PREMIER MINISTRE Secrétariat général de la défense et de la sécurité nationale Agence nationale de la sécurité des systèmes d’information Certification Report ANSSI-CC-2011/45 SafeNet eToken (Smartcard or USB token) version 9.1.2 Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCT-USB Microcontroller embedding IDSign applet Paris, 22nd of September 2011 Courtesy Translation Certification report ANSSI-CC-2011/45 SafeNet eToken (Smartcard or USB token) version 9.1.2 Page 2 out 18 ANSSI-CC-CER-F-07EN.5 Warning This report is designed to provide sponsors with a document enabling them to assess the security level of a product under the conditions of use and operation defined in this report for the evaluated version. It is also designed to provide the potential purchaser of the product with the conditions under which he may operate or use the product so as to meet the conditions of use for which the product has been evaluated and certified; that is why this certification report must be read alongside the evaluated user and administration guidance, as well as with the product security target, which presents threats, environmental assumptions and the supposed conditions of use so that the user can judge for himself whether the product meets his needs in terms of security objectives. Certification does not, however, constitute a recommendation product from ANSSI (French Network and Information Security Agency), and does not guarantee that the certified product is totally free of all exploitable vulnerabilities. Any correspondence about this report has to be addressed to: Secrétariat général de la défense et de la sécurité nationale Agence nationale de la sécurité des systèmes d'information Centre de certification 51, boulevard de la Tour Maubourg 75700 PARIS cedex 07 SP France certification.anssi@ssi.gouv.fr Reproduction of this document without any change or cut is authorised. SafeNet eToken (Smartcard or USB token) version 9.1.2 Certification report ANSSI-CC-2011/45 ANSSI-CC-CER-F-07EN.5 Page 3 out 18 Certification report reference ANSSI-CC-2011/45 Product name SafeNet eToken (Smartcard or USB token) version 9.1.2 Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCT- USB Microcontroller embedding IDSign applet Product reference - Athena IDProtect/OS755 Java Card : release date 0113, release level 2109 - Atmel AT90SC25672RCT-USB Microcontroller : AT58829, révision D - Atmel Toolbox version: 00.03.11.05 - Athena IDSign applet : version 3.0, build 001 Protection profile conformity [BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05 Evaluation criteria and version Common Criteria version 3.1 revision 3 Evaluation level EAL 4 augmented AVA_VAN.5 Developer(s) Athena Smartcard Solutions Inc. 1-14-16, Motoyokoyama-cho Hachioji-shi, Tokyo, 192-0063, Japan Inside Secure S.A. Maxwell Building - Scottish Enterprise technology Park, East Kilbride, G75 0QR, Scotland, United Kingdom Sponsor SafeNet Inc. 4690 Millenium Drive, Belcamp, MD 21017, USA Evaluation facility THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : nathalie.feyt@thalesgroup.com Recognition arrangements CCRA The product is recognised at EAL4 level. SOG-IS Certification report ANSSI-CC-2011/45 SafeNet eToken (Smartcard or USB token) version 9.1.2 Page 4 out 18 ANSSI-CC-CER-F-07EN.5 Introduction The Certification Security certification for information technology products and systems is governed by decree number 2002-535 dated April, 18th 2002, modified. This decree stipulates that: • The French Network and Information Security Agency draws up certification reports. These reports indicate the features of the proposed security targets. They may include any warnings that the authors feel the need to mention for security reasons. They may or may not be transmitted to third parties or made public, as the sponsors desire (article 7). • The certificates issued by the Prime Minister certify that the copies of the products or systems submitted for evaluation fulfil the specified security features. They also certify that the evaluations have been carried out in compliance with applicable rules and standards, with the required degrees of skill and impartiality (article 8). The procedures are available on the Internet site www.ssi.gouv.fr. SafeNet eToken (Smartcard or USB token) version 9.1.2 Certification report ANSSI-CC-2011/45 ANSSI-CC-CER-F-07EN.5 Page 5 out 18 Contents 1. THE PRODUCT........................................................................................................................... 6 1.1. PRESENTATION OF THE PRODUCT........................................................................................... 