Logiciel Mistral IP version 2.1.2

CSV information ?

Status archived
Valid from 22.07.2016
Valid until 22.07.2021
Scheme 🇫🇷 FR
Manufacturer Thales Communications & Security
Category Boundary Protection Devices and Systems
Security level EAL3+, AVA_VAN.3, ALC_FLR.3

Heuristics summary ?

Certificate ID: ANSSI-CC-2016/42

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Schemes
MAC
Protocols
IKEv2, IPsec, VPN

Trusted Execution Environments
SE
Vendor
Thales

Security level
EAL 3, EAL3, EAL4, EAL 1, EAL 5, EAL 7, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.3, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
ANSSI-CC-2016/42

File metadata

Title ANSSI-CC-2016_42
Pages 16
Creator PDFCreator Version 1.2.1
Producer GPL Ghostscript 9.02

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-128, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA512, SHA-256, SHA-384
Schemes
MAC, Key Exchange, Key exchange
Protocols
SSH, TLS, IKEv2, IKE, IKEv1, IPsec, VPN
Randomness
PRNG, RBG
Block cipher modes
CBC, GCM

Trusted Execution Environments
SE
Vendor
Thales

Security level
EAL3, EAL3 augmented
Claims
D.APPLICATIVE_DATA, D.TOPOLOGIC_INFO, D.SECURITY_POLICIES, D.CONFIG_PARAM, D.SUPERVISION_DATA, D.CRYPTO_KEYS, D.CRYPTO_KEYS_PROTECTION_PWD, D.AUDIT, D.AUTHENTICATION_DATA, D.SOFTWARE, D.SWUPDATE_PUBLICKEYS, D.TIME_BASE, D.SOFTWARES, D.CRYPTO_KEY, O.PROTECTED_COMMUNICATIONS, O.VERIFIABLE_UPDATES, O.SYSTEM_MONITORING, O.DISPLAY_BANNER, O.TOE_ADMINISTRATION, O.MANAGEMENT, O.RESIDUAL_INFORMATION_CLEAR, O.SESSION_LOCK, O.TSF_SELF_TEST, O.POL_ENFORCEMENT, O.FLOW_PARTITIONING, O.AUDIT, O.TIME_BASE, O.AUDIT_PROTECTION, O.SUPERVISION, O.SUPERVISION_IMPACT, O.VISUAL_ALARMS, O.ROLES, O.AUTHENTICATION_FAILURE, O.VIEW, O.POL_VIEW, O.DATA_ERASURE, O.LOCAL_DATA_PROTECTION, O.SOFTWARE_UPDATES, O.KEYS_INJECTION, O.CRYPTOPERIOD, O.CRYPTO_REGULATION, O.SELF_TEST, O.LED, O.VISUAL, T.ADMIN_ERROR, T.TSF_FAILURE, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.UNAUTHORISED_ACCESS, T.UNAUTHORISED_UPDATE, T.TIME_BASE, T.RESIDUAL_DATA, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRUSTED_NETWORKS, A.PHYSICAL_ENVIRONMENT_TOE, A.SW_PROTECTION, A.CONFIGURATION_CONTROL, A.ALARM, A.POLICIES_CONTINUITY, A.SECURED_MANAGEMENT_DEVICES, A.ACCESS_CONTROL_MANAGEMENT_DEVICES, A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES, A.AUDIT, A.SGC_TO_FRONT-END, A.STAND_ALONE_CEC, A.KEY_TRANSPORTATION, A.CEC_CRYPTO_REGULATION, R.ADMINISTRATOR, R.SGC, R.OPERATOR, R.SGL, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.TRUSTED_NETWORKS, OE.ALARM, OE.POLICIES_CONTINUITY, OE.AUDIT_ANALYSIS, OE.AUDIT_MNGT, OE.PHYSICAL_ENVIRONMENT_TOE, OE.LINUX_GUIDANCE, OE.TOE_INTEGRITY, OE.TOE_TRANSPORTATION, OE.SECURED_SGC, OE.ACCESS_CONTROL_SGC, OE.ACCESS_CONTROL_SF, OE.PHYSICAL_ENVIRONMENT_SGC, OE.PHYSICAL_ENVIRONMENT_SF, OE.SGC_TO_FRONT-END, OE.AUDIT_RECORD_SGC, OE.DISPLAY_BANNER_SGC, OE.SECURED_NTP_SERVER, OE.ACCESS_CONTROL_NTP_SERVER, OE.NTP_SERVER_LOCATION, OE.PHYSICAL_ENVIRONMENT_NTP_SERVER, OE.SECURED_FPD, OE.ACCESS_CONTROL_FPD, OE.PHYSICAL_ENVIRONMENT_FPD, OE.SECURED_SGL, OE.ACCESS_CONTROL_SGL, OE.SGL_CONNECTION, OE.PHYSICAL_ENVIRONMENT_SGL, OE.SECURED_CEC, OE.STAND_ALONE_CEC, OE.ACCESS_CONTROL_CEC, OE.PHYSICAL_ENVIRONMENT_CEC, OE.KEY_TRANSPORTATION, OE.CEC_CRYPTO_REGULATION, OE.SW_PROTECTION, OE.SW_UPDATE_KEY, OE.KEYS_TRANSPORTATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_GEN_EXT.3, FAU_STG_EXT.1, FAU_STG_EXT.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG_EXT.1.1, FAU_GEN.1, FAU_GEN, FAU_GEN_EXT.3.1, FAU_STG.1, FAU_STG.3, FAU_STG_EXT.3.1, FAU_SEG.1, FAU_GEN.2, FCS_RBG_EXT, FCS_IPS_EXT, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_CKM.1.1, FCS_CKM_EXT.4.1, FCS_COP.1.1, FCS_COP.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_IPS_EXT.1.1, FCS_IPS_EXT.1.2, FCS_IPS_EXT.1.3, FCS_IPS_EXT.1.4, FCS_IPS_EXT.1.5, FCS_IPS_EXT.1.6, FCS_IPS_EXT.1.7, FCS_IPS_EXT.1.8, FCS_COP, FCS_RBG_EXT.1, FCS_IPS_EXT.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.5.3, FCS_CKM_EXT, FCS_CKM.3, FDP_RIP.2.1, FDP_ITC.1, FDP_ITC.2, FDP_UCT, FDP_IFF, FDP_UIT, FDP_ITC, FDP_ETC, FDP_IFC, FDP_RIP.2, FDP_UCT.1, FDP_UIT.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF.1, FDP_ACC.1, FIA_UIA_EXT, FIA_PMG_EXT, FIA_UAU_EXT.2, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UAU.7.1, FIA_UID.2, FIA_UID, FIA_UIA_EXT.1, FIA_PMG_EXT.1, FIA_UAU, FIA_UAU_EXT, FIA_AFL, FIA_UAU.6, FIA_UAU.7, FIA_AFL.1, FIA_AFL.1.1, FIA_UIA, FIA_UID.1, FIA_UAU.1, FMT_MTD.1.1, FMT_MTD.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_MSA.3, FMT_MTD, FMT_SMR, FMT_SMF.1, FMT_MOF, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MOF.1, FMT_MDT, FMT_SKP_EXT.1, FMT_MSA.1, FPT_SIE_EXT, FPT_SKP_EXT, FPT_APW_EXT, FPT_TUD_EXT, FPT_SDP_EXT, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_STM.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TST_EXT.1.1, FPT_TST.1, FPT_TST.1.1, FPT_SIE_EXT.1, FPT_SIE_EXT.2, FPT_SIE_EXT.1.1, FPT_SIE_EXT.2.1, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_TUD_EXT.1, FPT_SDP_EXT.1, FPT_SDP_EXT.2, FPT_SDP_EXT.1.1, FPT_SDP_EXT.2.1, FPT_SDP_EXT.2.2, FPT_STM.1, FPT_TDC, FPT_FLS.1, FPT_TDC.1, FPT_FLS.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL_EXT.1, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTA_TAB.1, FTA_SSL.1, FTA_SSL_EXT, FTA_SSL, FTA_TAB, FTA_SSL.4, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1, FTP_ITC, FTP_TRP.1

