CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)

CSV information ?

Status active
Valid from 27.07.2020
Valid until 03.07.2028
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, EAL5+
Protection profiles
Maintenance updates ANSSI-CC-2020/64-M01 (05.02.2021) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2020/64

Certificate ?

Extracted keywords

Vendor
IDEMIA

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP- 0071-2012
Certificates
ANSSI-CC-2020/64-S01
Evaluation facilities
CEA - LETI

File metadata

Creation date D:20230706172634+02'00'
Modification date D:20230706172847+02'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Vendor
Infineon Technologies AG, Infineon, IDEMIA

Security level
EAL 5, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-PP-0084-2014, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-, PP-SSCD-Part4
Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/64, ANSSI-CC-2020/08
Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title ANSSI-CC-2020/64
Subject CombICAO v2.1 Applet in SSCD configuration on Cosmo v9.2
Keywords ANSSI-CC-CER-F-07, v29.2
Author Géraldine Avoué
Creation date D:20200729173447+02'00'
Pages 17
Creator Writer
Producer LibreOffice 4.4

Frontpage

Certificate ID ANSSI-CC-2020/64
Certified item CombICAO v2.1 Applet in SSCD configuration on Cosmo v9.2
Certification lab CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
Developer IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France

References

Outgoing
  • ANSSI-CC-2020/08 - active - Plateforme ID-One Cosmo V9.2 masquĂ©e sur le composant IFX SLC52
  • BSI-DSZ-CC-1110-V2-2019 - archived - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, KMAC, CMAC
Asymmetric Algorithms
RSA-1024, ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA-256, SHA-224, SHA-384, SHA-512
Schemes
MAC
Protocols
PACE, PGP
Randomness
RND
Block cipher modes
CBC

Vendor
Infineon, Oberthur Technologies, IDEMIA, Morpho

Security level
EAL5, EAL 5, EAL4, EAL5 augmented, EAL4 augmented
Claims
A.CGA, A.SCA, A.CSP, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.5, ADV_IMP, ADV_IMP.1, ADV_TDS, ADV_TDS.4, ADV_INT, ADV_INT.2, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_PRE_PLT, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.5, ALC_DEL, ALC_DEL.1, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.2, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.3, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN, APE_SRE, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCS_RND, FCS_RND.1, FCS_RND.1.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_RNG.1, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.1, FDP_UCT, FDP_UCT.1, FDP_DAU, FDP_DAU.2, FDP_UIT, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL, FIA_AFL.1, FIA_UID, FIA_UAU, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_MOF.1, FMT_MOF.1.1, FMT_SMR, FMT_MTD.3, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_ITC, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075, BSI-CC-PP-0071
Certificates
BSI-DSZ-CC-1110-V2-, ANSSI-CC-2020/08

Side-channel analysis
physical probing, side channel, SPA, DPA, timing attacks, physical tampering, Malfunction, malfunction, DFA, fault injection, JIL, JIL-COMP

Standards
PKCS#1, PKCS #1, PKCS#3, PKCS#15, SCP03, SCP02

File metadata

Title Title
Author Shubham SAGAR
Creation date D:20200617130014+05'30'
Modification date D:20200617130014+05'30'
Pages 100
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • ANSSI-CC-2020/08 - active - Plateforme ID-One Cosmo V9.2 masquĂ©e sur le composant IFX SLC52

Heuristics ?

Certificate ID: ANSSI-CC-2020/64

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_APD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data ?

Product CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)
Url https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523
Description Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents (
Sponsor Idemia
Developer Idemia, Infineon Technologies AG
Cert Id ANSSI-CC-2020/64
Level EAL5+
Expiration Date 03.07.2028
Enhanced
Cert Id ANSSI-CC-2020/64
Certification Date 27.07.2020
Expiration Date 03.07.2028
Category Cartes Ă  puce
Cc Version Critères Communs version 3.1r5
Developer Idemia, Infineon Technologies AG
Sponsor Idemia
Evaluation Facility CEA-Leti
Level EAL5+
Protection Profile Protection profiles for secure signature creation device (Part 2 Ă  part 4 incluses)
Mutual Recognition CCRA SOG-IS
Augmented ALC_DVS.2, AVA_VAN.5
Report Link https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf

References ?

