This page was not yet optimized for use on mobile devices.
Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33)
CSV information ?
Status | active |
---|---|
Valid from | 06.12.2024 |
Valid until | 06.12.2029 |
Scheme | 🇫🇷 FR |
Manufacturer | Thales |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL4+, ALC_FLR.1 |
Heuristics summary ?
Certificate ID: ANSSI-CC-2024/33
Certificate ?
Extracted keywords
Vendor
ThalesSecurity level
EAL4, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5Certificates
ANSSI-CC-2024/33, 2020-37-INF-3429- v1Evaluation facilities
Serma Safety & SecurityFile metadata
Creation date | D:20241210105125+01'00' |
---|---|
Modification date | D:20241210105204+01'00' |
Pages | 2 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESVendor
ThalesSecurity level
EAL4, EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ALC_FLR, AVA_VAN.5, AVA_VANCertificates
ANSSI-CC-2024/33, NSCIB-CC-2300182-01-CR, 2020-37-INF-3429- v1Evaluation facilities
SERMA, CESTIStandards
AIS20, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20241210104855+01'00' |
---|---|
Modification date | D:20241210105205+01'00' |
Pages | 14 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
References
Outgoing- NSCIB-CC-2300182-01-CR - active - STMicroelectronics ST54L A02
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES128, DES, TDES, 3DES, HMAC, KMAC, CMAC, CBC-MACAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA224, SHA256, SHA384, SHA512, SHA-224, SHA3-224, SHA3-256, SHA3-384, SHA3-512Schemes
MAC, Key Exchange, Key Agreement, Key agreementProtocols
TLS, PACE, PGPRandomness
RNG, RNDBlock cipher modes
ECB, CBC, CTR, GCM, CCMTLS cipher suites
TLS_PSK_WITH_AES_128_CBC_S, TLS_PSK_WITH_NULL_SHA, TLS_PSK_WITH_NULL_SHA256JavaCard versions
Java Card 3.1.0, Global Platform 2.3.1JavaCard API constants
ALG_DES_CBC_NOPAD, ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_ISO9797_M2, ALG_DES_CBC_PKCS5, ALG_DES_ECB_NOPAD, ALG_DES_ECB_ISO9797_M1, ALG_DES_ECB_ISO9797_M2, ALG_DES_ECB_PKCS5, ALG_DES_MAC4_ISO9797_1_M1_ALG3, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC4_PKCS5, ALG_DES_MAC4_NOPAD, ALG_DES_MAC8_ISO9797_1_M1_ALG3, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_DES_MAC8_ISO9797_M1, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_PKCS5, ALG_DES_MAC8_NOPAD, ALG_RSA_SHA_224_PKCS1, ALG_RSA_SHA_224_PKCS1_PSS, ALG_RSA_SHA_256_PKCS1, ALG_RSA_SHA_256_PKCS1_PSS, ALG_RSA_SHA_384_PKCS1, ALG_RSA_SHA_384_PKCS1_PSS, ALG_RSA_SHA_512_PKCS1, ALG_RSA_SHA_512_PKCS1_PSS, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_ISO9796_MR, ALG_RSA_SHA_PKCS1, ALG_RSA_SHA_PKCS1_PSS, ALG_RSA_SHA_RFC2409, ALG_RSA_NOPAD, ALG_RSA_PKCS1_OAEP, ALG_RSA_PKCS1, ALG_ECDSA_SHA, ALG_ECDSA_SHA_224, ALG_ECDSA_SHA_256, ALG_ECDSA_SHA_384, ALG_ECDSA_SHA_512, ALG_AES_BLOCK_128_CBC_NOPAD, ALG_AES_CBC_ISO9797_M1, ALG_AES_CBC_ISO9797_M2, ALG_AES_CBC_PKCS5, ALG_AES_BLOCK_128_ECB_NOPAD, ALG_AES_ECB_ISO9797_M1, ALG_AES_ECB_ISO9797_M2, ALG_AES_ECB_PKCS5, ALG_AES_CTR, ALG_AES_CCM, ALG_AES_GCM, ALG_AES_MAC_128_NOPAD, ALG_AES_CMAC_128, ALG_AES_MAC_192_NOPAD, ALG_AES_MAC_256_NOPAD, ALG_HMAC_SHA1, ALG_HMAC_SHA_256, ALG_HMAC_SHA_384, ALG_HMAC_SHA_512, ALG_EC_FP, ALG_EC_SVDP_DH_KDF, ALG_EC_SVDP_DH_PLAIN_XY, ALG_EC_SVDP_DHC_PLAIN, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC_KDF, ALG_SHA_224, ALG_SHA_256, ALG_SHA_384, ALG_SHA_512, ALG_SHA3_224, ALG_SHA3_256, ALG_SHA3_384, ALG_SHA3_512, ALG_ISO3309_CRC16, ALG_ISO3309_CRC32, SIG_CIPHER_DES_MAC4, SIG_CIPHER_DES_MAC8, SIG_CIPHER_AES_MAC128, SIG_CIPHER_AES_CMAC128, SIG_CIPHER_RSA, SIG_CIPHER_ECDSA, SIG_CIPHER_ECDSA_PLAIN, SIG_CIPHER_HMAC, CIPHER_AES_CCM, CIPHER_AES_GCM, PAD_PKCS1_OAEP, PAD_PKCS1_OAEP_SHA256, PAD_PKCS1_OAEP_SHA3_256, PAD_PKCS1_OAEP_SHA3_512, PAD_PKCS1_OAEP_SHA512, TYPE_ACCESS, TYPE_EC_FP_PRIVATE, TYPE_EC_FP_PRIVATE_TRANSIENT_RESET, TYPE_HMAC_TRANSIENT_RESET, TYPE_HMAC, LENGTH_EC_FP_160, LENGTH_EC_FP_192, LENGTH_EC_FP_224, LENGTH_EC_FP_256, LENGTH_EC_FP_384, LENGTH_EC_FP_521, LENGTH_HMAC_SHA_1_BLOCK_64, LENGTH_HMAC_SHA_256_BLOCK_64, LENGTH_HMAC_SHA_384_BLOCK_64, LENGTH_HMAC_SHA_384_BLOCK_128, LENGTH_HMAC_SHA_512_BLOCK_64, LENGTH_HMAC_SHA_512_BLOCK_128, LENGTH_RSA_1024, LENGTH_RSA_1536, LENGTH_RSA_1984, LENGTH_RSA_3072, LENGTH_SHA, LENGTH_AES_128, LENGTH_SHA_224, LENGTH_SHA_384, LENGTH_SHA3_224, LENGTH_SHA3_384, BRAINPOOLP192R1, BRAINPOOLP224R1, BRAINPOOLP256R1, BRAINPOOLP320R1, BRAINPOOLP384R1, BRAINPOOLP512R1, BRAINPOOLP256T1, BRAINPOOLP320T1, BRAINPOOLP384T1, BRAINPOOLP512T1, SECP192R1, SECP256R1, SECP521R1, SECP384R1Trusted Execution Environments