Certification process
out of scope, Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral

Standards
FIPS PUB 197, FIPS 197, FIPS 186-4, FIPS 180-3, FIPS 198-1, NIST SP 800-38A, NIST SP 800-38D, SP 800-107, RFC 1042, RFC 1213, RFC 2408, RFC 2409, RFC 5996, RFC 3566, RFC 3602, RFC 894, RFC 4303, RFC 4106, RFC 4109, RFC 4868, RFC 5639, RFC 5903

File metadata

Pages 128
Creator PDFCreator Version 1.2.3
Producer GPL Ghostscript 9.04

Heuristics ?

Certificate ID: ANSSI-CC-2016/42

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3

References ?

No references are available for this certificate.

Updates ?

  • 10.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL3+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
    • The scheme_data property was set to {'product': 'Logiciel Mistral IP - version 2.1.2', 'url': 'https://cyber.gouv.fr/produits-certifies/logiciel-mistral-ip-version-212', 'description': 'Le produit Ă©valuĂ© est le « Logiciel Mistral IP, Version 2.1.2 » dĂ©veloppĂ© par THALES COMMUNICATIONS &SECURITY et embarquĂ© dans le boĂ®tier matĂ©riel en version 1.2.00. Ce produit est un Ă©quipement de chiffrement de niveau rĂ©seau (couche 3 du modèle OSI)assurant la protection des paquets IP. Il offre des services de protection de donnĂ©es Ă©changĂ©essur des liens d’interconnexions de rĂ©seaux l', 'sponsor': 'Thales Communications & Security', 'developer': 'Thales Communications & Security', 'cert_id': 'ANSSI-CC-2016/42', 'level': 'EAL3+', 'enhanced': {'cert_id': 'ANSSI-CC-2016/42', 'certification_date': '2016-07-22', 'category': 'Produits rĂ©seau', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Thales Communications & Security', 'sponsor': 'Thales Communications & Security', 'evaluation_facility': 'Amossys', 'level': 'EAL3+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_FLR.3, AVA_VAN.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/anssi-cc-2016_42.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/cible-lite-2016-42.pdf'}}.
  • 03.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 27.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Logiciel Mistral IP - version 2.1.2', 'url': 'https://cyber.gouv.fr/produits-certifies/logiciel-mistral-ip-version-212', 'description': 'Le produit Ă©valuĂ© est le « Logiciel Mistral IP, Version 2.1.2 » dĂ©veloppĂ© par THALES COMMUNICATIONS &SECURITY et embarquĂ© dans le boĂ®tier matĂ©riel en version 1.2.00. Ce produit est un Ă©quipement de chiffrement de niveau rĂ©seau (couche 3 du modèle OSI)assurant la protection des paquets IP. Il offre des services de protection de donnĂ©es Ă©changĂ©essur des liens d’interconnexions de rĂ©seaux l', 'sponsor': 'Thales Communications & Security', 'developer': 'Thales Communications & Security', 'cert_id': 'ANSSI-CC-2016/42', 'level': 'EAL3+', 'enhanced': {'cert_id': 'ANSSI-CC-2016/42', 'certification_date': '2016-07-22', 'category': 'Produits rĂ©seau', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Thales Communications & Security', 'sponsor': 'Thales Communications & Security', 'evaluation_facility': 'Amossys', 'level': 'EAL3+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_FLR.3, AVA_VAN.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/anssi-cc-2016_42.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/cible-lite-2016-42.pdf'}}.
  • 06.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Logiciel Mistral IP - version 2.1.2', 'url': 'https://cyber.gouv.fr/produits-certifies/logiciel-mistral-ip-version-212', 'description': 'Le produit Ă©valuĂ© est le « Logiciel Mistral IP, Version 2.1.2 » dĂ©veloppĂ© par THALES COMMUNICATIONS &SECURITY et embarquĂ© dans le boĂ®tier matĂ©riel en version 1.2.00. Ce produit est un Ă©quipement de chiffrement de niveau rĂ©seau (couche 3 du modèle OSI)assurant la protection des paquets IP. Il offre des services de protection de donnĂ©es Ă©changĂ©essur des liens d’interconnexions de rĂ©seaux l', 'sponsor': 'Thales Communications & Security', 'developer': 'Thales Communications & Security', 'cert_id': 'ANSSI-CC-2016/42', 'level': 'EAL3+', 'enhanced': {'cert_id': 'ANSSI-CC-2016/42', 'certification_date': '2016-07-22', 'category': 'Produits rĂ©seau', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Thales Communications & Security', 'sponsor': 'Thales Communications & Security', 'evaluation_facility': 'Amossys', 'level': 'EAL3+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_FLR.3, AVA_VAN.