Updates ?

  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523', 'description': 'Le produit Ă©valuĂ© est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 » dĂ©veloppĂ© par IDEMIA et Infineon Technologies AG. Le produit Ă©valuĂ© est de type « carte Ă  puce » pouvant ĂŞtre utilisĂ© en modes avec et sans contact. Il est destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de documents (', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': 'ANSSI-CC-2020/64', 'level': 'EAL5+', 'expiration_date': '2028-07-03', 'enhanced': {'cert_id': 'ANSSI-CC-2020/64', 'certification_date': '2020-07-27', 'expiration_date': '2028-07-03', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA-Leti', 'level': 'EAL5+', 'protection_profile': 'Protection profiles for secure signature creation device (Part 2 Ă  part 4 incluses)', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523', 'description': 'Le produit Ă©valuĂ© est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 » dĂ©veloppĂ© par IDEMIA et Infineon Technologies AG. Le produit Ă©valuĂ© est de type « carte Ă  puce » pouvant ĂŞtre utilisĂ© en modes avec et sans contact. Il est destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de documents (', 'cert_id': 'ANSSI-CC-2020/64', 'expiration_date': '2028-07-03', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2020/64', 'certification_date': '2020-07-27', 'expiration_date': '2028-07-03', 'mutual_recognition': 'CCRA SOG-IS', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf'}}} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The following values were removed: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': None}]}.
    • The following values were added: {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v91-code-saaaar-203523', 'description': 'Le produit Ă©valuĂ© est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1, code SAAAAR : 203523 » dĂ©veloppĂ© par IDEMIA et Infineon Technologies AG. Le produit Ă©valuĂ© est de type « carte Ă  puce » pouvant ĂŞtre utilisĂ© en modes avec et sans contact. Il est destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de documents (', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': '2020/59', 'level': 'EAL5+', 'expiration_date': '3 Juillet 2028', 'enhanced': {'cert_id': '2020/59', 'certification_date': '27/07/2020', 'expiration_date': '03/07/2028', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA-Leti', 'level': 'EAL5+', 'protection_profile': 'Protection profiles for secure signature creation device (Part 2 Ă  part 4 incluses)', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_59fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-59en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_59-S01fr_0.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '55c0d77c8966d7e014f81e64db1d195e06ced8b0d9460cb89d1a96ab50931e70', 'txt_hash': 'd401c902157bbda16aa380a75d3c49838fc31ba1a308cc645ba31fca98897804'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '387d78bfa88fac8238f74627dd08faa158e1ead8d58d4aefa4aecc3c65aa4475', 'txt_hash': '2763a46456e3fcc87fb49aac8107e2d65d2308f7269ac05866ca4c720f203c1a'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2113224, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 100, '/Title': 'Title', '/Author': 'Shubham SAGAR', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200617130014+05'30'", '/ModDate': "D:20200617130014+05'30'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 158155, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20230706172634+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20230706172847+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-': 1}, 'FR': {'ANSSI-CC-2020/08': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1}}, 'cc_security_level': {'EAL': {'EAL5': 3, 'EAL 5': 1, 'EAL4': 1, 'EAL5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 15, 'ADV_FSP': 1, 'ADV_FSP.5': 22, 'ADV_IMP': 1, 'ADV_IMP.1': 15, 'ADV_TDS': 1, 'ADV_TDS.4': 23, 'ADV_INT': 1, 'ADV_INT.2': 7, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 8, 'AGD_OPE': 10, 'AGD_PRE_PLT': 1, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}, 'ALC': {'ALC_DVS.2': 14, 'ALC_DVS': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 16, 'ALC_CMS': 1, 'ALC_CMS.5': 7, 'ALC_DEL': 1, 'ALC_DEL.1': 6, 'ALC_LCD': 1, 'ALC_LCD.1': 9, 'ALC_TAT': 1, 'ALC_TAT.2': 12, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 8, 'ATE_DPT': 1, 'ATE_DPT.3': 7, 'ATE_FUN': 1, 'ATE_FUN.1': 14, 'ATE_IND': 1, 'ATE_IND.2': 8, 'ATE_COV.