CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) SAAAAR : 203742

CSV information ?

Status archived
Valid from 08.03.2022
Valid until 05.05.2023
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_DVS.2

Heuristics summary ?

Certificate ID: ANSSI-CC-2022/15

Certificate ?

Extracted keywords

Vendor
IDEMIA

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0056-2009
Certificates
ANSSI-CC-2022/15
Evaluation facilities
CEA-LETI

File metadata

Title: ANSSI-CC-2022/15
Keywords: version 3.1, révision 5
Author: DUCLOS Charlene
Creation date: D:20220309145829+01'00'
Modification date: D:20220309145830+01'00'
Pages: 2
Creator: Acrobat PDFMaker 11 pour Word
Producer: Adobe PDF Library 11.0

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Vendor
IDEMIA

Security level
EAL 5, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-CC-PP-0056-2009
Certificates
BSI-DSZ-CC-1107-2020, ANSSI-CC-2022/15, ANSSI-CC-2021/29
Evaluation facilities
CESTI, CEA - LETI, CEA-LETI

Standards
ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title: ANSSI-CC-2022/15
Subject: CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration)
Keywords: [ANSSI Crypto]
Author: qualite@intranet.fr
Creation date: D:20220309145738+01'00'
Modification date: D:20220309145739+01'00'
Pages: 13
Creator: Acrobat PDFMaker 11 pour Word
Producer: Adobe PDF Library 11.0

References

Outgoing
  • BSI-DSZ-CC-1107-2020 - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance
  • ANSSI-CC-2021/29 - ID-One COSMO X Code SAAAAR : 093363
Incoming
  • ANSSI-CC-2022/16v2 - CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742
  • ANSSI-CC-2022/15v2 - CombICAO Applet v3 on ID-One Cosmo X (BAC and CA Configuration) SAAAAR : 203742

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES128, AES192, AES256, AES-, DES, Triple-DES, 3DES, TDES, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH
Hash functions
SHA1, SHA-1, SHA256, SHA384, SHA512, SHA-224, SHA-256, SHA-384, SHA-512, SHA2
Schemes
MAC
Protocols
PACE
Block cipher modes
ECB, CBC

IC data groups
EF.DG1, EF.DG13, EF.DG16, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG14, EF.DG15, EF.COM, EF.SOD
Vendor
Infineon, Oberthur Technologies, IDEMIA, Morpho

Security level
EAL5, EAL 5, EAL 5+, EAL5 augmented
Claims
A.MRTD_, OE.MRTD_, OE.BAC_PP
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.5, ADV_IMP, ADV_IMP.1, ADV_INT, ADV_INT.2, ADV_TDS, ADV_TDS.4, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.5, ALC_DEL, ALC_DEL.1, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.2, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.3, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN, AVA_VAN.3, APE_SRE, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_CKM, FCS_RND.1.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_CKM.2, FDP_ACC, FDP_ACF, FDP_DAU, FDP_ITC, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_DAU.1, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_UID, FIA_UAU, FIA_AFL, FIA_API.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_MOF, FMT_MTD, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.3, FMT_MTD.3.1, FMT_MOF.1, FMT_MSA.3, FMT_MSA.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0055-2009, BSI-PP-0056, BSI-CC-PP0056-V2-, BSI-CC-PP-0084-2014, BSI-CC-PP-0068-V2-, BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP- 0071-2012-MA-01, BSI-CC-PP-0072-2012-, BSI-CC-PP-0076-2013-MA-, PP-SSCD2, PP-SSCD3, PP-SSCD4, PP-SSCD5, PP-SSCD6
Certificates
ANSSI-CC-2021/29
Evaluation facilities
CEA-LETI

Side-channel analysis
physical probing, DPA, SPA, timing attacks, physical tampering, Physical tampering, Physical Tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS 180-4, FIPS 186-3, FIPS 197, FIPS PUB 197, FIPS 46-3, PKCS#3, PKCS#1, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 18013, ISO/IEC 9797-1, ISO/IEC 11770-2, ISO/IEC 11770-3, ISO/IEC 9796-2, ICAO, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) Public Security Target
Author: KUMAR Prem
Creation date: D:20220201141800+05'30'
Modification date: D:20220201144319+05'30'
Pages: 157
Creator: Acrobat PDFMaker 21 for Word
Producer: Adobe PDF Library 21.11.71

References

Outgoing Incoming

Heuristics ?

