MultiApp v4.1 Javacard Platform(version 4.1.0.4) (ANSSI-CC-2025/53)

CSV information

Status active
Valid from 16.12.2025
Valid until 16.12.2030
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL5+, AVA_VAN.5, ALC_DVS.2
Protection profiles

Heuristics summary

Certificate ID: ANSSI-CC-2025/53

Certificate

Extracted keywords

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Certificates
ANSSI-CC-2025/53
Evaluation facilities
SERMA

File metadata

Title ANSSI-CC-2025/53
Keywords version x.x, révision x
Author DUCLOS Charlene
Creation date D:20251215135307+01'00'
Modification date D:20251217073419+00'00'
Pages 2
Creator Acrobat PDFMaker 25 pour Word
Producer PDFKit.NET 12.3.800.0 DMV10

Certification report

Extracted keywords

Symmetric Algorithms
DES
Protocols
PACE

JavaCard versions
Java Card 3.0.4
Vendor
Gemalto

Security level
EAL5, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-PP-0084-2014, ANSSI-CC-PP-2010/03-M01
Certificates
ANSSI-CC-2025/53, ANSSI-PP-2010-03, ANSSI-CC-2023/20-R02, ANSSI-CC-PP-2010/03-M01
Evaluation facilities
SERMA, CESTI

Standards
SCP01, SCP02, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title ANSSI-CC-2025/53
Subject MultiApp v4.1 Javacard Platform
Keywords [ANSSI Crypto]
Author [email protected]
Creation date D:20251215135329+01'00'
Modification date D:20251217073418+00'00'
Pages 16
Creator Acrobat PDFMaker 25 pour Word
Producer PDFKit.NET 12.3.800.0 DMV10

References

Outgoing
  • ANSSI-CC-2023/20-R02 - active - S3FT9MH/S3FT9MV/S3FT9MG16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software(S3FT9MH_20240713) (ANSSI-CC-2023/20-R02)

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, TDEA, 3DES, TDES, Triple-DES, HMAC, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA1, SHA-1, SHA-224, SHA-256, SHA-512, SHA224, SHA-384
Schemes
MAC, Key Agreement, Key agreement
Protocols
PACE
Randomness
DTRNG, PRNG, RNG, RND
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 2.2.2, Java Card 3.0.4
JavaCard API constants
TYPE_ACCESS
IC data groups
EF.DG1, EF.DG16, EF.DG3, EF.DG4
Vendor
Samsung, Gemalto, Thales Group, Thales

Security level
EAL5, EAL5+, EAL 6+, EAL5 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.BIO, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.BIO-MNGT, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, O.RND, O.OBJ_DELETION, O.CARD_MANAGEMENT, O.PIN-, O.TDES, O.AES, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.CODE_PCKG, O.KEY_MNGT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, A.APPLET, A.VERIFICATION, R.JAVA, OT.X, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OE.VERIFICATION, OE.APPLET, OE.CODE-EVIDENCE, OE.CARD-MANAGEMENT, OE.SCP, OE.NATIVE, OSP.VERIFICATION, OSP.RNG, OSP.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.5, ADV_FSP.1, ADV_FSP.2, ADV_FSP.4, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_PRE, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ALC_CMS.5, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_RND, FCS_CKM, FCS_COP, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_RNG.1, FDP_ACF, FDP_ACC, FDP_ACC.2, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_ROL.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_RIP.1.1, FDP_SDI.1, FDP_ITT.1, FIA_AFL, FIA_SOS.2, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UAU, FIA_UAU.1, FIA_UID.1, FIA_UAU.4, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMR, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPR_UNO, FPT_EMS, FPT_TST, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS, FPT_FLS.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV, FPT_RCV.3, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_RCV.4, FPT_ITT, FPT_ITT.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_TST.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-, BSI-CC-PP- 0068-V2-2011-MA-01, BSI-PP- 0055-2009
Certificates
ANSSI-CC-2023/20-R02, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, physical tampering, Physical Tampering, malfunction, Malfunction, fault induction
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are

Standards
FIPS180-2, FIPS197, FIPS 46-3, FIPS 197, SP 800-67, PKCS#1, PKCS#5, AIS31, ICAO, SCP01, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title MultiApp V4.1: JCS Security Target
Subject 1.12
Keywords 28-03-2018
Author D1417544
Creation date D:20250801155723+02'00'
Modification date D:20250801155723+02'00'
Pages 142
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

