JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, with patch version 2.0, emedded on SLE66CLX800PE or SLE66CLX360PE

CSV information

Status archived
Valid from 27.10.2009
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Trusted Logic / Infineon
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL5+

Heuristics summary

Certificate ID: ANSSI-CC-2009/34

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
RSA2048, ECC
Schemes
Key Agreement
Randomness
TRNG

JavaCard versions
Java Card 2.2.1, GlobalPlatform 2.1.1
Vendor
Infineon Technologies AG, Infineon Technologies, Infineon

Security level
EAL 5, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 7, EAL5+, ITSEC E6 et
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VLA.4, AVA_MSU.3, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA
Protection profiles
BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0482, BSI-DSZ-CC-0482-2008-MA-05, ANSSI-CC-2009/34
Evaluation facilities
Serma Technologies

Standards
AIS 34, AIS 31, AIS34, AIS31, ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Creation date D:20091125155640+01'00'
Modification date D:20091125155640+01'00'
Pages 22
Producer Acrobat Distiller 8.0.0 (Windows)

Frontpage

Certificate ID ANSSI-CC-2009/34
Certified item Carte à puce JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, avec patch en version 2.0, masquée sur composants SLE66CLX800PE et SLE66CLX360PE
Certification lab Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France TĂ©l : +33 (0)5 57 26 08 75, mĂ©l : [email protected]
Developer Trusted Logic 5 rue du Bailliage, 78000 VERSAILLES, FRANCE Infineon Technologies AG AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, GERMANY Commanditaire Trusted Logic 5 rue du Bailliage, 78000 VERSAILLES, FRANCE

References

Incoming
  • ANSSI-CC-2009/35 - archived - Trusted Logic. Carte Ă  puce JCLXxxjTOPyyIDv2 : applet de passeport Ă©lectronique chargĂ©e sur la plate-forme JCLX80jTOP20IDv2 masquĂ©e sur le composant SLE66CLX800PE

Security target

Extracted keywords

Symmetric Algorithms
DES
Asymmetric Algorithms
RSA2048, RSA-CRT, ECC, Diffie-Hellman
Schemes
MAC
Randomness
RND, RNG
Block cipher modes
ECB, CBC, CCM