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/anssi-cc-2016_42.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/cible-lite-2016-42.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit Ă©valuĂ© est le « Logiciel Mistral IP, Version 2.1.2 » dĂ©veloppĂ© par THALES COMMUNICATIONS &SECURITY et embarquĂ© dans le boĂ®tier matĂ©riel en version 1.2.00. Ce produit est un Ă©quipement de chiffrement de niveau rĂ©seau (couche 3 du modèle OSI)assurant la protection des paquets IP. Il offre des services de protection de donnĂ©es Ă©changĂ©essur des liens d’interconnexions de rĂ©seaux l', 'cert_id': 'ANSSI-CC-2016/42', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2016/42', 'certification_date': '2016-07-22', 'mutual_recognition': 'SOG-IS CCRA'}}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Logiciel Mistral IP - version 2.1.2', 'url': 'https://cyber.gouv.fr/produits-certifies/logiciel-mistral-ip-version-212', 'description': 'Le produit Ă©valuĂ© est le « Logiciel Mistral IP, Version 2.1.2 » dĂ©veloppĂ© par THALES COMMUNICATIONS &SECURITY et embarquĂ© dans le boĂ®tier matĂ©riel en version 1.2.00.\n\nCe produit est un Ă©quipement de chiffrement de niveau rĂ©seau (couche 3 du modèle OSI)assurant la protection des paquets IP. Il offre des services de protection de donnĂ©es Ă©changĂ©essur des liens d’interconnexions de rĂ©seaux l', 'sponsor': 'Thales Communications & Security', 'developer': 'Thales Communications & Security', 'cert_id': '2016/42', 'level': 'EAL3+', 'enhanced': {'cert_id': '2016/42', 'certification_date': '22/07/2016', 'category': 'Produits rĂ©seau', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Thales Communications & Security', 'sponsor': 'Thales Communications & Security', 'evaluation_facility': 'Amossys', 'level': 'EAL3+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.3, AVA_VAN.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/anssi-cc-2016_42.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/cible-lite-2016-42.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '09a6756be1c9845f464481bf953d8715b9b641d3989e4c29db06a7381603ee03', 'txt_hash': '4e56ed6a9fe3608a076f1730d6d133e4012b1297cf354740e449f90155923ba4'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd0a1a17b1d8fb66d344b30cbeb145d041bcec8332044ecf832d1bfbab1bdd70f', 'txt_hash': '9dcf33dabb7367fdfc8674c90b9d8834aa55ac8fd8d6d0a2e1be7b5d8847e5b1'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 780613, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/Producer': 'GPL Ghostscript 9.02', '/CreationDate': '', '/ModDate': '', '/Title': 'ANSSI-CC-2016_42', '/Creator': 'PDFCreator Version 1.2.1', '/Author': '', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 942738, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 128, '/Producer': 'GPL Ghostscript 9.04', '/CreationDate': '', '/ModDate': '', '/Title': '', '/Creator': 'PDFCreator Version 1.2.3', '/Author': '', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2016/42': 17}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 3, 'EAL3': 2, 'EAL4': 2, 'EAL 1': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 ElĂ©mentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 4, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Thales': {'Thales': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'IKE': {'IKEv2': 1}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.3': 9, 'ADV_TDS.2': 3, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_FSP.4': 3, 'ADV_IMP.1': 3, 'ADV_TDS.3': 3}, 'AGD': {'AGD_OPE.1': 6, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR.3': 8, 'ALC_CMC.3': 2, 'ALC_CMS.3': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 3, 'ALC_LCD.1': 4, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 3, 'ATE_FUN.1': 6, 'ATE_IND.2': 1, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.3': 11}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 2, 'ASE_SPD.1': 4, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN_EXT.3': 13, 'FAU_STG_EXT.1': 16, 'FAU_STG_EXT.3': 13, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 