References

Outgoing
  • ANSSI-CC-2023/20-R02 - active - S3FT9MH/S3FT9MV/S3FT9MG16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software(S3FT9MH_20240713) (ANSSI-CC-2023/20-R02)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2025/53

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Similar certificates

Name Certificate ID
MultiApp V5.0 Platform (configuration 1 : 5.0.1 version 2a et configuration 2 : 5.0.1 version 2b) (ANSSI-CC-2025/42) ANSSI-CC-2025/42 Compare
PPCA application on MultiApp V5.1 Platform (version 1.0.1.A) (ANSSI-CC-2025/05) ANSSI-CC-2025/05 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-... ANSSI-CC-2023/57 Compare
MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (A... ANSSI-CC-2020/42-R01 Compare
Smart Tachograph G2 on MultiApp V4.0.1 (Versions 2.0.1 G et 2.0.1 H) (EUCC-ANSSI-2025-03-02) ANSSI-CC-2025/03 Compare
eTravel v2.2 BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/43-R01) ANSSI-CC-2020/43-R01 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0) (ANSSI-CC-2020/49-R01) ANSSI-CC-2020/49-R01 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/45-R01) ANSSI-CC-2020/45-R01 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/44-R01) ANSSI-CC-2020/44-R01 Compare
MultiApp V4.0.1 Platform (Version 4.0.1) (ANSSI-2017/76-R01) ANSSI-CC-2017/76-R01 Compare
IAS Classic v5.2 on MultiApp V5.0 (versions 5.2.0.A.C version 2 et 5.2.0.A.O version 2) (ANSSI-CC-2025/46) ANSSI-CC-2025/46 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.3.3) (ANSSI-CC-2025/13) ANSSI-CC-2025/13 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2)... ANSSI-CC-2023/30 Compare
Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04) ANSSI-CC-2025/04 Compare
eTravel 3.2 BAC on MultiApp V5.2 version 3.2.1.0 (ANSSI-CC-2025/43) ANSSI-CC-2025/43 Compare
eTravel 3.2 EAC/BAC on MultiApp V5.2 version 3.2.1.0 (ANSSI-CC-2025/44) ANSSI-CC-2025/44 Compare
eTravel 3.2 EAC on SAC on MultiApp V5.2 version 3.2.1.0 (ANSSI-CC-2025/45) ANSSI-CC-2025/45 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.3.3) (ANSSI-CC-2025/11) ANSSI-CC-2025/11 Compare
MultiApp v4 Platform Version 4.0 (ANSSI-CC-2017/07-R01) ANSSI-CC-2017/07-R01 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.2.0.52) (ANSSI-CC-2025/02) ANSSI-CC-2025/02 Compare
TEQS V1.0 (version 1.0) (ANSSI-CC-2025/20) ANSSI-CC-2025/20 Compare
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0 ANSSI-CC-2020/43 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 – PACE, EAC (version 1.0) ANSSI-CC-2020/49 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/45 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/44 Compare
IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’a... ANSSI-CC-2020/53-R01 Compare
ACOS-IDv4.1 eMRTD (A) BAC Configuration (version 4.1 eMRTD (A)) ( ANSSI-CC-2025/15) ANSSI-CC-2025/15 Compare
ACOS-IDv4.1 SSCD (A) CB-Comm (version 4.1 SSCD (A)) (ANSSI-CC-2025/17) ANSSI-CC-2025/17 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0) ANSSI-CC-2020/49-R01 Compare
Infineon eID-OSv1.0 SSCD (A) CB-Comm (version 1.0 SSCD (A)) (ANSSI-CC-2025/21) ANSSI-CC-2025/21 Compare
ACOS-IDv4.1 SSCD (A) CL-TC-Comm (version 4.1 SSCD (A)) (ANSSI-CC-2025/18) ANSSI-CC-2025/18 Compare
Infineon eID-OSv1.0 eMRTD (A) BAC Configuration (version 1.0 eMRTD (A)) (ANSSI-CC-2025/23) ANSSI-CC-2025/23 Compare
