Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB

CSV information

Status archived
Valid from 17.02.2010
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Gemalto / NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL4+, AVA_VAN.5

Heuristics summary

Certificate ID: ANSSI-CC-2009/56

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Asymmetric Algorithms
ECC
Hash functions
SHA-256

Vendor
NXP, NXP Semiconductors, Gemalto

Security level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL 4 augmented, ITSEC E6 and
Security Assurance Requirements (SAR)
ADO_DEL, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_MSU.3, AVA_VLA.4, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-PP-0005-2002, BSI-PP-0006-2002, BSI-PP-0002-2001, BSI-PP- 0005-2002, BSI-PP-0005-, BSI-PP- 0006-2002, BSI-PP- 0002-2001
Certificates
BSI-DSZ-CC-0411-2007-MA-04, ANSSI-CC-2009/56
Evaluation facilities
Serma Technologies

Standards
CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Creation date D:20100827152755+02'00'
Modification date D:20100827152755+02'00'
Pages 19
Producer Acrobat Distiller 8.0.0 (Windows)

Frontpage

Certificate ID ANSSI-CC-2009/56
Certified item Multiapp ID IAS ECC smart card : electronic signature application v4.2.7.A loaded on Multiapp v1.0 Java Card platform with v1.2 soft mask embedded on NXP P5CD144 VOB
Certification lab Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]
Developer Gemalto SA1 6 rue de la Verrerie 92197 Meudon, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France

References

Incoming
  • ANSSI-CC-2012/81 - archived - MetaPKI
  • ANSSI-CC-2010/52 - archived - Carte à puce Multiapp ID IAS ECC wafer process : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB
  • ANSSI-CC-2010/59 - archived - MultiApp ID CIE/CNS

Security target

Extracted keywords

Symmetric Algorithms
DES, TDES, Triple-DES
Asymmetric Algorithms
ECC, DH
Hash functions
SHA-1, SHA-256
Schemes
MAC
Randomness
RNG

JavaCard versions
Java Card 2.2.1, JC2.2, JC2.2.1
Vendor
NXP, Gemalto

Security level
EAL5+, EAL4, EAL4+, EAL4 augmented
Claims
D.SCD, D.SVD, D.DTBS, D.VAD, D.RAD, D.SSCD, D.SIG, A.CGA, A.SCA, OE.SVD_AUTH_CGA, OE.HI_VAD
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_IMP.1, ADV_ARC, ADV_LLD, ADV_FSP, ADV_IMP, ADV_HLD, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, AGD_PRE, AGD_USR, AGD_ADM, AGD_OPE, AGD_PRE.1, AGD_OPE.1, ALC_DVS.2, ALC_DVS, ALC_CMC, ALC_CMS, ALC_DEL, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_VAN, AVA_VAN.5, AVA_CCA, AVA_VLA, AVA_SOF, AVA_MSU
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FDP_ACC, FDP_ACF, FDP_ETC, FDP_ITC, FDP_RIP, FDP_SDI, FDP_UCT, FDP_UIT, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_SDI.2, FDP_UCT.1, FDP_UIT.1, FDP_RIP.1.1, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.2.1, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS, FPT_PHP, FPT_TST, FPT_AMT, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_AMT.1, FPT_FLS.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_TRP, FTP_ITC.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Protection profiles
BSI-PP-0004-2002T-, BSI-PP-0005-2002T-03-04-2002, BSI-PP-0006-2002T-03-04-2002, BSI-PP-0002-2001

Side-channel analysis
Side channel, SPA, DPA, timing attacks, physical tampering
Certification process
out of scope, Multiapp platform. Beside the TOE, the product also contains the following Java Card applications (out of scope of the TOE) Figure 1 represents the product. The TOE is bordered with bold and un-continuous line

Standards
FIPS 46-3, FIPS 180-2, PKCS #1, AIS31, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Creation date D:20100301110216+01'00'
Modification date D:20100301110216+01'00'
Pages 58
Producer GPL Ghostscript 8.54