6 1.2. EVALUATED PRODUCT DESCRIPTION ..................................................................................... 6 1.2.1. Product identification.................................................................................................... 7 1.2.2. Security services............................................................................................................ 8 1.2.3. Architecture................................................................................................................... 8 1.2.4. Life cycle ....................................................................................................................... 9 1.2.5. Evaluated configuration.............................................................................................. 10 2. THE EVALUATION.................................................................................................................. 11 2.1. EVALUATION REFERENTIAL ................................................................................................. 11 2.2. EVALUATION WORK ............................................................................................................. 11 2.3. CRYPTOGRAPHIC MECHANISMS ROBUSTNESS ANALYSIS..................................................... 11 2.4. RANDOM NUMBER GENERATOR ANALYSIS .......................................................................... 12 3. CERTIFICATION...................................................................................................................... 13 3.1. CONCLUSION........................................................................................................................ 13 3.2. RESTRICTIONS...................................................................................................................... 13 3.3. RECOGNITION OF THE CERTIFICATE..................................................................................... 14 3.3.1. European recognition (SOG-IS).................................................................................. 14 3.3.2. International common criteria recognition (CCRA)................................................... 14 ANNEX 1. EVALUATION LEVEL OF THE PRODUCT.......................................................... 15 ANNEX 2. EVALUATED PRODUCT REFERENCES .............................................................. 16 ANNEX 3. CERTIFICATION REFERENCES ........................................................................... 18 Certification report ANSSI-CC-2011/45 SafeNet eToken (Smartcard or USB token) version 9.1.2 Page 6 out 18 ANSSI-CC-CER-F-07EN.5 1. The product 1.1. Presentation of the product The evaluated product is « SafeNet eToken (Smartcard or USB token) version 9.1.2 - Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCT-USB Microcontroller embedding IDSign applet » developed by Athena Smartcard Solutions Inc. and Inside Secure S.A. It can be in the form of a Smartcard or a USB token. The TOE (Target Of Evaluation) includes: - The component : o Atmel AT90SC25672RCT-USB Microcontroller : AT58829, révision D, developed by Inside Secure S.A. ; - associated with the crypto library : o Atmel Toolbox, version 00.03.11.05, developed by Inside Secure S.A. ; - embedding the Operating System : o Athena IDProtect/OS755 Java Card, release date 0113, release level 2109, developed by Athena Smartcard Solutions Inc. ; - and the application : o Athena IDSign applet, version 3.0, build 001, developed by Athena Smartcard Solutions Inc. This product is designed to be used as part of applications providing Digital Signature capabilities. 1.2. Evaluated product description The security target [ST] defines the evaluated product, its evaluated security functionalities and its operational environment. The security target is based on the protection profiles [BSI-PP-0005-2002] and [BSI-PP- 0006-2002] (SSCD type 2 and 3). This security target claims a demonstrable conformance to the protection profiles, note the evolution of the CC since their certification – CCv2.1 – and the redaction of the [ST] – CCv3.1. SafeNet eToken (Smartcard or USB token) version 9.1.2 Certification report ANSSI-CC-2011/45 ANSSI-CC-CER-F-07EN.5 Page 7 out 18 1.2.1. Product identification The configuration list [CONF] identifies the product’s constituent elements. The certified version of the product can be identified by the following elements, that are returned by the product as a response to the GET DATA command using the tag 9F7F (refer to [GUIDES], section 2.5 and 2.6 of the Preparative Guide and section 1.1 of the Operational Guide) : In order to illustrate this operation, here is presented the result of a validation