MS6003, rev C

CSV information ?

Status active
Valid from 16.04.2020
Valid until 16.04.2025
Scheme 🇫🇷 FR
Manufacturer Wisekey
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+
Protection profiles

Heuristics summary ?

Certificate ID: ANSSI-CC-2020/20

Certificate ?

Extracted keywords

Security Assurance Requirements (SAR)
ALC_DVS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
ANSSI-CC-2020/20

File metadata

Title ANSSI-CC-2020/20
Subject CER/F/14.2
Author Christian Benardeau
Creation date D:20200421121429+02'00'
Modification date D:20200421121429+02'00'
Pages 1
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Certification report ?

Extracted keywords

Security level
EAL 5, EAL2, EAL7, EAL4, EAL 1, EAL 3, EAL 7, EAL 5 augmented, ITSEC E6 High
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0084-2014, BSI-PP-0084-2014
Certificates
ANSSI-CC-2020/20, ANSSI-CC-2018/02
Evaluation facilities
Serma Safety & Security, CESTI, CEA - LETI

Standards
AIS 31, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title ANSSI-CC-2020/20
Subject MS6003
Keywords ANSSI-CC-CER-F-07.024
Author Coralie
Creation date D:20200528181029+02'00'
Pages 14
Creator Writer
Producer LibreOffice 4.4

References

Outgoing
  • ANSSI-CC-2018/02 - active - MicrocontrĂ´leur MS6001 rĂ©vision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèqueWear Levelling version 06.03.02.02

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-384, SHA-256, SHA-512
Protocols
PGP
Randomness
RNG, RND

Security level
EAL5, EAL4, EAL5+, EAL4+
Claims
O.C, O.RND, T.RND, R.O
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FAU_GEN.1, FAU_GEN, FAU_SAS, FCS_COP.1, FCS_RNG.1, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FDP_UTC.1, FDP_UIT.1, FDP_ACC, FDP_ACF, FDP_SDC.1, FDP_ITT.1, FDP_IFC.1, FDP_SDI.2, FDP_UCT.1, FDP_SDC.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1, FDP_ITT.1.1, FDP_IFF.1, FDP_IFC.1.1, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FIA_API.1, FIA_API.1.1, FIA_API, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_FLS.1.1, FPT_PHP.3.1, FPT_ITT.1.1, FPT_SDI.2, FRU_FLT.2, FRU_FLT.1, FRU_FLT.2.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014

Side-channel analysis
Leak-Inherent, physical probing, Physical Probing, Physical probing, side channel, timing attacks, physical tampering, Malfunction, malfunction, Fault Injection, JHAS

Standards
FIPS 197, FIPS 186-4, FIPS 180-4, NIST SP 800-67, NIST SP 800-38A, PKCS#1, AIS31, ISO/IEC 3309, SCP03

File metadata

Title MS6001 Security Target-Lite
Subject Security Target-Lite
Author Graeme Calder
Creation date D:20200331111154+02'00'
Modification date D:20200331111514+02'00'
Pages 78
Creator Microsoft® Word 2013
Producer Microsoft® Word 2013

Heuristics ?

Certificate ID: ANSSI-CC-2020/20

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data ?

Product MS6003, rev C
Url https://cyber.gouv.fr/produits-certifies/ms6003-rev-c
Description Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applications bancaires, télévision à péage, transport, santé, etc.) en fonction des logiciels applicatifs
Sponsor WISEKEY
Developer WISEKEY
Cert Id ANSSI-CC-2020/20
Level EAL5+
Expiration Date 16.04.2025
Enhanced
Cert Id ANSSI-CC-2020/20
Certification Date 16.04.2020
Expiration Date 16.04.2025
Category Micro-circuits
Cc Version Critères Communs version 3.1r5
Developer WISEKEY
Sponsor WISEKEY
Evaluation Facility CEA-Leti
Level EAL5+
Protection Profile BSI-CC-PP-0084-2014
Mutual Recognition SOG-IS CCRA
Augmented AVA_VAN.5, ALC_DVS.2
Report Link https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_20en.pdf
Target Link https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_20en.pdf

References ?