ACOS-IDv4.1 eMRTD (A) EAC/PACE Configuration (version 4.1 eMRTD (A)) (ANSSI-CC-2025/16) ANSSI-CC-2025/16 Compare
Infineon eID-OSv1.0 SSCD (A) CL-TC-Comm (version 1.0 SSCD (A)) (ANSSI-CC-2025/22) ANSSI-CC-2025/22 Compare
NPCT7xx TPM2.0 rev 1.59 configuration version 1.5.3.3 (ANSSI-CC-2025/14) ANSSI-CC-2025/14 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.3.3) (ANSSI-CC-2025/12) ANSSI-CC-2025/12 Compare
Infineon eID-OSv1.0 eMRTD (A) EAC/PACE Configuration (version 1.0 eMRTD (A)) (ANSSI-CC-2025/24) ANSSI-CC-2025/24 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/56v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/58v2 Compare
IAS Classic v5.2.3 with MOC Server v3.1.1 on MultiApp V5.2 Versions 5.2.3.A.C et 5.2.3.A.O (ANSSI-CC-2025/40) ANSSI-CC-2025/40 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de ... ANSSI-CC-2018/57v2 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
TESS v5.2 Platform(Révision 1.0) (ANSSI-CC-2025/19) ANSSI-CC-2025/19 Compare
MIFARE DESFire EV3 on ST31R480 A01(version 1.0.3) (ANSSI-CC-2025/31) ANSSI-CC-2025/31 Compare
MIFARE® Plus® EV2 on ST31R480 A01 (version 1.0.3) (ANSSI-CC-2025/33) ANSSI-CC-2025/33 Compare
ChipDoc v3.2 on JCOP 4 P71 in SSCD configuration (Version 3.2.0.52) (ANSSI-CC-2025/03) ANSSI-CC-2025/03 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO BAC configuration (Version 3.2.0.52)(ANSSI-CC-2025/01) ANSSI-CC-2025/01 Compare
IDEMIA CA (Version 1.3.1)(ANSSI-CC-2025/29) ANSSI-CC-2025/29 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 ANSSI-CC-2018/53 Compare
Application IAS V4.2.0.D sur la plateforme Javacard ouverte MultiApp V3.1S masquée sur le composant P60D144JVA (versi... ANSSI-CC-2015/38 Compare
Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) ANSSI-CC-2024/33 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) ANSSI-CC-2024/11 Compare
BELPIC V1.8 applet on MultiApp V4.1 (Révision 1.0) (ANSSI-CC-2019/31-R01) ANSSI-CC-2019/31-R01 Compare
ArcaShield Platform(Version 0003040E) (ANSSI-CC-2025/38) ANSSI-CC-2025/38 Compare
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Versio... ANSSI-CC-2016/03 Compare
Application IAS V4.2.0.B sur la plateforme Javacard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (versio... ANSSI-CC-2015/37 Compare
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Versio... ANSSI-CC-2016/04 Compare
PPCA application v1.0.1.3 on MultiApp v4.0.1 Platform ANSSI-CC-2018/21 Compare
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Car... ANSSI-CC-2020/65v2 Compare
MultiApp 5.2 Premium PQC (version 5.2)(ANSSI-CC-2025/32) ANSSI-CC-2025/32 Compare
secunet konnektor 2.0.0 und 2.1.0, Version 5.70.4:2.0.0 und 5.70.4:2.1.0 BSI-DSZ-CC-1044-V8-2025 Compare
MultiApp 5.2 Premium PQC GP-SE(version 5.2) (ANSSI-CC-2025/30) ANSSI-CC-2025/30 Compare
MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip ANSSI-CC-2020/42 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
Microcontrôleur sécurisé ST33H768 révision C,Firmware révision 5, incluant optionnellement la bibliothèque cryptograp... ANSSI-CC-2017/01 Compare
TMCOS 4.0 0.3 on THD89 1.0.3 Secure Element Java Card System Platform, version v4.0 0.3 NSCIB-CC-2400034-01-CR Compare
TMCOS 4.0 0.3 on THD89 1.0.3 Secure Element Java Card System Platform, version v4.0 0.3 NSCIB-CC-2400175-01-CR Compare
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cry... ANSSI-CC-2015/61 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09) ANSSI-CC-2024/09 Compare