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 2}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 15, 'ASE_ECD': 1, 'ASE_ECD.1': 14, 'ASE_INT': 1, 'ASE_INT.1': 17, 'ASE_OBJ': 1, 'ASE_OBJ.2': 13, 'ASE_REQ': 1, 'ASE_REQ.2': 15, 'ASE_SPD': 1, 'ASE_SPD.1': 8, 'ASE_APD.1': 1, 'ASE_TSS': 1, 'ASE_TSS.1': 6, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1}, 'FCS': {'FCS_RND': 2, 'FCS_RND.1': 15, 'FCS_RND.1.1': 2, 'FCS_CKM': 54, 'FCS_CKM.1': 13, 'FCS_CKM.4': 40, 'FCS_CKM.4.1': 1, 'FCS_COP': 81, 'FCS_COP.1': 12, 'FCS_RNG.1': 1, 'FCS_CKM.2': 3}, 'FDP': {'FDP_ACC': 83, 'FDP_ACC.1': 18, 'FDP_ACF': 70, 'FDP_ACF.1': 29, 'FDP_RIP.1': 25, 'FDP_RIP.1.1': 1, 'FDP_SDI': 28, 'FDP_SDI.2': 4, 'FDP_ITC': 10, 'FDP_ITC.1': 11, 'FDP_UCT': 25, 'FDP_UCT.1': 2, 'FDP_DAU': 9, 'FDP_DAU.2': 2, 'FDP_UIT': 12, 'FDP_UIT.1': 2, 'FDP_ITC.2': 8, 'FDP_IFC.1': 8}, 'FIA': {'FIA_API': 19, 'FIA_API.1': 16, 'FIA_API.1.1': 2, 'FIA_UID.1': 34, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 31, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL': 31, 'FIA_AFL.1': 4, 'FIA_UID': 27, 'FIA_UAU': 94, 'FIA_UAU.4': 1, 'FIA_UAU.5': 3, 'FIA_UAU.6': 2}, 'FMT': {'FMT_LIM': 3, 'FMT_LIM.1': 17, 'FMT_LIM.2': 15, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1': 53, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 74, 'FMT_SMF.1.1': 1, 'FMT_MSA': 25, 'FMT_MSA.1': 4, 'FMT_MSA.2': 22, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 34, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 18, 'FMT_MSA.4.1': 1, 'FMT_MTD': 194, 'FMT_MTD.1': 28, 'FMT_MOF.1': 12, 'FMT_MOF.1.1': 1, 'FMT_SMR': 28, 'FMT_MTD.3': 12, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 17, 'FPT_EMS.1': 16, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 22, 'FPT_FLS.1': 15, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1': 8, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 16, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC': 45, 'FTP_TRP.1': 3}}, 'cc_claims': {'A': {'A.CGA': 5, 'A.SCA': 4, 'A.CSP': 7}, 'OE': {'OE.HID_VAD': 6}}, 'vendor': {'Infineon': {'Infineon': 2}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 20}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 1, 'Triple-DES': 3}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA-1024': 3}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 3, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {'PACE': {'PACE': 62}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 2, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 6, 'Malfunction': 4, 'malfunction': 4, 'DFA': 2, 'fault injection': 2}, 'other': {'JIL': 1, 'JIL-COMP': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 8, 'PKCS #1': 1, 'PKCS#3': 2, 'PKCS#15': 2}, 'SCP': {'SCP03': 5, 'SCP02': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2020/64-S01': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP- 0071-2012': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2020-64en.pdf.
    • The cert_filename property was set to Certificat-CC-2020_64-S01fr.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/08']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/08', 'BSI-DSZ-CC-1110-V2-2019']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-1110-V2-2019', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-1110-2019', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V2-2016']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '198f217c70201a1cea976f86b0deec37fac968434521db55bec7d92c17c8563b', 'txt_hash': '0afd54c6d573fc4f76126b12ed7fceb885515a420af04e5e1a1417b732566333'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 269599, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 17, '/Title': 'ANSSI-CC-2020/64', '/Author': 'GĂ©raldine AvouĂ©', '/Subject': 'CombICAO v2.1 Applet in SSCD configuration on Cosmo v9.2', '/Keywords': 'ANSSI-CC-CER-F-07, v29.2', '/Creator': 'Writer', '/Producer': 'LibreOffice 4.4', '/CreationDate': "D:20200729173447+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/', 'http://www.commoncriteriaportal.org/', 'http://www.sogis.org/']}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['RĂ©fĂ©rence du rapport de certification(.+)Nom du produit(.+)RĂ©fĂ©rence/version du produit(.