MULTOS I4C (1-1-1) platform with patch AMD 0029v002 on component SLE66CX322P/m1484a24

CSV information

Status archived
Valid from 04.12.2003
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Keycorp Limited / Infineon Technologies AG
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, AVA_VLA.4, ADV_IMP.2, ALC_DVS.2

Heuristics summary

Certificate ID: ANSSI-CC-2003/14

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Symmetric Algorithms
DES
Asymmetric Algorithms
RSA 2048

Vendor
Infineon Technologies AG, Infineon

Security level
EAL7, EAL4, EAL 5, EAL41, EAL1, EAL3, EAL5, ITSEC E6 et
Claims
O.DLV_PROTECT, O.DLV_AUDIT, O.DLV_RESP, O.DLV_DATA, O.TEST_OPERATE, O.USE_DIAG, O.CODE_HASH, O.APPLI_DEV
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_FLR, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_MSU.2, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FDP_ACC.2, FDP_ACF.1, FDP_DAU.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.4, FIA_UID.1, FIA_USB.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMR.1, FPR_UNO.1, FPT_FLS.1, FPT_PHP.3, FPT_RCV.4, FPT_RVM.1, FPT_SEP.1, FPT_TDC.1, FPT_TST.1, FRU_RSA.1
Protection profiles
BSI-PP-0002
Certificates
BSI-DSZ-CC-0223-2003, Rapport de certification 2003/14, Rapport de certification 2003/01

Standards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title Rapport de certification 2003/14
Subject Plate-forme MULTOS I4C (1-1-1)
Author Patrick REDON
Creation date D:20031204162531+01'00'
Modification date D:20031204162711+01'00'
Pages 35
Creator Acrobat PDFMaker 5.0 pour Word
Producer Acrobat Distiller 5.0 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0223-2003 - archived - Infineon Smart Card IC (Security Controller) SLE66CX322P with RSA 2048/m1484 a24/ m1484a27 and m1484b14

Security target

Extracted keywords

Symmetric Algorithms
DES
Hash functions
SHA-1
Randomness
RNG
Block cipher modes
CBC

Vendor
Infineon Technologies, Infineon, Thales

Security level
EAL4, EAL4 augmented
Claims
O.CODE_HASH, O.TAMPER_ES, O.SIDE, O.ROLLBACK, O.RESOURCE, O.LOAD, O.SECURITY, O.EFFECT_L, O.REMOVE, O.EFFECT_R, O.SEGREGATE, O.DEV_DIS_ES, O.INIT_ACS, O.SAMPLE_ACS, O.DLV_DATA, O.APPLI_DEV, O.RESOURCES, O.SAMPLES_ACS, O.DIS_, O.DIS, O.MOD_, O.OPERATE, O.DIS_MEMORY, O.MOD_MEMORY, O.FLAW, O.CLON, T.DIS_TEST_ES, T.T_TOOLS, T.MOD, T.T_ES, T.T_CMD, T.MOD_TSF, T.MOD_LOAD, T.MOD_EXE, T.MOD_SHARE, T.LOAD_MAN, T.LOAD_APP, T.LOAD_OTHER, T.LOAD_MOD, T.APP_DISC, T.APP_CORR, T.APP_REMOVE, T.ERR_REMOVE, T.DEL_REMOVE, T.APP_READ, T.APP_MOD, T.RESOURCES, T.DIS_DATA, T.MOD_DATA, T.DIS_TEST, T.T_SAMPLE, T.MOD_DEL, T.MOD_SOF, T.MOD_LOA, T.MOD_SHA, T.MOD_DAT, T.LOAD_MA, T.LOAD_OT, T.LOAD_MO, T.APP_COR, T.APP_REM, T.ERR_REM, T.DEL_REM, T.APP_REA, T.RESOURC, T.CLON, T.DIS_INFO, T.DIS_DEL, T.MOD_SOFT, A.APPLI_CONT
Security Assurance Requirements (SAR)
ADV_IMP, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, ADV_HLD, ADV_LLD, AGD_ADM.1, AGD_USR.1, AGD_ADM, ALC_DVS, ALC_DVS.2, ALC_TAT.1, ALC_DVS.1, AVA_VLA, AVA_VLA.4
Security Functional Requirements (SFR)
FAU_ARP, FAU_SAA, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAA.1, FCS_CKM, FCS_COP, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_DAU, FDP_ETC, FDP_ITC, FDP_RIP, FDP_ROL, FDP_SDI, FDP_ACC.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.1, FDP_RIP.1.1, FDP_ROL.1, FDP_ROL.1.1, FDP_ROL.1.2, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_USB, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_USB.1.1, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SMR, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.2, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS, FPT_PHP, FPT_RCV, FPT_RVM, FPT_SEP, FPT_TDC, FPT_TST, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_RCV.4, FPT_RCV.4.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_RSA, FRU_RSA.1, FRU_RSA.1.1