IAS Classic v5.0 with MOC Server v3.0 on MultiApp v4.2 Version 5.0.0.A.C, version 3.0.1A ANSSI-CC-2020/70 Compare
TESS v5.1 Platform (Revision 1.0) (ANSSI-CC-2024/28) ANSSI-CC-2024/28 Compare
BELPIC V1.8 applet on MultiApp V4.1 Platform Révision 1.0 ANSSI-CC-2019/31 Compare
TESS v5.0 Platform (revision 1.0) (ANSSI-CC-2024/12) ANSSI-CC-2024/12 Compare
COSMOPOLIC 2.1 V4 JavaCard Open Platform Embedded Software version 1 ANSSI-CC-2002/05 Compare
Digital Identity 1.0.A PACE, EAC on MultiApp V5.0.A(version 1.0.A) ANSSI-CC-2022/57 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.0.0) ANSSI-CC-2021/52 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.0.1) ANSSI-CC-2022/27 Compare
Digital Identity 1.0.A PACE, EAC on MultiApp V5.0.A (version 1.0.A) ANSSI-CC-2022/22 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 ANSSI-CC-2019/07 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.1.6.52) (ANSSI-CC-2021/19-R01) ANSSI-CC-2021/19-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration(Version 4.0.1.52) ANSSI-CC-2023/12 Compare
Strong Customer Authentication for Apple Pay on Apple Watch Series 10 with S10 running watchOS 11.4(watchOS 11.4 (bui... ANSSI-CC-2025/35 Compare
Strong Customer Authentication for Apple Pay on iPhone 16 Pro with A18 Pro running iOS 18.4(iOS 18.4 (build 22E240)) ... ANSSI-CC-2025/34 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45) ANSSI-CC-2023/45 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration(Version 4.0.1.52) ANSSI-CC-2023/10 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52) ANSSI-CC-2023/11 Compare
Strong Customer Authentication for Apple Pay on Mac mini with M4 running macOS Sequoia 15.4, paired with Magic keyboa... ANSSI-CC-2025/36 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.2.2) (ANSSI-CC-2024/10) ANSSI-CC-2024/10 Compare
SCR700U (version A) (ANSSI-CC-2025/39) ANSSI-CC-2025/39 Compare
Application IAS V4.2 sur la plateformeJavaCard ouverte MultiApp V3.1 masquée surle composant P60D080PVC(version du pa... ANSSI-CC-2015/08 Compare
ChipDoc v3 on JCOP 4 P71 in SSCD configuration (Version 3.0.0.52) (ANSSI-CC-2020/73-R01) ANSSI-CC-2020/73-R01 Compare
ID-One Cosmo v9.1 embedding VITALE application(version 2.1.4)(ANSSI-CC-2022/33-R01) ANSSI-CC-2022/33-R01 Compare
IAS Classic V4.4 with MOC Server 1.1 on MultiApp V4 ANSSI-CC-2017/22 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (Version 3.1.6.52) (ANSSI-CC-2021/20-R01) ANSSI-CC-2021/20-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) (ANSSI-CC-2021/18-R01) ANSSI-CC-2021/18-R01 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration (Version 3.0.0.52) (ANSSI-CC-2020/72-R01) ANSSI-CC-2020/72-R01 Compare
TrustySign version 4.1.4 ANSSI-CC-2010/53 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.1.1) ANSSI-CC-2022/31 Compare
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l... ANSSI-CC-2020/50-R01 Compare
MultiApp V4.2 ID version 4.2.1 ANSSI-CC-2021/41 Compare
Microcontrôleur sécurisé ST33H768 révision C, Firmware révision 4, incluant optionnellement la bibliothèque cryptogra... ANSSI-CC-2015/36 Compare
secunet konnektor 2.0.0, Version 4.1.3:2.0.0 BSI-DSZ-CC-1044-V4-2021 Compare
Application M/Chip 4 version 1.0.1.1 for MULTOS ANSSI-CC-2003/10 Compare
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC112... None Compare
Showing 5 out of 116.