2, 'FAU_STG_EXT.1.1': 3, 'FAU_GEN.1': 16, 'FAU_GEN': 9, 'FAU_GEN_EXT.3.1': 2, 'FAU_STG.1': 1, 'FAU_STG.3': 1, 'FAU_STG_EXT.3.1': 2, 'FAU_SEG.1': 2, 'FAU_GEN.2': 5}, 'FCS': {'FCS_RBG_EXT': 5, 'FCS_IPS_EXT': 4, 'FCS_CKM_EXT.4': 15, 'FCS_CKM_EXT.5': 23, 'FCS_CKM.1.1': 1, 'FCS_CKM_EXT.4.1': 2, 'FCS_COP.1.1': 4, 'FCS_COP.1': 23, 'FCS_RBG_EXT.1.1': 3, 'FCS_RBG_EXT.1.2': 3, 'FCS_IPS_EXT.1.1': 4, 'FCS_IPS_EXT.1.2': 3, 'FCS_IPS_EXT.1.3': 3, 'FCS_IPS_EXT.1.4': 3, 'FCS_IPS_EXT.1.5': 3, 'FCS_IPS_EXT.1.6': 3, 'FCS_IPS_EXT.1.7': 3, 'FCS_IPS_EXT.1.8': 4, 'FCS_COP': 96, 'FCS_RBG_EXT.1': 17, 'FCS_IPS_EXT.1': 23, 'FCS_CKM': 9, 'FCS_CKM.1': 29, 'FCS_CKM.4': 16, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.5.3': 1, 'FCS_CKM_EXT': 50, 'FCS_CKM.3': 1}, 'FDP': {'FDP_RIP.2.1': 2, 'FDP_ITC.1': 32, 'FDP_ITC.2': 44, 'FDP_UCT': 14, 'FDP_IFF': 32, 'FDP_UIT': 18, 'FDP_ITC': 43, 'FDP_ETC': 8, 'FDP_IFC': 35, 'FDP_RIP.2': 6, 'FDP_UCT.1': 2, 'FDP_UIT.1': 4, 'FDP_ETC.2': 4, 'FDP_IFC.1': 14, 'FDP_IFF.1': 21, 'FDP_ACC.1': 8}, 'FIA': {'FIA_UIA_EXT': 16, 'FIA_PMG_EXT': 10, 'FIA_UAU_EXT.2': 9, 'FIA_PMG_EXT.1.1': 2, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_UAU_EXT.2.1': 2, 'FIA_UAU.7.1': 1, 'FIA_UID.2': 2, 'FIA_UID': 10, 'FIA_UIA_EXT.1': 7, 'FIA_PMG_EXT.1': 5, 'FIA_UAU': 15, 'FIA_UAU_EXT': 6, 'FIA_AFL': 8, 'FIA_UAU.6': 1, 'FIA_UAU.7': 1, 'FIA_AFL.1': 2, 'FIA_AFL.1.1': 1, 'FIA_UIA': 1, 'FIA_UID.1': 4, 'FIA_UAU.1': 4}, 'FMT': {'FMT_MTD.1.1': 1, 'FMT_MTD.1': 12, 'FMT_SMF.1.1': 2, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_MSA.3': 21, 'FMT_MTD': 52, 'FMT_SMR': 23, 'FMT_SMF.1': 30, 'FMT_MOF': 5, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 16, 'FMT_MOF.1': 1, 'FMT_MDT': 1, 'FMT_SKP_EXT.1': 1, 'FMT_MSA.1': 1}, 'FPT': {'FPT_SIE_EXT': 9, 'FPT_SKP_EXT': 4, 'FPT_APW_EXT': 4, 'FPT_TUD_EXT': 20, 'FPT_SDP_EXT': 3, 'FPT_SKP_EXT.1.1': 3, 'FPT_APW_EXT.1.1': 3, 'FPT_APW_EXT.1.2': 3, 'FPT_STM.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_TST_EXT.1.1': 1, 'FPT_TST.1': 6, 'FPT_TST.1.1': 2, 'FPT_SIE_EXT.1': 6, 'FPT_SIE_EXT.2': 4, 'FPT_SIE_EXT.1.1': 1, 'FPT_SIE_EXT.2.1': 1, 'FPT_SKP_EXT.1': 9, 'FPT_APW_EXT.1': 10, 'FPT_TUD_EXT.1': 7, 'FPT_SDP_EXT.1': 5, 'FPT_SDP_EXT.2': 10, 'FPT_SDP_EXT.1.1': 1, 'FPT_SDP_EXT.2.1': 2, 'FPT_SDP_EXT.2.2': 2, 'FPT_STM.1': 19, 'FPT_TDC': 8, 'FPT_FLS.1': 7, 'FPT_TDC.1': 5, 'FPT_FLS.1.1': 1, 'FPT_TST.1.2': 2, 'FPT_TST.1.3': 2}, 'FTA': {'FTA_SSL_EXT.1': 9, 'FTA_SSL_EXT.1.1': 2, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1, 'FTA_TAB.1': 5, 'FTA_SSL.1': 2, 'FTA_SSL_EXT': 6, 'FTA_SSL': 6, 'FTA_TAB': 7, 'FTA_SSL.4': 1}, 'FTP': {'FTP_ITC.1.1': 3, 'FTP_ITC.1.2': 2, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 2, 'FTP_TRP.1.2': 2, 'FTP_TRP.1.3': 2, 'FTP_ITC.1': 14, 'FTP_ITC': 14, 'FTP_TRP.1': 7}}, 'cc_claims': {'D': {'D.APPLICATIVE_DATA': 7, 'D.TOPOLOGIC_INFO': 5, 'D.SECURITY_POLICIES': 23, 'D.CONFIG_PARAM': 22, 'D.SUPERVISION_DATA': 3, 'D.CRYPTO_KEYS': 18, 'D.CRYPTO_KEYS_PROTECTION_PWD': 3, 'D.AUDIT': 3, 'D.AUTHENTICATION_DATA': 11, 'D.SOFTWARE': 4, 'D.SWUPDATE_PUBLICKEYS': 5, 'D.TIME_BASE': 8, 'D.SOFTWARES': 3, 'D.CRYPTO_KEY': 4}, 'O': {'O.PROTECTED_COMMUNICATIONS': 11, 'O.VERIFIABLE_UPDATES': 1, 'O.SYSTEM_MONITORING': 1, 'O.DISPLAY_BANNER': 6, 'O.TOE_ADMINISTRATION': 1, 'O.MANAGEMENT': 7, 'O.RESIDUAL_INFORMATION_CLEAR': 6, 'O.SESSION_LOCK': 6, 'O.TSF_SELF_TEST': 1, 'O.POL_ENFORCEMENT': 6, 'O.FLOW_PARTITIONING': 5, 'O.AUDIT': 12, 'O.TIME_BASE': 5, 'O.AUDIT_PROTECTION': 6, 'O.SUPERVISION': 5, 'O.SUPERVISION_IMPACT': 4, 'O.VISUAL_ALARMS': 5, 'O.ROLES': 4, 'O.AUTHENTICATION_FAILURE': 4, 'O.VIEW': 5, 'O.POL_VIEW': 7, 'O.DATA_ERASURE': 6, 'O.LOCAL_DATA_PROTECTION': 11, 'O.SOFTWARE_UPDATES': 5, 'O.KEYS_INJECTION': 5, 'O.CRYPTOPERIOD': 4, 'O.CRYPTO_REGULATION': 7, 'O.SELF_TEST': 7, 'O.LED': 1, 'O.VISUAL': 1}, 'T': {'T.ADMIN_ERROR': 4, 'T.TSF_FAILURE': 4, 'T.UNDETECTED_ACTIONS': 4, 'T.UNAUTHORIZED_ACCESS': 1, 'T.UNAUTHORIZED_UPDATE': 1, 'T.USER_DATA_REUSE': 4, 'T.UNAUTHORISED_ACCESS': 3, 'T.UNAUTHORISED_UPDATE': 3, 'T.TIME_BASE': 3, 'T.RESIDUAL_DATA': 3}, 'A': {'A.NO_GENERAL_PURPOSE': 4, 'A.PHYSICAL': 1, 'A.TRUSTED_ADMIN': 4, 'A.TRUSTED_NETWORKS': 4, 'A.PHYSICAL_ENVIRONMENT_TOE': 3, 'A.SW_PROTECTION': 3, 'A.CONFIGURATION_CONTROL': 3, 'A.ALARM': 3, 'A.POLICIES_CONTINUITY': 