SEVendor
STMicroelectronics, ThalesSecurity level
EAL4+, EAL4, EAL6+, EAL4 augmentedClaims
D.ISD_KEYS, D.APP_KEYS, D.APSD_KEYS, D.CASD_KEYS, D.GP_REGISTRY, D.GP_CODE, D.TOE_IDENTIFIER, D.CLFDB-DK, D.GS-PARAMETERS, D.CVM_PIN, D.CVM_MGMT_STATE, D.TOKEN-, D.RECEIPT-, D.CONFIRMATION-, D.DAP_BLOCK, D.APSD_DAP_KEYS, D.CASD_DAP_KEYS, D.CCCM_KEYS, D.CTL_REGISTRY, D.CTL_PRO, D.OLD_ELF, D.NEW_ELF, D.ELF_AID, D.ELF_SESSION_ST, D.ELF_APP_INS, D.ELF_RG_DATA, D.OS-, D.OS-UPDATE_DEC-, D.OS-UPDATE-CODE-, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.RECEIPT-GENERATION-KEY, D.CONFIRMATION-DATA, D.TOKEN-VERIFICATION-KEY, D.OS-UPDATE_ADDITIONALCODE, D.OS-UPDATE_SGNVER-KEY, D.OS, D.OS-UPDATE-CODE-ID, D.OS-UPDATE_DEC-KEY, O.KEY-MNGT, O.CARD-, O.DOMAIN-RIGHTS, O.APPLI-AUTH, O.SECURITY-, O.COMM-AUTH, O.COMM-INTEGRITY, O.COMM-, O.NO-KEY-REUSE, O.PRIVILEGES-, O.LC-MANAGEMENT, O.CLFDB-DECIPHER, O.GLOBAL-CVM, O.CVM-BLOCK, O.CVM-MGMT, O.RECEIPT, O.TOKEN, O.CCCM, O.CTL_REGISTRY, O.CTL_SC, O.CRS_PRIVILEGES, O.CRS_COUNTERS, O.ELF_AUTHORISED, O.ELF_INTEGRITY, O.ELF_APP_DATA, O.ELF_SESSION, O.ELF_DELE_IRR, O.ELF_DATA_PRO, O.SECURE_LOAD_AC, O.SECURE_AC_ACTIV, O.TOE_IDENTIFICATI, O.CONFID-OS-, O.SID, O.FIREWALL, O.GLOBAL_ARRAY, O.ARRAY_VIEWS_, O.ARRAY_VIEWS_I, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.SENSITIVE_ARR, O.SENSITIVE_RES, O.MTC-CTR-MNGT, O.CRT-MNGT, O.CARD-MANAGEMENT, O.COMM-CONFIDENTIALITY, O.PRIVILEGES-MANAGEMENT, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, O.GLOBAL_ARRAYS_CONFID, O.ARRAY_VIEWS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEWS_INTEG, O.MTC-CTR-, O.SENSITIVE_ARRAYS_INTEG, O.SENSITIVE_RESULTS_INTEG, O.SECURITY-DOMAINS, O.RND, O.TOE-, O.PIN-, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.JAVAOB, O.JAVAO, O.CODE_, O.JAVAOBJE, O.CODE_PKG, T.UNAUTHORISED-, T.LIFE-CYCLE, T.COM-EXPLOIT, T.BRUTE-FORCE-SCP, T.CLFDB-DISC, T.CVM-IMPERSONATE, T.CVM-UPDATE, T.BRUTE-FORCE-CVM, T.RECEIPT, T.TOKEN, T.CTL-REGISTRY-, T.COUNTERS-FREEZE, T.CTL-AUTH-FORGE, T.CRS-BYPASS, T.ELF-UNAUTHORISED, T.ELF-VERSION, T.ELF-DATA-ACCESS, T.ELF-DATA-INTEGRITY, T.ELF-SESSION, T.ELF-ILL-COMMAND, T.ELF-RES-DATA, T.UNAUTHORISED-TOE-, T.FAKE-SGNVER-KEY, T.WRONG-UPDATE-, T.INTEG-OS-UPDATE-, T.CONFID-OS-UPDATE-, T.CONFID-APPLI-, T.CONFID-JCS-, T.INTEG-APPLI-, T.INTEG-JCS-, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.UNAUTHORISED-CARD-MGMT, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.RND, T.CONFID-APPLI-DATA, T.INTEG-APPLI-DATA, T.CTL-REGISTRY-OVERWRITE, T.UNAUTHORISED-TOE-CODE-, T.WRONG-UPDATE-STATE, T.INTEG-OS-UPDATE-LOAD, T.CONFID-OS-UPDATE-LOAD, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.UNAUTHORISED-TOE-CODE-UPDATE, A.ISSUER, A.ADMIN, A.APPS-PROVIDER, A.VERIFICATION-, A.KEY-ESCROW, A.PERSONALISER, A.CONTROLLING-, A.PRODUCTION, A.SCP-SUPP, A.KEYS-PROT, A.OS-UPDATE-, A.SECURE_ACODE_, A.CAP_FILE, A.VERIFICA, A.VERIFICATION-AUTHORITY, A.CONTROLLING-AUTHORITY, A.OS-UPDATE-EVIDENCE, A.SECURE_ACODE_MANAGEMENT, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_ALOAD, OP.ARRAY_T_ASTORE, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUTFIELD, OP.PUTSTATIC, OP.PUT, OE.SCP, OE.OS-UPDATE-ENCRYPTION, OE.ISSUER, OE.ADMIN, OE.APPS-PROVIDER, OE.VERIFICATION-, OE.KEY-ESCROW, OE.PERSONALISER, OE.CONTROLLING-, OE.SCP-SUPP, OE.KEYS-PROT, OE.PRODUCTION, OE.APPLICATIONS, OE.AID-MANAGEMENT, OE.LOADING, OE.SERVERS, OE.AP-KEYS, OE.ISD-KEYS, OE.KEY-GENERATION, OE.CA-KEYS, OE.KEY-CHANGE, OE.CLFDB-ENC-PR, OE.TOKEN-GEN, OE.RECEIPT-VER, OE.DAP_BLOCK_GEN, OE.OS-UPDATE-EVIDENCE, OE.OS-UPDATE-, OE.SECURE_ACODE_MANA, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-, OE.CODE-EVIDENCE, OE.VERIFICATION-AUTHORITY, OE.CONTROLLING-AUTHORITY, OE.SECURE_ACODE_MANAGEMENT, OSP.AID-MANAGEMENT, OSP.LOADING, OSP.SERVERS, OSP.APSD-KEYS, OSP.ISD-KEYS, OSP.KEY-GENERATION, OSP.CASD-KEYS, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