References

Loading...

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-53-certificat.pdf",
  "dgst": "a080e5982168ce54",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2025/53",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.1",
        "4.1.0.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "85bef5b6f16c4d33"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/20-R02"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/20-R02"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/20-R02"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2023/20-R02"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "MultiApp v4.1 Javacard Platform(version 4.1.0.4) (ANSSI-CC-2025/53)",
  "not_valid_after": "2030-12-16",
  "not_valid_before": "2025-12-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ANSSI-CC-2025-53-certificat.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2025/53": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "DUCLOS Charlene",
      "/Comments": "ANSSI-CC-CER-F-14_v15.0",
      "/Company": "SGDSN",
      "/CreationDate": "D:20251215135307+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 25 pour Word",
      "/Keywords": "version x.x, r\u00e9vision x",
      "/ModDate": "D:20251217073419+00\u002700\u0027",
      "/Producer": "PDFKit.NET 12.3.800.0 DMV10",
      "/SourceModified": "D:20251215125258",
      "/Title": "ANSSI-CC-2025/53",
      "pdf_file_size_bytes": 304654,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2025-53-rapport.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/20-R02": 1,
          "ANSSI-CC-2025/53": 3,
          "ANSSI-CC-PP-2010/03-M01": 1,
          "ANSSI-PP-2010-03": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2010/03-M01": 1
        },
        "BSI": {
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 2,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "com": {
          "com.gemalto": 1,
          "com.gemalto.javacard.eid": 1,
          "com.gemalto.javacard.esign": 1,
          "com.gemalto.javacard.iasclassic": 1,
          "com.gemalto.javacard.mspnp": 1,
          "com.gemalto.mchipadv": 1,
          "com.gemalto.moc.server": 1,
          "com.gemalto.mpcos": 1,
          "com.gemalto.pure": 1,
          "com.gemalto.puredi": 1,
          "com.visa.vsdc": 1
        },
        "javacard": {
          "javacard.eid": 1,
          "javacard.esign": 1,
          "javacard.iasclassic": 1,
          "javacard.mspnp": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.4": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "SCP": {
          "SCP01": 2,
          "SCP02": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "[email protected]",
      "/Category": "version 4.1.0.4",
      "/Comments": "ANSSI-CC-CER-F-07_v31.9",
      "/Company": "THALES DIS France SAS",
      "/CreationDate": "D:20251215135329+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 25 pour Word",
      "/Keywords": "[ANSSI Crypto]",
      "/ModDate": "D:20251217073418+00\u002700\u0027",
      "/Producer": "PDFKit.NET 12.3.800.0 DMV10",
      "/SourceModified": "D:20251215125323",
      "/Subject": "MultiApp v4.1 Javacard Platform",
      "/Title": "ANSSI-CC-2025/53",
      "pdf_file_size_bytes": 891858,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cyber.gouv.fr/",
          "http://www.commoncriteriaportal.org/",
          "http://www.sogis.eu/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "ANSSI-CC-2025-53-cible.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 12
          },
          "ECDH": {
            "ECDH": 8
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "DH": 11,
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/20-R02": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 3,
          "CC-3": 3
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 5,
          "A.VERIFICATION": 4
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_CODE": 6,
          "D.APP_C_DATA": 3,
          "D.APP_I_DATA": 4,
          "D.BIO": 1,
          "D.CRYPTO": 5,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.PIN": 4,
          "D.SEC_DATA": 7
        },
        "O": {
          "O.AES": 1,
          "O.ALARM": 15,
          "O.APPLET": 28,
          "O.BIO-MNGT": 5,
          "O.CARD-MANAGEMENT": 3,
          "O.CARD_MANAGEMENT": 17,
          "O.CIPHER": 10,
          "O.CODE_PCKG": 16,
          "O.CODE_PKG": 7,
          "O.DELETION": 7,
          "O.FIREWALL": 12,
          "O.GLOBAL_ARRAYS_CONFID": 9,
          "O.GLOBAL_ARRAYS_INTEG": 5,
          "O.INSTALL": 10,
          "O.JAVAOBJECT": 56,
          "O.KEY-MNGT": 6,
          "O.KEY_MNGT": 3,
          "O.LOAD": 7,
          "O.NATIVE": 12,
          "O.OBJ-DELETION": 4,
