MIFARE® DESFire® EV3 on ST31N600A02 (version 1.0.2) (ANSSI-CC-2024/25)

CSV information ?

Status active
Valid from 22.07.2024
Valid until 22.07.2029
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL5+, ASE_TSS.2, AVA_VAN.5, ALC_FLR.1
Protection profiles

Heuristics summary ?

Certificate ID: ANSSI-CC-2024/25

Certificate ?

Extracted keywords

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
ANSSI-CC-2024/25

File metadata

Creation date D:20240725101627+02'00'
Modification date D:20240725101744+02'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Security level
EAL5, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ALC_FLR, AVA_VAN.5, AVA_VAN, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014, BSI-PP-0084-2014
Certificates
ANSSI-CC-2024/25, ANSSI-CC-2022/21-R01
Evaluation facilities
CESTI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title ANSSI-CC-2024/25
Subject MIFARE® DESFire® EV3 on ST31N600A02
Keywords [ANSSI Crypto]
Author [email protected]
Creation date D:20240725101505+02'00'
Modification date D:20240725101509+02'00'
Pages 14
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES, TDEA, CMAC
Schemes
MAC
Randomness
TRNG, RND
Block cipher modes
CBC

Vendor
NXP, STMicroelectronics

Security level
EAL5, EAL6, EAL4, EAL5 augmented, EAL6 augmented
Claims
O.RND, O.MAC, O.LEAK-INHERENT, O.PHYS-PROBING, O.MALFUNCTION, O.PHYS-MANIPULATION, O.LEAK-FORCED, O.ABUSE-FUNC, O.IDENTIFICATION, O.ADD-FUNCTIONS, O.MEM-ACCESS, T.RND, OE.RESP-APPL, OE.PROCESS-SEC-IC, OE.LIM-BLOCK-LOADER, OE.LOADER-USAGE
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_ARC, ADV_FSP, ADV_IMP, AGD_OPE.1, AGD_PRE.1, AGD_OPE, ALC_DVS.2, ALC_FLR.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DVS, ALC_CMS, ALC_CMC, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_INT, ASE_CCL, ASE_ECD, ASE_SPD, ASE_OBJ, ASE_REQ, ASE_TSS, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAR.1, FAU_GEN.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FCS_RNG, FCS_RNG.1, FCS_COP, FCS_ITC.2, FCS_CKM.2, FDP_ETC.3, FDP_ACC.1, FDP_ACF.1, FDP_ITC.2, FDP_ROL.1, FDP_RIP.1, FDP_ETC, FDP_SDC, FDP_SDC.1, FDP_ETC.1, FDP_ETC.2, FDP_ETC.3.1, FDP_ETC.3.2, FDP_ETC.3.3, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.2, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_SMF.1, FDP_SMR.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.3, FIA_UAU.5, FIA_API, FIA_API.1, FIA_UID.1, FIA_UAU.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_MTD.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FPR_UNL.1, FPT_TDC.1, FPT_RPL.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_RSA.2, FRU_FLT.2, FTP_TRP.1, FTP_ITC.1, FTP_TRP.1.3
Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP- 0084-2014, BSI-CC-PP-0084-

Side-channel analysis
Leak-Inherent, Physical Probing, side-channel, Malfunction, malfunction, JIL
Certification process
out of scope, the evaluation, except MIFARE DESFire EV3. Proximity Check and Virtual Card Architecture are also out of scope. 37 Note that the notion of various different roles and privileges does not exist for the MFDF

Standards
FIPS 197, NIST SP 800-67, NIST SP 800-38A, NIST SP 800-38B, SP 800-67, AIS20, AIS31, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-001

File metadata

Title SMD_MFDFEV3_ST31N600_V01_4P.pdf
Author feixbeno
Creation date D:20240403101551Z
Modification date D:20240403101948+02'00'
Pages 84
Creator FrameMaker 17.0.1
Producer Adobe PDF Library 17.0

Heuristics ?