JavaCard versions
Java Card 2.2.1, Java Card 2.2.2, GlobalPlatform 2.1.1

Security level
EAL5, EAL5+, EAL5 augmented
Claims
D.APP-CODE, D.APP-INST, D.COMMAND, D.ISD-SESSION-KEYS, D.JCS_KEYS, D.ISD-, D.ISD-PERSO, D.GP-REGISTRY, D.CVM, O.REQUEST, O.INFO-ORIGIN, O.LOAD, O.INSTALL, O.INFO-INTEGRITY, O.INFO-CONFIDENTIALITY, O.NO-KEY-REUSE, O.DELETION, O.LIFE-CYCLE, O.IDENTIFICATION, O.GLOBAL-CVM, O.CVM-BLOCK, O.ERROR-COUNTERS, O.RECOVERY, O.LOCK, O.VERIFICATION, O.PROT-INF-LEAK, O.PROT-PHYS-TAMPER, O.ABUSE-FUNC, O.PROT-MALFUNCTION, O.PROT-, O.RND, O.OS-SUPPORT, O.IC-SUPPORT, O.KEY-MNGT, T.INSTALL, T.CRYPTO, T.CONFID-APPLI-DATA, T.CONFID-JCS-DATA, T.INTEG-, T.INTEG-JCS-DATA, T.DELETION, T.IMPERSONATE, T.INVALID-INPUT, T.INVALID-ORDER, T.FORCED-RESET, T.REPLAY, T.BRUTE-FORCE, T.LIFE-CYCLE, T.ABUSE-FUNC, T.PHYS-TAMPER, T.MALFUNCTION, T.INF-LEAK, T.RND, A.CARD-MANAGEMENT, A.NATIVE, OE.IC, OE.SCP, OE.RECOVERY, OE.SUPPORT, OE.CARD-MANAGEMENT, OE.SECRETS, OE.KEY-LENGTH, OSP, OSP.FILE-ORIGIN, OSP.SECRETS, OSP.KEY-LENGTH, OSP.NO-RMI-APPLETS, OSP.PERSONALIZATION, OSP.PROCESS-TOE
Security Assurance Requirements (SAR)
ADV_HLD, ALC_DVS.2, AVA_VLA.4
Security Functional Requirements (SFR)
FCS_RND, FCS_RND.1, FCS_COP, FCS_COP.1, FCS_CKM, FCS_CKM.3, FCS_CKM.1, FCS_RND.1.1, FDP_ACC, FDP_IFF, FDP_IFF.1, FDP_IFF.1.5, FDP_IFF.1.2, FDP_ITC, FDP_ITC.1, FDP_ROL, FDP_ROL.1, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACF.1.1, FDP_ITT, FDP_ITT.1, FDP_IFC, FDP_IFC.1, FDP_IFC.2, FDP_IFF.2, FIA_UAU, FIA_UAU.4, FIA_AFL, FIA_AFL.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_SMF, FMT_SMF.1, FMT_SMR, FMT_SMR.1, FMT_MSA.2, FPT_TST.2, FPT_TDC, FPT_TDC.1, FPT_RCV, FPT_RCV.3, FPT_FLS, FPT_FLS.1, FPT_TST, FPT_SEP, FPT_SEP.1, FPT_PHP, FPT_PHP.3, FPT_ITT, FPT_ITT.1, FPT_TST.2.1, FPT_AMT.1, FPT_TST.1, FRU_FLT, FRU_FLT.2, FRU_RSA, FRU_RSA.1
Protection profiles
BSI-PP-0002

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, physical tampering, Physical tampering, malfunction, DFA, reverse engineering

Standards
FIPS PUB 46-3, FIPS 46-2, PKCS#1, PKCS#3, AIS34, ISO/IEC 15946-1, ISO/IEC 15946-3, ISO/IEC 15408:2005, SCP01, SCP02, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Creation date D:20091125155704+01'00'
Modification date D:20091125155704+01'00'
Pages 86
Producer GPL Ghostscript 8.54