3, 'A.SECURED_MANAGEMENT_DEVICES': 3, 'A.ACCESS_CONTROL_MANAGEMENT_DEVICES': 3, 'A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES': 3, 'A.AUDIT': 3, 'A.SGC_TO_FRONT-END': 3, 'A.STAND_ALONE_CEC': 3, 'A.KEY_TRANSPORTATION': 3, 'A.CEC_CRYPTO_REGULATION': 3}, 'R': {'R.ADMINISTRATOR': 13, 'R.SGC': 8, 'R.OPERATOR': 6, 'R.SGL': 1}, 'OE': {'OE.NO_GENERAL_PURPOSE': 1, 'OE.PHYSICAL': 1, 'OE.TRUSTED_ADMIN': 6, 'OE.TRUSTED_NETWORKS': 5, 'OE.ALARM': 3, 'OE.POLICIES_CONTINUITY': 3, 'OE.AUDIT_ANALYSIS': 2, 'OE.AUDIT_MNGT': 3, 'OE.PHYSICAL_ENVIRONMENT_TOE': 3, 'OE.LINUX_GUIDANCE': 3, 'OE.TOE_INTEGRITY': 8, 'OE.TOE_TRANSPORTATION': 3, 'OE.SECURED_SGC': 3, 'OE.ACCESS_CONTROL_SGC': 3, 'OE.ACCESS_CONTROL_SF': 2, 'OE.PHYSICAL_ENVIRONMENT_SGC': 3, 'OE.PHYSICAL_ENVIRONMENT_SF': 2, 'OE.SGC_TO_FRONT-END': 3, 'OE.AUDIT_RECORD_SGC': 5, 'OE.DISPLAY_BANNER_SGC': 3, 'OE.SECURED_NTP_SERVER': 3, 'OE.ACCESS_CONTROL_NTP_SERVER': 2, 'OE.NTP_SERVER_LOCATION': 2, 'OE.PHYSICAL_ENVIRONMENT_NTP_SERVER': 2, 'OE.SECURED_FPD': 2, 'OE.ACCESS_CONTROL_FPD': 3, 'OE.PHYSICAL_ENVIRONMENT_FPD': 3, 'OE.SECURED_SGL': 2, 'OE.ACCESS_CONTROL_SGL': 2, 'OE.SGL_CONNECTION': 4, 'OE.PHYSICAL_ENVIRONMENT_SGL': 2, 'OE.SECURED_CEC': 3, 'OE.STAND_ALONE_CEC': 3, 'OE.ACCESS_CONTROL_CEC': 3, 'OE.PHYSICAL_ENVIRONMENT_CEC': 3, 'OE.KEY_TRANSPORTATION': 2, 'OE.CEC_CRYPTO_REGULATION': 6, 'OE.SW_PROTECTION': 3, 'OE.SW_UPDATE_KEY': 3, 'OE.KEYS_TRANSPORTATION': 1}}, 'vendor': {'Thales': {'Thales': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17, 'AES-128': 1}}, 'constructions': {'MAC': {'HMAC': 2, 'HMAC-SHA-256': 2, 'HMAC-SHA-384': 2, 'HMAC-SHA-512': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 6, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA512': 2, 'SHA-256': 2, 'SHA-384': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 2, 'Key exchange': 2}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 1}}, 'IKE': {'IKEv2': 27, 'IKE': 71, 'IKEv1': 8}, 'IPsec': {'IPsec': 5}, 'VPN': {'VPN': 41}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RBG': 4}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'GCM': {'GCM': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS 197': 4, 'FIPS 186-4': 1, 'FIPS 180-3': 4, 'FIPS 198-1': 2}, 'NIST': {'NIST SP 800-38A': 2, 'NIST SP 800-38D': 2, 'SP 800-107': 1}, 'RFC': {'RFC 1042': 1, 'RFC 1213': 1, 'RFC 2408': 1, 'RFC 2409': 1, 'RFC 5996': 4, 'RFC 3566': 4, 'RFC 3602': 3, 'RFC 894': 1, 'RFC 4303': 2, 'RFC 4106': 1, 'RFC 4109': 1, 'RFC 4868': 3, 'RFC 5639': 1, 'RFC 5903': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral': 1}}}.
    • The report_filename property was set to ANSSI-CC-2016_42.pdf.
    • The st_filename property was set to Cible Lite 2016-42.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2016/42.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_42.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20Lite%202016-42.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Logiciel Mistral IP - version 2.1.2', 'url': 'https://cyber.gouv.fr/produits-certifies/logiciel-mistral-ip-version-212', 'description': 'Le produit Ă©valuĂ© est le « Logiciel Mistral IP, Version 2.1.2 » dĂ©veloppĂ© par THALES COMMUNICATIONS &SECURITY et embarquĂ© dans le boĂ®tier matĂ©riel en version 1.2.00.\n\nCe produit est un Ă©quipement de chiffrement de niveau rĂ©seau (couche 3 du modèle OSI)assurant la protection des paquets IP. Il offre des services de protection de donnĂ©es Ă©changĂ©essur des liens d’interconnexions de rĂ©seaux l', 'sponsor': 'Thales Communications & Security', 'developer': 'Thales Communications & Security', 'cert_id': '2016/42', 'level': 'EAL3+', 'enhanced': {'cert_id': '2016/42', 'certification_date': '22/07/2016', 'category': 'Produits rĂ©seau', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Thales Communications & Security', 'sponsor': 'Thales Communications & Security', 'evaluation_facility': 'Amossys', 'level': 'EAL3+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.3, AVA_VAN.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/anssi-cc-2016_42.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/07/cible-lite-2016-42.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Logiciel Mistral IP version 2.1.2 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": null,
