Application e-Passport AXSEAL CC V2 36K embedded on Philips P5CD036V0Q microcontroller

CSV information

Status archived
Valid from 28.11.2006
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Gemalto / Philips Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_IMP.2, EAL4+, ADV_DVS.2

Heuristics summary

Certificate ID: ANSSI-CC-2006/23

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Symmetric Algorithms
DES

Vendor
Gemalto, Thales, Philips

Security level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL5+, ITSEC E6 et
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA
Protection profiles
BSI-PP-0017, BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0349-2006, Rapport de certification 2006/23
Evaluation facilities
CESTI

Standards
AIS 34, AIS34, ICAO, CCIMB-2004-01-001, CCIMB-2004-01-002, CCIMB-2004-01-003, CCIMB-2004-01-004

File metadata

Title 2006/23
Subject Application e-Passport AXSEAL CC V2 36K embarquée sur le microcontrôleur Philips P5CD036V0Q
Keywords CER/F/07.3
Author Mathieu Robert
Creation date D:20061129144145+01'00'
Modification date D:20061129144149+01'00'
Pages 17
Creator Acrobat PDFMaker 5.0 pour Word
Producer Acrobat Distiller 5.0 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0349-2006 - archived - Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q,P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software

Security target

Extracted keywords

Symmetric Algorithms
DES, Triple-DES, TDES, TDEA, KMAC
Hash functions
SHA-1
Schemes
MAC
Randomness
RND, RNG
Engines
SmartMX
Block cipher modes
ECB, CBC

CPLC
IC Fabricator, IC Type
IC data groups
EF.DG9, EF.DG10, EF.DG11, EF.DG12, EF.DG13, EF.DG14, EF.DG15, EF.DG1, EF.DG16, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG6, EF.DG7, EF.DG8, EF.COM, EF.SOD
Trusted Execution Environments
SSC
Vendor
Gemalto, Axalto, Philips

Security level
EAL4, EAL 5, EAL4 augmented
Claims
D.LDS, D.MRTD, T.SKIMMING, T.EAVESDROPPING, T.SKIMMINGS, T.FORGERY, T.CLONING, T.INFORMATION_LEAKAGE, T.PHYS_TAMPER, T.MALFUNCTION, T.CHIP_ID, T.ABUSE_FUNC, A.PERS_AGENT, A.INSP_SYS, A.SIGNATURE_PKI, A.AUTH_PKI, A.HOLDER_BEHAV, OT.AC_PERS, OT.DATA_INT, OT.DATA_CONF, OT.IDENTIFICATION, OT.CHIP_AUTH_PROOF, OT.PROT_ABUSE_FUNC, OT.PROT_INF_LEAK, OT.PROT_PHYS_TAMPER, OT.PROT_MALFUNCTION, OT.ADMINISTRATION, OE.PASS_AUTH_SIGN, OE.ADMINISTRATION, OE.EXAM_MRTD, OE.PROT_LOGICAL_MRTD, OE.SECURE_HANDLING
Security Assurance Requirements (SAR)
ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_LLD, ADV_IMP, ADV_RCR, ALC_DVS.2, APE_SRE
Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FCS_RND, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1, FCS_CKM.4, FCS_CKM, FCS_COP, FDP_ACF, FDP_ACC.1, FDP_ACC, FDP_ACF.1, FDP_UCT, FDP_UIT, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UCT.1, FDP_UIT.1, FDP_DAU.1, FDP_IFC, FDP_IFF, FDP_IFC.1, FIA_API, FIA_UAU, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.3, FIA_UAU.4, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MOF.1, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA, FMT_MSA.2.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FPR_UNO.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2
Protection profiles
BSI-PP-0017, BSI-PP-0002
Certificates
BSI-DSZ-CC-0349-2006, BSI-DSZ-CC-0349, CC-1, CC-2, CC-3

Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS180-2, FIPS 46-3, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 7816-2, ICAO, CCIMB-2004-01-001, CCIMB-2004-01-002, CCIMB-2004-01-003, CCIMB-2004-01-004

File metadata

Title AXSEAL_V2_CC_36K_Security_Target_Lite
Author Eric DELAUNAY - Gemalto
Creation date D:20061116163720+01'00'
Modification date D:20061116163720Z
Pages 76
Creator PDFCreator Version 0.9.3
Producer GPL Ghostscript 8.54

