This page was not yet optimized for use on mobile
devices.
CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)
CSV information
| Status | active |
|---|---|
| Valid from | 27.07.2020 |
| Valid until | 03.07.2028 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Idemia |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
| Protection profiles |
|
| Maintenance updates | ANSSI-CC-2020/64-M01 (05.02.2021) Certification report |
Heuristics summary
Certificate ID: ANSSI-CC-2020/64
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Vendor
IDEMIASecurity level
EAL5, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP- 0071-2012Certificates
ANSSI-CC-2020/64-S01Evaluation facilities
CEA - LETICertification report
Extracted keywords
Symmetric Algorithms
DESVendor
Infineon Technologies AG, Infineon, IDEMIASecurity level
EAL 5, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-PP-0084-2014, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-, PP-SSCD-Part4Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/64, ANSSI-CC-2020/08Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Title | ANSSI-CC-2020/64 |
|---|---|
| Subject | CombICAO v2.1 Applet in SSCD configuration on Cosmo v9.2 |
| Keywords | ANSSI-CC-CER-F-07, v29.2 |
| Author | Géraldine Avoué |
| Creation date | D:20200729173447+02'00' |
| Pages | 17 |
| Creator | Writer |
| Producer | LibreOffice 4.4 |
Frontpage
| Certificate ID | ANSSI-CC-2020/64 |
|---|---|
| Certified item | CombICAO v2.1 Applet in SSCD configuration on Cosmo v9.2 |
| Certification lab | CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France |
| Developer | IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France |
References
Outgoing- BSI-DSZ-CC-1110-V2-2019 - archived - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
- ANSSI-CC-2020/08 - active - Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, KMAC, CMACAsymmetric Algorithms
RSA-1024, ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-224, SHA-384, SHA-512Schemes
MACProtocols
PACE, PGPRandomness
RNDBlock cipher modes
CBCVendor
Infineon, Oberthur Technologies, IDEMIA, MorphoSecurity level
EAL5, EAL 5, EAL4, EAL5 augmented, EAL4 augmentedClaims
A.CGA, A.SCA, A.CSP, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.5, ADV_IMP, ADV_IMP.1, ADV_TDS, ADV_TDS.4, ADV_INT, ADV_INT.2, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_PRE_PLT, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.5, ALC_DEL, ALC_DEL.1, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.2, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.3, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN, APE_SRE, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_ARP.1, FCS_RND, FCS_RND.1, FCS_RND.1.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_RNG.1, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.1, FDP_UCT, FDP_UCT.1, FDP_DAU, FDP_DAU.2, FDP_UIT, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL, FIA_AFL.1, FIA_UID, FIA_UAU, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_MOF.1, FMT_MOF.1.1, FMT_SMR, FMT_MTD.3, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_ITC, FTP_TRP.1Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075, BSI-CC-PP-0071Certificates
BSI-DSZ-CC-1110-V2-, ANSSI-CC-2020/08Side-channel analysis
physical probing, side channel, SPA, DPA, timing attacks, physical tampering, Malfunction, malfunction, DFA, fault injection, JIL, JIL-COMPStandards
PKCS#1, PKCS #1, PKCS#3, PKCS#15, SCP03, SCP02File metadata
| Title | Title |
|---|---|
| Author | Shubham SAGAR |
| Creation date | D:20200617130014+05'30' |
| Modification date | D:20200617130014+05'30' |
| Pages | 100 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
References
Outgoing- ANSSI-CC-2020/08 - active - Plateforme ID-One Cosmo V9.2 masquée sur le composant IFX SLC52
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2020/64Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_APD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 9.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_64-S01fr.pdf",
"dgst": "698f1c315858ea9e",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2020/64",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_APD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.1",
"9.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"27abdb9c6ab375a7",
"d918b28fd7bb5d79",
"1f7ea2e05de5b88b"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019",
"ANSSI-CC-2020/08"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0945-2017",
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-1110-2019",
"BSI-DSZ-CC-0945-V2-2018",
"BSI-DSZ-CC-0891-2015",
"ANSSI-CC-2020/08",
"BSI-DSZ-CC-0945-V3-2018"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/08"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019",
"ANSSI-CC-2020/08"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2021-02-05",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_64-m01.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2020/64-M01"
}
]
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)",
"not_valid_after": "2028-07-03",
"not_valid_before": "2020-07-27",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "Certificat-CC-2020_64-S01fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2020/64-S01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0071-2012": 1,
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0075-2012": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 2
}
},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "anssi-cc-2020_64fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2020/64",
"cert_item": "CombICAO v2.1 Applet in SSCD configuration on Cosmo v9.2",
"cert_item_version": "Code SAAAAR : 203523",
"cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1110-V2-2019": 1
},
"FR": {
"ANSSI-CC-2020/08": 1,
"ANSSI-CC-2020/64": 18
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071-2012": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-PP-0084-2014": 1
},
"other": {
"PP-SSCD-": 1,
"PP-SSCD-Part2": 2,
"PP-SSCD-Part3": 2,
"PP-SSCD-Part4": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 3,
