This page was not yet optimized for use on mobile
devices.
eTravel EAC v1.2 masquée sur le composant S3CC9LC
CSV information
| Status | archived |
|---|---|
| Valid from | 16.03.2012 |
| Valid until | 01.09.2019 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Gemalto / Samsung |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VLA.4, ALC_DVS.2, ADV_IMP.2, AVA_MSU.3, EAL4+ |
| Protection profiles |
Heuristics summary
Certificate ID: ANSSI-CC-2012/09
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
ECDH, ECDSA, ECC, DHHash functions
SHA-1Vendor
Samsung, GemaltoSecurity level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL4+, EAL5+, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_VLA, AVA_CCA, AVA_MSU, AVA_SOFProtection profiles
BSI-PP-0026, BSI-PP-0002-2001, BSI-PP-0002-, BSI-PP-0026-2006-MA-Certificates
BSI-DSZ-CC-0624-2010, BSI-DSZ-CC-0624-, BSI-DSZ-CC-0624-2010-MA-01, DCSSI-2008/45, ANSSI-CC-2012/09, ANSSI-2009/17Evaluation facilities
Serma TechnologiesStandards
AIS 34, AIS34, ISO/IEC 15408:2005, ISO/IEC 18045:2005, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
| Creation date | D:20120320094044+01'00' |
|---|---|
| Modification date | D:20120320094044+01'00' |
| Pages | 22 |
| Producer | Acrobat Distiller 8.0.0 (Windows) |
Frontpage
| Certificate ID | ANSSI-CC-2012/09 |
|---|---|
| Certified item | eTravel EAC v1.2 masquée sur le composant S3CC9LC |
| Certification lab | Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France |
| Developer | Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics La Boursidière, RN 186, Bâtiment Jura, BP 202, 92357 Le Plessis-Robinson, France Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France |
References
Outgoing- ANSSI-CC-2009/17 - archived - eTravel EAC version 1.0 (version 01 03) on SLE66CLX800PE m1581 e13/a14
- BSI-DSZ-CC-0624-2010 - archived - Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software
- ANSSI-CC-2008/45 - archived - eTravel EAC version 1.1 (version 01 02) embedded on P5CD080 and P5CD144 microcontrollers
Security target
Extracted keywords
Symmetric Algorithms
DES, Triple-DES, TDES, KMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384Schemes
MAC, Key AgreementRandomness
RND, RNGBlock cipher modes
CBCCPLC
IC Fabricator, IC TypeIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG9, EF.DG10, EF.DG11, EF.DG12, EF.DG13, EF.DG15, EF.DG6, EF.DG7, EF.DG8, EF.COM, EF.SODTrusted Execution Environments
SSCVendor
Samsung, GemaltoSecurity level
EAL4+, EAL4, EAL 5, EAL4 augmentedClaims
D.LDS, D.MRTD, T.INFORMATION_LEAKAGE, T.PHYS_TAMPER, T.MALFUNCTION, A.PERS_AGENT, A.INSP_SYS, OT.AC_PERS, OT.DATA_INT, OT.DATA_CONF, OT.IDENTIFICATION, OT.PROT_ABUSE_FUNC, OT.PROT_INF_LEAK, OT.PROT_PHYS_TAMPER, OT.PROT_MALFUNCTION, OE.PASS_AUTH_SIGN, OE.EXAM_MRTD, OE.PROT_LOGICAL_MRTDSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_LLD, ADV_IMP, ADV_RCR, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.4, FCS_COP.1, FCS_CKM, FCS_COP, FDP_ACF, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UCT, FDP_UIT.1, FDP_UIT, FDP_DAU.1, FDP_DAU, FIA_API, FIA_UAU, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_AFL.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1.1, FIA_AFL.1.2, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MOF.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHPProtection profiles
BSI-PP-0017, BSI-PP-0026, BSI-PP-0002Certificates
CC-1, CC-2, CC-3Evaluation facilities
Serma TechnologiesSide-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS180-2, FIPS46-3, FIPS PUB 46-3, FIPS 46-3, FIPS 180-2, PKCS#3, AIS20, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003File metadata
| Creation date | D:20120320094137+01'00' |
|---|---|
| Modification date | D:20120320094137+01'00' |
| Pages | 75 |