Certificate ID: ANSSI-CC-2022/15

Extracted SARs

ASE_SPD.1, ADV_TDS.4, AGD_PRE.1, ALC_DVS.2, ASE_ECD.1, ASE_TSS.1, ALC_CMC.4, ALC_LCD.1, ADV_FSP.5, ALC_TAT.2, ADV_ARC.1, ASE_REQ.2, ALC_DEL.1, ATE_COV.2, ASE_CCL.1, ASE_INT.1, AGD_OPE.1, ATE_DPT.3, ATE_FUN.1, ADV_IMP.1, AVA_VAN.5, ATE_IND.2, ASE_OBJ.2, ALC_CMS.5, ASE_APD.1, ADV_INT.2

Scheme data ?

Product CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742
Url https://cyber.gouv.fr/produits-certifies/combicao-applet-v3-id-one-cosmo-x-eac-pace-french-id-configuration-saaaar-0
Description Le produit évalué est la carte à puce « CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration), SAAAAR : 203742 » développée par IDEMIA, sur un micro-contrôleur développé par INFINEON. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spéci
Sponsor IDEMIA INFINEON TECHNOLOGIES AG
Developer IDEMIA INFINEON TECHNOLOGIES AG
Cert Id 2022/17v2
Enhanced
Cert Id 2022/17v2
Certification Date 05/05/2023
Category
Cc Version
Developer IDEMIA INFINEON TECHNOLOGIES AG
Sponsor IDEMIA INFINEON TECHNOLOGIES AG
Evaluation Facility CEA - LETI
Level
Protection Profile Machine Readable Travel Document with "ICAO Application", Extended Access Control version 1.3.2, BSI-CC-PP-0056-V2-2012-MA02 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1, BSI-CC-PP-0068-V2-2011-MA-01
Mutual Recognition
Augmented ALC_DVS.2, AVA_VAN.5
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2022_17v2.pdf