performed by the evaluator on a sample of the product: - Command GET DATA with tag 9F7F sent : o 00CA9F7F00 ; - Data returned by the product : o 4180 0106 8211 0113 2109 0954 00233904 6598 0000 0000 0000 0000 0000000000000000 0000000000000000 In the returned data, we can find, in particular, the values 0113 and 2109 (corresponding to the fields “ Operating System release date ” and “ Operating System release level ” in the table above). These elements correspond to the whole embedded software including IDProtect and IDSign (the value 2109 reads backward, that is version 9.1.2). In addition, the command GET DATA with tag 0046 can be used to retrieve the elements that identify the component. On the evaluated sample, we obtain : - Command GET DATA with tag 0046 sent : o 00CA004600 ; - Data returned by the product : o 230309546598233904 The value 23 identified the component corresponding to the value in IC register SN_0 (here the AT90SC25672RCT-USB). Furthermore, the value 03 provides the revision of the component corresponding to the IC register SN_1 (here revision D). Certification report ANSSI-CC-2011/45 SafeNet eToken (Smartcard or USB token) version 9.1.2 Page 8 out 18 ANSSI-CC-CER-F-07EN.5 1.2.2. Security services The product provides mainly the following security services: - signature creation : the product signs the data to be signed (DTBS – Data To Be Signed) using the signature private key (SCD – Signature Creation Data) ; - identification and authentication : the product handles the identification and authentication of the signatory and the administrator; it also enforces a mechanism of role separation ; - access control : the product verifies that for each operation initiated by a user, the security attributes, corresponding to the privileges granted for a user to access the data, are valid ; typical operations of the SSCD, such as the digital signature the key generation, the import and export of SCD/SVD (Signature Creation Data / Signature Verification Data, which are the private/public keys for signature) and the verification of the RAD/PUK (Reference Authentication Data / PIN Unblocking Key, which are the PIN code and the unlock code of the product), are subject to these verifications ; - secure channel : the product can set up a communication channel that is secured between him and the external device that interacts with him ; typical operations of the SSCD, such as the digital signature the key generation, the import and export of SCD/SVD and the verification of the RAD/PUK, are subject to the establishment of this secure channel ; - cryptography : the product offers cryptographic means to all the other security functions (in particular, DES/TDES, RSA, RNG, prime number generation) ; - protection : the product protects the data of the security functions (“TSF data”), the data of the user (“user data”) and the security functions (“TSF”) against malfunction, perturbation and observation using autotests, the management of crashes, the integrity tests, the secure re-initialization, the counter-measures to prevent leakage, etc. ; this security service ensures also the termination of care content loading and installation, and termination of the patch mechanism. 1.2.3. Architecture The product consists of the smartcard microcontroller. However the final product can be in the form of a smartcard, or a USB token, as the underlying component AT90CS25672RCT- USB provides both the ISO7816 and USB interfaces. In the case where the TOE is a smartcard, the communication is done through the ISO7816 interface, with the commands ISO 7816. In the case where the TOE is a USB token, the communication is done through the USB interface ; the ISO7816 commands are then encapsulated using the protocol CCID (Chip Card Interface Devices), eToken or GPIO (General Purpose Input/Output). The TOE does not provide any other external interface. All the application software is embedded in ROM and only patches are loaded in EEPROM. SafeNet eToken (Smartcard or USB token) version 9.1.2 Certification report ANSSI-CC-2011/45 ANSSI-CC-CER-F-07EN.5 Page 9 out 18 The perimeter of the TOE is illustrated in the following picture (boundaries in dotted-line): 1.2.4. Life cycle The product’s life cycle is based on the smartcard lifecycle, as described in the protection profiles [BSI-PP-0005-2002] and [BSI-PP-0006-2002], but refined with the addition of a step called “Integration” (“IC Packaging” and “Card Manufacturing” more precisely) covered by the [GUIDES]. It is illustrated in the following picture: HW Fabrication OS and Application Implementation Loading of General Application Data Card Content Loading and Installation Termination