| Producer | Microsoft® Office Word 2007 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2012/09Extracted SARs
ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "7c1a2e19236b65ac",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2012/09",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"627a214702fd03e7"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0624-2010",
"ANSSI-CC-2008/45",
"ANSSI-CC-2009/17"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0223-2003",
"BSI-DSZ-CC-0501-2008",
"ANSSI-CC-2008/45",
"BSI-DSZ-CC-0452-2007",
"ANSSI-CC-2009/17",
"BSI-DSZ-CC-0624-2010",
"BSI-DSZ-CC-0410-2007",
"BSI-DSZ-CC-0482-2008",
"BSI-DSZ-CC-0404-2007",
"BSI-DSZ-CC-0266-2005",
"BSI-DSZ-CC-0169-2002",
"BSI-DSZ-CC-0399-2007",
"BSI-DSZ-CC-0322-2005",
"ANSSI-CC-2008/28",
"BSI-DSZ-CC-0400-2007",
"BSI-DSZ-CC-0438-2007",
"BSI-DSZ-CC-0411-2007"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Gemalto / Samsung",
"manufacturer_web": "https://www.gemalto.com/",
"name": "eTravel EAC v1.2 masqu\u00e9e sur le composant S3CC9LC",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-03-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC_2012-09fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augment\u00e9 ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4",
"cc_version": "Crit\u00e8res Communs version 2.3 conforme \u00e0 la norme ISO 15408:2005",
"cert_id": "ANSSI-CC-2012/09",
"cert_item": "eTravel EAC v1.2 masqu\u00e9e sur le composant S3CC9LC",
"cert_item_version": "T1004548 avec softmask S1081425 r\u00e9vision 01 02",
"cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France",
"developer": "Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics La Boursidi\u00e8re, RN 186, B\u00e2timent Jura, BP 202, 92357 Le Plessis-Robinson, France Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur\\(s\\)(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "BSI-PP-0026, [PP EAC], version 1.2 Protection Profile \u2013 Machine Readable Travel Document with ICAO application, Extended Access Control"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0624-": 1,
"BSI-DSZ-CC-0624-2010": 3,
"BSI-DSZ-CC-0624-2010-MA-01": 1
},
"FR": {
"ANSSI-2009/17": 1,
"ANSSI-CC-2012/09": 23,
"DCSSI-2008/45": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-": 1,
"BSI-PP-0002-2001": 2,
"BSI-PP-0026": 2,
"BSI-PP-0026-2006-MA-": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 2,
"AVA_SOF": 1,
"AVA_VLA": 2,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 3,
"EAL4+": 1,
"EAL5": 1,
"EAL5+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 34": 2,
"AIS34": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 46
},
"Samsung": {
"Samsung": 50
}
},
"vulnerability": {}
},
"report_metadata": {
"/Comments": "Developpeur",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20120320094044+01\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20120320094044+01\u002700\u0027",
"/Producer": "Acrobat Distiller 8.0.0 (Windows)",
"/SourceModified": "D:20120319122111",
"pdf_file_size_bytes": 249858,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 22
},
"st_filename": "ANSSI-CC-cible_2012-09en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 8
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 8
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"NL": {
"CC-1": 3,
"CC-2": 39,
"CC-3": 2
}
},
"cc_claims": {
"A": {
"A.INSP_SYS": 1,
"A.PERS_AGENT": 1
},
"D": {
"D.LDS": 4,
"D.MRTD": 1
},
"OE": {
"OE.EXAM_MRTD": 1,
"OE.PASS_AUTH_SIGN": 1,
"OE.PROT_LOGICAL_MRTD": 1
},
"OT": {
"OT.AC_PERS": 1,
"OT.DATA_CONF": 1,
"OT.DATA_INT": 1,
"OT.IDENTIFICATION": 1,
"OT.PROT_ABUSE_FUNC": 1,
"OT.PROT_INF_LEAK": 1,
"OT.PROT_MALFUNCTION": 1,
"OT.PROT_PHYS_TAMPER": 1
},
"T": {
"T.INFORMATION_LEAKAGE": 1,
"T.MALFUNCTION": 1,
"T.PHYS_TAMPER": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 1,