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2009/34

Extracted SARs

ALC_DVS.2, AVA_MSU.3, AVA_VLA.4

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "e35cd307ad95ed6d",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2009/34",
    "cert_lab": [
      "SERMA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/35"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/35"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Trusted Logic / Infineon",
  "manufacturer_web": "https://www.trusted-logic.com/",
  "name": "JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, with patch version 2.0, emedded on SLE66CLX800PE or SLE66CLX360PE",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2009-10-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "anssi-cc_2009-34fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VLA.4",
        "cc_version": "Crit\u00e8res Communs version 2.3 conforme \u00e0 la norme ISO 15408:2005",
        "cert_id": "ANSSI-CC-2009/34",
        "cert_item": "Carte \u00e0 puce JCLX80jTOP20ID : Java Trusted Open Platform IFX#v42, avec patch en version 2.0, masqu\u00e9e sur composants SLE66CLX800PE et SLE66CLX360PE",
        "cert_item_version": "Version plate-forme : IFX#v42 Version patch : 2.0",
        "cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France T\u00e9l : +33 (0)5 57 26 08 75, m\u00e9l : [email protected]",
        "developer": "Trusted Logic 5 rue du Bailliage, 78000 VERSAILLES, FRANCE Infineon Technologies AG AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, GERMANY Commanditaire Trusted Logic 5 rue du Bailliage, 78000 VERSAILLES, FRANCE",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur\\(s\\)(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "N\u00e9ant"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "RSA": {
          "RSA2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0482": 1,
          "BSI-DSZ-CC-0482-2008-MA-05": 1
        },
        "FR": {
          "ANSSI-CC-2009/34": 23
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 1,
          "ACM_SCP": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_IGS": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_LLD": 1,
          "ADV_RCR": 1,
          "ADV_SPM": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.3": 1,
          "AVA_SOF": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL4": 3,
          "EAL5": 1,
          "EAL5+": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 et": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Technologies": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.1.1": 4
        },
        "JavaCard": {
          "Java Card 2.2.1": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "TRNG": {
          "TRNG": 3
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 31": 2,
          "AIS 34": 2,
          "AIS31": 1,
          "AIS34": 1
        },
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1,
          "CCMB-2005-08-004": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 1,
          "ISO/IEC 18045:2005": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 3,
          "Infineon Technologies": 2,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20091125155640+01\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20091125155640+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.0.0 (Windows)",
      "pdf_file_size_bytes": 202613,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    },
    "st_filename": "anssi-cible_2009-34en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        },
        "RSA": {
          "RSA-CRT": 1,
          "RSA2048": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CARD-MANAGEMENT": 1,
          "A.NATIVE": 1
        },
        "D": {
          "D.APP-CODE": 2,
          "D.APP-INST": 2,
          "D.COMMAND": 2,
          "D.CVM": 2,
          "D.GP-REGISTRY": 2,
          "D.ISD-": 1,
          "D.ISD-PERSO": 2,
          "D.ISD-SESSION-KEYS": 2,
          "D.JCS_KEYS": 1
        },
        "O": {
          "O.ABUSE-FUNC": 2,
          "O.CVM-BLOCK": 2,
          "O.DELETION": 2,
          "O.ERROR-COUNTERS": 2,
          "O.GLOBAL-CVM": 2,
          "O.IC-SUPPORT": 1,
          "O.IDENTIFICATION": 3,
          "O.INFO-CONFIDENTIALITY": 3,
          "O.INFO-INTEGRITY": 4,
          "O.INFO-ORIGIN": 3,
          "O.INSTALL": 4,
          "O.KEY-MNGT": 1,
          "O.LIFE-CYCLE": 3,
          "O.LOAD": 4,
          "O.LOCK": 2,
          "O.NO-KEY-REUSE": 2,
          "O.OS-SUPPORT": 1,
          "O.PROT-": 1,
          "O.PROT-INF-LEAK": 4,
          "O.PROT-MALFUNCTION": 3,
          "O.PROT-PHYS-TAMPER": 4,
          "O.RECOVERY": 3,
          "O.REQUEST": 2,
          "O.RND": 3,
          "O.VERIFICATION": 3
        },
        "OE": {
          "OE.CARD-MANAGEMENT": 1,
          "OE.IC": 1,
          "OE.KEY-LENGTH": 2,
          "OE.RECOVERY": 1,
          "OE.SCP": 2,
          "OE.SECRETS": 2,
          "OE.SUPPORT": 1