.APPLICATIONS, OSP.CLFDB-ENC-PR, OSP.TOKEN-GEN, OSP.RECEIPT-VER, OSP.DAP_BLOCK_GEN, OSP.CCCM, OSP.ELF_DELE_OP, OSP.ATOMIC_ACTIVATION, OSP.TOE_IDENTIFICATION, OSP.ADDITIONAL_CODE_SIG, OSP.ADDITIONAL_CODE_EN, OSP.VERIFICATION, OSP.ADDITIONAL_CODE_SIGNING, OSP.ADDITIONAL_CODE_ENCRYPTIONSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FAU_SAR, FAU_SAS, FCO_NRO, FCO_NRO.2, FCO_NRR, FCO_NRR.1, FCS_RNG.1, FCS_CKM.5, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.5.1, FCS_COP, FCS_CKM.4.1, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_ITC, FDP_ITC.2, FDP_UIT, FDP_UIT.1, FDP_ROL, FDP_ROL.1, FDP_UCT, FDP_UCT.1, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACC.2, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_SDI, FDP_SDI.2, FDP_SDI.2.2, FDP_ITC.1, FDP_SDC.1, FDP_ITT.1, FIA_UID, FIA_UID.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_API.1, FMT_MTD, FMT_MTD.1, FMT_MSA, FMT_MSA.1, FMT_SMR, FMT_MSA.3, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD.3, FMT_MSA.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_RCV, FPT_RCV.3, FPT_FLS, FPT_FLS.1, FPT_TDC, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.4, FPT_STM, FPT_STM.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_TRP, FTP_TRP.1, FTP_ITC, FTP_ITC.1Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014Certificates
CC-1, CC-2, CC-3, NSCIB-CC-2300182-01Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, physical tampering, malfunction, Malfunction, JILCertification process
out of scope, GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1, of software patches (GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1. ▪ Integrated mapping (DH and ECDH). ▪ Generic mapping (DH) ▪ PACE and mEAC, protection of the confidentiality and integrity of user data, and for entity authentication. CSP is out of scope of the TOE. CSP provides service, including: Connected eSE 5.3.4 Platform Security Target Lite ©, 3.4 Platform Security Target Lite © Copyright Thales DIS France SAS - 2024 Page: 62 / 169 point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT areStandards
FIPS PUB 180-4, FIPS PUB 186-4, FIPS 197, FIPS PUB 197, FIPS 198, FIPS 180, FIPS 197126, FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 186-4184, FIPS 180-4, FIPS 202, PKCS#1, PKCS #1, PKCS#5157, PKCS#5161, PKCS#5, AIS20, AIS31, RFC2104, RFC 5758, RFC3610165, RFC2409174, RFC2409, RFC 5246, RFC 5869, ISO/IEC 10116, ISO/IEC 14888-2, ISO/IEC 18033-3, ISO/IEC 9797-1, ISO/IEC 9797-2, ISO/IEC 18032, ISO/IEC 9796-2, ISO/IEC 3309206, ICAO, X.509, SCP11, SCP02, SCP80, SCP81, SCP03, SCP10, SCP22, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20240801152433+02'00' |
---|---|
Modification date | D:20240801152433+02'00' |
Pages | 169 |
Creator | Microsoft® Word for Microsoft 365 |
Producer | Microsoft® Word for Microsoft 365 |
References
Outgoing- NSCIB-CC-2300182-01-CR - active - STMicroelectronics ST54L A02
Heuristics ?
Certificate ID: ANSSI-CC-2024/33
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.5Similar certificates
Showing 5 out of 47.
Scheme data ?
Product | Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/connected-ese-534-platform-v11-revision-10 | |
Description | Le produit évalué est « Connected eSE 5.3.4 Platform v1.1, Revision 1.0 » développé par THALES DIS. Ce produit est destiné à être utilisé dans le marché de l’électronique mobile grand public. | |
Sponsor | THALES DIS | |
Developer | THALES DIS | |
Cert Id | ANSSI-CC-2024/33 | |
Level | EAL4+ | |
Expiration Date | 06.12.2029 | |
Enhanced | ||
Cert Id | ANSSI-CC-2024/33 | |
Certification Date | 06.12.2024 | |
Expiration Date | 06.12.2029 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | THALES DIS | |
Sponsor | THALES DIS | |
Evaluation Facility | SERMA SAFETY & SECURITY | |
Level | EAL4+ | |
Protection Profile | GlobalPlatform Technology - Secure Element Protection Profile version 1.0 Certifié 2020-37-INF-3429- v1 le 18 mars 2021 | |
Mutual Recognition | CCRA SOG-IS | |
Augmented | ALC_DVS.2, ALC_FLR.1 et AVA_VAN.5 | |
Report Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_33fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_33en.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_33fr.pdf |
References ?