Loading of Personal data SCD/SVD import or generation Signature-creation Optional SCD/SVD import or generation SSCD Destruction Design Fabrication Initialisation Personalisation Usage IC Manufacturing IC Packaging Card Manufacturing Integration HW Design OS Design Applications Design The delivery point is located at the end of step “Integration”, stating the end of the product development phase. All the steps that precede this delivery point have been covered hereby this evaluation (as part of ALC), if necessary, by reusing results obtained during the evaluation of the underlying component. Certification report ANSSI-CC-2011/45 SafeNet eToken (Smartcard or USB token) version 9.1.2 Page 10 out 18 ANSSI-CC-CER-F-07EN.5 The step “Integration” (“IC Packaging” and “Card Manufacturing”) as well as «Initialisation” and “Personalisation” have all been taken into account during this evaluation through the guides (as part of AGD). The tests focused on the functions of the product that are available during the operational phase (as part of ATE and AVA). The product has been developed on the following sites: Site n°1 de développement du logiciel Athena Smartcard Ltd. Westpoint - 4 Redheughs Rigg - South Gyle Edinburgh EH12 9DQ Scotland - United Kingdom Site n°2 de développement du logiciel Athena Smartcard Ltd. 20380 Town Center Lane – Suite 240 Cupertino CA95014 United States of America Site de développement et fabrication du microcontrôleur Inside Secure S.A. Maxwell Building Scottish Enterprise technology Park, East Kilbride, G75 0QR Scotland - United Kingdom In the evaluation context, the role “administrator” (“S.Admin”) has been considered as the product administrator and the role “signatory” (“S.Signatory”) has been considered as the product user (cf. [ST] section 4.2 Subjects). 1.2.5. Evaluated configuration The certificate applies to the configuration of the TOE obtained after following the preparative guide (cf. [GUIDES]). This guide describes the options of personalization that have to be chosen in order to obtain the evaluated TOE configuration. Additional personalization options are possible but do not correspond to the evaluated configuration. SafeNet eToken (Smartcard or USB token) version 9.1.2 Certification report ANSSI-CC-2011/45 ANSSI-CC-CER-F-07EN.5 Page 11 out 18 2. The evaluation 2.1. Evaluation referential The evaluation has been performed in compliance with Common Criteria version 3.1 revision 3 [CC], with the Common Evaluation Methodology [CEM]. For assurance components which are not covered by [CEM] manual, the evaluation facility own evaluation methods, validated by ANSSI, have been used. In order to meet the specificities of smart cards, the [CC IC] and [CC AP] guides have been applied. 2.2. Evaluation work The evaluation has been performed according to the composition scheme as defined in the guide [COMP] in order to assess that no weakness comes from the integration of the software in the microcontroller already certified. Therefore, the results of the evaluation of the microcontroller “AT90SC25672RCT-USB D Rev. D” at EAL4 level augmented with ADV_IMP.2, ALC_DVS.2, AVA_MSU.3 and AVA_VLA.4, compliant with the ANSSI protection profile [ANSSI-CC-PP-1998_06], have been used. This microcontroller has been certified the ANSSI under the reference [ANSSI- CC-2006_30]. The microcontroller robustness level has been confirmed the 1st of April 2010 (cf. [SUR_IC]) in a surveillance process. The evaluation has also taken into account the result of the surveillance of the cryptographic library “Cryptographic library ATMEL toolbox 00.03.11.05” which was initially certified at level EAL5 augmented with ALC_DVS.2, AVA_MSU.3 and AVA_VLA.4 (cf. [ANSSI-CC- 2009_11] and [SUR_Biblio]). Finally, the evaluation has also taken into account the result of the previous version of the product. An ANSSI certificate was issued then (cf. [ANSSI-CC-2011_03]). The evaluation technical report [ETR], delivered to ANSSI the 28th of July 2011, provides details on the work performed by the evaluation facility and assesses that all evaluation tasks are “pass”. 2.3. Cryptographic mechanisms robustness analysis The robustness of cryptographic mechanisms has not been analysed against the ANSSI technical referential [RGS]. Certification report ANSSI-CC-2011/45 SafeNet eToken (Smartcard or USB token) version 9.1.2 Page 12 out 18 ANSSI-CC-CER-F-07EN.5 Nevertheless, the evaluation has not lead to the identification of any exploitable vulnerability for the aimed AVA_VAN.5 level. 