        },
        "OSP": {
          "OSP": 2,
          "OSP.FILE-ORIGIN": 2,
          "OSP.KEY-LENGTH": 2,
          "OSP.NO-RMI-APPLETS": 2,
          "OSP.PERSONALIZATION": 2,
          "OSP.PROCESS-TOE": 3,
          "OSP.SECRETS": 2
        },
        "T": {
          "T.ABUSE-FUNC": 1,
          "T.BRUTE-FORCE": 2,
          "T.CONFID-APPLI-DATA": 1,
          "T.CONFID-JCS-DATA": 1,
          "T.CRYPTO": 4,
          "T.DELETION": 3,
          "T.FORCED-RESET": 2,
          "T.IMPERSONATE": 2,
          "T.INF-LEAK": 2,
          "T.INSTALL": 4,
          "T.INTEG-": 1,
          "T.INTEG-JCS-DATA": 1,
          "T.INVALID-INPUT": 2,
          "T.INVALID-ORDER": 2,
          "T.LIFE-CYCLE": 3,
          "T.MALFUNCTION": 2,
          "T.PHYS-TAMPER": 2,
          "T.REPLAY": 2,
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_HLD": 1
        },
        "ALC": {
          "ALC_DVS.2": 2
        },
        "AVA": {
          "AVA_VLA.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL5": 2,
          "EAL5 augmented": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 8,
          "FCS_CKM.1": 3,
          "FCS_CKM.3": 1,
          "FCS_COP": 22,
          "FCS_COP.1": 11,
          "FCS_RND": 6,
          "FCS_RND.1": 6,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 5,
          "FDP_ACC.1": 2,
          "FDP_ACF": 4,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 1,
          "FDP_IFC": 6,
          "FDP_IFC.1": 1,
          "FDP_IFC.2": 2,
          "FDP_IFF": 4,
          "FDP_IFF.1": 6,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.5": 1,
          "FDP_IFF.2": 7,
          "FDP_ITC": 4,
          "FDP_ITC.1": 3,
          "FDP_ITT": 3,
          "FDP_ITT.1": 1,
          "FDP_ROL": 2,
          "FDP_ROL.1": 2
        },
        "FIA": {
          "FIA_AFL": 6,
          "FIA_AFL.1": 6,
          "FIA_UAU": 2,
          "FIA_UAU.4": 1
        },
        "FMT": {
          "FMT_MSA": 26,
          "FMT_MSA.1": 6,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 10,
          "FMT_SMF": 10,
          "FMT_SMF.1": 5,
          "FMT_SMR": 8,
          "FMT_SMR.1": 8
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_FLS": 4,
          "FPT_FLS.1": 1,
          "FPT_ITT": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP": 2,
          "FPT_PHP.3": 1,
          "FPT_RCV": 2,
          "FPT_RCV.3": 4,
          "FPT_SEP": 2,
          "FPT_SEP.1": 2,
          "FPT_TDC": 2,
          "FPT_TDC.1": 2,
          "FPT_TST": 4,
          "FPT_TST.1": 4,
          "FPT_TST.2": 6,
          "FPT_TST.2.1": 1
        },
        "FRU": {
          "FRU_FLT": 2,
          "FRU_FLT.2": 1,
          "FRU_RSA": 2,
          "FRU_RSA.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CCM": {
          "CCM": 1
        },
        "ECB": {
          "ECB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 12
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.1.1": 10
        },
        "JavaCard": {
          "Java Card 2.2.1": 4,
          "Java Card 2.2.2": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 5,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 2,
          "Physical tampering": 1,
          "malfunction": 7,
          "physical tampering": 3
        },
        "SCA": {
          "DPA": 3,
          "Leak-Inherent": 1,
          "SPA": 2,
          "physical probing": 4
        },
        "other": {
          "reverse engineering": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS34": 2
        },
        "CC": {
          "CCMB-2005-08-001": 1,
          "CCMB-2005-08-002": 1,
          "CCMB-2005-08-003": 1,
          "CCMB-2005-08-004": 1
        },
        "FIPS": {
          "FIPS 46-2": 1,
          "FIPS PUB 46-3": 6
        },
        "ISO": {
          "ISO/IEC 15408:2005": 3,
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 15946-3": 1
        },
        "PKCS": {
          "PKCS#1": 2,
          "PKCS#3": 1
        },
        "SCP": {
          "SCP01": 3,
          "SCP02": 6
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 29
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20091125155704+01\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20091125155704+01\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.54",
      "pdf_file_size_bytes": 1470192,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 86
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc_2009-34fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible_2009-34en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "99b2153ba59afc595d117eb9d9005a7451ab63793c82ea864d5096c05115ab66",
      "txt_hash": "44a47fe677cf7d899763f8704a682338ba8d789cd701b4b5110db70835d556e5"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "19dbf74c170dfee557c7a3eeb619fb9fd7261eaa0ca319706e7a3498c58732a3",
      "txt_hash": "b723e657bfd60695e1a168dcdbe52dcb394538d13b2c801754979dd27b9d4957"
    }
  },
  "status": "archived"
}