Updates ?
-
23.12.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_33fr.pdf",
"dgst": "4d52b7d551235f92",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2024/33",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.3.4",
"1.1",
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300182-01-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300182-01-CR"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2024/33",
"description": "Le produit \u00e9valu\u00e9 est \u00ab Connected eSE 5.3.4 Platform v1.1, Revision 1.0 \u00bb d\u00e9velopp\u00e9 par THALES DIS. Ce produit est destin\u00e9 \u00e0 \u00eatre utilis\u00e9 dans le march\u00e9 de l\u2019\u00e9lectronique mobile grand public.",
"developer": "THALES DIS",
"enhanced": {
"augmented": "ALC_DVS.2, ALC_FLR.1 et AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2024/33",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_33fr.pdf",
"certification_date": "2024-12-06",
"developer": "THALES DIS",
"evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
"expiration_date": "2029-12-06",
"level": "EAL4+",
"mutual_recognition": "CCRA SOG-IS",
"protection_profile": "GlobalPlatform Technology - Secure Element Protection Profile version 1.0 Certifi\u00e9 2020-37-INF-3429- v1 le 18 mars 2021",
"report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_33fr.pdf",
"sponsor": "THALES DIS",
"target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_33en.pdf"
},
"expiration_date": "2029-12-06",
"level": "EAL4+",
"product": "Connected eSE 5.3.4 Platform v1.1 (Revision 1.0)",
"sponsor": "THALES DIS",
"url": "https://cyber.gouv.fr/produits-certifies/connected-ese-534-platform-v11-revision-10"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300182-01-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300182-01-CR"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Thales",
"manufacturer_web": null,
"name": "Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33)",
"not_valid_after": "2029-12-06",
"not_valid_before": "2024-12-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certificat-CC-2024_33fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2020-37-INF-3429- v1": 1
},
"FR": {
"ANSSI-CC-2024/33": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR.1": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Safety \u0026 Security": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Thales": {
"Thales": 2
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20241210105125+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20241210105204+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 169655,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2024_33fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2020-37-INF-3429- v1": 2
},
"FR": {
"ANSSI-CC-2024/33": 2
},
"NL": {
"NSCIB-CC-2300182-01-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 2
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL4": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"Serma": {
"SERMA": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS20": 2
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Thales": {
"Thales": 7
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20241210104855+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20241210105205+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 353663,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.sogis.eu/",
"http://www.ssi.gouv.fr/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "ANSSI-cible-CC-2024_33en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 11
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 9
}
},
"FF": {
"DH": {
"DH": 4,
"Diffie-Hellman": 4
}
},
"RSA": {
"RSA 1024": 19
}
},
"cc_cert_id": {
"NL": {
"CC-1": 2,
"CC-2": 3,
"CC-3": 3,
"NSCIB-CC-2300182-01": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.APPS-PROVIDER": 3,
"A.CAP_FILE": 4,
"A.CONTROLLING-": 1,
"A.CONTROLLING-AUTHORITY": 2,
"A.ISSUER": 3,
"A.KEY-ESCROW": 3,
"A.KEYS-PROT": 3,
"A.OS-UPDATE-": 1,
"A.OS-UPDATE-EVIDENCE": 2,
"A.PERSONALISER": 3,