Side-channel analysis
side channel, SPA, DPA, Timing attacks, timing attack, timing attacks, physical tampering, Physical tampering
Certification process
out of scope, Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements, strength level of these security functions is “SOF high”. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 6.1.1

Standards
FIPS PUB 180-2, PKCS # 1, PKCS#2

File metadata

Title Public Security Target
Subject Keycorp MULTOS Common Criteria
Author Thales Microelectronics & Keycorp MULTOS Team
Creation date D:20040526124355
Modification date D:20040526124445+11'00'
Pages 85
Creator Microsoft Word 8.0
Producer Acrobat Distiller 4.0 for Windows

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2003/14

Extracted SARs

ADV_FSP.1, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "72ed5b59efbf992c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2003/14",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0223-2003"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0169-2002",
          "BSI-DSZ-CC-0223-2003"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Keycorp Limited / Infineon Technologies AG",
  "manufacturer_web": "https://www.keycorp.net/",
  "name": "MULTOS I4C (1-1-1) platform with patch AMD 0029v002 on component SLE66CX322P/m1484a24",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2003-12-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "2003_14.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 2048": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0223-2003": 3
        },
        "FR": {
          "Rapport de certification 2003/01": 1,
          "Rapport de certification 2003/14": 18
        }
      },
      "cc_claims": {
        "O": {
          "O.APPLI_DEV": 1,
          "O.CODE_HASH": 1,
          "O.DLV_AUDIT": 1,
          "O.DLV_DATA": 1,
          "O.DLV_PROTECT": 1,
          "O.DLV_RESP": 1,
          "O.TEST_OPERATE": 1,
          "O.USE_DIAG": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 1,
          "ACM_CAP": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 1,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.2": 1,
          "ADV_HLD": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 3,
          "ADV_INT": 1,
          "ADV_LLD": 1,
          "ADV_LLD.1": 1,
          "ADV_RCR": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 1,
          "AGD_USR": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR": 2,
          "ALC_LCD.1": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.2": 1,
          "AVA_MSU.3": 1,
          "AVA_SOF": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL1": 1,
          "EAL3": 1,
          "EAL4": 1,
          "EAL41": 1,
          "EAL5": 1,
          "EAL7": 2
        },
        "ITSEC": {
          "ITSEC E6 et": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 2,
          "FAU_SAA.1": 2
        },
        "FCS": {
          "FCS_CKM.3": 2,
          "FCS_CKM.4": 2,
          "FCS_COP.1": 2
        },
        "FDP": {
          "FDP_ACC.2": 2,
          "FDP_ACF.1": 2,
          "FDP_DAU.1": 2,
          "FDP_ETC.1": 2,
          "FDP_ITC.1": 2,
          "FDP_RIP.1": 2,
          "FDP_ROL.1": 2,
          "FDP_SDI.2": 2
        },
        "FIA": {
          "FIA_AFL.1": 2,
          "FIA_ATD.1": 2,
          "FIA_UAU.1": 2,
          "FIA_UAU.4": 2,
          "FIA_UID.1": 2,
          "FIA_USB.1": 2
        },
        "FMT": {
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 2,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 2,
          "FMT_MTD.1": 2,
          "FMT_MTD.2": 2,
          "FMT_SMR.1": 2
        },
        "FPR": {
          "FPR_UNO.1": 2
        },
        "FPT": {
          "FPT_FLS.1": 2,
          "FPT_PHP.3": 2,
          "FPT_RCV.4": 2,