Certificate ID: ANSSI-CC-2024/25

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Similar certificates

Name Certificate ID
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09) ANSSI-CC-2024/09 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) ANSSI-CC-2024/11 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.2.2) (ANSSI-CC-2024/10) ANSSI-CC-2024/10 Compare
MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03) ANSSI-CC-2024/03 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
TESS v5.1 Platform (Revision 1.0) (ANSSI-CC-2024/28) ANSSI-CC-2024/28 Compare
TESS v5.0 Platform (revision 1.0) (ANSSI-CC-2024/12) ANSSI-CC-2024/12 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) ANSSI-CC-2024/33 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) ANSSI-CC-2023/30 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
secunet konnektor 2.0.0 und 2.0.1, Version 5.50.1:2.0.0 und 5.50.1:2.0.1 BSI-DSZ-CC-1044-V7-2023 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.0.1) ANSSI-CC-2022/25 Compare
OPENLiMiT SignCubes base components 2.0, Version 2.0.1.1 with OPENLiMiT SignCubes PDF Plugin, Version 2.0.1.1 for Adobe BSI-DSZ-CC-0299-2005 Compare
Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1 ANSSI-CC-2011/78 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
TPM 2.0 Hardware version FB5C85D, Firmware version 1.3.0.1 ANSSI-CC-2016/15 Compare
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0 ANSSI-CC-2020/43 Compare
NPCT7xx TPM 2.0 Hardware version LAG019, Firmware version 7.2.0.1 ANSSI-CC-2017/75 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/44 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/45 Compare
VOP 2.0.1 / Javacard 2.1.1 JPH33V2 Operating system version 1 installed on Integrated circuit PHILIPS P8WE5033 ANSSI-CC-2001/13 Compare
OPENLiMiT SignCubes Basiskomponenten 2.1, Version 2.1.1.1 with OPENLiMiT PDF Plugin Version 2.0.1.1 for Adobe BSI-DSZ-CC-0420-2007 Compare
SCE900U (Version A) (ANSSI-CC-2024/19) ANSSI-CC-2024/19 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1202-2022 Compare
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. IC3S/BG01/HALTDOS/EAL2/0317/0008 Compare
secunet konnektor 2.1.0, Version 5.1.2:2.1.0 BSI-DSZ-CC-1128-V5-2022 Compare
Microcontrôleur sécurisé ST33H768 révision C,Firmware révision 5, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0 ANSSI-CC-2017/01 Compare
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révisions 9 et A, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0 ANSSI-CC-2015/61 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2 NSCIB-CC-2200029-03-CR Compare
eTravel Essential 1.3-2.0 - BAC and AA activated (Version 1.0) ANSSI-CC-2021/60 Compare
KM67S3B2 Smart Card IC (v1.0) (ANSSI-CC-2024/35) ANSSI-CC-2024/35 Compare
IAS ECC v2, version 1.3, in configuration #2 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/51-R01) ANSSI-CC-2020/51-R01 Compare
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) ANSSI-CC-2020/50-R01 Compare
eTravel Essential 1.3-2.0 – BAC, EAC and AA activated (Version 1.0) ANSSI-CC-2021/64 Compare
eTravel Essential 1.3-2.0 – PACE, EAC and AA activated (Version 1.0) ANSSI-CC-2021/63 Compare
Trustway IP Protect (Version 6.01.17) (ANSSI-CC-2024/32) ANSSI-CC-2024/32 Compare
NPCT7xx TPM2.0 rev1.38 Hardware version LAG019 Firmware version 7.2.1.0 ANSSI-CC-2018/61 Compare
MIFARE DESFire EV2 on ST31P450 A04 (version 1.0.4) ANSSI-CC-2022/43 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
secunet konnektor 2.0.0, Version 5.1.2:2.0.0 BSI-DSZ-CC-1201-2022 Compare
Microcontrôleur sécurisé ST31-K330A révision F pour version bi-mode (contact et sans contact) ou version sans contact seulement, incluant optionnellement la librairie cryptographique Neslib révision 3.2 et la librairie MIFARE DESFire EV1TM révision 2.2 ANSSI-CC-2013/66 Compare
secunet konnektor 2.0.0, Version 5.1.2:2.0.0 BSI-DSZ-CC-1044-V6-2022 Compare
Showing 5 out of 51.

Scheme data ?