"A.PRODUCTION": 4,
"A.SCP-SUPP": 3,
"A.SECURE_ACODE_": 1,
"A.SECURE_ACODE_MANAGEMENT": 2,
"A.VERIFICA": 1,
"A.VERIFICATION": 2,
"A.VERIFICATION-": 1,
"A.VERIFICATION-AUTHORITY": 2
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 7,
"D.APP_C_DATA": 5,
"D.APP_I_DATA": 9,
"D.APP_KEYS": 9,
"D.APSD_DAP_KEYS": 1,
"D.APSD_KEYS": 3,
"D.CASD_DAP_KEYS": 1,
"D.CASD_KEYS": 1,
"D.CCCM_KEYS": 1,
"D.CLFDB-DK": 1,
"D.CONFIRMATION-": 1,
"D.CONFIRMATION-DATA": 1,
"D.CRYPTO": 4,
"D.CTL_PRO": 5,
"D.CTL_REGISTRY": 5,
"D.CVM_MGMT_STATE": 3,
"D.CVM_PIN": 3,
"D.DAP_BLOCK": 1,
"D.ELF_AID": 3,
"D.ELF_APP_INS": 3,
"D.ELF_RG_DATA": 1,
"D.ELF_SESSION_ST": 2,
"D.GP_CODE": 1,
"D.GP_REGISTRY": 6,
"D.GS-PARAMETERS": 1,
"D.ISD_KEYS": 3,
"D.JCS_CODE": 6,
"D.JCS_DATA": 10,
"D.NEW_ELF": 3,
"D.OLD_ELF": 3,
"D.OS": 1,
"D.OS-": 3,
"D.OS-UPDATE-CODE-": 1,
"D.OS-UPDATE-CODE-ID": 1,
"D.OS-UPDATE_ADDITIONALCODE": 3,
"D.OS-UPDATE_DEC-": 1,
"D.OS-UPDATE_DEC-KEY": 1,
"D.OS-UPDATE_SGNVER-KEY": 1,
"D.PIN": 6,
"D.RECEIPT-": 1,
"D.RECEIPT-GENERATION-KEY": 1,
"D.SEC_DATA": 8,
"D.TOE_IDENTIFIER": 1,
"D.TOKEN-": 1,
"D.TOKEN-VERIFICATION-KEY": 1
},
"O": {
"O.ALARM": 16,
"O.APPLET": 16,
"O.APPLI-AUTH": 5,
"O.ARRAY_VIEWS_": 1,
"O.ARRAY_VIEWS_CONFID": 4,
"O.ARRAY_VIEWS_I": 1,
"O.ARRAY_VIEWS_INTEG": 4,
"O.CARD-": 11,
"O.CARD-MANAGEMENT": 22,
"O.CCCM": 9,
"O.CIPHER": 9,
"O.CLFDB-DECIPHER": 5,
"O.CODE_": 1,
"O.CODE_CAP_FILE": 12,
"O.CODE_PKG": 1,
"O.COMM-": 1,
"O.COMM-AUTH": 10,
"O.COMM-CONFIDENTIALITY": 7,
"O.COMM-INTEGRITY": 10,
"O.CONFID-OS-": 1,
"O.CONFID-OS-UPDATE": 6,
"O.CRS_COUNTERS": 5,
"O.CRS_PRIVILEGES": 5,
"O.CRT-MNGT": 5,
"O.CTL_REGISTRY": 5,
"O.CTL_SC": 5,
"O.CVM-BLOCK": 9,
"O.CVM-MGMT": 9,
"O.DELETION": 5,
"O.DOMAIN-RIGHTS": 9,
"O.ELF_APP_DATA": 7,
"O.ELF_AUTHORISED": 5,
"O.ELF_DATA_PRO": 5,
"O.ELF_DELE_IRR": 5,
"O.ELF_INTEGRITY": 5,
"O.ELF_SESSION": 7,
"O.FIREWALL": 19,
"O.GLOBAL-CVM": 5,
"O.GLOBAL_ARRAY": 2,
"O.GLOBAL_ARRAYS_CONFID": 6,
"O.GLOBAL_ARRAYS_INTEG": 6,
"O.INSTALL": 11,
"O.JAVAO": 1,
"O.JAVAOB": 4,
"O.JAVAOBJE": 1,
"O.JAVAOBJECT": 42,
"O.KEY-MNGT": 9,
"O.LC-MANAGEMENT": 6,
"O.LOAD": 11,
"O.MTC-CTR-": 1,
"O.MTC-CTR-MNGT": 4,
"O.NATIVE": 11,
"O.NO-KEY-REUSE": 5,
"O.OBJ-DELETION": 5,
"O.OPERATE": 23,
"O.PIN-": 1,
"O.PIN-MNGT": 7,
"O.PRIVILEGES-": 1,
"O.PRIVILEGES-MANAGEMENT": 4,
"O.REALLOCATION": 7,
"O.RECEIPT": 5,
"O.RESOURCES": 7,
"O.RND": 1,
"O.RNG": 8,
"O.SCP": 45,
"O.SECURE_AC_ACTIV": 1,
"O.SECURE_AC_ACTIVATION": 6,
"O.SECURE_LOAD_AC": 1,
"O.SECURE_LOAD_ACODE": 10,
"O.SECURITY-": 2,
"O.SECURITY-DOMAINS": 3,
"O.SENSITIVE_ARR": 1,
"O.SENSITIVE_ARRAYS_INTEG": 4,
"O.SENSITIVE_RES": 1,
"O.SENSITIVE_RESULTS_INTEG": 4,
"O.SID": 15,
"O.TOE-": 1,
"O.TOE_IDENTIFICATI": 1,
"O.TOE_IDENTIFICATION": 6,
"O.TOKEN": 5,
"O.TRANSACTION": 7
},
"OE": {
"OE.ADMIN": 3,
"OE.AID-MANAGEMENT": 3,
"OE.AP-KEYS": 3,
"OE.APPLICATIONS": 3,
"OE.APPS-PROVIDER": 3,
"OE.CA-KEYS": 3,
"OE.CAP_FILE": 6,
"OE.CLFDB-ENC-PR": 3,
"OE.CODE-": 5,
"OE.CODE-EVIDENCE": 12,
"OE.CONTROLLING-": 1,
"OE.CONTROLLING-AUTHORITY": 2,
"OE.DAP_BLOCK_GEN": 3,
"OE.ISD-KEYS": 3,
"OE.ISSUER": 3,
"OE.KEY-CHANGE": 3,
"OE.KEY-ESCROW": 3,
"OE.KEY-GENERATION": 3,
"OE.KEYS-PROT": 3,
"OE.LOADING": 3,
"OE.OS-UPDATE-": 1,
"OE.OS-UPDATE-ENCRYPTION": 4,
"OE.OS-UPDATE-EVIDENCE": 3,
"OE.PERSONALISER": 3,
"OE.PRODUCTION": 4,
"OE.RECEIPT-VER": 3,
"OE.SCP": 3,
"OE.SCP-SUPP": 3,
"OE.SECURE_ACODE_MANA": 1,
"OE.SECURE_ACODE_MANAGEMENT": 2,
"OE.SERVERS": 3,
"OE.TOKEN-GEN": 3,
"OE.VERIFICATION": 35,
"OE.VERIFICATION-": 1,
"OE.VERIFICATION-AUTHORITY": 2
},
"OP": {
"OP.ARRAY_AASTORE": 3,
"OP.ARRAY_ACCESS": 4,
"OP.ARRAY_LENGTH": 4,
"OP.ARRAY_T_ALOAD": 3,
"OP.ARRAY_T_ASTORE": 3,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_CAP_FILE": 3,
"OP.DELETE_CAP_FILE_APPLET": 3,
"OP.INSTANCE_FIELD": 3,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.PUT": 5,
"OP.PUTFIELD": 1,
"OP.PUTSTATIC": 1,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.ADDITIONAL_CODE_EN": 1,
"OSP.ADDITIONAL_CODE_ENCRYPTION": 2,
"OSP.ADDITIONAL_CODE_SIG": 1,
"OSP.ADDITIONAL_CODE_SIGNING": 2,
