This page was not yet optimized for use on mobile devices.
KM67S3B2 Smart Card IC (v1.0) (ANSSI-CC-2024/35)
CSV information ?
Status | active |
---|---|
Valid from | 06.12.2024 |
Valid until | 06.12.2029 |
Scheme | 🇫🇷 FR |
Manufacturer | Nuvoton Technology |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Protection profiles |
Heuristics summary ?
Certificate ID: ANSSI-CC-2024/35
Certificate ?
Extracted keywords
Security level
EAL5, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0084-2014Certificates
ANSSI-CC-2024/35Evaluation facilities
SERMAFile metadata
Creation date | D:20241210105535+01'00' |
---|---|
Modification date | D:20241210105641+01'00' |
Pages | 2 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDESSecurity level
EAL5, EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VANProtection profiles
BSI-CC-PP-0084-2014, BSI-PP-0084-2014Certificates
ANSSI-CC-2024/35Evaluation facilities
SERMA, CESTIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20241210105318+01'00' |
---|---|
Modification date | D:20241210105642+01'00' |
Pages | 14 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, CBC-MAC, CMACSchemes
MACRandomness
TRNG, RND, RNGBlock cipher modes
ECB, CBC, CTR, CFB, OFB, GCMSecurity level
EAL5, EAL5 augmentedClaims
O.RND, O.TDES, O.AES, O.PUF, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_TDS, ADV_FSP.5, ADV_FSP.4, AGD_OPE, AGD_PRE, ALC_DVS, ALC_DVS.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_LCD, ALC_TAT, ALC_CMS.5, ALC_CMS.4, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FDP_SDC, FDP_ACF, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1.1, FDP_IFF.1, FDP_IFC.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_SMF.1.1, FMT_MSA, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_ITT.1.1, FRU_FLT.2, FRU_FLT.1, FRU_FLT.2.1Protection profiles
BSI-CC-PP-0084-2014Certificates
CC-1, CC-2, CC-3Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side-channel, DPA, SPA, Malfunction, malfunction, DFA, reverse engineering, JIL, JHASCertification process
out of scope, TDES), and AES. However, the single- DES is out of scope. (6, of single-DES, dual-key or triple-key triple-DES (TDES), and AES. However, the single- DES is out of scope. (6) Security The security block has controllers for the circuits related to security (refer to, one of the three configurations. The TOE supports single-DES operations but the single-DES is out of scope. The IC Dedicated Software in binary form is delivered to an OS developer. The OS developerStandards
FIPS197, FIPS PUB 197, AIS31, ISO/IEC14443-, ISO/IEC18092, ISO/IEC14443-2, ISO/IEC14443, ISO/IEC14443-3, ISO/IEC9797-1, ISO/IEC 9797-1, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20241113093946+09'00' |
---|---|
Modification date | D:20241113093946+09'00' |
Pages | 68 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Heuristics ?
Certificate ID: ANSSI-CC-2024/35
Extracted SARs
ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5Similar certificates
Name | Certificate ID | |
---|---|---|
Samsung S3FT9FA 16-bit RISC Microcontroller for Smart Card (S3FT9FA_20240430) (ANSSI-CC-2024/08) | ANSSI-CC-2024/08 | Compare |
Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) | ANSSI-CC-2024/33 | Compare |
TESS v5.0 Platform (revision 1.0) (ANSSI-CC-2024/12) | ANSSI-CC-2024/12 | Compare |
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) | ANSSI-CC-2023/35 | Compare |
TESS v5.1 Platform (Revision 1.0) (ANSSI-CC-2024/28) | ANSSI-CC-2024/28 | Compare |
MIFARE® DESFire® EV3 on ST31N600A02 (version 1.0.2) (ANSSI-CC-2024/25) | ANSSI-CC-2024/25 | Compare |
MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03) | ANSSI-CC-2024/03 | Compare |
Showing 5 out of 7.
Scheme data ?