"BSI-PP-0017": 1,
"BSI-PP-0026": 2
}
},
"cc_sar": {
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 2,
"ADV_LLD": 1,
"ADV_RCR": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_MSU.3": 2,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 6,
"FAU_SAS.1": 6,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 27,
"FCS_CKM.4": 10,
"FCS_COP": 21,
"FCS_COP.1": 58,
"FCS_RND": 9,
"FCS_RND.1": 14,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 2,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU": 1,
"FDP_DAU.1": 4,
"FDP_UCT": 2,
"FDP_UCT.1": 4,
"FDP_UIT": 2,
"FDP_UIT.1": 6
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 16,
"FIA_API.1": 8,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 26,
"FIA_UAU.1": 3,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 6,
"FIA_UAU.5": 6,
"FIA_UAU.6": 6,
"FIA_UID.1": 3,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 12,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 11,
"FMT_LIM.2.1": 2,
"FMT_MOF.1": 1,
"FMT_MTD": 7,
"FMT_MTD.1": 13,
"FMT_MTD.3": 1,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 2,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 2,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 3,
"FPT_FLS.1.1": 1,
"FPT_PHP": 1,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 1,
"FPT_RVM.1": 3,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 3,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TST.1": 4,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICType": {
"IC Type": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 6
},
"MAC": {
"MAC": 14
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA2": {
"SHA-224": 6,
"SHA-256": 7,
"SHA-384": 6
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 11,
"EF.DG1": 22,
"EF.DG10": 1,
"EF.DG11": 1,
"EF.DG12": 1,
"EF.DG13": 3,
"EF.DG14": 8,
"EF.DG15": 2,
"EF.DG16": 22,
"EF.DG2": 9,
"EF.DG3": 15,
"EF.DG4": 15,
"EF.DG5": 8,
"EF.DG6": 2,
"EF.DG7": 1,
"EF.DG8": 1,
"EF.DG9": 1,
"EF.SOD": 10
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 8
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"Physical Tampering": 2,
"Physical tampering": 3,
"fault injection": 1,
"malfunction": 3,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 4,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 2
},
"CC": {
"CCMB-2005-08-001": 2,
"CCMB-2005-08-002": 2,
"CCMB-2005-08-003": 2
},
"FIPS": {
"FIPS 180-2": 8,
"FIPS 46-3": 2,
"FIPS PUB 46-3": 1,
"FIPS180-2": 6,
"FIPS46-3": 2
},
"ICAO": {
"ICAO": 17
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816-4": 1
},
"PKCS": {
"PKCS#3": 1
},
"RFC": {
"RFC3369": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 3,
"Triple-DES": 14
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"KMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 100
},
"Samsung": {
"Samsung": 23
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20120320094137+01\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20120320094137+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"pdf_file_size_bytes": 945987,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 75
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026_ma1b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-09fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VLA.4",
"EAL4+",
"ADV_IMP.2",
"AVA_MSU.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-09en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "10d459bda67168ecb7dcbd1bc8439fff32cf012046f3f3f48df8f51df1110d7e",
"txt_hash": "def4971701461024d263b899cc5d72912327d2dc4b74e7c181cc58a55fc703fa"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f95496a79a2b7a4a036e6014d942ad23f89c0c6418f511e2ac7b92cb843be741",
"txt_hash": "d81e87d4821ec02484f809380fc3730552181c0fbae55894b9ca60014b16bd54"
}
},
"status": "archived"
}