Product MIFARE® DESFire® EV3 on ST31N600A02 (version 1.0.2)
Url https://cyber.gouv.fr/produits-certifies/mifarer-desfirer-ev3-st31n600a02-version-102
Description Le produit évalué est « MIFARE® DESFire® EV3 on ST31N600A02, version 1.0.2 » développé par STMICROELECTRONICS.
Sponsor STMICROELECTRONICS
Developer STMICROELECTRONICS
Cert Id ANSSI-CC-2024/25
Level EAL5+
Expiration Date 22.07.2029
Enhanced
Cert Id ANSSI-CC-2024/25
Certification Date 22.07.2024
Expiration Date 22.07.2029
Category Micro-circuits
Cc Version Critères Communs version 3.1r5
Developer STMICROELECTRONICS
Sponsor STMICROELECTRONICS
Evaluation Facility THALES/CNES
Level EAL5+
Protection Profile Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the Security IC” “Package 1 : Loader dedicated for usage in Secured Environment only” “Package 2 : Loader Dedicated for usage by authorized users only”
Mutual Recognition CCRA SOG-IS
Augmented ASE_TSS.2, ALC_DVS.2, AVA_VAN.5, ALC_FLR.1
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_25fr.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_25fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/Cible-ANSSI-CC-2024_25en.pdf

References ?

Updates ?