"AGD_PRE": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1,
"CEA-LETI": 2
},
"CESTI": {
"CESTI": 3
},
"Serma": {
"SERMA": 14
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 34
},
"Infineon": {
"Infineon": 1,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "G\u00e9raldine Avou\u00e9",
"/CreationDate": "D:20200729173447+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "ANSSI-CC-CER-F-07, v29.2",
"/Producer": "LibreOffice 4.4",
"/Subject": "CombICAO v2.1 Applet in SSCD configuration on Cosmo v9.2",
"/Title": "ANSSI-CC-2020/64",
"pdf_file_size_bytes": 269599,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"http://www.sogis.org/",
"http://www.commoncriteriaportal.org/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "anssi-cible-cc-2020-64en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 5
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA-1024": 3
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1110-V2-": 1
},
"FR": {
"ANSSI-CC-2020/08": 1
}
},
"cc_claims": {
"A": {
"A.CGA": 5,
"A.CSP": 7,
"A.SCA": 4
},
"OE": {
"OE.HID_VAD": 6
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071": 1,
"BSI-CC-PP-0075": 1,
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 15,
"ADV_FSP": 1,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 22,
"ADV_IMP": 1,
"ADV_IMP.1": 15,
"ADV_INT": 1,
"ADV_INT.2": 7,
"ADV_TDS": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 23
},
"AGD": {
"AGD_OPE": 10,
"AGD_OPE.1": 15,
"AGD_PRE": 8,
"AGD_PRE.1": 11,
"AGD_PRE_PLT": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 16,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.5": 7,
"ALC_DEL": 1,
"ALC_DEL.1": 6,
"ALC_DVS": 2,
"ALC_DVS.1": 1,
"ALC_DVS.2": 14,
"ALC_LCD": 1,
"ALC_LCD.1": 9,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 12
},
"APE": {
"APE_SRE": 1
},
"ASE": {
"ASE_APD.1": 1,
"ASE_CCL": 1,
"ASE_CCL.1": 15,
"ASE_ECD": 1,
"ASE_ECD.1": 14,
"ASE_INT": 1,
"ASE_INT.1": 17,
"ASE_OBJ": 1,
"ASE_OBJ.2": 13,
"ASE_REQ": 1,
"ASE_REQ.1": 2,
"ASE_REQ.2": 15,
"ASE_SPD": 1,
"ASE_SPD.1": 8,
"ASE_TSS": 1,
"ASE_TSS.1": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 2,
"ATE_COV.2": 8,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.3": 7,
"ATE_FUN": 1,
"ATE_FUN.1": 14,
"ATE_IND": 1,
"ATE_IND.2": 8
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 15
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL4": 1,
"EAL4 augmented": 1,
"EAL5": 3,
"EAL5 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCS": {
"FCS_CKM": 54,
"FCS_CKM.1": 13,
"FCS_CKM.2": 3,
"FCS_CKM.4": 40,
"FCS_CKM.4.1": 1,
"FCS_COP": 81,
"FCS_COP.1": 12,
"FCS_RND": 2,
"FCS_RND.1": 15,
"FCS_RND.1.1": 2,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 83,
"FDP_ACC.1": 18,
"FDP_ACF": 70,
"FDP_ACF.1": 29,
"FDP_DAU": 9,
"FDP_DAU.2": 2,
"FDP_IFC.1": 8,
"FDP_ITC": 10,
"FDP_ITC.1": 11,
"FDP_ITC.2": 8,
"FDP_RIP.1": 25,
"FDP_RIP.1.1": 1,
"FDP_SDI": 28,
"FDP_SDI.2": 4,
"FDP_UCT": 25,
"FDP_UCT.1": 2,
"FDP_UIT": 12,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 31,
"FIA_AFL.1": 4,
"FIA_API": 19,
"FIA_API.1": 16,
"FIA_API.1.1": 2,
"FIA_UAU": 94,
"FIA_UAU.1": 31,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 1,
"FIA_UAU.5": 3,
"FIA_UAU.6": 2,
"FIA_UID": 27,
"FIA_UID.1": 34,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 3,
"FMT_LIM.1": 17,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 15,
"FMT_LIM.2.1": 2,
"FMT_MOF.1": 12,
"FMT_MOF.1.1": 1,
"FMT_MSA": 25,
"FMT_MSA.1": 4,
"FMT_MSA.2": 22,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 34,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 18,
"FMT_MSA.4.1": 1,
"FMT_MTD": 194,
"FMT_MTD.1": 28,
"FMT_MTD.3": 12,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 74,
"FMT_SMF.1.1": 1,
"FMT_SMR": 28,
"FMT_SMR.1": 53,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 17,
"FPT_EMS.1": 16,
"FPT_EMS.1.1": 4,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 15,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 8,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 16,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 22,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 45,
"FTP_ITC.1": 13,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 62
},
"PGP": {
"PGP": 1
}
},
"crypto_scheme": {
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 3,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Malfunction": 4,
"fault injection": 2,
"malfunction": 4,
"physical tampering": 6
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 3,
"side channel": 2,
"timing attacks": 1
},
"other": {
"JIL": 1,
"JIL-COMP": 1
}
},
"standard_id": {
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 8,
"PKCS#15": 2,
"PKCS#3": 2
},
"SCP": {
"SCP02": 1,
"SCP03": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"TDES": 1,
"Triple-DES": 3
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"KMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 20
},
"Infineon": {
"Infineon": 2
},
"Morpho": {
"Morpho": 1
},
"Oberthur": {
"Oberthur Technologies": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Shubham SAGAR",
"/CreationDate": "D:20200617130014+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20200617130014+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "Title",
"pdf_file_size_bytes": 2113224,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 100
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_64fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL5+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020-64en.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "387d78bfa88fac8238f74627dd08faa158e1ead8d58d4aefa4aecc3c65aa4475",
"txt_hash": "2763a46456e3fcc87fb49aac8107e2d65d2308f7269ac05866ca4c720f203c1a"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "198f217c70201a1cea976f86b0deec37fac968434521db55bec7d92c17c8563b",
"txt_hash": "0afd54c6d573fc4f76126b12ed7fceb885515a420af04e5e1a1417b732566333"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "55c0d77c8966d7e014f81e64db1d195e06ced8b0d9460cb89d1a96ab50931e70",
"txt_hash": "d401c902157bbda16aa380a75d3c49838fc31ba1a308cc645ba31fca98897804"
}
},
"status": "active"
}