References

Outgoing
  • BSI-DSZ-CC-0349-2006 - archived - Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q,P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2006/23

Extracted SARs

ADV_DVS.2, ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "4595e440ec3a547c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2006/23",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0349-2006"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0349-2006",
          "BSI-DSZ-CC-0348-2006",
          "BSI-DSZ-CC-0227-2004",
          "BSI-DSZ-CC-0312-2005"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0349-2006"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0349-2006"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Gemalto / Philips Semiconductors",
  "manufacturer_web": "https://www.gemalto.com/",
  "name": "Application e-Passport AXSEAL CC V2 36K embedded on Philips P5CD036V0Q microcontroller",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2006-11-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "2006_23fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0349-2006": 3
        },
        "FR": {
          "Rapport de certification 2006/23": 9
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0017": 2
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 1,
          "ACM_SCP": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_IGS": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_LLD": 1,
          "ADV_RCR": 1,
          "ADV_SPM": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_USR": 2
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.3": 1,
          "AVA_SOF": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 1,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 5,
          "EAL5": 1,
          "EAL5+": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 et": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 34": 1,
          "AIS34": 1
        },
        "CC": {
          "CCIMB-2004-01-001": 1,
          "CCIMB-2004-01-002": 1,
          "CCIMB-2004-01-003": 1,
          "CCIMB-2004-01-004": 1
        },
        "ICAO": {
          "ICAO": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 20
        },
        "Philips": {
          "Philips": 27
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Mathieu Robert",
      "/CreationDate": "D:20061129144145+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 pour Word",
      "/Keywords": "CER/F/07.3",
      "/ModDate": "D:20061129144149+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0 (Windows)",
      "/Subject": "Application e-Passport AXSEAL CC V2 36K embarqu\u00e9e sur le microcontr\u00f4leur Philips P5CD036V0Q",
      "/Title": "2006/23",
      "pdf_file_size_bytes": 666960,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 17
    },
    "st_filename": "cible2006_23en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0349": 1,
          "BSI-DSZ-CC-0349-2006": 1
        },
        "NL": {
          "CC-1": 1,
          "CC-2": 1,
          "CC-3": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.AUTH_PKI": 1,
          "A.HOLDER_BEHAV": 2,
          "A.INSP_SYS": 1,
          "A.PERS_AGENT": 1,
          "A.SIGNATURE_PKI": 1
        },
        "D": {
          "D.LDS": 1,
          "D.MRTD": 2
        },
        "OE": {
          "OE.ADMINISTRATION": 2,
          "OE.EXAM_MRTD": 2,
          "OE.PASS_AUTH_SIGN": 1,
          "OE.PROT_LOGICAL_MRTD": 1,
          "OE.SECURE_HANDLING": 3
        },
        "OT": {
          "OT.AC_PERS": 2,
          "OT.ADMINISTRATION": 2,
          "OT.CHIP_AUTH_PROOF": 1,
          "OT.DATA_CONF": 3,
          "OT.DATA_INT": 1,
          "OT.IDENTIFICATION": 6,
          "OT.PROT_ABUSE_FUNC": 1,
          "OT.PROT_INF_LEAK": 1,
          "OT.PROT_MALFUNCTION": 1,
          "OT.PROT_PHYS_TAMPER": 2
        },
        "T": {
          "T.ABUSE_FUNC": 1,
          "T.CHIP_ID": 3,
          "T.CLONING": 2,
          "T.EAVESDROPPING": 2,
          "T.FORGERY": 1,
          "T.INFORMATION_LEAKAGE": 2,
          "T.MALFUNCTION": 2,
          "T.PHYS_TAMPER": 2,
          "T.SKIMMING": 1,
          "T.SKIMMINGS": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002": 1,
          "BSI-PP-0017": 2
        }
      },
      "cc_sar": {
        "ADO": {
          "ADO_DEL": 2,
          "ADO_IGS": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 2,
          "ADV_LLD": 1,
          "ADV_RCR": 1
        },
        "ALC": {
          "ALC_DVS.2": 2
        },
        "APE": {
          "APE_SRE": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL4": 3,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 3,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 1,
          "FAU_SAA.1": 3,