  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'MIFARE® DESFire® EV3 on ST31N600A02 (version 1.0.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/mifarer-desfirer-ev3-st31n600a02-version-102', 'description': 'Le produit évalué est « MIFARE® DESFire® EV3 on ST31N600A02, version 1.0.2 » développé par STMICROELECTRONICS.', 'sponsor': 'STMICROELECTRONICS', 'developer': 'STMICROELECTRONICS', 'cert_id': 'ANSSI-CC-2024/25', 'level': 'EAL5+', 'expiration_date': '2029-07-22', 'enhanced': {'cert_id': 'ANSSI-CC-2024/25', 'certification_date': '2024-07-22', 'expiration_date': '2029-07-22', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'STMICROELECTRONICS', 'sponsor': 'STMICROELECTRONICS', 'evaluation_facility': 'THALES/CNES', 'level': 'EAL5+', 'protection_profile': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the Security IC” “Package 1 : Loader dedicated for usage in Secured Environment only” “Package 2 : Loader Dedicated for usage by authorized users only”', 'mutual_recognition': 'CCRA SOG-IS', 'augmented': 'ASE_TSS.2, ALC_DVS.2, AVA_VAN.5, ALC_FLR.1', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_25fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_25fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Cible-ANSSI-CC-2024_25en.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'expiration_date': '2029-07-22', 'enhanced': {'__update__': {'certification_date': '2024-07-22', 'expiration_date': '2029-07-22', 'protection_profile': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the Security IC” “Package 1 : Loader dedicated for usage in Secured Environment only” “Package 2 : Loader Dedicated for usage by authorized users only”', 'mutual_recognition': 'CCRA SOG-IS'}}} data.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JAVA_OC', 'SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0']}}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'MIFARE® DESFire® EV3 on ST31N600A02 (version 1.0.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/mifarer-desfirer-ev3-st31n600a02-version-102', 'description': 'Le produit évalué est « MIFARE® DESFire® EV3 on ST31N600A02, version 1.0.2 » développé par STMICROELECTRONICS.', 'sponsor': 'STMICROELECTRONICS', 'developer': 'STMICROELECTRONICS', 'cert_id': 'ANSSI-CC-2024/25', 'level': 'EAL5+', 'expiration_date': '22 Juillet 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2024/25', 'certification_date': '22/07/2024', 'expiration_date': '22/07/2029', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'STMICROELECTRONICS', 'sponsor': 'STMICROELECTRONICS', 'evaluation_facility': 'THALES/CNES', 'level': 'EAL5+', 'protection_profile': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0\ncertifié BSI-CC-PP-0084-2014 le 19 février 2014\n\navec conformité aux packages :\n\n“Authentication of the Security IC” “Package 1 : Loader dedicated for usage in Secured Environment only”\n“Package 2 : Loader Dedicated for usage by authorized users only”', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ASE_TSS.2, ALC_DVS.2, AVA_VAN.5, ALC_FLR.1', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_25fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_25fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Cible-ANSSI-CC-2024_25en.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'eb455cb12041e6dcb635e40cb8ec88eb0a5929f590205662ebd8913eb5561025', 'txt_hash': '9eb4a1253e92df2039e83135dbb97068a2b629071ed5ceafe1fe098c7084fdd0'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd57cea50a95e14dc71cf4372fc04d75f62ba8b2e0544e83c2eb803ef0c3756a8', 'txt_hash': '876b8069e57efb115d8d32769d02eec4541b47736f9599f3c256c99939790e70'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2145464, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 84, '/Author': 'feixbeno', '/CreationDate': 'D:20240403101551Z', '/Creator': 'FrameMaker 17.0.1', '/CreatorTool': 'FrameMaker 17.0.1', '/ModDate': "D:20240403101948+02'00'", '/Producer': 'Adobe PDF Library 17.0', '/Title': 'SMD_MFDFEV3_ST31N600_V01_4P.pdf', '/Trapped': '/False', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 169574, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240725101627+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240725101744+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 66, 'BSI-CC-PP- 0084-2014': 11, 'BSI-CC-PP-0084-': 1}}, 'cc_security_level': {'EAL': {'EAL5': 19, 'EAL6': 2, 'EAL4': 1, 'EAL5 augmented': 3, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_DVS.2': 6, 'ALC_FLR.1': 9, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 3, 'ASE_ECD': 6, 'ASE_SPD': 5, 'ASE_OBJ': 9, 'ASE_REQ': 17, 'ASE_TSS': 6, 'ASE_TSS.2': 8, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 2, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_REQ.