"OSP.AID-MANAGEMENT": 3,
"OSP.APPLICATIONS": 3,
"OSP.APSD-KEYS": 3,
"OSP.ATOMIC_ACTIVATION": 3,
"OSP.CASD-KEYS": 3,
"OSP.CCCM": 3,
"OSP.CLFDB-ENC-PR": 3,
"OSP.DAP_BLOCK_GEN": 3,
"OSP.ELF_DELE_OP": 3,
"OSP.ISD-KEYS": 3,
"OSP.KEY-CHANGE": 3,
"OSP.KEY-GENERATION": 3,
"OSP.LOADING": 3,
"OSP.RECEIPT-VER": 3,
"OSP.SECURITY-DOMAINS": 3,
"OSP.SERVERS": 3,
"OSP.TOE_IDENTIFICATION": 3,
"OSP.TOKEN-GEN": 3,
"OSP.VERIFICATION": 3
},
"R": {
"R.JAVA": 12
},
"T": {
"T.BRUTE-FORCE-CVM": 3,
"T.BRUTE-FORCE-SCP": 3,
"T.CLFDB-DISC": 3,
"T.COM-EXPLOIT": 4,
"T.CONFID-APPLI-": 1,
"T.CONFID-APPLI-DATA": 3,
"T.CONFID-JCS-": 2,
"T.CONFID-JCS-CODE": 2,
"T.CONFID-JCS-DATA": 2,
"T.CONFID-OS-UPDATE-": 1,
"T.CONFID-OS-UPDATE-LOAD": 2,
"T.COUNTERS-FREEZE": 3,
"T.CRS-BYPASS": 3,
"T.CTL-AUTH-FORGE": 3,
"T.CTL-REGISTRY-": 1,
"T.CTL-REGISTRY-OVERWRITE": 2,
"T.CVM-IMPERSONATE": 3,
"T.CVM-UPDATE": 3,
"T.DELETION": 4,
"T.ELF-DATA-ACCESS": 3,
"T.ELF-DATA-INTEGRITY": 3,
"T.ELF-ILL-COMMAND": 3,
"T.ELF-RES-DATA": 3,
"T.ELF-SESSION": 3,
"T.ELF-UNAUTHORISED": 3,
"T.ELF-VERSION": 3,
"T.EXE-CODE": 7,
"T.FAKE-SGNVER-KEY": 3,
"T.INSTALL": 4,
"T.INTEG-APPLI-": 4,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 5,
"T.INTEG-JCS-": 1,
"T.INTEG-JCS-CODE": 2,
"T.INTEG-JCS-DATA": 3,
"T.INTEG-OS-UPDATE-": 1,
"T.INTEG-OS-UPDATE-LOAD": 2,
"T.LIFE-CYCLE": 4,
"T.NATIVE": 3,
"T.OBJ-DELETION": 3,
"T.PHYSICAL": 9,
"T.RECEIPT": 3,
"T.RESOURCES": 3,
"T.RND": 1,
"T.SID": 8,
"T.TOKEN": 3,
"T.UNAUTHORISED-": 1,
"T.UNAUTHORISED-CARD-MGMT": 4,
"T.UNAUTHORISED-TOE-": 1,
"T.UNAUTHORISED-TOE-CODE-": 1,
"T.UNAUTHORISED-TOE-CODE-UPDATE": 1,
"T.WRONG-UPDATE-": 1,
"T.WRONG-UPDATE-STATE": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0099-V2-2020": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_IMP.1": 4,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 4
},
"AGD": {
"AGD_OPE.1": 9,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR.1": 4,
"ALC_FLR.2": 1,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 4,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 1,
"ASE_SPD.1": 3,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 5
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 4,
"EAL4 augmented": 2,
"EAL4+": 2,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 15,
"FAU_ARP.1.1": 2,
"FAU_GEN": 1,
"FAU_SAA.1": 3,
"FAU_SAR": 2,
"FAU_SAS": 1,
"FAU_SAS.1": 1
},
"FCO": {
"FCO_NRO": 28,
"FCO_NRO.2": 9,
"FCO_NRR": 5,
"FCO_NRR.1": 3
},
"FCS": {
"FCS_CKM": 71,
"FCS_CKM.1": 31,
"FCS_CKM.2": 9,
"FCS_CKM.4": 65,
"FCS_CKM.4.1": 1,
"FCS_CKM.5": 7,
"FCS_CKM.5.1": 1,
"FCS_COP": 161,
"FCS_COP.1": 31,
"FCS_RNG": 1,
"FCS_RNG.1": 11,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 66,
"FDP_ACC.1": 27,
"FDP_ACC.2": 5,
"FDP_ACF": 58,
"FDP_ACF.1": 38,
"FDP_IFC": 67,
"FDP_IFC.1": 23,
"FDP_IFC.2": 6,
"FDP_IFF": 53,
"FDP_IFF.1": 27,
"FDP_ITC": 32,
"FDP_ITC.1": 23,
"FDP_ITC.2": 33,
"FDP_ITT.1": 1,
"FDP_RIP": 127,
"FDP_RIP.1": 9,
"FDP_ROL": 32,
"FDP_ROL.1": 11,
"FDP_SDC.1": 1,
"FDP_SDI": 25,
"FDP_SDI.2": 10,
"FDP_SDI.2.2": 1,
"FDP_UCT": 6,
"FDP_UCT.1": 1,
"FDP_UIT": 9,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 11,
"FIA_AFL.1": 8,
"FIA_API.1": 1,
"FIA_ATD": 13,
"FIA_ATD.1": 3,
"FIA_UAU": 27,
"FIA_UAU.1": 4,
"FIA_UAU.4": 1,
"FIA_UID": 34,
"FIA_UID.1": 14,
"FIA_UID.2": 1,
"FIA_USB": 7,
"FIA_USB.1": 3
},
"FMT": {
"FMT_LIM": 6,
"FMT_MSA": 189,
"FMT_MSA.1": 19,
"FMT_MSA.2": 2,
"FMT_MSA.3": 30,
"FMT_MTD": 38,
"FMT_MTD.1": 5,
"FMT_MTD.3": 2,
"FMT_SMF": 78,
"FMT_SMF.1": 28,
"FMT_SMF.1.1": 1,
"FMT_SMR": 82,
"FMT_SMR.1": 43,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO": 12,
"FPR_UNO.1": 14,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 58,
"FPT_FLS.1": 7,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_RCV": 24,
"FPT_RCV.3": 10,
"FPT_RCV.4": 1,
"FPT_STM": 3,
"FPT_STM.1": 5,
"FPT_TDC": 9,
"FPT_TDC.1": 9,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 34,
"FTP_ITC.1": 13,
"FTP_TRP": 10,
"FTP_TRP.1": 11
}
},
"certification_process": {
"OutOfScope": {