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2009/56

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VAN.5, AVA_VLA.4

Similar certificates

Name Certificate ID
Carte à puce Multiapp ID IAS ECC wafer process : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Mu... ANSSI-CC-2010/52 Compare
Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant I... ANSSI-CC-2012/10 Compare
Application IAS XL sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur ... ANSSI-CC-2013/31 Compare
Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masq... ANSSI-CC-2013/30 Compare
Trusted Logic. Carte à puce JCLXxxjTOPyyIDv2 : applet de passeport électronique chargée sur la plate-forme JCLX80jTOP... ANSSI-CC-2009/35 Compare
Application IAS XL sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composan... ANSSI-CC-2012/80 Compare
Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur ... ANSSI-CC-2012/76 Compare
Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD... ANSSI-CC-2013/70 Compare
Plateforme Java Card de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC081V1A ANSSI-CC-2012/24 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A ANSSI-CC-2013/29 Compare
Applet IAS Classic v3 sur carte à puce MultiApp V2 masquée sur composants de la famille SLE66 ANSSI-CC-2011/16 Compare
Mécanisme SAC de l'application eTravel EAC v1.3 chargée sur la carte à puce MultiApp V2 SAC (PACE) masquée sur le com... ANSSI-CC-2011/80 Compare
Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-n (composant NXP) en configuration Larg... ANSSI-CC-2010/39 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2013/32 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/06 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (v... ANSSI-CC-2015/15 Compare
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Ve... ANSSI-CC-2014/86 Compare
Carte à puce ID-ONE Cosmo V7.0.1-n, avec correctif 077121, masquée sur composants NXP P5CD145 V0A (Large Dual), P5CC1... ANSSI-CC-2011/64 Compare
Application eTravel EAC v1.3 chargée sur la carte à puce MultiApp V2 SAC (PACE) masquée sur le composant SLE66CLX1440... ANSSI-CC-2011/79 Compare
Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-a (composant Atmel) en configuration La... ANSSI-CC-2010/36 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Car... ANSSI-CC-2020/65v2 Compare
Plateforme Java Card en configuration ouverte de la carte � puce MultiApp V2 masqu�e sur composants de la famille SLE66 ANSSI-CC-2011/10 Compare
Plateforme Java Card MAV31S en configuration ouverte de la carte à puce Optelio Contactless R7S masquée sur le compos... ANSSI-CC-2015/30 Compare
Application eTravel EAC v2.0 sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2013/33 Compare
Application eTravel EAC v2.0 sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/07 Compare
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 ANSSI-CC-2016/24 Compare
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7793 A12 et G12 ANSSI-CC-2016/23 Compare
Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/08 Compare
Application eTravel EAC v2.0, en configuration BAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2013/35 Compare
Application eTravel EAC v2.0, en configuration BAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2014/09 Compare
Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 ANSSI-CC-2013/34 Compare
Application IAS V4.2.0.D sur la plateforme Javacard ouverte MultiApp V3.1S masquée sur le composant P60D144JVA (versi... ANSSI-CC-2015/38 Compare
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Versio... ANSSI-CC-2016/03 Compare
Application IAS V4.2.0.B sur la plateforme Javacard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (versio... ANSSI-CC-2015/37 Compare
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Versio... ANSSI-CC-2016/04 Compare
Application CPS2ter v1.12, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2 (... ANSSI-CC-2019/43 Compare
IAS ECC V2 en configuration #2 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le... ANSSI-CC-2018/16 Compare
eTravel 2.2 en configuration EAC sur BAC sur Plate-forme MultiApp v4.0 ANSSI-CC-2017/19 Compare
eTravel 2.2 en configuration EAC sur SAC sur Plate-forme MultiApp v4.0 ANSSI-CC-2017/20 Compare
Application eTravel EAC v2.0 sur la carte à pucefermée MultiApp V3 masquée sur le composantM7820 A11(Version du patch : 5.0) ANSSI-CC-2014/61 Compare
Application eTravel EAC v2.0, en configurationSAC, sur la carte à puce fermée MultiApp V3masquée sur le composant M78... ANSSI-CC-2014/62 Compare
Oberthur Carte à puce ID-One Cosmo V7.0-n en configuration Basic masquée sur composant NXP P5CC037 V0A ANSSI-CC-2009/49 Compare
SECORA™ ID X v2 Applet Collection with ePasslet Suite v4.0 by cryptovision GmbH, version 1.0 – Java Card applet confi... NSCIB-CC-2400169-01-CR Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de ... ANSSI-CC-2018/57v2 Compare