          "FAU_SAS": 6,
          "FAU_SAS.1": 7,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 7,
          "FCS_CKM.1": 7,
          "FCS_CKM.4": 6,
          "FCS_COP": 10,
          "FCS_COP.1": 24,
          "FCS_RND": 15,
          "FCS_RND.1": 9,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 7,
          "FDP_ACC.1": 6,
          "FDP_ACF": 7,
          "FDP_ACF.1": 10,
          "FDP_DAU.1": 4,
          "FDP_IFC": 1,
          "FDP_IFC.1": 2,
          "FDP_IFF": 1,
          "FDP_RIP.1": 3,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.2": 3,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT": 6,
          "FDP_UCT.1": 5,
          "FDP_UIT": 6,
          "FDP_UIT.1": 5
        },
        "FIA": {
          "FIA_AFL.1": 3,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 21,
          "FIA_API.1": 6,
          "FIA_API.1.1": 1,
          "FIA_ATD.1": 3,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 25,
          "FIA_UAU.1": 3,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.3": 1,
          "FIA_UAU.4": 8,
          "FIA_UAU.5": 2,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 2,
          "FIA_UAU.6": 4,
          "FIA_UID.1": 3,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 7,
          "FMT_LIM.1": 14,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 13,
          "FMT_LIM.2.1": 2,
          "FMT_MOF.1": 4,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 1,
          "FMT_MSA.1": 4,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 2,
          "FMT_MSA.2.1": 1,
          "FMT_MTD": 4,
          "FMT_MTD.1": 10,
          "FMT_SMF.1": 4,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 2
        },
        "FPT": {
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.3": 6,
          "FPT_PHP.3.1": 1,
          "FPT_RVM.1": 3,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 3,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_TST.1": 5,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        },
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 2
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 16,
          "EF.DG1": 2,
          "EF.DG10": 1,
          "EF.DG11": 1,
          "EF.DG12": 1,
          "EF.DG13": 1,
          "EF.DG14": 1,
          "EF.DG15": 4,
          "EF.DG16": 2,
          "EF.DG2": 1,
          "EF.DG3": 1,
          "EF.DG4": 1,
          "EF.DG5": 1,
          "EF.DG6": 1,
          "EF.DG7": 1,
          "EF.DG8": 1,
          "EF.DG9": 1,
          "EF.SOD": 16
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "Physical Tampering": 2,
          "Physical tampering": 2,
          "fault injection": 1,
          "malfunction": 4,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 5,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCIMB-2004-01-001": 2,
          "CCIMB-2004-01-002": 2,
          "CCIMB-2004-01-003": 2,
          "CCIMB-2004-01-004": 1
        },
        "FIPS": {
          "FIPS 46-3": 3,
          "FIPS180-2": 2
        },
        "ICAO": {
          "ICAO": 19
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816-2": 1,
          "ISO/IEC 7816-4": 1
        },
        "RFC": {
          "RFC3369": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 6,
            "Triple-DES": 30
          },
          "DES": {
            "DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SSC": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Axalto": {
          "Axalto": 76
        },
        "Gemalto": {
          "Gemalto": 78
        },
        "Philips": {
          "Philips": 11
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Eric DELAUNAY - Gemalto",
      "/CreationDate": "D:20061116163720+01\u002700\u0027",
      "/Creator": "PDFCreator Version 0.9.3",
      "/Keywords": "",
      "/ModDate": "D:20061116163720Z",
      "/Producer": "GPL Ghostscript 8.54",
      "/Subject": "",
      "/Title": "AXSEAL_V2_CC_36K_Security_Target_Lite",
      "pdf_file_size_bytes": 587705,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 76
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2006_23fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_IMP.2",
      "EAL4+",
      "ADV_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2006_23en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e00abe32c83cfafdc8da384982506ad8f563d296fd3263e42ba90bef16e94c9f",
      "txt_hash": "682da4bc57f9c76049b8bb0e5bc6e826b25e3337345dbb94dd51425679748f50"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "54f3a5f348bfa8146098eb00de1c489af6c88398dab283330c9ed9a4b67d260a",
      "txt_hash": "7c90db40f9cbeb39083b51667737408b2c620bdbf145a69cd8724ee2a57892fa"
    }
  },
  "status": "archived"
}