"3.4 Platform Security Target Lite \u00a9 Copyright Thales DIS France SAS - 2024 Page: 62 / 169 point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
"GemActivate). The platform implements the following modes, but they are out of scope of the TOE: \u25aa mEAC v1": 1,
"of software patches (GemActivate). The platform implements the following modes, but they are out of scope of the TOE: \u25aa mEAC v1. \u25aa Integrated mapping (DH and ECDH). \u25aa Generic mapping (DH) \u25aa PACE and mEAC": 1,
"out of scope": 3,
"protection of the confidentiality and integrity of user data, and for entity authentication. CSP is out of scope of the TOE. CSP provides service, including: Connected eSE 5.3.4 Platform Security Target Lite \u00a9": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 32
},
"CCM": {
"CCM": 13
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 8
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
},
"PGP": {
"PGP": 1
},
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 8,
"Key agreement": 5
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 18
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4,
"SHA1": 7
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 5,
"SHA-384": 5,
"SHA-512": 4,
"SHA224": 3,
"SHA256": 4,
"SHA384": 4,
"SHA512": 4
},
"SHA3": {
"SHA3-224": 1,
"SHA3-256": 1,
"SHA3-384": 1,
"SHA3-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"ALG": {
"AES": {
"ALG_AES_BLOCK_128_CBC_NOPAD": 2,
"ALG_AES_BLOCK_128_ECB_NOPAD": 2,
"ALG_AES_CBC_ISO9797_M1": 2,
"ALG_AES_CBC_ISO9797_M2": 2,
"ALG_AES_CBC_PKCS5": 2,
"ALG_AES_CCM": 2,
"ALG_AES_CMAC_128": 4,
"ALG_AES_CTR": 2,
"ALG_AES_ECB_ISO9797_M1": 2,
"ALG_AES_ECB_ISO9797_M2": 2,
"ALG_AES_ECB_PKCS5": 2,
"ALG_AES_GCM": 2,
"ALG_AES_MAC_128_NOPAD": 2,
"ALG_AES_MAC_192_NOPAD": 1,
"ALG_AES_MAC_256_NOPAD": 1
},
"DES": {
"ALG_DES_CBC_ISO9797_M1": 2,
"ALG_DES_CBC_ISO9797_M2": 2,
"ALG_DES_CBC_NOPAD": 2,
"ALG_DES_CBC_PKCS5": 2,
"ALG_DES_ECB_ISO9797_M1": 2,
"ALG_DES_ECB_ISO9797_M2": 2,
"ALG_DES_ECB_NOPAD": 2,
"ALG_DES_ECB_PKCS5": 2,
"ALG_DES_MAC4_ISO9797_1_M1_ALG3": 2,
"ALG_DES_MAC4_ISO9797_1_M2_ALG3": 2,
"ALG_DES_MAC4_ISO9797_M1": 2,
"ALG_DES_MAC4_ISO9797_M2": 2,
"ALG_DES_MAC4_NOPAD": 2,
"ALG_DES_MAC4_PKCS5": 2,
"ALG_DES_MAC8_ISO9797_1_M1_ALG3": 2,
"ALG_DES_MAC8_ISO9797_1_M2_ALG3": 2,
"ALG_DES_MAC8_ISO9797_M1": 2,
"ALG_DES_MAC8_ISO9797_M2": 2,
"ALG_DES_MAC8_NOPAD": 2,
"ALG_DES_MAC8_PKCS5": 2
},
"EC": {
"ALG_EC_FP": 6,
"ALG_EC_SVDP_DHC_KDF": 1,
"ALG_EC_SVDP_DHC_PLAIN": 2,
"ALG_EC_SVDP_DH_KDF": 2,
"ALG_EC_SVDP_DH_PLAIN": 1,
"ALG_EC_SVDP_DH_PLAIN_XY": 2
},
"ECDSA": {
"ALG_ECDSA_SHA": 2,
"ALG_ECDSA_SHA_224": 2,
"ALG_ECDSA_SHA_256": 2,
"ALG_ECDSA_SHA_384": 2,
"ALG_ECDSA_SHA_512": 2
},
"HMAC": {
"ALG_HMAC_SHA1": 8,
"ALG_HMAC_SHA_256": 8,
"ALG_HMAC_SHA_384": 2,
"ALG_HMAC_SHA_512": 2
},
"ISO3309": {
"ALG_ISO3309_CRC16": 2,
"ALG_ISO3309_CRC32": 2
},
"RSA": {
"ALG_RSA_NOPAD": 2,
"ALG_RSA_PKCS1": 1,
"ALG_RSA_PKCS1_OAEP": 2,
"ALG_RSA_SHA_224_PKCS1": 2,
"ALG_RSA_SHA_224_PKCS1_PSS": 2,
"ALG_RSA_SHA_256_PKCS1": 2,
"ALG_RSA_SHA_256_PKCS1_PSS": 2,
"ALG_RSA_SHA_384_PKCS1": 2,
"ALG_RSA_SHA_384_PKCS1_PSS": 2,
"ALG_RSA_SHA_512_PKCS1": 2,
"ALG_RSA_SHA_512_PKCS1_PSS": 2,
"ALG_RSA_SHA_ISO9796": 2,
"ALG_RSA_SHA_ISO9796_MR": 2,
"ALG_RSA_SHA_PKCS1": 2,
"ALG_RSA_SHA_PKCS1_PSS": 2,
"ALG_RSA_SHA_RFC2409": 2
},
"SHA": {
"ALG_SHA_224": 4,
"ALG_SHA_256": 6,
"ALG_SHA_384": 4,
"ALG_SHA_512": 4
},
"SHA3": {
"ALG_SHA3_224": 4,
"ALG_SHA3_256": 4,
"ALG_SHA3_384": 4,
"ALG_SHA3_512": 4
}
},
"curves": {
"BRAINPOOLP192R1": 1,
"BRAINPOOLP224R1": 1,
"BRAINPOOLP256R1": 2,
"BRAINPOOLP256T1": 1,
"BRAINPOOLP320R1": 2,
"BRAINPOOLP320T1": 1,
"BRAINPOOLP384R1": 2,
"BRAINPOOLP384T1": 1,
"BRAINPOOLP512R1": 2,
"BRAINPOOLP512T1": 1,
"SECP192R1": 1,
"SECP256R1": 2,
"SECP384R1": 1,
"SECP521R1": 2
},
"misc": {
"CIPHER_AES_CCM": 2,
"CIPHER_AES_GCM": 2,
"LENGTH_AES_128": 2,
"LENGTH_EC_FP_160": 3,
"LENGTH_EC_FP_192": 2,
"LENGTH_EC_FP_224": 3,
"LENGTH_EC_FP_256": 2,
"LENGTH_EC_FP_384": 3,
"LENGTH_EC_FP_521": 2,
"LENGTH_HMAC_SHA_1_BLOCK_64": 1,
"LENGTH_HMAC_SHA_256_BLOCK_64": 1,