*)ConformitĂ© Ă  un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)DĂ©veloppeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2020/64', 'cert_item': 'CombICAO v2.1 Applet in SSCD configuration on Cosmo v9.2', 'cert_item_version': 'Code SAAAAR : 203523', 'ref_protection_profiles': 'Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012', 'cc_version': 'Critères Communs version 3.1 rĂ©vision 5', 'cc_security_level': 'EAL 5 augmentĂ© ALC_DVS.2, AVA_VAN.5', 'developer': 'IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France', 'cert_lab': 'CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 1}, 'FR': {'ANSSI-CC-2020/64': 18, 'ANSSI-CC-2020/08': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-PP-0084-2014': 1}, 'other': {'PP-SSCD-Part2': 2, 'PP-SSCD-Part3': 2, 'PP-SSCD-': 1, 'PP-SSCD-Part4': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 3, 'AGD_PRE': 3}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 1}, 'Idemia': {'IDEMIA': 34}}, 'eval_facility': {'Serma': {'SERMA': 14}, 'CESTI': {'CESTI': 3}, 'CEA-LETI': {'CEA - LETI': 1, 'CEA-LETI': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to anssi-cc-2020_64fr.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['CEA'].
    • The cert_id property was set to ANSSI-CC-2020/64.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/08']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/08']}} data.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_64fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020-64en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
    • The scheme_data property was set to {'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v91-code-saaaar-203523', 'description': 'Le produit Ă©valuĂ© est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1, code SAAAAR : 203523 » dĂ©veloppĂ© par IDEMIA et Infineon Technologies AG. Le produit Ă©valuĂ© est de type « carte Ă  puce » pouvant ĂŞtre utilisĂ© en modes avec et sans contact. Il est destinĂ© Ă  ĂŞtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD). Il peut ĂŞtre utilisĂ© dans diffĂ©rents types de documents (', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': '2020/59', 'level': 'EAL5+', 'expiration_date': '3 Juillet 2028', 'enhanced': {'cert_id': '2020/59', 'certification_date': '27/07/2020', 'expiration_date': '03/07/2028', 'category': 'Cartes Ă  puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA-Leti', 'level': 'EAL5+', 'protection_profile': 'Protection profiles for secure signature creation device (Part 2 Ă  part 4 incluses)', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_59fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-59en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_59-S01fr_0.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_64-S01fr.pdf",
  "dgst": "698f1c315858ea9e",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2020/64",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_APD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1",
        "9.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/08",
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0945-2017",
          "BSI-DSZ-CC-1110-2019",
          "BSI-DSZ-CC-0891-V2-2016",
          "ANSSI-CC-2020/08",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-0945-V3-2018",
          "BSI-DSZ-CC-1110-V2-2019",
          "BSI-DSZ-CC-0945-V2-2018"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2020/64",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 \u00bb d\u00e9velopp\u00e9 par IDEMIA et Infineon Technologies AG. Le produit \u00e9valu\u00e9 est de type \u00ab carte \u00e0 puce \u00bb pouvant \u00eatre utilis\u00e9 en modes avec et sans contact. Il est destin\u00e9 \u00e0 \u00eatre utilis\u00e9 comme dispositif s\u00e9curis\u00e9 de cr\u00e9ation de signature (SSCD). Il peut \u00eatre utilis\u00e9 dans diff\u00e9rents types de documents (",
      "developer": "Idemia, Infineon Technologies AG",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2020/64",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf",
        "certification_date": "2020-07-27",
        "developer": "Idemia, Infineon Technologies AG",
        "evaluation_facility": "CEA-Leti",
        "expiration_date": "2028-07-03",
        "level": "EAL5+",
        "mutual_recognition": "CCRA SOG-IS",
        "protection_profile": "Protection profiles for secure signature creation device (Part 2 \u00e0 part 4 incluses)",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf",
        "sponsor": "Idemia",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf"
      },
      "expiration_date": "2028-07-03",
      "level": "EAL5+",
      "product": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)",
      "sponsor": "Idemia",
