Cryptosmart SIM card (Version 5.1)

CSV information

Status archived
Valid from 28.01.2020
Valid until 28.01.2025
Scheme 🇫🇷 FR
Manufacturer Ercom/IDEMIA/Infineon
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL4+, AVA_VAN.4

Heuristics summary

Certificate ID: ANSSI-CC-2019/38

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
RSA 2048

Vendor
Infineon Technologies AG, OBERTHUR, Idemia, IDEMIA

Security level
EAL4, EAL2, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.4, AVA_VAN, AVA_VAN.5, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
ANSSI-CC-PP-
Certificates
ANSSI-CC-2019/38, ANSSI-CC-2016/60, ANSSI-CC-2016/60-S01, ANSSI-CC-2016/69
Evaluation facilities
Serma Safety & Security, SERMA, CESTI

Standards
PKCS#11, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title ANSSI-CC-2019/38
Subject Cryptosmart-SIM card
Keywords ANSSI-CC-CER-F-07.29.1
Author DUCLOS Charlene
Creation date D:20200131104400+01'00'
Modification date D:20200131104400+01'00'
Pages 16
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Frontpage

Certificate ID ANSSI-CC-2019/38
Certified item Cryptosmart-SIM card
Certification lab Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
Developer Ercom 6, rue Dewoitine 78140 Vélizy France Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Ercom 6, rue Dewoitine 78140 Vélizy France

References

Outgoing
  • ANSSI-CC-2016/69 - archived - Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816
  • ANSSI-CC-2016/60 - archived - DragonFly v4.0 sur composant SLE97CNFX1M50PE Identification Hardware 412691 Card Manager GOP Ref V21.06.01

Security target

Extracted keywords

Symmetric Algorithms
AES, AES-256, TDES, HMAC, CMAC, CBC-MAC
Asymmetric Algorithms
RSA-2048, DH, Diffie-Hellman
Hash functions
SHA256
Schemes
MAC, Key Agreement
Protocols
VPN
Randomness
DRBG, RNG
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 3.0.4
Vendor
Infineon Technologies, Infineon, Samsung, Oberthur, IDEMIA, Idemia

Security level
EAL4, EAL4 augmented
Claims
D.PLAINTEXT_DATA, D.USER_STORED_KEYS, D.USER_STORED_DATA, D.SESSION_KEYS, D.USER_SIGNATURE_KEY, D.USER_AUTH_CODE, D.TOE_INTERNAL_DATA, D.APDU_KEYS, D.TOE_INTERNAL_INFORMATION, D.APP_CODE, D.ORIGINAL_DATA, O.USER_AUTHENTICATION, O.PUK_UNBLOCK, O.STRONG_SECCODE, O.LIMITED_AUTH_NUMBER, O.FUNCTION_ACCESS_CONTROL, O.CRYPTOGRAPHIC_OPERATION, O.STRONG_MUTUAL_AUTHENTICATION, O.KEY_MANAGEMENT, O.PROTECT_SESSION_KEY, O.APDU_ENCRYPTION, O.SENSITIVE_MEMORY_ERASING, O.WIPE, O.PIN-MNGT, O.KEY-MNGT, O.REALLOCATION, O.CARD-MANAGEMENT, O.DOMAIN-RIGHTS, O.APPLI-AUTH, O.COMM_AUTH, O.COMM_INTEGRITY, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.RESOURCES, O.ALARM, O.TRANSACTION, O.OBJ-DELETION, O.LOAD, O.INSTALL, O.SCP, T.TOE_DATA_CORRUPTION, T.TOE_DATA_COMPROMISE, T.ABUSE_FUNC, T.MASQUERADE, T.KEY_DERIVE, T.INTERFACE_EAVESDROP, T.LIFE_CYCLE, T.UNAUTHORIZED_CARD_MNGT, T.PHYSICAL, T.UNAUTHORIZED_ACCESS, A.TRUSTED_ADMIN, A.TRAINED_ADMIN, A.CONFIGURATION, A.KEY_QUALITY, A.SECURE_KEY_MANAGEMENT, A.VERIFICATION, A.APPLET, OE.ADMIN, OE.CARD_ADMIN_STATION, OE.KEY_GENERATOR, OE.SECURE_PERSONALIZATION, OE.SECURE_KEY_MANAGEMENT, OE.SECURE_SECCODE_ENTRY, OE.NON_TRIVIAL_SECCODE, OE.HOST_CORRECT_BEHAVIOR, OE.HOST_AUDIT, OE.VERIFICATION, OE.APPLET, OE.BASIC-APPS-VALIDATION, OSP, OSP.SYMMETRIC_ENCRYPTION, OSP.RGS_CRYPTO, OSP.MUTUAL_AUTHENTICATION, OSP.KEY_STORAGE, OSP.RSA_PRIVATE_KEY_OPERATION, OSP.LOCAL_AUTHENTICATION, OSP.PUK_UNBLOCK, OSP.DATA_WIPE, OSP.ACCESS_CONTROL, OSP.TOE_AUDIT, OSP.AUDIT, OSP.BASIC-APPS-VALIDATION, OSP.AID-MANAGEMENT
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_FLR.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_DPT.1, AVA_VAN.4, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_COP, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FCS_CKM, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_RNG, FCS_CKM.3, FDP_ACC, FDP_ACC.1, FDP_ACF.1, FDP_ACC.2, FDP_ACF, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_ITC, FDP_ETC, FDP_ETC.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_SDI.2, FDP_UIT, FDP_IFC, FDP_IFF, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UAU.1, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.4, FIA_UAU.4.1, FIA_SOS, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_AFL, FIA_AFL.1, FIA_UID, FIA_USB, FMT_MSA.3, FMT_MSA, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FMT_SMF.1.1, FMT_MTD, FMT_REV, FPR_UNO.1, FPR_UNO, FPT_TDC.1, FPT_TDC, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS, FPT_FLS.1, FPT_RCV, FPT_PHP, FPT_RPL, FRU_FLT, FTP_ITC.1, FTP_TRP.1, FTP_TRP, FTP_ITC
Certificates
BSI-DSZ-CC-0946-V2-2015, ANSSI-CC-2016/60-S01, ANSSI-CC-2016/60