          "FPT_RVM.1": 2,
          "FPT_SEP.1": 2,
          "FPT_TDC.1": 2,
          "FPT_TST.1": 2
        },
        "FRU": {
          "FRU_RSA.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 7,
          "Infineon Technologies AG": 7
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Patrick REDON",
      "/CreationDate": "D:20031204162531+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 pour Word",
      "/ModDate": "D:20031204162711+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0 (Windows)",
      "/Subject": "Plate-forme MULTOS I4C (1-1-1)",
      "/Title": "Rapport de certification 2003/14",
      "pdf_file_size_bytes": 867591,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 35
    },
    "st_filename": "cible2003_14.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.APPLI_CONT": 1
        },
        "O": {
          "O.APPLI_DEV": 4,
          "O.CLON": 1,
          "O.CODE_HASH": 2,
          "O.DEV_DIS_ES": 6,
          "O.DIS": 1,
          "O.DIS_": 1,
          "O.DIS_MEMORY": 1,
          "O.DLV_DATA": 3,
          "O.EFFECT_L": 4,
          "O.EFFECT_R": 3,
          "O.FLAW": 1,
          "O.INIT_ACS": 4,
          "O.LOAD": 4,
          "O.MOD_": 1,
          "O.MOD_MEMORY": 1,
          "O.OPERATE": 1,
          "O.REMOVE": 4,
          "O.RESOURCE": 2,
          "O.RESOURCES": 1,
          "O.ROLLBACK": 3,
          "O.SAMPLES_ACS": 1,
          "O.SAMPLE_ACS": 2,
          "O.SECURITY": 4,
          "O.SEGREGATE": 4,
          "O.SIDE": 4,
          "O.TAMPER_ES": 11
        },
        "T": {
          "T.APP_COR": 1,
          "T.APP_CORR": 4,
          "T.APP_DISC": 9,
          "T.APP_MOD": 5,
          "T.APP_REA": 1,
          "T.APP_READ": 4,
          "T.APP_REM": 1,
          "T.APP_REMOVE": 4,
          "T.CLON": 1,
          "T.DEL_REM": 1,
          "T.DEL_REMOVE": 4,
          "T.DIS_DATA": 5,
          "T.DIS_DEL": 1,
          "T.DIS_INFO": 1,
          "T.DIS_TEST": 1,
          "T.DIS_TEST_ES": 4,
          "T.ERR_REM": 1,
          "T.ERR_REMOVE": 4,
          "T.LOAD_APP": 6,
          "T.LOAD_MA": 1,
          "T.LOAD_MAN": 4,
          "T.LOAD_MO": 1,
          "T.LOAD_MOD": 6,
          "T.LOAD_OT": 1,
          "T.LOAD_OTHER": 4,
          "T.MOD": 5,
          "T.MOD_DAT": 1,
          "T.MOD_DATA": 3,
          "T.MOD_DEL": 3,
          "T.MOD_EXE": 5,
          "T.MOD_LOA": 1,
          "T.MOD_LOAD": 4,
          "T.MOD_SHA": 1,
          "T.MOD_SHARE": 4,
          "T.MOD_SOF": 1,
          "T.MOD_SOFT": 1,
          "T.MOD_TSF": 5,
          "T.RESOURC": 1,
          "T.RESOURCES": 4,
          "T.T_CMD": 5,
          "T.T_ES": 5,
          "T.T_SAMPLE": 1,
          "T.T_TOOLS": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_HLD": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP": 3,
          "ADV_IMP.1": 2,
          "ADV_IMP.2": 10,
          "ADV_LLD": 1,
          "ADV_LLD.1": 3,
          "ADV_RCR.1": 2
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 1,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 10,
          "ALC_TAT.1": 2
        },
        "AVA": {
          "AVA_VLA": 3,
          "AVA_VLA.4": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 17,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 2,
          "FAU_ARP.1": 11,
          "FAU_ARP.1.1": 2,
          "FAU_SAA": 2,
          "FAU_SAA.1": 15,
          "FAU_SAA.1.1": 2,
          "FAU_SAA.1.2": 2
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.3": 12,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 12,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 2,
          "FCS_COP.1": 12,
          "FCS_COP.1.1": 4
        },
        "FDP": {
          "FDP_ACC": 2,
          "FDP_ACC.2": 15,
          "FDP_ACC.2.1": 2,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 2,