SECORA™ ID X v2 Applet Collection with ePasslet Suite v4.0 by cryptovision GmbH, version 1.0 – Java Card applet confi... NSCIB-CC-2400171-01-CR Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/56v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/58v2 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2)... ANSSI-CC-2023/30 Compare
ID&Trust CNS Card: NXP JCOP 2.4.2 R3 Smart Card with ID&Trust HTCNS v1.03 21.0.01/TSE-CCCS-29 Compare
Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2Code SAA... ANSSI-CC-2019/43-R01 Compare
Oberthur Carte à puce ID-One Cosmo V7.0-n en configuration Large, Standard, Basic (modes dual ou contact) ou Entry (m... ANSSI-CC-2009/48 Compare
eTravel 2.2 en configuration BAC sur Plate-forme MultiApp v4.0 ANSSI-CC-2017/21 Compare
Showing 5 out of 52.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "03de79a10467e320",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2009/56",
    "cert_lab": [
      "SERMA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.2.7",
        "1.0",
        "1.2"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2014-3402",
        "CVE-2014-2103",
        "CVE-2013-1243",
        "CVE-2011-4022",
        "CVE-2013-1218",
        "CVE-2014-3406"
      ]
    },
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2010/52",
          "ANSSI-CC-2010/59",
          "ANSSI-CC-2012/81"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2010/52",
          "Certificate Number: 2012/81",
          "ANSSI-CC-2010/59",
          "ANSSI-CC-2012/81"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Gemalto / NXP Semiconductors",
  "manufacturer_web": "https://www.gemalto.com/",
  "name": "Gemalto Carte \u00e0 puce Multiapp ID IAS ECC : applet de signature v4.2.7.A charg\u00e9e sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masqu\u00e9e sur microcontr\u00f4leur NXP P5CD144 VOB",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2010-02-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC_2009-56en.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 4 augmented ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Common Criteria version 3.1",
        "cert_id": "ANSSI-CC-2009/56",
        "cert_item": "Multiapp ID IAS ECC smart card : electronic signature application v4.2.7.A loaded on Multiapp v1.0 Java Card platform with v1.2 soft mask embedded on NXP P5CD144 VOB",
        "cert_item_version": "Applet version: v4.2.7.A Multiapp Java Card platform version : v1.0 soft mask version: v1.2 Microcontroller version : V0B",
        "cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]",
        "developer": "Gemalto SA1 6 rue de la Verrerie 92197 Meudon, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France",
        "match_rules": [
          "Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements"
        ],
        "ref_protection_profiles": "BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 34
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0411-2007-MA-04": 1
        },
        "FR": {
          "ANSSI-CC-2009/56": 20
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0002-2001": 1,
          "BSI-PP- 0005-2002": 1,
          "BSI-PP- 0006-2002": 1,
          "BSI-PP-0002-2001": 2,
          "BSI-PP-0005-": 1,
          "BSI-PP-0005-2002": 3,
          "BSI-PP-0006-2002": 3
        }
      },
      "cc_sar": {
        "ADO": {
          "ADO_DEL": 1
        },
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_MSU.3": 1,
          "AVA_VAN": 1,
          "AVA_VAN.5": 2,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 4 augmented": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 3,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 and": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Technologies": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 1,
          "CCMB-2007-09-002": 1,
          "CCMB-2007-09-003": 1,
          "CCMB-2007-09-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 26
        },
        "NXP": {
          "NXP": 9,
          "NXP Semiconductors": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20100827152755+02\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20100827152755+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.0.0 (Windows)",
      "pdf_file_size_bytes": 147571,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 19
    },
    "st_filename": "anssi-cc-cible_2009-56en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 28
          }
        },
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CGA": 2,
          "A.SCA": 2
        },
        "D": {
          "D.DTBS": 6,
          "D.RAD": 5,
          "D.SCD": 10,
          "D.SIG": 3,
          "D.SSCD": 1,
          "D.SVD": 7,
          "D.VAD": 1
        },
        "OE": {
          "OE.HI_VAD": 3,
          "OE.SVD_AUTH_CGA": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0004-2002T-": 1,