          "O.OBJ_DELETION": 1,
          "O.OPERATE": 15,
          "O.PIN-": 1,
          "O.PIN-MNGT": 5,
          "O.REALLOCATION": 5,
          "O.RESOURCES": 9,
          "O.RND": 14,
          "O.SCP": 36,
          "O.SID": 13,
          "O.TDES": 1,
          "O.TRANSACTION": 6
        },
        "OE": {
          "OE.APPLET": 4,
          "OE.CARD-MANAGEMENT": 1,
          "OE.CODE-EVIDENCE": 10,
          "OE.NATIVE": 1,
          "OE.SCP": 6,
          "OE.VERIFICATION": 25
        },
        "OP": {
          "OP.ARRAY_ACCESS": 6,
          "OP.CREATE": 10,
          "OP.DELETE_APPLET": 6,
          "OP.DELETE_PCKG": 4,
          "OP.DELETE_PCKG_APPLET": 4,
          "OP.INSTANCE_FIELD": 6,
          "OP.INVK_INTERFACE": 10,
          "OP.INVK_VIRTUAL": 8,
          "OP.JAVA": 8,
          "OP.PUT": 7,
          "OP.THROW": 7,
          "OP.TYPE_ACCESS": 7
        },
        "OSP": {
          "OSP.RND": 3,
          "OSP.RNG": 1,
          "OSP.VERIFICATION": 4
        },
        "OT": {
          "OT.X": 1
        },
        "R": {
          "R.JAVA": 9
        },
        "T": {
          "T.CONFID-APPLI-DATA": 4,
          "T.CONFID-JCS-CODE": 4,
          "T.CONFID-JCS-DATA": 4,
          "T.DELETION": 3,
          "T.EXE-CODE": 8,
          "T.INSTALL": 4,
          "T.INTEG-APPLI-CODE": 7,
          "T.INTEG-APPLI-DATA": 8,
          "T.INTEG-JCS-CODE": 3,
          "T.INTEG-JCS-DATA": 4,
          "T.NATIVE": 4,
          "T.OBJ-DELETION": 4,
          "T.PHYSICAL": 4,
          "T.RESOURCES": 3,
          "T.SID": 8
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0084-": 1,
          "BSI-PP- 0055-2009": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 11,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 6,
          "ADV_IMP": 1,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 3,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE.1": 9,
          "AGD_PRE": 1,
          "AGD_PRE.1": 7
        },
        "ALC": {
          "ALC_CMC.4": 3,
          "ALC_CMS.5": 2,
          "ALC_DEL.1": 3,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 9,
          "ALC_LCD.1": 5,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 5
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 4,
          "ATE_DPT.1": 2,
          "ATE_DPT.3": 3,
          "ATE_FUN.1": 9,
          "ATE_IND.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6+": 1,
          "EAL5": 7,
          "EAL5 augmented": 2,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 15,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 2
        },
        "FCO": {
          "FCO_NRO": 7,
          "FCO_NRO.2": 3
        },
        "FCS": {
          "FCS_CKM": 54,
          "FCS_CKM.1": 32,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 11,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 7,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 25,
          "FCS_CKM.4.1": 2,
          "FCS_COP": 46,
          "FCS_COP.1": 30,
          "FCS_COP.1.1": 5,
          "FCS_RND": 21,
          "FCS_RND.1": 9,
          "FCS_RND.1.1": 3,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 41,
          "FDP_ACC.1": 14,
          "FDP_ACC.2": 6,
          "FDP_ACF": 35,
          "FDP_ACF.1": 16,
          "FDP_IFC": 24,
          "FDP_IFC.1": 13,
          "FDP_IFC.2": 2,
          "FDP_IFF": 17,
          "FDP_IFF.1": 12,
          "FDP_ITC": 12,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 17,
          "FDP_ITT.1": 1,
          "FDP_RIP": 101,
          "FDP_RIP.1": 10,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 15,
          "FDP_ROL.1": 2,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 10,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT": 7,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 25,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_ATD": 9,
          "FIA_ATD.1": 2,
          "FIA_SOS.2": 1,
          "FIA_UAU": 65,
          "FIA_UAU.1": 6,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.4": 1,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 41,
          "FIA_UID.1": 18,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 2,
          "FIA_UID.2": 1,
          "FIA_USB": 8,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_LIM": 24,
          "FMT_LIM.1": 16,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 15,
          "FMT_LIM.2.1": 3,
          "FMT_MSA": 91,
          "FMT_MSA.1": 11,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 15,
          "FMT_MTD": 41,
          "FMT_MTD.1": 9,
          "FMT_MTD.3": 1,
          "FMT_SMF": 61,
          "FMT_SMF.1": 17,
          "FMT_SMF.1.1": 2,
          "FMT_SMR": 75,
          "FMT_SMR.1": 27,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 2