  "dgst": "0ef53661a4c000d4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2016/42",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL3+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Thales Communications \u0026 Security",
  "manufacturer_web": "https://www.thalescommuninc.com",
  "name": "Logiciel Mistral IP version 2.1.2",
  "not_valid_after": "2021-07-22",
  "not_valid_before": "2016-07-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC-2016_42.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2016/42": 17
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.3": 4,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 3,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL3": 2,
          "EAL4": 2
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKEv2": 1
        },
        "IPsec": {
          "IPsec": 1
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "PDFCreator Version 1.2.1",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "GPL Ghostscript 9.02",
      "/Subject": "",
      "/Title": "ANSSI-CC-2016_42",
      "pdf_file_size_bytes": 780613,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "Cible Lite 2016-42.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "DH": 6,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 2
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS_CONTROL_MANAGEMENT_DEVICES": 3,
          "A.ALARM": 3,
          "A.AUDIT": 3,
          "A.CEC_CRYPTO_REGULATION": 3,
          "A.CONFIGURATION_CONTROL": 3,
          "A.KEY_TRANSPORTATION": 3,
          "A.NO_GENERAL_PURPOSE": 4,
          "A.PHYSICAL": 1,
          "A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES": 3,
          "A.PHYSICAL_ENVIRONMENT_TOE": 3,
          "A.POLICIES_CONTINUITY": 3,
          "A.SECURED_MANAGEMENT_DEVICES": 3,
          "A.SGC_TO_FRONT-END": 3,
          "A.STAND_ALONE_CEC": 3,
          "A.SW_PROTECTION": 3,
          "A.TRUSTED_ADMIN": 4,
          "A.TRUSTED_NETWORKS": 4
        },
        "D": {
          "D.APPLICATIVE_DATA": 7,
          "D.AUDIT": 3,
          "D.AUTHENTICATION_DATA": 11,
          "D.CONFIG_PARAM": 22,
          "D.CRYPTO_KEY": 4,
          "D.CRYPTO_KEYS": 18,
          "D.CRYPTO_KEYS_PROTECTION_PWD": 3,
          "D.SECURITY_POLICIES": 23,
          "D.SOFTWARE": 4,
          "D.SOFTWARES": 3,
          "D.SUPERVISION_DATA": 3,
          "D.SWUPDATE_PUBLICKEYS": 5,
          "D.TIME_BASE": 8,
          "D.TOPOLOGIC_INFO": 5
        },
        "O": {
          "O.AUDIT": 12,
          "O.AUDIT_PROTECTION": 6,
          "O.AUTHENTICATION_FAILURE": 4,
          "O.CRYPTOPERIOD": 4,
          "O.CRYPTO_REGULATION": 7,
          "O.DATA_ERASURE": 6,
          "O.DISPLAY_BANNER": 6,
          "O.FLOW_PARTITIONING": 5,
          "O.KEYS_INJECTION": 5,
          "O.LED": 1,
          "O.LOCAL_DATA_PROTECTION": 11,
          "O.MANAGEMENT": 7,
          "O.POL_ENFORCEMENT": 6,
          "O.POL_VIEW": 7,
          "O.PROTECTED_COMMUNICATIONS": 11,
          "O.RESIDUAL_INFORMATION_CLEAR": 6,
          "O.ROLES": 4,
          "O.SELF_TEST": 7,
          "O.SESSION_LOCK": 6,
          "O.SOFTWARE_UPDATES": 5,
          "O.SUPERVISION": 5,
          "O.SUPERVISION_IMPACT": 4,
          "O.SYSTEM_MONITORING": 1,
          "O.TIME_BASE": 5,
          "O.TOE_ADMINISTRATION": 1,
          "O.TSF_SELF_TEST": 1,
          "O.VERIFIABLE_UPDATES": 1,
          "O.VIEW": 5,
          "O.VISUAL": 1,
          "O.VISUAL_ALARMS": 5
        },
        "OE": {
          "OE.ACCESS_CONTROL_CEC": 3,
          "OE.ACCESS_CONTROL_FPD": 3,
          "OE.ACCESS_CONTROL_NTP_SERVER": 2,
          "OE.ACCESS_CONTROL_SF": 2,
          "OE.ACCESS_CONTROL_SGC": 3,
          "OE.ACCESS_CONTROL_SGL": 2,
          "OE.ALARM": 3,
          "OE.AUDIT_ANALYSIS": 2,
          "OE.AUDIT_MNGT": 3,
          "OE.AUDIT_RECORD_SGC": 5,
          "OE.CEC_CRYPTO_REGULATION": 6,
          "OE.DISPLAY_BANNER_SGC": 3,
          "OE.KEYS_TRANSPORTATION": 1,
          "OE.KEY_TRANSPORTATION": 2,
          "OE.LINUX_GUIDANCE": 3,
          "OE.NO_GENERAL_PURPOSE": 1,
          "OE.NTP_SERVER_LOCATION": 2,
          "OE.PHYSICAL": 1,
          "OE.PHYSICAL_ENVIRONMENT_CEC": 3,
          "OE.PHYSICAL_ENVIRONMENT_FPD": 3,