          "BSI-PP-0005-2002T-03-04-2002": 1,
          "BSI-PP-0006-2002T-03-04-2002": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 2,
          "ACM_SCP": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_IGS": 1
        },
        "ADV": {
          "ADV_ARC": 2,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.4": 1,
          "ADV_HLD": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 2,
          "ADV_IMP.2": 1,
          "ADV_LLD": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 3,
          "AGD_PRE.1": 3,
          "AGD_USR": 1
        },
        "ALC": {
          "ALC_CMC": 2,
          "ALC_CMC.4": 1,
          "ALC_CMS": 2,
          "ALC_DEL": 2,
          "ALC_DEL.1": 1,
          "ALC_DVS": 3,
          "ALC_DVS.2": 3,
          "ALC_LCD": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.3": 2,
          "AVA_SOF": 1,
          "AVA_VAN": 2,
          "AVA_VAN.5": 2,
          "AVA_VLA": 1,
          "AVA_VLA.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 8,
          "EAL4 augmented": 6,
          "EAL4+": 4,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM": 9,
          "FCS_CKM.1": 5,
          "FCS_CKM.4": 4,
          "FCS_COP": 9,
          "FCS_COP.1": 9
        },
        "FDP": {
          "FDP_ACC": 10,
          "FDP_ACC.1": 9,
          "FDP_ACF": 9,
          "FDP_ACF.1": 24,
          "FDP_ETC": 6,
          "FDP_ETC.1": 4,
          "FDP_ITC": 6,
          "FDP_ITC.1": 8,
          "FDP_RIP": 4,
          "FDP_RIP.1": 2,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 5,
          "FDP_SDI.2": 7,
          "FDP_UCT": 3,
          "FDP_UCT.1": 5,
          "FDP_UIT": 6,
          "FDP_UIT.1": 6
        },
        "FIA": {
          "FIA_AFL": 3,
          "FIA_AFL.1": 3,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 4,
          "FIA_ATD.1": 2,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 3,
          "FIA_UAU.1": 3,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 4,
          "FIA_UID.1": 4,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF": 3,
          "FMT_MOF.1": 3,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 9,
          "FMT_MSA.1": 5,
          "FMT_MSA.2": 3,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 7,
          "FMT_MTD": 3,
          "FMT_MTD.1": 3,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 3,
          "FMT_SMF.1": 3,
          "FMT_SMF.1.1": 2,
          "FMT_SMR": 3,
          "FMT_SMR.1": 3,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT": 1,
          "FPT_AMT.1": 1,
          "FPT_FLS": 3,
          "FPT_FLS.1": 3,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 4,
          "FPT_PHP.1": 3,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 3,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 5,
          "FPT_TST.1": 3,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 10,
          "FTP_ITC.1": 14,
          "FTP_TRP": 7,
          "FTP_TRP.1": 3,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Multiapp platform. Beside the TOE, the product also contains the following Java Card applications (out of scope of the TOE) Figure 1 represents the product. The TOE is bordered with bold and un-continuous line": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-256": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "JC2.2": 1,
          "JC2.2.1": 1,
          "Java Card 2.2.1": 5
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 4
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 4
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "Side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2006-09-001": 1,
          "CCMB-2007-09-002": 1,
          "CCMB-2007-09-003": 1,
          "CCMB-2007-09-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 46-3": 1
        },
        "PKCS": {
          "PKCS #1": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDES": 9,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 357
        },
        "NXP": {
          "NXP": 10
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20100301110216+01\u002700\u0027",
      "/Keywords": "",
      "/ModDate": "D:20100301110216+01\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.54",
      "pdf_file_size_bytes": 791366,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 58
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2009-56en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL4+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-56en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "36e5f98a6530124c7ca9effe5ae7ad75837034a584ac9c904ac68f3609dd8bc3",
      "txt_hash": "b42c32331ff75ce41792a57e059dfaf736b87f30da5072103a6e8801b9b457a7"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0b7397291144d02860f4a9b40392bc014b5797e7be814bcdd5e9999a0c83dc5b",
      "txt_hash": "6297cd67c1c73ed0cbc3ecf06e812949a8118da2d0fe44f6f947bb6cba908c81"
    }
  },
  "status": "archived"
}