"LENGTH_HMAC_SHA_384_BLOCK_128": 1,
"LENGTH_HMAC_SHA_384_BLOCK_64": 1,
"LENGTH_HMAC_SHA_512_BLOCK_128": 1,
"LENGTH_HMAC_SHA_512_BLOCK_64": 1,
"LENGTH_RSA_1024": 1,
"LENGTH_RSA_1536": 1,
"LENGTH_RSA_1984": 1,
"LENGTH_RSA_3072": 1,
"LENGTH_SHA": 8,
"LENGTH_SHA3_224": 2,
"LENGTH_SHA3_384": 2,
"LENGTH_SHA_224": 2,
"LENGTH_SHA_384": 2,
"PAD_PKCS1_OAEP": 1,
"PAD_PKCS1_OAEP_SHA256": 1,
"PAD_PKCS1_OAEP_SHA3_256": 1,
"PAD_PKCS1_OAEP_SHA3_512": 1,
"PAD_PKCS1_OAEP_SHA512": 1,
"SIG_CIPHER_AES_CMAC128": 2,
"SIG_CIPHER_AES_MAC128": 2,
"SIG_CIPHER_DES_MAC4": 2,
"SIG_CIPHER_DES_MAC8": 2,
"SIG_CIPHER_ECDSA": 2,
"SIG_CIPHER_ECDSA_PLAIN": 2,
"SIG_CIPHER_HMAC": 2,
"SIG_CIPHER_RSA": 2,
"TYPE_ACCESS": 5,
"TYPE_EC_FP_PRIVATE": 6,
"TYPE_EC_FP_PRIVATE_TRANSIENT_RESET": 1,
"TYPE_HMAC": 6,
"TYPE_HMAC_TRANSIENT_RESET": 1
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 5,
"javacard.security": 8
},
"javacardx": {
"javacardx.crypto": 1,
"javacardx.framework.time": 1,
"javacardx.security": 3,
"javacardx.security.cert": 1,
"javacardx.security.util": 2
}
},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.3.1": 1
},
"JavaCard": {
"Java Card 3.1.0": 4
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 10
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 5,
"malfunction": 4,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 3,
"Physical Probing": 2,
"physical probing": 3,
"side channel": 1
},
"other": {
"JIL": 8
}
},
"standard_id": {
"BSI": {
"AIS20": 2,
"AIS31": 6
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 180": 1,
"FIPS 180-4": 5,
"FIPS 197": 4,
"FIPS 197126": 1,
"FIPS 198": 2,
"FIPS 202": 4,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 2,
"FIPS PUB 186-4184": 1,
"FIPS PUB 197": 3,
"FIPS PUB 46-3": 2,
"FIPS PUB 81": 2
},
"ICAO": {
"ICAO": 4
},
"ISO": {
"ISO/IEC 10116": 4,
"ISO/IEC 14888-2": 2,
"ISO/IEC 18032": 2,
"ISO/IEC 18033-3": 2,
"ISO/IEC 3309206": 2,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9797-1": 7,
"ISO/IEC 9797-2": 2
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 9,
"PKCS#5": 1,
"PKCS#5157": 1,
"PKCS#5161": 1
},
"RFC": {
"RFC 5246": 2,
"RFC 5758": 2,
"RFC 5869": 2,
"RFC2104": 2,
"RFC2409": 1,
"RFC2409174": 1,
"RFC3610165": 1
},
"SCP": {
"SCP02": 16,
"SCP03": 13,
"SCP10": 2,
"SCP11": 13,
"SCP22": 2,
"SCP80": 12,
"SCP81": 11
},
"X509": {
"X.509": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 40,
"AES128": 2
}
},
"DES": {
"3DES": {
"3DES": 11,
"TDES": 49
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CBC-MAC": 2,
"CMAC": 4,
"HMAC": 15,
"KMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 16
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_PSK_WITH_AES_128_CBC_S": 1,
"TLS_PSK_WITH_NULL_SHA": 1,
"TLS_PSK_WITH_NULL_SHA256": 1
}
},
"vendor": {
"STMicroelectronics": {
"STMicroelectronics": 20
},
"Thales": {
"Thales": 206
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20240801152433+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20240801152433+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"pdf_file_size_bytes": 2283923,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 169
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CCN-CC-PP-5-2021.pdf",
"pp_name": "Secure Element Protection Profile - GPC_SPE_174, version 1.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_33fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"ALC_FLR.1",
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_33en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5fabc1b43f7d0c994c933a51b51bac9871f05440dac72b4d214d64817af8ecfa",
"txt_hash": "2f1a283f721e8ded5392dae7d6ce144fcb305e82f5464007862e8d3fee513bb9"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "24712c50d1da104a10ae650d56e98251a2b819a611e3d44376eaf6d7d17abbc6",
"txt_hash": "ed5fde9141653a199a6ef02fcacf13ed936a783072bd7744ae7b29a9481ada0b"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e24e626c2d24c1fb1bf2c67ee523627cc8f27bc38b994e829f9835e974f72a54",
"txt_hash": "0057fc7ad892f6f88ad2215f14d200a7ea46bc72edcc75d097478b00ae1b90cb"
}
},
"status": "active"
}