          "OE.PHYSICAL_ENVIRONMENT_NTP_SERVER": 2,
          "OE.PHYSICAL_ENVIRONMENT_SF": 2,
          "OE.PHYSICAL_ENVIRONMENT_SGC": 3,
          "OE.PHYSICAL_ENVIRONMENT_SGL": 2,
          "OE.PHYSICAL_ENVIRONMENT_TOE": 3,
          "OE.POLICIES_CONTINUITY": 3,
          "OE.SECURED_CEC": 3,
          "OE.SECURED_FPD": 2,
          "OE.SECURED_NTP_SERVER": 3,
          "OE.SECURED_SGC": 3,
          "OE.SECURED_SGL": 2,
          "OE.SGC_TO_FRONT-END": 3,
          "OE.SGL_CONNECTION": 4,
          "OE.STAND_ALONE_CEC": 3,
          "OE.SW_PROTECTION": 3,
          "OE.SW_UPDATE_KEY": 3,
          "OE.TOE_INTEGRITY": 8,
          "OE.TOE_TRANSPORTATION": 3,
          "OE.TRUSTED_ADMIN": 6,
          "OE.TRUSTED_NETWORKS": 5
        },
        "R": {
          "R.ADMINISTRATOR": 13,
          "R.OPERATOR": 6,
          "R.SGC": 8,
          "R.SGL": 1
        },
        "T": {
          "T.ADMIN_ERROR": 4,
          "T.RESIDUAL_DATA": 3,
          "T.TIME_BASE": 3,
          "T.TSF_FAILURE": 4,
          "T.UNAUTHORISED_ACCESS": 3,
          "T.UNAUTHORISED_UPDATE": 3,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTHORIZED_UPDATE": 1,
          "T.UNDETECTED_ACTIONS": 4,
          "T.USER_DATA_REUSE": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.3": 9,
          "ADV_FSP.4": 3,
          "ADV_IMP.1": 3,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 3,
          "ADV_TDS.3": 3
        },
        "AGD": {
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.3": 2,
          "ALC_CMS.1": 1,
          "ALC_CMS.3": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 3,
          "ALC_FLR.3": 8,
          "ALC_LCD.1": 4
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 5,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 4,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 4,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 11
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 4,
          "EAL3 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 9,
          "FAU_GEN.1": 16,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 2,
          "FAU_GEN_EXT.3": 13,
          "FAU_GEN_EXT.3.1": 2,
          "FAU_SEG.1": 2,
          "FAU_STG.1": 1,
          "FAU_STG.3": 1,
          "FAU_STG_EXT.1": 16,
          "FAU_STG_EXT.1.1": 3,
          "FAU_STG_EXT.3": 13,
          "FAU_STG_EXT.3.1": 2
        },
        "FCS": {
          "FCS_CKM": 9,
          "FCS_CKM.1": 29,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 16,
          "FCS_CKM_EXT": 50,
          "FCS_CKM_EXT.4": 15,
          "FCS_CKM_EXT.4.1": 2,
          "FCS_CKM_EXT.5": 23,
          "FCS_CKM_EXT.5.1": 1,
          "FCS_CKM_EXT.5.2": 1,
          "FCS_CKM_EXT.5.3": 1,
          "FCS_COP": 96,
          "FCS_COP.1": 23,
          "FCS_COP.1.1": 4,
          "FCS_IPS_EXT": 4,
          "FCS_IPS_EXT.1": 23,
          "FCS_IPS_EXT.1.1": 4,
          "FCS_IPS_EXT.1.2": 3,
          "FCS_IPS_EXT.1.3": 3,
          "FCS_IPS_EXT.1.4": 3,
          "FCS_IPS_EXT.1.5": 3,
          "FCS_IPS_EXT.1.6": 3,
          "FCS_IPS_EXT.1.7": 3,
          "FCS_IPS_EXT.1.8": 4,
          "FCS_RBG_EXT": 5,
          "FCS_RBG_EXT.1": 17,
          "FCS_RBG_EXT.1.1": 3,
          "FCS_RBG_EXT.1.2": 3
        },
        "FDP": {
          "FDP_ACC.1": 8,
          "FDP_ETC": 8,
          "FDP_ETC.2": 4,
          "FDP_IFC": 35,
          "FDP_IFC.1": 14,
          "FDP_IFF": 32,
          "FDP_IFF.1": 21,
          "FDP_ITC": 43,
          "FDP_ITC.1": 32,
          "FDP_ITC.2": 44,
          "FDP_RIP.2": 6,
          "FDP_RIP.2.1": 2,
          "FDP_UCT": 14,
          "FDP_UCT.1": 2,
          "FDP_UIT": 18,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 8,
          "FIA_AFL.1": 2,
          "FIA_AFL.1.1": 1,
          "FIA_PMG_EXT": 10,
          "FIA_PMG_EXT.1": 5,
          "FIA_PMG_EXT.1.1": 2,
          "FIA_UAU": 15,
          "FIA_UAU.1": 4,
          "FIA_UAU.6": 1,
          "FIA_UAU.7": 1,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT": 6,
          "FIA_UAU_EXT.2": 9,
          "FIA_UAU_EXT.2.1": 2,
          "FIA_UIA": 1,
          "FIA_UIA_EXT": 16,
          "FIA_UIA_EXT.1": 7,
          "FIA_UIA_EXT.1.1": 2,
          "FIA_UIA_EXT.1.2": 2,
          "FIA_UID": 10,
