
"O.ADM_DISQUES": 13,
"O.ARRET_UTILISATEUR": 11,
"O.AUDIT": 16,
"O.CLES_CHIFFREMENT": 11,
"O.COLLECTE": 9,
"O.CRYPTO": 17,
"O.HIBERNATION": 12,
"O.INT_POLICIE": 1,
"O.INT_POLICIES": 8,
"O.PROTECTION_DES_": 1,
"O.PROTECTION_DES_DONNEES_ENREGISTREES": 31,
"O.RECOUVREMENT": 11,
"O.ROBUSTESSE": 9,
"O.ROLES": 17
},
"OE": {
"OE.ADM_ROOT_WINDOWS": 6,
"OE.CERTIFICATS": 6,
"OE.CONSERV_CLES": 6,
"OE.CRYPTO_EXT": 6,
"OE.ENV_ALEA": 6,
"OE.ENV_FIRMWARE": 8,
"OE.ENV_OPERATIONNEL": 23,
"OE.FORMATION": 8,
"OE.HORODATAGE": 6,
"OE.PORT_DMA": 5,
"OE.SO_CONF": 6
},
"OSP": {
"OSP.ACCES": 4,
"OSP.ADMIN_ACCES": 4,
"OSP.ADMIN_DISQUES": 6,
"OSP.AUDIT": 4,
"OSP.COLLECTE": 5,
"OSP.CRYPTO": 5,
"OSP.DISQUE": 5,
"OSP.HIBERNATION": 5,
"OSP.RECOUVREMENT": 6,
"OSP.REPRISE": 3,
"OSP.VERIF_POLICIES": 4
},
"T": {
"T.ACCES_": 1,
"T.ACCES_DONNEES": 13,
"T.ACCES_MEMOIRES": 4,
"T.MODIF_FIC_FONC": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.3": 8,
"ADV_FSP.4": 2,
"ADV_IMP.1": 2,
"ADV_TDS.1": 2,
"ADV_TDS.2": 5,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 6,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.3": 2,
"ALC_CMS.1": 1,
"ALC_CMS.3": 2,
"ALC_DEL.1": 2,
"ALC_DVS.1": 4,
"ALC_FLR.3": 8,
"ALC_LCD.1": 4
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 5,
"ASE_INT.1": 6,
"ASE_OBJ.2": 4,
"ASE_REQ.1": 2,
"ASE_REQ.2": 3,
"ASE_SPD.1": 3,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 4,
"ATE_DPT.1": 3,
"ATE_FUN.1": 7,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 11
}
},
"cc_security_level": {
"EAL": {
"EAL 8": 1,
"EAL3": 26,
"EAL3+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 30,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 22,
"FAU_GEN.2.1": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 10,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 4,
"FCS_COP": 1,
"FCS_COP.1": 17,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 32,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 22,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 6,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1,
"FDP_RIP": 1,
"FDP_RIP.1": 9,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU.1": 11,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 19,
"FIA_UID.1.1": 2
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 10,
"FMT_MOF.1.1": 1,
"FMT_MSA": 47,
"FMT_MSA.1": 8,
"FMT_MSA.3": 14,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 1,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 34,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 36,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 9,
"FPT_FLS.1.1": 1,
"FPT_SDI_EXT": 4,
"FPT_SDI_EXT.2": 10,
"FPT_SDI_EXT.2.1": 2,
"FPT_SDI_EXT.2.2": 2,
"FPT_STM.1": 3,
"FPT_TST": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST_TST.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"XTS": {
"XTS": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"NIST": {
"SP 800-90A": 1
},
"PKCS": {
"PKCS#1": 4,
"PKCS#11": 5,
"PKCS#12": 3,
"PKCS#5": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 7
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Jos\u00e9 Lavancier [Prim\u0027X Technologies]",
"/Comments": "Cryhod Q.2021 Cible de S\u00e9curit\u00e9",
"/Company": "",
"/CreationDate": "D:20220615163133+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 pour Word",
"/ModDate": "D:20220615163141+02\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20220615143113",
"pdf_file_size_bytes": 754809,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 61
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp200804en.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_35fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.3",
"EAL3+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2022_35fr.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "fb48cf2a4156347fd2fdd7d580a5336162050e4ce6b1c5d8322355c3520a87b5",
"txt_hash": "479eb5045b2c66558739640da04e29c7ae49259c2b278840148abd03e133c35e"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "293364420d444f2a8dd2bac6a4c5c87acffed23c65cfb628786a59ae5a814cb3",
"txt_hash": "c05bf9fec7bc603846f717b61148ddbd9611fde07f882b67bd5b33bc7962cc79"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "21f0695d830ff4db97f64efff00b7ad0d84f3bba58617ff927722df64d4eeaa8",
"txt_hash": "d2b1601a9d64fb4ec75e9fbe6f160c9ff909b2229c454f754c81afaad29f2a61"
}
},
"status": "active"
}