          "FDP_ACF.1": 14,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_DAU": 2,
          "FDP_DAU.1": 9,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ETC": 2,
          "FDP_ETC.1": 5,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_ITC": 2,
          "FDP_ITC.1": 10,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_RIP": 2,
          "FDP_RIP.1": 8,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 2,
          "FDP_ROL.1": 4,
          "FDP_ROL.1.1": 1,
          "FDP_ROL.1.2": 1,
          "FDP_SDI": 2,
          "FDP_SDI.2": 6,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 2,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 7,
          "FIA_UAU.4.1": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 10,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 2,
          "FIA_USB.1": 8,
          "FIA_USB.1.1": 1
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 2,
          "FMT_MSA": 2,
          "FMT_MSA.1": 12,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 9,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 2,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.2": 6,
          "FMT_MTD.2.1": 1,
          "FMT_MTD.2.2": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 9,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 3,
          "FPR_UNO.1": 7,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 2,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 2,
          "FPT_PHP.3": 10,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 2,
          "FPT_RCV.4": 4,
          "FPT_RCV.4.1": 1,
          "FPT_RVM": 2,
          "FPT_RVM.1": 6,
          "FPT_RVM.1.1": 1,
          "FPT_SEP": 2,
          "FPT_SEP.1": 11,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_TDC": 2,
          "FPT_TDC.1": 5,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_RSA": 2,
          "FRU_RSA.1": 5,
          "FRU_RSA.1.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements": 1,
          "out of scope": 1,
          "strength level of these security functions is \u201cSOF high\u201d. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 6.1.1": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Physical tampering": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 2,
          "Timing attacks": 1,
          "side channel": 2,
          "timing attack": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS PUB 180-2": 1
        },
        "PKCS": {
          "PKCS # 1": 1,
          "PKCS#2": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 16
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies": 5
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Thales Microelectronics \u0026 Keycorp MULTOS Team",
      "/CreationDate": "D:20040526124355",
      "/Creator": "Microsoft Word 8.0",
      "/ModDate": "D:20040526124445+11\u002700\u0027",
      "/Producer": "Acrobat Distiller 4.0 for Windows",
      "/Subject": "Keycorp MULTOS Common Criteria",
      "/Title": "Public Security Target",
      "pdf_file_size_bytes": 652006,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 85
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2003_14.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "ADV_IMP.2",
      "EAL4+",
      "AVA_VLA.4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2003_14.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "3979eb58e5c3ee9abc048d5c36861ff230bfc68cb37f01c29bc103e1612dfa61",
      "txt_hash": "3a0158df6abcb2abd887b7e4b9ae3276c1582aaa803e59f0ad08d6c9e645c49e"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "fb17d9af5360e801f93a406d87aa8efb76a926e679dc6383c116551c4eb2495a",
      "txt_hash": "bfce1933bc4dce3591006fedb708451ad6cc98b189598e2f1465b2cff2cad249"
    }
  },
  "status": "archived"
}