2.4. Random number generator analysis The analysis of the random number generator against the ANSSI technical referential [CERT_IC] was out of the scope of this evaluation and was not performed. Nevertheless, the evaluation has not lead to the identification of any exploitable vulnerability for the aimed AVA_VAN.5 level. SafeNet eToken (Smartcard or USB token) version 9.1.2 Certification report ANSSI-CC-2011/45 ANSSI-CC-CER-F-07EN.5 Page 13 out 18 3. Certification 3.1. Conclusion The evaluation was carried out according to the current rules and standards, with the required competency and impartiality of a licensed evaluation facility. All the work performed permits the release of a certificate in conformance with the decree 2002-535. This certificate testifies that the product “SafeNet eToken (Smartcard or USB token) version 9.1.2 - Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCT-USB Microcontroller embedding IDSign applet” submitted for evaluation fulfils the security features specified in its security target [ST] for the evaluation level EAL 4 augmented. 3.2. Restrictions This certificate only applies on the product specified in chapter 1.2 of this certification report. The user of the certified product shall respect the security objectives for the operational environment, as specified in the security target [ST], and shall respect the recommendations in the guidance [GUIDES]. Certification report ANSSI-CC-2011/45 SafeNet eToken (Smartcard or USB token) version 9.1.2 Page 14 out 18 ANSSI-CC-CER-F-07EN.5 3.3. Recognition of the certificate 3.3.1. European recognition (SOG-IS) This certificate is released in accordance with the provisions of the SOG-IS agreement [SOG- IS]. The European Recognition Agreement made by SOG-IS in 2010 allows recognition from Signatory States of the agreement1 , of ITSEC and Common Criteria certificates. The European recognition is applicable, for smart cards and similar devices, up to ITSEC E6 High and CC EAL7 levels. The certificates that are recognized in the agreement scope are released with the following marking: 3.3.2. International common criteria recognition (CCRA) This certificate is released in accordance with the provisions of the CCRA [CC RA]. The Common Criteria Recognition Arrangement allows the recognition, by signatory countries2 , of the Common Criteria certificates. The mutual recognition is applicable up to the assurance components of CC EAL4 level and also to ALC_FLR family. The certificates that are recognized in the agreement scope are released with the following marking: 1 The signatory countries of the SOG-IS agreement are: Finland, France, Germany, The Netherlands, Norway, Spain, Sweden and United Kingdom. 2 The signatory countries of the CCRA arrangement are: Australia, Austria, Canada, Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, India, Israel, Italy, Japan, the Republic of Korea, Malaysia, Netherlands, New-Zealand, Norway, Pakistan, Singapore, Spain, Sweden, Turkey, the United Kingdom and the United States of America. SafeNet eToken (Smartcard or USB token) version 9.1.2 Certification report ANSSI-CC-2011/45 ANSSI-CC-CER-F-07EN.5 Page 15 out 18 Annex 1. Evaluation level of the product Components by assurance level Assurance level of the product Class Family EAL 1 EAL 2 EAL 3 EAL 4 EAL 5 EAL 6 EAL 7 EAL 4+ Name of the component ADV_ARC 1 1 1 1 1 1 1 Security architecture description ADV_FSP 1 2 3 4 5 5 6 4 Complete functional specification ADV_IMP 1 1 2 2 1 Implementation representation of the TSF ADV Development ADV_TDS 1 2 3 4 5 6 3 Basic modular design AGD_OPE 1 1 1 1 1 1 1 1 Operational user guidance AGD Guidance AGD_PRE 1 1 1 1 1 1 1 1 Preparative procedures ALC_CMC 2 3 4 4 5 5 4 Production support, acceptance procedures and automation ALC_CMS 1 2 3 4 5 5 5 4 Problem tracking CM coverage ALC_DEL 1 1 1 1 1 1 1 Delivery procedures ALC_DVS 1 1 1 2 2 1 Identification of security measures ALC_FLR ALC_LCD 1 1 1 1 2 1 Developer defined life-cycle model ALC Life-cycle support ALC_TAT 1 2 3 3 1 Well-defined development tools ASE_CCL 1 1 1 1 1 1 1 1 Conformance claims ASE_ECD 1 1 1 1 1 1 1 1 Extended components definition ASE_INT 1 1 1 1 1 1 1 1 ST introduction ASE_OBJ 1 2 2 2 2 2 2 2 Security objectives ASE_REQ 1 2 2 2 2 2 2 2 Derived security requirements ASE_SPD 1 1 1 1 1 1 1 Security problem definition ASE Security Target Evaluation ASE_TSS 1 1 1 1 1 1 1 1 TOE summary specification ATE_COV 1 2 2 2 3 3 2 Analysis of coverage ATE_DPT 1 1 3 3 4 1 Testing: security enforcing modules ATE_FUN 1 1 1 1 2 2 1 Functional testing ATE Tests ATE_IND 1 2 2 2 2 2 3 2 Independent testing: sample AVA Vulnerability assessment AVA_VAN 1 2 2 3 4 5 5 5 Advanced methodical vulnerability analysis Certification report ANSSI-CC-2011/45 SafeNet eToken (Smartcard or USB token) version 9.1.2 Page 16 out 18 