This page was not yet optimized for use on mobile
devices.
Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèqueWear Levelling version 06.03.02.02
CSV information
| Status | archived |
|---|---|
| Valid from | 29.01.2018 |
| Valid until | 06.04.2025 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Wisekey |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
| Maintenance updates | Reassement report ANSSI-CC-2018/02-S01 (06.04.2020) Certification report |
Heuristics summary
Certificate ID: ANSSI-CC-2018/02
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL5Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Certificates
ANSSI-CC-2018/02-S01Evaluation facilities
CEA-LETICertification report
Extracted keywords
Symmetric Algorithms
AES, DES, TDESSecurity level
EAL 5, EAL2, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0084-2014, BSI-PP-0084-2014Certificates
ANSSI-CC-2018/02, ANSSI-CC-2016/16Evaluation facilities
CESTI, CEA - LETIStandards
AIS 31, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Keywords | ANSSI-CC-CER-F-07.026 |
|---|---|
| Creation date | D:20180206150425+01'00' |
| Modification date | D:20180206173210+01'00' |
| Pages | 16 |
| Creator | Acrobat PDFMaker 11 pour Word |
| Producer | Adobe PDF Library 11.0 |
Frontpage
| Certificate ID | ANSSI-CC-2018/02 |
|---|---|
| Certified item | Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèque Wear Levelling version 06.03.02.02 |
| Certification lab | CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France |
| Developer | Wisekey Semiconductors Arteparc Bachasson, Bât. A, rue de la carrière de Bachasson, 13590 Meyreuil, France. Commanditaire Wisekey Semiconductors Arteparc Bachasson, Bât. A, rue de la carrière de Bachasson, 13590 Meyreuil, France |
References
Outgoing- ANSSI-CC-2016/16 - archived - Microcontrleur MS6001 r?vision E embarquant la biblioth�que cryptographique Toolbox version 0x06040102
- ANSSI-CC-2020/20 - archived - MS6003, rev C
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, TDEAAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512Randomness
RNG, RNDBlock cipher modes
CBCSecurity level
EAL5, EAL4, EAL5+, EAL4+Claims
O.C, O.RND, T.RND, R.OSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FAU_GEN.1, FAU_GEN, FAU_SAS, FCS_COP.1, FCS_RNG.1, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FDP_SDC.1, FDP_ITT.1, FDP_IFC.1, FDP_SDI.2, FDP_SDC.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1, FDP_ITT.1.1, FDP_IFF.1, FDP_IFC.1.1, FDP_ITC.1, FDP_ITC.2, FDP_SDC, FIA_API.1, FIA_API.1.1, FIA_API, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_FLS.1.1, FPT_PHP.3.1, FPT_ITT.1.1, FPT_SDI.2, FRU_FLT.2, FRU_FLT.1, FRU_FLT.2.1Protection profiles
BSI-CC-PP-0084-2014Side-channel analysis
Leak-Inherent, physical probing, Physical Probing, Physical probing, side channel, timing attacks, physical tampering, Malfunction, malfunction, Fault InjectionStandards
FIPS 197, FIPS 186-4, FIPS 180-4, NIST SP 800-67, NIST SP 800-38A, SP 800-38A, PKCS#1, AIS31, ISO/IEC 3309File metadata
| Creation date | D:20170914114542+02'00' |
|---|---|
| Modification date | D:20180206173151+01'00' |
| Pages | 79 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2018/02Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 36.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_02-s01.pdf",
"dgst": "ff1e497a4f732f43",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2018/02",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"06.03.02.02",
"06.04.01.07"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/20"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/16"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/20"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/16"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2020-04-06",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_02-s01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Reassement report ANSSI-CC-2018/02-S01"
}
]
},
"manufacturer": "Wisekey",
"manufacturer_web": "https://www.wisekey.com",
"name": "Microcontr\u00f4leur MS6001 r\u00e9vision E embarquant la biblioth\u00e8que cryptographique Toolbox version 06.04.01.07 et la biblioth\u00e8queWear Levelling version 06.03.02.02",
"not_valid_after": "2025-04-06",
"not_valid_before": "2018-01-29",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "certificat-anssi-cc-2018_02-s01.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2018/02-S01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "anssi-cc-2018_02fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2018/02",
"cert_item": "Microcontr\u00f4leur MS6001 r\u00e9vision E embarquant la biblioth\u00e8que cryptographique Toolbox version 06.04.01.07 et la biblioth\u00e8que Wear Levelling version 06.03.02.02",