Standards
PKCS#11, PKCS#1, PKCS #11, ISO/IEC 7816-4, X.509, SCP11, SCP80, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title Cryptosmart-SIM card
Subject Security Target
Author julien.kowalski
Creation date D:20190515094914+02'00'
Modification date D:20190515094914+02'00'
Pages 92
Creator Microsoft® Word 2013
Producer Microsoft® Word 2013

References

Outgoing
  • ANSSI-CC-2016/60 - archived - DragonFly v4.0 sur composant SLE97CNFX1M50PE Identification Hardware 412691 Card Manager GOP Ref V21.06.01
  • BSI-DSZ-CC-0946-V2-2015 - archived - Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2019/38

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.3, ATE_DPT.1, AVA_VAN.4

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "c0fba4fbe23bed27",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2019/38",
    "cert_lab": [
      "SERMA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/69",
          "ANSSI-CC-2016/60"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2011/07",
          "BSI-DSZ-CC-0827-V2-2014",
          "ANSSI-CC-2012/39",
          "ANSSI-CC-2010/50",
          "BSI-DSZ-CC-0857-2013",
          "ANSSI-CC-2009/25",
          "ANSSI-CC-2013/13",
          "ANSSI-CC-2012/79",
          "ANSSI-CC-2009/57",
          "BSI-DSZ-CC-0555-2009",
          "ANSSI-CC-2016/60",
          "ANSSI-CC-2016/69",
          "ANSSI-CC-2014/81",
          "ANSSI-CC-2011/24",
          "ANSSI-CC-2012/06",
          "BSI-DSZ-CC-0857-V2-2015",
          "BSI-DSZ-CC-0827-2013",
          "BSI-DSZ-CC-0791-2012",
          "ANSSI-CC-2013/60",
          "BSI-DSZ-CC-0946-V2-2015",
          "ANSSI-CC-2010/49",
          "BSI-DSZ-CC-0946-2014"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0946-V2-2015",
          "ANSSI-CC-2016/60"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0946-V2-2015",
          "BSI-DSZ-CC-0946-2014",
          "ANSSI-CC-2016/60"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Ercom/IDEMIA/Infineon",
  "manufacturer_web": null,
  "name": "Cryptosmart SIM card (Version 5.1)",
  "not_valid_after": "2025-01-28",
  "not_valid_before": "2020-01-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "anssi-cc-2019-38fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL4 augment\u00e9 ALC_DVS.2, AVA_VAN.4",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
        "cert_id": "ANSSI-CC-2019/38",
        "cert_item": "Cryptosmart-SIM card",
        "cert_item_version": "Version 5.1",
        "cert_lab": "Serma Safety \u0026 Security 14 rue Galil\u00e9e, CS 10071, 33608 Pessac Cedex, France",
        "developer": "Ercom 6, rue Dewoitine 78140 V\u00e9lizy France Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Ercom 6, rue Dewoitine 78140 V\u00e9lizy France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Aucun"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 2048": 2
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2016/60": 1,
          "ANSSI-CC-2016/60-S01": 1,
          "ANSSI-CC-2016/69": 1,
          "ANSSI-CC-2019/38": 17
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.4": 6,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL4": 3,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 1,
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "PKCS": {
          "PKCS#11": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 3,
          "Idemia": 1
        },
        "Infineon": {
          "Infineon Technologies AG": 1
        },
        "Oberthur": {
          "OBERTHUR": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "DUCLOS Charlene",
      "/CreationDate": "D:20200131104400+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/Keywords": "ANSSI-CC-CER-F-07.29.1",
      "/ModDate": "D:20200131104400+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "Cryptosmart-SIM card",
      "/Title": "ANSSI-CC-2019/38",
      "pdf_file_size_bytes": 625797,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "anssi-cible-2019_38en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 5
          }
        },
        "RSA": {