ANSSI-CC-CER-F-07EN.5 Annex 2. Evaluated product references [ST] Reference security target for the evaluation: - SafeNet eToken - Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCT-USB embedding IDSign applet - Security Target, version 2.1, 19/07/2011, Athena / SafeNet. For the needs of publication, the following security target has been provided and validated in the evaluation: - SafeNet eToken - Athena IDProtect/OS755 Java Card on INSIDE Secure AT90SC25672RCT-USB embedding IDSign applet - Security Target Lite, version 2.1, 19/07/2011, Athena / SafeNet. [ETR] Evaluation technical report : - Evaluation technical report - Project: BOREALIS_M01, version: 1.0, 28/07/2011, Thales-CEACI. [CONF] Product configuration List : - Borealis_M01 - Documents Configuration List, version 1.0, 21/07/2011 Athena. [GUIDES] Preparation guidance: - Preparative Procedures, version 2.0, 11/07/2011, Athena. - Personalisation scripts, version 1.6, Athena. - SafeNet eToken Card Administrator Manual, version 0.6, 09/04/2010, Athena User guidance: Operational User Guidance version 2.0, 11/07/2011, Athena SafeNet eToken (Smartcard or USB token) version 9.1.2 Certification report ANSSI-CC-2011/45 ANSSI-CC-CER-F-07EN.5 Page 17 out 18 [BSI-PP- 0005-2002] Protection Profile — Secure Signature-Creation Device Type 2, Version: 1.04, 25 July 2001. Certified by the BSI under the reference BSI-PP-0005- 2002T. [BSI-PP- 0006-2002] Protection Profile — Secure Signature-Creation Device Type 3, Version: 1.05, 25 July 2001. Certified by the BSI under the reference BSI-PP-0006- 2002T. [ANSSI-CC- PP-1998_06] Protection Profile Smart Card Integrated Circuit Version 2.0, September 1998. Certified by the ANSSI under the reference PP/9806. [ANSSI-CC- 2006_30] ANSSI Certificate delivered on December 19th 2006 for the product: « Microcontrôleur sécurisé ATMEL AT90SC25672RCT-USB rev. D ». [SUR_IC] Surveillance letter emitted by the ANSSI on February 4th 2011 for the product: « Microcontroleur sécurisé ATMEL AT90SC25672RCT-USB, Rev. D » initially certified by the ANSSI (cf. [ANSSI-CC-2006_30]). [ANSSI-CC- 2009_11] ANSSI certificate delivered on June 30th 2009 for the evaluation of the library: « Bibliothèque cryptographique ATMEL Toolbox 00.03.11.05 ». [SUR_Biblio] Surveillance letter emitted by the ANSSI on March 18th 2011 for the library: « Bibliothèque cryptographique ATMEL Toolbox 00.03.11.05 » initially certified by the ANSSI (cf. [ANSSI-CC-2009_11]). [ANSSI-CC- 2011_03] ANSSI certificate delivered on March 4th 2011 for the product: « SafeNet eToken (Smartcard or USB token) Version 9.1 - Athena IDProtect/OS755 Java Card on Atmel AT90SC25672RCT-USB Microcontroller embedding IDSign applet ». Certification report ANSSI-CC-2011/45 SafeNet eToken (Smartcard or USB token) version 9.1.2 Page 18 out 18 ANSSI-CC-CER-F-07EN.5 Annex 3. Certification references Decree number 2002-535, 18th April 2002, modified related to the security evaluations and certifications for information technology products and systems. [CER/P/01] Procedure CER/P/01 - Certification of the security provided by IT products and systems, DCSSI. [CC] Common Criteria for Information Technology Security Evaluation : Part 1: Introduction and general model, July 2009, version 3.1, revision 3 Final, ref CCMB-2009-07-001; Part 2: Security functional components, July 2009, version 3.1, revision 3 Final, ref CCMB-2009-07-002; Part 3: Security assurance components, July 2009, version 3.1, revision 3 Final, ref CCMB-2009-07-003. [CEM] Common Methodology for Information Technology Security Evaluation : Evaluation Methodology, July 2009, version 3.1, revision 3 Final, ref CCMB-2009-07-004. [CC IC] Common Criteria Supporting Document - Mandatory Technical Document - The Application of CC to Integrated Circuits, reference CCDB-2009-03-002 version 3.0, revision 1, March 2009. [CC AP] Common Criteria Supporting Document - Mandatory Technical Document - Application of attack potential to smart-cards, reference CCDB-2009-03-001 version 2.7 revision 1, March 2009. [COMP] Common Criteria Supporting Document - Mandatory Technical Document - Composite product evaluation for smart cards and similar devices, reference CCDB-2007-09-001 version 1.0, revision 1, September 2007. [CC RA] Arrangement on the Recognition of Common Criteria certificates in the field of information Technology Security, May 2000. [SOG-IS] « Mutual Recognition Agreement of Information Technology Security Evaluation Certificates », version 3.0, 8 Janvier 2010, Management Committee. [RGS] Référentiel Général de Sécurité (RGS), version 1.0 Documents related to the use of cryptographic mechanisms in the security functions. See www.ssi.gouv.fr.