Updates ?

  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'MS6003, rev C', 'url': 'https://cyber.gouv.fr/produits-certifies/ms6003-rev-c', 'description': 'Le microcontrĂ´leur seul n’est pas un produit utilisable en tant que tel. Il est destinĂ© Ă  hĂ©berger une ou plusieurs applications. Il peut ĂŞtre insĂ©rĂ© dans un support plastique pour constituer une carte Ă  puce. Les usages possibles de cette carte sont multiples (documents d’identitĂ© sĂ©curisĂ©s, applications bancaires, tĂ©lĂ©vision Ă  pĂ©age, transport, santĂ©, etc.) en fonction des logiciels applicatifs', 'sponsor': 'WISEKEY', 'developer': 'WISEKEY', 'cert_id': 'ANSSI-CC-2020/20', 'level': 'EAL5+', 'expiration_date': '2025-04-16', 'enhanced': {'cert_id': 'ANSSI-CC-2020/20', 'certification_date': '2020-04-16', 'expiration_date': '2025-04-16', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'WISEKEY', 'sponsor': 'WISEKEY', 'evaluation_facility': 'CEA-Leti', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'AVA_VAN.5, ALC_DVS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_20en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_20en.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'ANSSI-CC-2020/20', 'expiration_date': '2025-04-16', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2020/20', 'certification_date': '2020-04-16', 'expiration_date': '2025-04-16', 'mutual_recognition': 'SOG-IS CCRA'}}} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JAVA_OC', 'SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0']}}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'MS6003, rev C', 'url': 'https://cyber.gouv.fr/produits-certifies/ms6003-rev-c', 'description': 'Le microcontrĂ´leur seul n’est pas un produit utilisable en tant que tel. Il est destinĂ© Ă  hĂ©berger une ou plusieurs applications. Il peut ĂŞtre insĂ©rĂ© dans un support plastique pour constituer une carte Ă  puce. Les usages possibles de cette carte sont multiples (documents d’identitĂ© sĂ©curisĂ©s, applications bancaires, tĂ©lĂ©vision Ă  pĂ©age, transport, santĂ©, etc.) en fonction des logiciels applicatifs', 'sponsor': 'WISEKEY', 'developer': 'WISEKEY', 'cert_id': '2020/20', 'level': 'EAL5+', 'expiration_date': '16 Avril 2025', 'enhanced': {'cert_id': '2020/20', 'certification_date': '16/04/2020', 'expiration_date': '16/04/2025', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'WISEKEY', 'sponsor': 'WISEKEY', 'evaluation_facility': 'CEA-Leti', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'AVA_VAN.5, ALC_DVS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_20en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_20en.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '53b6bb4474d0dc50f5917b3349b4835e8a9f7d8935a0d3903f78d2c45d3ad68c', 'txt_hash': '8875c2099a8d4a138fff6c173dafe5a69d66c5750fe131dbe80128f2b6fbb24b'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e693d943ceb2fda04092fcaf85edf5bc505ea30f38d72b874a954135a43d8dcb', 'txt_hash': '8f0c7729a309a20ffd0a3237fae4bbe94f8473dd657bfdc1a32f543f1be0e9fd'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1435553, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 78, '/Author': 'Graeme Calder', '/CreationDate': "D:20200331111154+02'00'", '/Creator': 'Microsoft® Word 2013', '/ModDate': "D:20200331111514+02'00'", '/Producer': 'Microsoft® Word 2013', '/Subject': 'Security Target-Lite', '/Title': 'MS6001 Security Target-Lite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.insidesecure.com/', 'http://www.ssi.gouv.fr/index.html']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 726573, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'ANSSI-CC-2020/20', '/Author': 'Christian Benardeau', '/Subject': 'CER/F/14.2', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20200421121429+02'00'", '/ModDate': "D:20200421121429+02'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 20}}, 'cc_security_level': {'EAL': {'EAL5': 9, 'EAL4': 2, 'EAL5+': 1, 'EAL4+': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.5': 5}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 13, 'FAU_SAS.1.1': 1, 'FAU_GEN.1': 1, 'FAU_GEN': 1, 'FAU_SAS': 1}, 'FCS': {'FCS_COP.1': 16, 'FCS_RNG.1': 20, 'FCS_COP': 16, 'FCS_CKM.1': 13, 'FCS_CKM.4': 13, 'FCS_COP.1.1': 13}, 'FDP': {'FDP_UTC.1': 1, 