      "url": "https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/08"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/08",
          "BSI-DSZ-CC-1110-V2-2019"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2021-02-05",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_64-m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2020/64-M01"
      }
    ]
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)",
  "not_valid_after": "2028-07-03",
  "not_valid_before": "2020-07-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2020_64-S01fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/64-S01": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0071-2012": 1,
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0075-2012": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20230706172634+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20230706172847+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 158155,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2020_64fr.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
        "cert_id": "ANSSI-CC-2020/64",
        "cert_item": "CombICAO v2.1 Applet in SSCD configuration on Cosmo v9.2",
        "cert_item_version": "Code SAAAAR : 203523",
        "cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
        "developer": "IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V2-2019": 1
        },
        "FR": {
          "ANSSI-CC-2020/08": 1,
          "ANSSI-CC-2020/64": 18
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0071-2012": 1,
          "BSI-CC-PP-0075-2012": 1,
          "BSI-PP-0084-2014": 1
        },
        "other": {
          "PP-SSCD-": 1,
          "PP-SSCD-Part2": 2,
          "PP-SSCD-Part3": 2,
          "PP-SSCD-Part4": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 3,
          "AGD_PRE": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1,
          "CEA-LETI": 2
        },
        "CESTI": {
          "CESTI": 3
        },
        "Serma": {
          "SERMA": 14
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 34
        },
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "G\u00e9raldine Avou\u00e9",
      "/CreationDate": "D:20200729173447+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "ANSSI-CC-CER-F-07, v29.2",
      "/Producer": "LibreOffice 4.4",
      "/Subject": "CombICAO v2.1 Applet in SSCD configuration on Cosmo v9.2",
      "/Title": "ANSSI-CC-2020/64",
      "pdf_file_size_bytes": 269599,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.sogis.org/",
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "anssi-cible-cc-2020-64en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA-1024": 3
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V2-": 1
        },
        "FR": {
          "ANSSI-CC-2020/08": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 5,
          "A.CSP": 7,
          "A.SCA": 4
        },
        "OE": {
          "OE.HID_VAD": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0071": 1,
          "BSI-CC-PP-0075": 1,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 15,
          "ADV_FSP": 1,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 22,
          "ADV_IMP": 1,
          "ADV_IMP.1": 15,
          "ADV_INT": 1,
          "ADV_INT.2": 7,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 23
        },
        "AGD": {
          "AGD_OPE": 10,
          "AGD_OPE.1": 15,
          "AGD_PRE": 8,
          "AGD_PRE.1": 11,
          "AGD_PRE_PLT": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 16,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 7,
          "ALC_DEL": 1,
          "ALC_DEL.1": 6,
          "ALC_DVS": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 14,
          "ALC_LCD": 1,
          "ALC_LCD.1": 9,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 12
        },
        "APE": {
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_APD.1": 1,
          "ASE_CCL": 1,
          "ASE_CCL.1": 15,
          "ASE_ECD": 1,
          "ASE_ECD.1": 14,
          "ASE_INT": 1,
          "ASE_INT.1": 17,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 13,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 15,
          "ASE_SPD": 1,
          "ASE_SPD.1": 8,
          "ASE_TSS": 1,
          "ASE_TSS.1": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 2,
          "ATE_COV.2": 8,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 7,
          "ATE_FUN": 1,
          "ATE_FUN.1": 14,