Product | KM67S3B2 Smart Card IC (v1.0) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/km67s3b2-smart-card-ic-v10 | |
Description | Le produit évalué est le microcontrôleur « KM67S3B2 Smart Card IC, v1.0 » développé par NUVOTON TECHNOLOGY CORPORATION JAPAN. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d | |
Sponsor | NUVOTON TECHNOLOGY CORPORATION JAPAN | |
Developer | NUVOTON TECHNOLOGY CORPORATION JAPAN | |
Cert Id | ANSSI-CC-2024/35 | |
Level | EAL5+ | |
Expiration Date | 06.12.2029 | |
Enhanced | ||
Cert Id | ANSSI-CC-2024/35 | |
Certification Date | 06.12.2024 | |
Expiration Date | 06.12.2029 | |
Category | Micro-circuits | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | NUVOTON TECHNOLOGY CORPORATION JAPAN | |
Sponsor | NUVOTON TECHNOLOGY CORPORATION JAPAN | |
Evaluation Facility | SERMA SAFETY & SECURITY | |
Level | EAL5+ | |
Protection Profile | Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : Cryptographic Services “TDES”, “AES” | |
Mutual Recognition | CCRA SOG-IS | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Report Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_35fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_35.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_35fr.pdf |
References ?
No references are available for this certificate.
Updates ?
-
23.12.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name KM67S3B2 Smart Card IC (v1.0) (ANSSI-CC-2024/35) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_35fr.pdf",
"dgst": "2c5a573da469c480",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2024/35",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2024/35",
"description": "Le produit \u00e9valu\u00e9 est le microcontr\u00f4leur \u00ab KM67S3B2 Smart Card IC, v1.0 \u00bb d\u00e9velopp\u00e9 par NUVOTON TECHNOLOGY CORPORATION JAPAN. Le microcontr\u00f4leur seul n\u2019est pas un produit utilisable en tant que tel. Il est destin\u00e9 \u00e0 h\u00e9berger une ou plusieurs applications. Il peut \u00eatre ins\u00e9r\u00e9 dans un support plastique pour constituer une carte \u00e0 puce. Les usages possibles de cette carte sont multiples (documents d",
"developer": "NUVOTON TECHNOLOGY CORPORATION JAPAN",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Micro-circuits",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2024/35",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_35fr.pdf",
"certification_date": "2024-12-06",
"developer": "NUVOTON TECHNOLOGY CORPORATION JAPAN",
"evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
"expiration_date": "2029-12-06",
"level": "EAL5+",
"mutual_recognition": "CCRA SOG-IS",
"protection_profile": "Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifi\u00e9 BSI-CC-PP-0084-2014 le 19 f\u00e9vrier 2014 avec conformit\u00e9 aux packages : Cryptographic Services \u201cTDES\u201d, \u201cAES\u201d",
"report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_35fr.pdf",
"sponsor": "NUVOTON TECHNOLOGY CORPORATION JAPAN",
"target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_35.pdf"
},
"expiration_date": "2029-12-06",
"level": "EAL5+",
"product": "KM67S3B2 Smart Card IC (v1.0)",
"sponsor": "NUVOTON TECHNOLOGY CORPORATION JAPAN",
"url": "https://cyber.gouv.fr/produits-certifies/km67s3b2-smart-card-ic-v10"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Nuvoton Technology",
"manufacturer_web": null,
"name": "KM67S3B2 Smart Card IC (v1.0) (ANSSI-CC-2024/35)",
"not_valid_after": "2029-12-06",
"not_valid_before": "2024-12-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certificat-ANSSI-CC-2024_35fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2024/35": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20241210105535+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20241210105641+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 169799,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2024_35fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2024/35": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"Serma": {
"SERMA": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"TDES": 1
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20241210105318+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20241210105642+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 351984,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.sogis.eu/",