'FDP_UIT.1': 8, 'FDP_ACC': 15, 'FDP_ACF': 13, 'FDP_SDC.1': 12, 'FDP_ITT.1': 22, 'FDP_IFC.1': 28, 'FDP_SDI.2': 8, 'FDP_UCT.1': 9, 'FDP_SDC.1.1': 1, 'FDP_SDI.1': 3, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACC.1': 6, 'FDP_ITT.1.1': 1, 'FDP_IFF.1': 3, 'FDP_IFC.1.1': 1, 'FDP_ITC.1': 13, 'FDP_ITC.2': 13, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACF.1': 5, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1}, 'FIA': {'FIA_API.1': 9, 'FIA_API.1.1': 1, 'FIA_API': 1}, 'FMT': {'FMT_LIM': 20, 'FMT_LIM.1': 24, 'FMT_LIM.2': 27, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.3': 3}, 'FPT': {'FPT_FLS.1': 24, 'FPT_ITT.1': 20, 'FPT_PHP.3': 25, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_ITT.1.1': 1, 'FPT_SDI.2': 2}, 'FRU': {'FRU_FLT.2': 19, 'FRU_FLT.1': 1, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 15, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 6}}, 'cc_claims': {'O': {'O.C': 2, 'O.RND': 4}, 'T': {'T.RND': 3}, 'R': {'R.O': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 6}, '3DES': {'TDES': 10}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 19}, 'ECC': {'ECC': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 3, 'SHA-384': 3, 'SHA-256': 2, 'SHA-512': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RNG': 15, 'RND': 7}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 16, 'physical probing': 4, 'Physical Probing': 1, 'Physical probing': 1, 'side channel': 3, 'timing attacks': 1}, 'FI': {'physical tampering': 2, 'Malfunction': 19, 'malfunction': 7, 'Fault Injection': 1}, 'other': {'JHAS': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 1, 'FIPS 186-4': 4, 'FIPS 180-4': 5}, 'NIST': {'NIST SP 800-67': 1, 'NIST SP 800-38A': 1}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS31': 13}, 'ISO': {'ISO/IEC 3309': 2}, 'SCP': {'SCP03': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2020/20': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2020_20en.pdf.
    • The cert_filename property was set to CertificatCC-2020_20.pdf.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/16']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3d5f0be493ebdca1b62e444668beb8a3be63b6e57ef42bb273b457980ec313bf', 'txt_hash': '0e3853da25e1ff8312e5dc0497060a5de2cf1c99a1749c202d9ad5c602800e7d'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 244629, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Title': 'ANSSI-CC-2020/20', '/Author': 'Coralie', '/Subject': 'MS6003', '/Keywords': 'ANSSI-CC-CER-F-07.024', '/Creator': 'Writer', '/Producer': 'LibreOffice 4.4', '/CreationDate': "D:20200528181029+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2020/20': 15, 'ANSSI-CC-2018/02': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL2': 1, 'EAL7': 1, 'EAL4': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1, 'EAL 5 augmented': 1}, 'ITSEC': {'ITSEC E6 High': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'Serma Safety & Security': 2}, 'CESTI': {'CESTI': 2}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'org': {'org': 1}}, 'certification_process': {}}.
    • The report_filename property was set to anssi-cc-2020_20en.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2020/20.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/02']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/02']}} data.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_20en.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_20en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The scheme_data property was set to {'product': 'MS6003, rev C', 'url': 'https://cyber.gouv.fr/produits-certifies/ms6003-rev-c', 'description': 'Le microcontrĂ´leur seul n’est pas un produit utilisable en tant que tel. Il est destinĂ© Ă  hĂ©berger une ou plusieurs applications. Il peut ĂŞtre insĂ©rĂ© dans un support plastique pour constituer une carte Ă  puce. Les usages possibles de cette carte sont multiples (documents d’identitĂ© sĂ©curisĂ©s, applications bancaires, tĂ©lĂ©vision Ă  pĂ©age, transport, santĂ©, etc.) en fonction des logiciels applicatifs', 'sponsor': 'WISEKEY', 'developer': 'WISEKEY', 'cert_id': '2020/20', 'level': 'EAL5+', 'expiration_date': '16 Avril 2025', 'enhanced': {'cert_id': '2020/20', 'certification_date': '16/04/2020', 'expiration_date': '16/04/2025', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'WISEKEY', 'sponsor': 'WISEKEY', 'evaluation_facility': 'CEA-Leti', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'AVA_VAN.5, ALC_DVS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_20en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_20en.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MS6003, rev C was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CertificatCC-2020_20.pdf",