        },
        "FPR": {
          "FPR_UNO": 7,
          "FPR_UNO.1": 11,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 15,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 47,
          "FPT_FLS.1": 16,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 7,
          "FPT_ITT.1": 2,
          "FPT_PHP": 7,
          "FPT_PHP.3": 17,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 16,
          "FPT_RCV.3": 4,
          "FPT_RCV.4": 2,
          "FPT_TDC.1": 9,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 9,
          "FPT_TST.1": 15,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST.2": 1
        },
        "FTP": {
          "FTP_ITC": 18,
          "FTP_ITC.1": 5,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 190
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 3,
          "Key agreement": 2
        },
        "MAC": {
          "MAC": 14
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4,
            "SHA1": 2
          },
          "SHA2": {
            "SHA-224": 4,
            "SHA-256": 4,
            "SHA-384": 2,
            "SHA-512": 4,
            "SHA224": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.DG1": 6,
          "EF.DG16": 6,
          "EF.DG3": 1,
          "EF.DG4": 1
        }
      },
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 7
        }
      },
      "javacard_packages": {
        "com": {
          "com.gemalto.javacard": 3,
          "com.gemalto.javacard.filesystem": 1,
          "com.gemalto.javacard.tlv": 1,
          "com.gemalto.javacard.util": 1,
          "com.gemalto.javacardx.biometry": 2,
          "com.gemalto.javacardx.crypto.asymmetric.rsa": 1,
          "com.gemalto.javacardx.gap": 2
        },
        "javacard": {
          "javacard.filesystem": 1,
          "javacard.framework": 2,
          "javacard.tlv": 1,
          "javacard.util": 1
        },
        "javacardx": {
          "javacardx.biometry": 4,
          "javacardx.crypto.asymmetric.rsa": 1,
          "javacardx.gap": 2
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2.2": 3,
          "Java Card 3.0.4": 8
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RND": 22,
          "RNG": 14
        },
        "TRNG": {
          "DTRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 9,
          "Physical Tampering": 3,
          "fault induction": 2,
          "malfunction": 8,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 5,
          "SPA": 1,
          "physical probing": 6,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 4
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 197": 1,
          "FIPS 46-3": 1,
          "FIPS180-2": 1,
          "FIPS197": 5
        },
        "ICAO": {
          "ICAO": 1
        },
        "NIST": {
          "SP 800-67": 1
        },
        "PKCS": {
          "PKCS#1": 7,
          "PKCS#5": 5
        },
        "SCP": {
          "SCP01": 4,
          "SCP02": 4,
          "SCP03": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 28
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2,
            "TDEA": 1,
            "TDES": 15,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 20
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "HMAC": 3,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 7
        },
        "Samsung": {
          "Samsung": 14
        },
        "Thales": {
          "Thales": 20,
          "Thales Group": 142
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "D1417544",
      "/CreationDate": "D:20250801155723+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/Keywords": "28-03-2018",
      "/ModDate": "D:20250801155723+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Subject": "1.12",
      "/Title": "MultiApp V4.1: JCS Security Target",
      "pdf_file_size_bytes": 3648901,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 142
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-53-rapport.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL5+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-53-cible.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "8aec92b3a06d1d9e3349f82ca592e6a8572a7198118589dc321edaa9bac4e7dc",
      "txt_hash": "a35724202606dabc8fbadfd9aa34eeb58b7a968aaa302defe18c2428739b6d0d"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "f887305cefdac8a15d9934a6e06cb7d55f6e786612312e39a7c75a54f7d71975",
      "txt_hash": "a2d03deedc41bbcc7aa9338c77dccf610e714a0cb13c45a876ef57ff6f6dce71"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "4ba795c993c70a2d75af96d1e108cc43f077c6146bd0215de55683e3ad23753c",
      "txt_hash": "323e0feda90af79b31ab7cc1a0e5d3f90532ce46c6550ab3c210307ab9c3b190"
    }
  },
  "status": "active"
}