          "RSA-2048": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0946-V2-2015": 1
        },
        "FR": {
          "ANSSI-CC-2016/60": 2,
          "ANSSI-CC-2016/60-S01": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 5,
          "A.CONFIGURATION": 4,
          "A.KEY_QUALITY": 2,
          "A.SECURE_KEY_MANAGEMENT": 4,
          "A.TRAINED_ADMIN": 2,
          "A.TRUSTED_ADMIN": 4,
          "A.VERIFICATION": 3
        },
        "D": {
          "D.APDU_KEYS": 3,
          "D.APP_CODE": 3,
          "D.ORIGINAL_DATA": 1,
          "D.PLAINTEXT_DATA": 5,
          "D.SESSION_KEYS": 3,
          "D.TOE_INTERNAL_DATA": 3,
          "D.TOE_INTERNAL_INFORMATION": 2,
          "D.USER_AUTH_CODE": 4,
          "D.USER_SIGNATURE_KEY": 5,
          "D.USER_STORED_DATA": 4,
          "D.USER_STORED_KEYS": 4
        },
        "O": {
          "O.ALARM": 1,
          "O.APDU_ENCRYPTION": 7,
          "O.APPLI-AUTH": 1,
          "O.CARD-MANAGEMENT": 1,
          "O.COMM_AUTH": 1,
          "O.COMM_INTEGRITY": 1,
          "O.CRYPTOGRAPHIC_OPERATION": 11,
          "O.DOMAIN-RIGHTS": 1,
          "O.FIREWALL": 1,
          "O.FUNCTION_ACCESS_CONTROL": 9,
          "O.GLOBAL_ARRAYS_CONFID": 1,
          "O.GLOBAL_ARRAYS_INTEG": 1,
          "O.INSTALL": 1,
          "O.KEY-MNGT": 1,
          "O.KEY_MANAGEMENT": 8,
          "O.LIMITED_AUTH_NUMBER": 7,
          "O.LOAD": 1,
          "O.NATIVE": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 3,
          "O.PROTECT_SESSION_KEY": 6,
          "O.PUK_UNBLOCK": 6,
          "O.REALLOCATION": 2,
          "O.RESOURCES": 1,
          "O.SCP": 3,
          "O.SENSITIVE_MEMORY_ERASING": 6,
          "O.SID": 1,
          "O.STRONG_MUTUAL_AUTHENTICATION": 7,
          "O.STRONG_SECCODE": 7,
          "O.TRANSACTION": 1,
          "O.USER_AUTHENTICATION": 8,
          "O.WIPE": 6
        },
        "OE": {
          "OE.ADMIN": 4,
          "OE.APPLET": 3,
          "OE.BASIC-APPS-VALIDATION": 1,
          "OE.CARD_ADMIN_STATION": 4,
          "OE.HOST_AUDIT": 3,
          "OE.HOST_CORRECT_BEHAVIOR": 4,
          "OE.KEY_GENERATOR": 4,
          "OE.NON_TRIVIAL_SECCODE": 2,
          "OE.SECURE_KEY_MANAGEMENT": 3,
          "OE.SECURE_PERSONALIZATION": 3,
          "OE.SECURE_SECCODE_ENTRY": 2,
          "OE.VERIFICATION": 3
        },
        "OSP": {
          "OSP": 1,
          "OSP.ACCESS_CONTROL": 4,
          "OSP.AID-MANAGEMENT": 1,
          "OSP.AUDIT": 1,
          "OSP.BASIC-APPS-VALIDATION": 1,
          "OSP.DATA_WIPE": 2,
          "OSP.KEY_STORAGE": 4,
          "OSP.LOCAL_AUTHENTICATION": 2,
          "OSP.MUTUAL_AUTHENTICATION": 2,
          "OSP.PUK_UNBLOCK": 4,
          "OSP.RGS_CRYPTO": 4,
          "OSP.RSA_PRIVATE_KEY_OPERATION": 4,
          "OSP.SYMMETRIC_ENCRYPTION": 4,
          "OSP.TOE_AUDIT": 1
        },
        "T": {
          "T.ABUSE_FUNC": 4,
          "T.INTERFACE_EAVESDROP": 3,
          "T.KEY_DERIVE": 4,
          "T.LIFE_CYCLE": 5,
          "T.MASQUERADE": 2,
          "T.PHYSICAL": 1,
          "T.TOE_DATA_COMPROMISE": 2,
          "T.TOE_DATA_CORRUPTION": 5,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTHORIZED_CARD_MNGT": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 3,
          "ADV_ARC.1": 1,
          "ADV_FSP": 2,
          "ADV_FSP.4": 1,
          "ADV_IMP": 2,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 2,
          "ADV_SPM": 1,
          "ADV_TDS": 2,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_OPE.1": 1,
          "AGD_PRE": 2,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 2,
          "ALC_CMS": 2,
          "ALC_DEL": 2,
          "ALC_DVS": 2,
          "ALC_DVS.2": 5,
          "ALC_FLR": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD": 2,
          "ALC_TAT": 2
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_ECD": 2,
          "ASE_INT": 2,
          "ASE_OBJ": 2,
          "ASE_REQ": 2,
          "ASE_SPD": 2,
          "ASE_TSS": 2
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_DPT": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 2
        },
        "FCS": {