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 1, 'FAU_SAS.1': 14, 'FAU_SAR.1': 11, 'FAU_GEN.1': 2}, 'FCS': {'FCS_COP.1': 28, 'FCS_CKM.1': 19, 'FCS_CKM.4': 20, 'FCS_RNG': 1, 'FCS_RNG.1': 7, 'FCS_COP': 2, 'FCS_ITC.2': 2, 'FCS_CKM.2': 1}, 'FDP': {'FDP_ETC.3': 18, 'FDP_ACC.1': 35, 'FDP_ACF.1': 30, 'FDP_ITC.2': 14, 'FDP_ROL.1': 9, 'FDP_RIP.1': 9, 'FDP_ETC': 6, 'FDP_SDC': 1, 'FDP_SDC.1': 8, 'FDP_ETC.1': 1, 'FDP_ETC.2': 1, 'FDP_ETC.3.1': 1, 'FDP_ETC.3.2': 1, 'FDP_ETC.3.3': 1, 'FDP_SDI.2': 10, 'FDP_ITT.1': 9, 'FDP_IFC.1': 19, 'FDP_ACC.2': 9, 'FDP_UCT.1': 8, 'FDP_UIT.1': 8, 'FDP_ITC.1': 4, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_UID.2': 11, 'FIA_UAU.2': 9, 'FIA_UAU.3': 9, 'FIA_UAU.5': 10, 'FIA_API': 1, 'FIA_API.1': 4, 'FIA_UID.1': 12, 'FIA_UAU.1': 8}, 'FMT': {'FMT_SMR.1': 23, 'FMT_MSA.3': 29, 'FMT_MSA.1': 25, 'FMT_SMF.1': 26, 'FMT_MTD.1': 9, 'FMT_LIM': 1, 'FMT_LIM.1': 25, 'FMT_LIM.2': 25}, 'FPR': {'FPR_UNL.1': 9}, 'FPT': {'FPT_TDC.1': 10, 'FPT_RPL.1': 11, 'FPT_FLS.1': 17, 'FPT_PHP.3': 9, 'FPT_ITT.1': 9}, 'FRU': {'FRU_RSA.2': 9, 'FRU_FLT.2': 8}, 'FTP': {'FTP_TRP.1': 17, 'FTP_ITC.1': 18, 'FTP_TRP.1.3': 3}}, 'cc_claims': {'O': {'O.RND': 6, 'O.MAC': 12, 'O.LEAK-INHERENT': 2, 'O.PHYS-PROBING': 2, 'O.MALFUNCTION': 2, 'O.PHYS-MANIPULATION': 2, 'O.LEAK-FORCED': 2, 'O.ABUSE-FUNC': 2, 'O.IDENTIFICATION': 2, 'O.ADD-FUNCTIONS': 2, 'O.MEM-ACCESS': 2}, 'T': {'T.RND': 3}, 'OE': {'OE.RESP-APPL': 2, 'OE.PROCESS-SEC-IC': 2, 'OE.LIM-BLOCK-LOADER': 2, 'OE.LOADER-USAGE': 2}}, 'vendor': {'NXP': {'NXP': 1}, 'STMicroelectronics': {'STMicroelectronics': 11}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 19}}, 'DES': {'DES': {'DES': 5}, '3DES': {'Triple-DES': 4, 'TDES': 5, 'TDEA': 1}}, 'constructions': {'MAC': {'CMAC': 7}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 30}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 9}}, 'cipher_mode': {'CBC': {'CBC': 8}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 4, 'side-channel': 1}, 'FI': {'Malfunction': 11, 'malfunction': 2}, 'other': {'JIL': 28}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 3}, 'NIST': {'NIST SP 800-67': 2, 'NIST SP 800-38A': 5, 'NIST SP 800-38B': 4, 'SP 800-67': 1}, 'BSI': {'AIS20': 2, 'AIS31': 2}, 'CC': {'CCMB-2017-04-002': 34, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'the evaluation, except MIFARE DESFire EV3. Proximity Check and Virtual Card Architecture are also out of scope. 37 Note that the notion of various different roles and privileges does not exist for the MFDF': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2024/25': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 2}, 'AVA': {'AVA_VAN.5': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to Cible-ANSSI-CC-2024_25en.pdf.
    • The cert_filename property was set to Certificat-ANSSI-CC-2024_25fr.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_25fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-ANSSI-CC-2024_25en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ce66a2e691b3f7df00ebb09f408e2cfcdf70ad93b3f1cc65c85090251e0bfc08', 'txt_hash': '0cfcff990a5399cd6839d6c1e497b7ed8d3443f4499a56cde57c8cde0706c586'} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 349787, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Author': '[email protected]', '/Category': 'version 1.0.2', '/Comments': 'ANSSI-CC-CER-F-07_v31.6', '/Company': 'STMICROELECTRONICS', '/CreationDate': "D:20240725101505+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '[ANSSI Crypto]', '/ModDate': "D:20240725101509+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', '/SourceModified': 'D:20240725081454', '/Subject': 'MIFARE® DESFire® EV3 on ST31N600A02', '/Title': 'ANSSI-CC-2024/25', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.sogis.eu/', 'mailto:[email protected]', 'http://www.ssi.gouv.fr/', 'http://www.commoncriteriaportal.org/']}}.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2024/25': 2, 'ANSSI-CC-2022/21-R01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 3, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 3, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to None.
    • The report_filename property was set to ANSSI-CC-2024_25fr.pdf.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/21-R01']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/21-R01']}} data.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'MIFARE® DESFire® EV3 on ST31N600A02 (version 1.0.2)', 'url': 'https://cyber.gouv.fr/produits-certifies/mifarer-desfirer-ev3-st31n600a02-version-102', 'description': 'Le produit évalué est « MIFARE® DESFire® EV3 on ST31N600A02, version 1.0.2 » développé par STMICROELECTRONICS.', 'sponsor': 'STMICROELECTRONICS', 'developer': 'STMICROELECTRONICS', 'cert_id': 'ANSSI-CC-2024/25', 'level': 'EAL5+', 'expiration_date': '22 Juillet 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2024/25', 'certification_date': '22/07/2024', 'expiration_date': '22/07/2029', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'STMICROELECTRONICS', 'sponsor': 'STMICROELECTRONICS', 'evaluation_facility': 'THALES/CNES', 'level': 'EAL5+', 'protection_profile': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0\ncertifié BSI-CC-PP-0084-2014 le 19 février 2014\n\navec conformité aux packages :\n\n“Authentication of the Security IC” “Package 1 : Loader dedicated for usage in Secured Environment only”\n“Package 2 : Loader Dedicated for usage by authorized users only”', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ASE_TSS.2, ALC_DVS.2, AVA_VAN.5, ALC_FLR.1', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_25fr.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_25fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Cible-ANSSI-CC-2024_25en.pdf'}}.