"cert_item_version": "Part number 0x44, hardware revision E, Toolbox Library version 0x06040107, Wear Levelling Library version 0x06030202",
"cert_lab": "CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "Wisekey Semiconductors Arteparc Bachasson, B\u00e2t. A, rue de la carri\u00e8re de Bachasson, 13590 Meyreuil, France. Commanditaire Wisekey Semiconductors Arteparc Bachasson, B\u00e2t. A, rue de la carri\u00e8re de Bachasson, 13590 Meyreuil, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur (.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifi\u00e9 BSI-CC-PP-0084-2014, le 19 f\u00e9vrier 2014 avec conformit\u00e9 au \u201c Package 1 : Loader dedicated for usage by authorized users only"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2016/16": 3,
"ANSSI-CC-2018/02": 17
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1
},
"CESTI": {
"CESTI": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 2
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"TDES": 1
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Category": "R\u00e9f\u00e9rence, Version",
"/Comments": "D\u00e9veloppeur",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20180206150425+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 pour Word",
"/Keywords": "ANSSI-CC-CER-F-07.026",
"/ModDate": "D:20180206173210+01\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20180206140421",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 332329,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"http://www.sogis.org/",
"http://www.commoncriteriaportal.org/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "anssi-cible-cc-2018_02en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 6
},
"ECDSA": {
"ECDSA": 19
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.C": 1,
"O.RND": 4
},
"R": {
"R.O": 1
},
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 19
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 4,
"ADV_FSP.5": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 5,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4+": 1,
"EAL5": 9,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 1,
"FAU_SAS": 1,
"FAU_SAS.1": 13,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 12,
"FCS_CKM.4": 12,
"FCS_COP": 17,
"FCS_COP.1": 15,
"FCS_COP.1.1": 13,
"FCS_RNG.1": 19
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_IFC.1": 22,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 3,
"FDP_ITC.1": 12,
"FDP_ITC.2": 12,
"FDP_ITT.1": 22,
"FDP_ITT.1.1": 1,
"FDP_SDC": 1,
"FDP_SDC.1": 11,
"FDP_SDC.1.1": 1,
"FDP_SDI.1": 3,
"FDP_SDI.2": 9,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_API": 1,
"FIA_API.1": 11,
"FIA_API.1.1": 1
},
"FMT": {
"FMT_LIM": 17,
"FMT_LIM.1": 28,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 29,
"FMT_LIM.2.1": 1
},
"FPT": {
"FPT_FLS.1": 24,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 20,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 25,
"FPT_PHP.3.1": 1,
"FPT_SDI.2": 2
},
"FRU": {
"FRU_FLT.1": 1,
"FRU_FLT.2": 20,
"FRU_FLT.2.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 7,
"RNG": 13
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1,
"Malfunction": 19,
"malfunction": 8,
"physical tampering": 2
},
"SCA": {
"Leak-Inherent": 14,
"Physical Probing": 1,
"Physical probing": 1,
"physical probing": 4,
"side channel": 2,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 11
},
"FIPS": {
"FIPS 180-4": 5,
"FIPS 186-4": 4,
"FIPS 197": 1
},
"ISO": {
"ISO/IEC 3309": 2
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-67": 2,
"SP 800-38A": 1
},
"PKCS": {
"PKCS#1": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 8
},
"DES": {
"DES": 5
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20170914114542+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20180206173151+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 2606553,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/index.html",
"mailto:[email protected]",
"http://www.insidesecure.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 79
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_02fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL5+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_02en.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "f3cbb21b277fe5f248016952ac4f503de8d2ab564e40ae7cbbbccec6c3039d35",
"txt_hash": "4fdd6ea0903c51a2f80e59acba4160975417544fa962680c1ce78978bb3c2323"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "5ff2a3aca95493eea6777bd3485ca7fb258426b6c15d63ed77cdc0d90e9775f3",
"txt_hash": "96123f6260ac5be658bb34bbc32e3ebfdaf519a184feaace6ede767a6eb5c066"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "3ebcbcf8c8e758863a925683384a37350f03e8fc4275592ba2cb7bf60e1858d4",
"txt_hash": "fae4ea603f62f0e2eb5957e608e3bd894d524031c73d2b094f12413a8ad05360"
}
},
"status": "archived"
}