  "dgst": "2344e16062cfc712",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2020/20",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2018/02"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/16",
          "ANSSI-CC-2018/02"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2020/20",
      "description": "Le microcontr\u00f4leur seul n\u2019est pas un produit utilisable en tant que tel. Il est destin\u00e9 \u00e0 h\u00e9berger une ou plusieurs applications. Il peut \u00eatre ins\u00e9r\u00e9 dans un support plastique pour constituer une carte \u00e0 puce. Les usages possibles de cette carte sont multiples (documents d\u2019identit\u00e9 s\u00e9curis\u00e9s, applications bancaires, t\u00e9l\u00e9vision \u00e0 p\u00e9age, transport, sant\u00e9, etc.) en fonction des logiciels applicatifs",
      "developer": "WISEKEY",
      "enhanced": {
        "augmented": "AVA_VAN.5, ALC_DVS.2",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2020/20",
        "certification_date": "2020-04-16",
        "developer": "WISEKEY",
        "evaluation_facility": "CEA-Leti",
        "expiration_date": "2025-04-16",
        "level": "EAL5+",
        "mutual_recognition": "SOG-IS CCRA",
        "protection_profile": "BSI-CC-PP-0084-2014",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_20en.pdf",
        "sponsor": "WISEKEY",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_20en.pdf"
      },
      "expiration_date": "2025-04-16",
      "level": "EAL5+",
      "product": "MS6003, rev C",
      "sponsor": "WISEKEY",
      "url": "https://cyber.gouv.fr/produits-certifies/ms6003-rev-c"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Wisekey",
  "manufacturer_web": "https://www.wisekey.com",
  "name": "MS6003, rev C",
  "not_valid_after": "2025-04-16",
  "not_valid_before": "2020-04-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "CertificatCC-2020_20.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/20": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Christian Benardeau",
      "/CreationDate": "D:20200421121429+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20200421121429+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "CER/F/14.2",
      "/Title": "ANSSI-CC-2020/20",
      "pdf_file_size_bytes": 726573,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "anssi-cc-2020_20en.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2018/02": 2,
          "ANSSI-CC-2020/20": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 2,
          "EAL 5 augmented": 1,
          "EAL 7": 1,
          "EAL2": 1,
          "EAL4": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 High": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        },
        "CESTI": {
          "CESTI": 2
        },
        "Serma": {
          "Serma Safety \u0026 Security": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "org": {
          "org": 1
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Coralie",
      "/CreationDate": "D:20200528181029+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "ANSSI-CC-CER-F-07.024",
      "/Producer": "LibreOffice 4.4",
      "/Subject": "MS6003",
      "/Title": "ANSSI-CC-2020/20",
      "pdf_file_size_bytes": 244629,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "anssi-cible-cc-2020_20en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDSA": {
            "ECDSA": 19
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.C": 2,
          "O.RND": 4
        },
        "R": {
          "R.O": 2
        },
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 20
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 4,
          "ADV_FSP.5": 1,
          "ADV_IMP.1": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4+": 1,