          "ATE_IND": 1,
          "ATE_IND.2": 8
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL5": 3,
          "EAL5 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCS": {
          "FCS_CKM": 54,
          "FCS_CKM.1": 13,
          "FCS_CKM.2": 3,
          "FCS_CKM.4": 40,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 81,
          "FCS_COP.1": 12,
          "FCS_RND": 2,
          "FCS_RND.1": 15,
          "FCS_RND.1.1": 2,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 83,
          "FDP_ACC.1": 18,
          "FDP_ACF": 70,
          "FDP_ACF.1": 29,
          "FDP_DAU": 9,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 8,
          "FDP_ITC": 10,
          "FDP_ITC.1": 11,
          "FDP_ITC.2": 8,
          "FDP_RIP.1": 25,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 28,
          "FDP_SDI.2": 4,
          "FDP_UCT": 25,
          "FDP_UCT.1": 2,
          "FDP_UIT": 12,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 31,
          "FIA_AFL.1": 4,
          "FIA_API": 19,
          "FIA_API.1": 16,
          "FIA_API.1.1": 2,
          "FIA_UAU": 94,
          "FIA_UAU.1": 31,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 3,
          "FIA_UAU.6": 2,
          "FIA_UID": 27,
          "FIA_UID.1": 34,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 3,
          "FMT_LIM.1": 17,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 15,
          "FMT_LIM.2.1": 2,
          "FMT_MOF.1": 12,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 25,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 22,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 34,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 18,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 194,
          "FMT_MTD.1": 28,
          "FMT_MTD.3": 12,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 74,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 28,
          "FMT_SMR.1": 53,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 17,
          "FPT_EMS.1": 16,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 15,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 8,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 16,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 22,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 45,
          "FTP_ITC.1": 13,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 62
        },
        "PGP": {
          "PGP": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 3,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 2,
          "Malfunction": 4,
          "fault injection": 2,
          "malfunction": 4,
          "physical tampering": 6
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 3,
          "side channel": 2,
          "timing attacks": 1
        },
        "other": {
          "JIL": 1,
          "JIL-COMP": 1
        }
      },
      "standard_id": {
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 8,
          "PKCS#15": 2,
          "PKCS#3": 2
        },
        "SCP": {
          "SCP02": 1,
          "SCP03": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 20
        },
        "Infineon": {
          "Infineon": 2
        },
        "Morpho": {
          "Morpho": 1
        },
        "Oberthur": {
          "Oberthur Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Shubham SAGAR",
      "/CreationDate": "D:20200617130014+05\u002730\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20200617130014+05\u002730\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Title",
      "pdf_file_size_bytes": 2113224,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 100
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_SSCD_PART3_V1.0.2"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_64fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020-64en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "387d78bfa88fac8238f74627dd08faa158e1ead8d58d4aefa4aecc3c65aa4475",
      "txt_hash": "2763a46456e3fcc87fb49aac8107e2d65d2308f7269ac05866ca4c720f203c1a"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "198f217c70201a1cea976f86b0deec37fac968434521db55bec7d92c17c8563b",
      "txt_hash": "0afd54c6d573fc4f76126b12ed7fceb885515a420af04e5e1a1417b732566333"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "55c0d77c8966d7e014f81e64db1d195e06ced8b0d9460cb89d1a96ab50931e70",
      "txt_hash": "d401c902157bbda16aa380a75d3c49838fc31ba1a308cc645ba31fca98897804"
    }
  },
  "status": "active"
}