"http://www.ssi.gouv.fr/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "ANSSI-cible-CC-2024_35.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-1": 1,
"CC-2": 1,
"CC-3": 1
}
},
"cc_claims": {
"O": {
"O.AES": 9,
"O.PUF": 9,
"O.RND": 5,
"O.TDES": 10
},
"T": {
"T.RND": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 2,
"ADV_FSP": 3,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_IMP": 2,
"ADV_INT": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 2,
"ALC_CMS": 3,
"ALC_CMS.4": 1,
"ALC_CMS.5": 2,
"ALC_DEL": 2,
"ALC_DVS": 7,
"ALC_DVS.2": 4,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL5": 4,
"EAL5 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 6,
"FAU_SAS.1": 10,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 15,
"FCS_CKM.1": 10,
"FCS_CKM.4": 8,
"FCS_COP": 22,
"FCS_COP.1": 5,
"FCS_RNG": 8,
"FCS_RNG.1": 9,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 15,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 12,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 15,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 1,
"FDP_ITC.1": 10,
"FDP_ITC.2": 10,
"FDP_ITT.1": 10,
"FDP_ITT.1.1": 1,
"FDP_SDC": 5,
"FDP_SDC.1": 14,
"FDP_SDC.1.1": 2,
"FDP_SDI": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 6,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FMT": {
"FMT_LIM": 6,
"FMT_LIM.1": 16,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 15,
"FMT_LIM.2.1": 2,
"FMT_MSA": 1,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 13,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_FLS.1": 12,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 9,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 13,
"FPT_PHP.3.1": 1
},
"FRU": {
"FRU_FLT.1": 1,
"FRU_FLT.2": 10,
"FRU_FLT.2.1": 1
}
},
"certification_process": {
"OutOfScope": {
"TDES), and AES. However, the single- DES is out of scope. (6": 1,
"of single-DES, dual-key or triple-key triple-DES (TDES), and AES. However, the single- DES is out of scope. (6) Security The security block has controllers for the circuits related to security (refer to": 1,
"one of the three configurations. The TOE supports single-DES operations but the single-DES is out of scope. The IC Dedicated Software in binary form is delivered to an OS developer. The OS developer": 1,
"out of scope": 2
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CFB": {
"CFB": 2
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 2
},
"OFB": {
"OFB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 9,
"RNG": 8
},
"TRNG": {
"TRNG": 4
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 17,
"malfunction": 5
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 14,
"Physical Probing": 5,
"Physical probing": 1,
"SPA": 1,
"physical probing": 6,
"side-channel": 2
},
"other": {
"JHAS": 2,
"JIL": 1,
"reverse engineering": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 4
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS PUB 197": 1,
"FIPS197": 2
},
"ISO": {
"ISO/IEC 9797-1": 1,
"ISO/IEC14443": 2,
"ISO/IEC14443-": 1,
"ISO/IEC14443-2": 2,
"ISO/IEC14443-3": 2,
"ISO/IEC18092": 10,
"ISO/IEC9797-1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 38
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 29,
"Triple-DES": 9
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CBC-MAC": 2,
"CMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20241113093946+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20241113093946+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 1575843,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 68
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"JAVA_OC",
"BAROC_SC_PP_V1.0",
"SECURITY_IC_AUGP_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_35fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_35.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "57f4df56d28a28e059d03655a783b868a53511aec165f720714671d6d41b158f",
"txt_hash": "130e7b46407b8f28ac133d6a1d598b829cc1ee4875f866a37670ef4f7474085c"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3cf1300e16962b37f42ea9ebfc6351c97df01fc07a68314a80e5f21d068b45f3",
"txt_hash": "8843433db7974ce3d81c509299cd5caf0a74242d7b1740e795b016e147f3dcea"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8e10c83e1e3d6fc417d59f8e292910c52cee8930093acde749643019888c4f10",
"txt_hash": "064470eb1a20e182fc18334970bfe2417d1a7e6e6a2283d08a97161a39e732ee"
}
},
"status": "active"
}