  • 31.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MIFARE® DESFire® EV3 on ST31N600A02 (version 1.0.2) (ANSSI-CC-2024/25) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_25fr.pdf",
  "dgst": "591865f4dabbeac7",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2024/25",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2022/21-R01"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2022/21-R01"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2024/25",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab MIFARE\u00ae DESFire\u00ae EV3 on ST31N600A02, version 1.0.2 \u00bb d\u00e9velopp\u00e9 par STMICROELECTRONICS.",
      "developer": "STMICROELECTRONICS",
      "enhanced": {
        "augmented": "ASE_TSS.2, ALC_DVS.2, AVA_VAN.5, ALC_FLR.1",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2024/25",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2024_25fr.pdf",
        "certification_date": "2024-07-22",
        "developer": "STMICROELECTRONICS",
        "evaluation_facility": "THALES/CNES",
        "expiration_date": "2029-07-22",
        "level": "EAL5+",
        "mutual_recognition": "CCRA SOG-IS",
        "protection_profile": "Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifi\u00e9 BSI-CC-PP-0084-2014 le 19 f\u00e9vrier 2014 avec conformit\u00e9 aux packages : \u201cAuthentication of the Security IC\u201d \u201cPackage 1 : Loader dedicated for usage in Secured Environment only\u201d \u201cPackage 2 : Loader Dedicated for usage by authorized users only\u201d",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_25fr.pdf",
        "sponsor": "STMICROELECTRONICS",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/Cible-ANSSI-CC-2024_25en.pdf"
      },
      "expiration_date": "2029-07-22",
      "level": "EAL5+",
      "product": "MIFARE\u00ae DESFire\u00ae EV3 on ST31N600A02 (version 1.0.2)",
      "sponsor": "STMICROELECTRONICS",
      "url": "https://cyber.gouv.fr/produits-certifies/mifarer-desfirer-ev3-st31n600a02-version-102"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "MIFARE\u00ae DESFire\u00ae EV3 on ST31N600A02 (version 1.0.2) (ANSSI-CC-2024/25)",
  "not_valid_after": "2029-07-22",
  "not_valid_before": "2024-07-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-ANSSI-CC-2024_25fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2024/25": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240725101627+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240725101744+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 169574,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2024_25fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2022/21-R01": 1,
          "ANSSI-CC-2024/25": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 3
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "[email protected]",
      "/Category": "version 1.0.2",
      "/Comments": "ANSSI-CC-CER-F-07_v31.6",
      "/Company": "STMICROELECTRONICS",
      "/CreationDate": "D:20240725101505+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "[ANSSI Crypto]",
      "/ModDate": "D:20240725101509+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "/SourceModified": "D:20240725081454",
      "/Subject": "MIFARE\u00ae DESFire\u00ae EV3 on ST31N600A02",
      "/Title": "ANSSI-CC-2024/25",
      "pdf_file_size_bytes": 349787,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "http://www.sogis.eu/",
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "Cible-ANSSI-CC-2024_25en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.ABUSE-FUNC": 2,
          "O.ADD-FUNCTIONS": 2,
          "O.IDENTIFICATION": 2,
          "O.LEAK-FORCED": 2,
          "O.LEAK-INHERENT": 2,
          "O.MAC": 12,
          "O.MALFUNCTION": 2,
          "O.MEM-ACCESS": 2,
          "O.PHYS-MANIPULATION": 2,
          "O.PHYS-PROBING": 2,
          "O.RND": 6
        },
        "OE": {
          "OE.LIM-BLOCK-LOADER": 2,
          "OE.LOADER-USAGE": 2,
          "OE.PROCESS-SEC-IC": 2,
          "OE.RESP-APPL": 2
        },
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0084-2014": 11,
          "BSI-CC-PP-0084-": 1,
          "BSI-CC-PP-0084-2014": 66
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 2,
          "ADV_FSP": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 6,
          "ALC_FLR.1": 9,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL": 3,
          "ASE_CCL.1": 1,
          "ASE_ECD": 6,
          "ASE_ECD.1": 1,
          "ASE_INT": 2,