          "EAL5": 9,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 1,
          "FAU_SAS": 1,
          "FAU_SAS.1": 13,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 13,
          "FCS_CKM.4": 13,
          "FCS_COP": 16,
          "FCS_COP.1": 16,
          "FCS_COP.1.1": 13,
          "FCS_RNG.1": 20
        },
        "FDP": {
          "FDP_ACC": 15,
          "FDP_ACC.1": 6,
          "FDP_ACF": 13,
          "FDP_ACF.1": 5,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_IFC.1": 28,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 3,
          "FDP_ITC.1": 13,
          "FDP_ITC.2": 13,
          "FDP_ITT.1": 22,
          "FDP_ITT.1.1": 1,
          "FDP_SDC.1": 12,
          "FDP_SDC.1.1": 1,
          "FDP_SDI.1": 3,
          "FDP_SDI.2": 8,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT.1": 9,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 8,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1,
          "FDP_UTC.1": 1
        },
        "FIA": {
          "FIA_API": 1,
          "FIA_API.1": 9,
          "FIA_API.1.1": 1
        },
        "FMT": {
          "FMT_LIM": 20,
          "FMT_LIM.1": 24,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 27,
          "FMT_LIM.2.1": 1,
          "FMT_MSA.3": 3
        },
        "FPT": {
          "FPT_FLS.1": 24,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 20,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 25,
          "FPT_PHP.3.1": 1,
          "FPT_SDI.2": 2
        },
        "FRU": {
          "FRU_FLT.1": 1,
          "FRU_FLT.2": 19,
          "FRU_FLT.2.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 15,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 6
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 2,
            "SHA-384": 3,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 7,
          "RNG": 15
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Fault Injection": 1,
          "Malfunction": 19,
          "malfunction": 7,
          "physical tampering": 2
        },
        "SCA": {
          "Leak-Inherent": 16,
          "Physical Probing": 1,
          "Physical probing": 1,
          "physical probing": 4,
          "side channel": 3,
          "timing attacks": 1
        },
        "other": {
          "JHAS": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 13
        },
        "FIPS": {
          "FIPS 180-4": 5,
          "FIPS 186-4": 4,
          "FIPS 197": 1
        },
        "ISO": {
          "ISO/IEC 3309": 2
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-67": 1
        },
        "PKCS": {
          "PKCS#1": 2
        },
        "SCP": {
          "SCP03": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 14
          }
        },
        "DES": {
          "3DES": {
            "TDES": 10
          },
          "DES": {
            "DES": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Graeme Calder",
      "/CreationDate": "D:20200331111154+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/ModDate": "D:20200331111514+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "/Subject": "Security Target-Lite",
      "/Title": "MS6001 Security Target-Lite",
      "pdf_file_size_bytes": 1435553,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.insidesecure.com/",
          "http://www.ssi.gouv.fr/index.html",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 78
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "JAVA_OC",
            "BAROC_SC_PP_V1.0",
            "SECURITY_IC_AUGP_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_20en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_20en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e693d943ceb2fda04092fcaf85edf5bc505ea30f38d72b874a954135a43d8dcb",
      "txt_hash": "8f0c7729a309a20ffd0a3237fae4bbe94f8473dd657bfdc1a32f543f1be0e9fd"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3d5f0be493ebdca1b62e444668beb8a3be63b6e57ef42bb273b457980ec313bf",
      "txt_hash": "0e3853da25e1ff8312e5dc0497060a5de2cf1c99a1749c202d9ad5c602800e7d"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "53b6bb4474d0dc50f5917b3349b4835e8a9f7d8935a0d3903f78d2c45d3ad68c",
      "txt_hash": "8875c2099a8d4a138fff6c173dafe5a69d66c5750fe131dbe80128f2b6fbb24b"
    }
  },
  "status": "active"
}