          "FCS_CKM": 15,
          "FCS_CKM.1": 14,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 3,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 18,
          "FCS_CKM.4.1": 2,
          "FCS_COP": 36,
          "FCS_COP.1": 34,
          "FCS_COP.1.1": 11,
          "FCS_RNG": 2
        },
        "FDP": {
          "FDP_ACC": 22,
          "FDP_ACC.1": 19,
          "FDP_ACC.2": 4,
          "FDP_ACF": 26,
          "FDP_ACF.1": 12,
          "FDP_ETC": 8,
          "FDP_ETC.1": 2,
          "FDP_IFC": 4,
          "FDP_IFC.1": 13,
          "FDP_IFF": 4,
          "FDP_ITC": 31,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 9,
          "FDP_RIP": 18,
          "FDP_RIP.1": 20,
          "FDP_ROL": 4,
          "FDP_SDI.2": 2,
          "FDP_UIT": 2
        },
        "FIA": {
          "FIA_AFL": 7,
          "FIA_AFL.1": 14,
          "FIA_ATD": 2,
          "FIA_ATD.1": 8,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 1,
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_SOS.2": 7,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_UAU": 7,
          "FIA_UAU.1": 12,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 6,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 8,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 10,
          "FIA_UID.1": 3,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MSA": 51,
          "FMT_MSA.1": 6,
          "FMT_MSA.3": 11,
          "FMT_MTD": 3,
          "FMT_REV": 1,
          "FMT_SMF": 7,
          "FMT_SMF.1": 15,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 7,
          "FMT_SMR.1": 19,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 2
        },
        "FPT": {
          "FPT_FLS": 5,
          "FPT_FLS.1": 1,
          "FPT_PHP": 1,
          "FPT_RCV": 3,
          "FPT_RPL": 1,
          "FPT_TDC": 3,
          "FPT_TDC.1": 10,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1
        },
        "FRU": {
          "FRU_FLT": 1
        },
        "FTP": {
          "FTP_ITC": 2,
          "FTP_ITC.1": 2,
          "FTP_TRP": 17,
          "FTP_TRP.1": 8
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 14
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA256": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.4": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "ISO": {
          "ISO/IEC 7816-4": 1
        },
        "PKCS": {
          "PKCS #11": 1,
          "PKCS#1": 11,
          "PKCS#11": 8
        },
        "SCP": {
          "SCP11": 2,
          "SCP80": 1
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 27,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "TDES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "CMAC": 4,
            "HMAC": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 9,
          "Idemia": 2
        },
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies": 1
        },
        "Oberthur": {
          "Oberthur": 1
        },
        "Samsung": {
          "Samsung": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "julien.kowalski",
      "/CreationDate": "D:20190515094914+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word\u00a02013",
      "/ModDate": "D:20190515094914+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word\u00a02013",
      "/Subject": "Security Target",
      "/Title": "Cryptosmart-SIM card",
      "pdf_file_size_bytes": 2162273,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 92
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019-38fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL4+",
      "AVA_VAN.4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2019_38en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4e81c5d45e5b7a9c1feeb9e79714af654bc1963d938cb7c56ebb75f59cdc6b82",
      "txt_hash": "67c54810b4805e2de30185a78de797d9354287e14789fc4aa82f2b3b0396f21d"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e904731c72ecb60cf2c7bfde5d43407735b57dededbf0d5d242b630b19f4945e",
      "txt_hash": "c22187d665922f9ec8b2c3220b0a5b793f1f94098db838e9451f935f2a192b6e"
    }
  },
  "status": "archived"
}