          "ASE_INT.1": 2,
          "ASE_OBJ": 9,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 17,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 5,
          "ASE_SPD.1": 1,
          "ASE_TSS": 6,
          "ASE_TSS.2": 8
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL5": 19,
          "EAL5 augmented": 3,
          "EAL6": 2,
          "EAL6 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 2,
          "FAU_SAR.1": 11,
          "FAU_SAS": 1,
          "FAU_SAS.1": 14
        },
        "FCS": {
          "FCS_CKM.1": 19,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 20,
          "FCS_COP": 2,
          "FCS_COP.1": 28,
          "FCS_ITC.2": 2,
          "FCS_RNG": 1,
          "FCS_RNG.1": 7
        },
        "FDP": {
          "FDP_ACC.1": 35,
          "FDP_ACC.2": 9,
          "FDP_ACF.1": 30,
          "FDP_ETC": 6,
          "FDP_ETC.1": 1,
          "FDP_ETC.2": 1,
          "FDP_ETC.3": 18,
          "FDP_ETC.3.1": 1,
          "FDP_ETC.3.2": 1,
          "FDP_ETC.3.3": 1,
          "FDP_IFC.1": 19,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 14,
          "FDP_ITT.1": 9,
          "FDP_RIP.1": 9,
          "FDP_ROL.1": 9,
          "FDP_SDC": 1,
          "FDP_SDC.1": 8,
          "FDP_SDI.2": 10,
          "FDP_SMF.1": 2,
          "FDP_SMR.1": 1,
          "FDP_UCT.1": 8,
          "FDP_UIT.1": 8
        },
        "FIA": {
          "FIA_API": 1,
          "FIA_API.1": 4,
          "FIA_UAU.1": 8,
          "FIA_UAU.2": 9,
          "FIA_UAU.3": 9,
          "FIA_UAU.5": 10,
          "FIA_UID.1": 12,
          "FIA_UID.2": 11
        },
        "FMT": {
          "FMT_LIM": 1,
          "FMT_LIM.1": 25,
          "FMT_LIM.2": 25,
          "FMT_MSA.1": 25,
          "FMT_MSA.3": 29,
          "FMT_MTD.1": 9,
          "FMT_SMF.1": 26,
          "FMT_SMR.1": 23
        },
        "FPR": {
          "FPR_UNL.1": 9
        },
        "FPT": {
          "FPT_FLS.1": 17,
          "FPT_ITT.1": 9,
          "FPT_PHP.3": 9,
          "FPT_RPL.1": 11,
          "FPT_TDC.1": 10
        },
        "FRU": {
          "FRU_FLT.2": 8,
          "FRU_RSA.2": 9
        },
        "FTP": {
          "FTP_ITC.1": 18,
          "FTP_TRP.1": 17,
          "FTP_TRP.1.3": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "the evaluation, except MIFARE DESFire EV3. Proximity Check and Virtual Card Architecture are also out of scope. 37 Note that the notion of various different roles and privileges does not exist for the MFDF": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 30
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 9
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 11,
          "malfunction": 2
        },
        "SCA": {
          "Leak-Inherent": 12,
          "Physical Probing": 4,
          "side-channel": 1
        },
        "other": {
          "JIL": 28
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 2,
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 34,
          "CCMB-2017-04-003": 2
        },
        "FIPS": {
          "FIPS 197": 3
        },
        "NIST": {
          "NIST SP 800-38A": 5,
          "NIST SP 800-38B": 4,
          "NIST SP 800-67": 2,
          "SP 800-67": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 5,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 7
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1
        },
        "STMicroelectronics": {
          "STMicroelectronics": 11
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "feixbeno",
      "/CreationDate": "D:20240403101551Z",
      "/Creator": "FrameMaker 17.0.1",
      "/CreatorTool": "FrameMaker 17.0.1",
      "/ModDate": "D:20240403101948+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 17.0",
      "/Title": "SMD_MFDFEV3_ST31N600_V01_4P.pdf",
      "/Trapped": "/False",
      "pdf_file_size_bytes": 2145464,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.st.com"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 84
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "JAVA_OC",
            "BAROC_SC_PP_V1.0",
            "SECURITY_IC_AUGP_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_25fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL5+",
      "ALC_FLR.1",
      "ASE_TSS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-ANSSI-CC-2024_25en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d57cea50a95e14dc71cf4372fc04d75f62ba8b2e0544e83c2eb803ef0c3756a8",
      "txt_hash": "876b8069e57efb115d8d32769d02eec4541b47736f9599f3c256c99939790e70"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ce66a2e691b3f7df00ebb09f408e2cfcdf70ad93b3f1cc65c85090251e0bfc08",
      "txt_hash": "0cfcff990a5399cd6839d6c1e497b7ed8d3443f4499a56cde57c8cde0706c586"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "eb455cb12041e6dcb635e40cb8ec88eb0a5929f590205662ebd8913eb5561025",
      "txt_hash": "9eb4a1253e92df2039e83135dbb97068a2b629071ed5ceafe1fe098c7084fdd0"
    }
  },
  "status": "active"
}