          "FIA_UID.1": 4,
          "FIA_UID.2": 2
        },
        "FMT": {
          "FMT_MDT": 1,
          "FMT_MOF": 5,
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 21,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 52,
          "FMT_MTD.1": 12,
          "FMT_MTD.1.1": 1,
          "FMT_SKP_EXT.1": 1,
          "FMT_SMF.1": 30,
          "FMT_SMF.1.1": 2,
          "FMT_SMR": 23,
          "FMT_SMR.1": 16,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_APW_EXT": 4,
          "FPT_APW_EXT.1": 10,
          "FPT_APW_EXT.1.1": 3,
          "FPT_APW_EXT.1.2": 3,
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 1,
          "FPT_SDP_EXT": 3,
          "FPT_SDP_EXT.1": 5,
          "FPT_SDP_EXT.1.1": 1,
          "FPT_SDP_EXT.2": 10,
          "FPT_SDP_EXT.2.1": 2,
          "FPT_SDP_EXT.2.2": 2,
          "FPT_SIE_EXT": 9,
          "FPT_SIE_EXT.1": 6,
          "FPT_SIE_EXT.1.1": 1,
          "FPT_SIE_EXT.2": 4,
          "FPT_SIE_EXT.2.1": 1,
          "FPT_SKP_EXT": 4,
          "FPT_SKP_EXT.1": 9,
          "FPT_SKP_EXT.1.1": 3,
          "FPT_STM.1": 19,
          "FPT_STM.1.1": 2,
          "FPT_TDC": 8,
          "FPT_TDC.1": 5,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 2,
          "FPT_TST.1.2": 2,
          "FPT_TST.1.3": 2,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TUD_EXT": 20,
          "FPT_TUD_EXT.1": 7,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 2
        },
        "FTA": {
          "FTA_SSL": 6,
          "FTA_SSL.1": 2,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 1,
          "FTA_SSL.4.1": 1,
          "FTA_SSL_EXT": 6,
          "FTA_SSL_EXT.1": 9,
          "FTA_SSL_EXT.1.1": 2,
          "FTA_TAB": 7,
          "FTA_TAB.1": 5,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 14,
          "FTP_ITC.1.1": 3,
          "FTP_ITC.1.2": 2,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 7,
          "FTP_TRP.1.1": 2,
          "FTP_TRP.1.2": 2,
          "FTP_TRP.1.3": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 71,
          "IKEv1": 8,
          "IKEv2": 27
        },
        "IPsec": {
          "IPsec": 5
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 41
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2,
          "Key exchange": 2
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2,
            "SHA-384": 2,
            "SHA512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RBG": 4
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 180-3": 4,
          "FIPS 186-4": 1,
          "FIPS 197": 4,
          "FIPS 198-1": 2,
          "FIPS PUB 197": 1
        },
        "NIST": {
          "NIST SP 800-38A": 2,
          "NIST SP 800-38D": 2,
          "SP 800-107": 1
        },
        "RFC": {
          "RFC 1042": 1,
          "RFC 1213": 1,
          "RFC 2408": 1,
          "RFC 2409": 1,
          "RFC 3566": 4,
          "RFC 3602": 3,
          "RFC 4106": 1,
          "RFC 4109": 1,
          "RFC 4303": 2,
          "RFC 4868": 3,
          "RFC 5639": 1,
          "RFC 5903": 1,
          "RFC 5996": 4,
          "RFC 894": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17,
            "AES-128": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2,
            "HMAC-SHA-256": 2,
            "HMAC-SHA-384": 2,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "PDFCreator Version 1.2.3",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "GPL Ghostscript 9.04",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 942738,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 128
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_42.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ALC_FLR.3",
      "AVA_VAN.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20Lite%202016-42.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "09a6756be1c9845f464481bf953d8715b9b641d3989e4c29db06a7381603ee03",
      "txt_hash": "4e56ed6a9fe3608a076f1730d6d133e4012b1297cf354740e449f90155923ba4"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d0a1a17b1d8fb66d344b30cbeb145d041bcec8332044ecf832d1bfbab1bdd70f",
      "txt_hash": "9dcf33dabb7367fdfc8674c90b9d8834aa55ac8fd8d6d0a2e1be7b5d8847e5b1"
    }
  },
  "status": "archived"
}