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9f82f3dc5e5f18e278c5c27298caa3349333905f548aa899b5e3dbcdeadca6f7', 'txt_hash': 'f153586915c1d2c9fb070b43c1ecf6111a8683f4143dc44469c4a8ab96add552'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5fa70ba1f39d1bdec43f722f9449d8f8e9ee4eb09144cba09aeb2bc7647e2ec6', 'txt_hash': '37f997a8d61c26dd44290aeda4e0ebea9fb2281301c87509e275fafe8b0888f7'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '739c5d21e0de24e2e388c48fba9d78b76d15a0e55bb90eb3fd8a23bc9048adcb', 'txt_hash': 'b5ada8530076f01120ac770785744fab1353cd0566329f6d6769fa56f5d00e17'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 100984, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': 'DUCLOS Charlene', '/Category': ' ', '/Comments': 'ANSSI-CC-CER-F-14_v14.6', '/Company': 'SGDSN', '/CreationDate': "D:20220309145829+01'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/Keywords': 'version 3.1, révision 5', '/ModDate': "D:20220309145830+01'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20220309135818', '/Title': 'ANSSI-CC-2022/15', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2022/15': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-2009': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'certificat-cc-2022_15.pdf'}.
    • The report_frontpage property was set to {'FR': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1107-2020': 2}}, 'FR': {'__update__': {'ANSSI-CC-2022/15': 2, 'ANSSI-CC-2021/29': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2021/29': 1}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v3-id-one-cosmo-x-eac-pace-french-id-configuration-saaaar-0', 'description': 'Le produit évalué est la carte à puce « CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration), SAAAAR : 203742 » développée par IDEMIA, sur un micro-contrôleur développé par INFINEON.\n\n\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spéci', 'cert_id': '2022/17v2', 'enhanced': {'__update__': {'cert_id': '2022/17v2', 'certification_date': '05/05/2023', 'category': '', 'cc_version': '', 'level': '', 'protection_profile': 'Machine Readable Travel Document with "ICAO Application", Extended Access Control version 1.3.2, BSI-CC-PP-0056-V2-2012-MA02 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1, BSI-CC-PP-0068-V2-2011-MA-01', 'mutual_recognition': '', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2022_17v2.pdf'}, '__delete__': ['expiration_date', 'report_link', 'target_link']}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1107-2020': 4}}, 'FR': {'__update__': {'ANSSI-CC-2022/15': 4, 'ANSSI-CC-2021/29': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2021/29': 2}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) SAAAAR : 203742', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v3-id-one-cosmo-x-eac-configuration-saaaar-203742', 'description': 'Le produit évalué est la carte à puce « CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration), SAAAAR : 203742 » développée par IDEMIA, sur un microcontrôleur développé par INFINEON. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de', 'cert_id': '2022/15', 'enhanced': {'__insert__': {'expiration_date': '08/03/2027', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/anssi-cc-2022_15.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/anssi-cible-cc-2022_15en.pdf'}, '__update__': {'cert_id': '2022/15', 'certification_date': '08/03/2022', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL5+', 'protection_profile': 'Machine Readable Travel Document with "ICAO Application", Extended Access Control version 1.10, BSI-CC-PP-0056-2009', 'mutual_recognition': 'CCRA\n SOG-IS', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/certificat-cc-2022_15.pdf'}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'7 5 7': 1, '2 0 2': 12, '2 0 3': 12}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1107-2020': 2}}, 'FR': {'__update__': {'ANSSI-CC-2022/15': 2, 'ANSSI-CC-2021/29': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2021/29': 1}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v3-id-one-cosmo-x-eac-pace-french-id-configuration-saaaar-0', 'description': 'Le produit évalué est la carte à puce « CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration), SAAAAR : 203742 » développée par IDEMIA, sur un micro-contrôleur développé par INFINEON.\n\n\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spéci', 'cert_id': '2022/17v2', 'enhanced': {'__update__': {'cert_id': '2022/17v2', 'certification_date': '05/05/2023', 'category': '', 'cc_version': '', 'level': '', 'protection_profile': 'Machine Readable Travel Document with "ICAO Application", Extended Access Control version 1.3.2, BSI-CC-PP-0056-V2-2012-MA02 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1, BSI-CC-PP-0068-V2-2011-MA-01', 'mutual_recognition': '', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2022_17v2.pdf'}, '__delete__': ['expiration_date', 'report_link', 'target_link']}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) SAAAAR : 203742', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v3-id-one-cosmo-x-eac-configuration-saaaar-203742', 'description': 'Le produit évalué est la carte à puce « CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration), SAAAAR : 203742 » développée par IDEMIA, sur un microcontrôleur développé par INFINEON. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de', 'sponsor': 'IDEMIA INFINEON TECHNOLOGIES AG', 'developer': 'IDEMIA INFINEON TECHNOLOGIES AG', 'cert_id': '2022/15', 'level': 'EAL5+', 'expiration_date': '8 Mars 2027', 'enhanced': {'cert_id': '2022/15', 'certification_date': '08/03/2022', 'expiration_date': '08/03/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'IDEMIA INFINEON TECHNOLOGIES AG', 'sponsor': 'IDEMIA INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'Machine Readable Travel Document with "ICAO Application", Extended Access Control version 1.10, BSI-CC-PP-0056-2009', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/certificat-cc-2022_15.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/anssi-cc-2022_15.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/anssi-cible-cc-2022_15en.pdf'}}.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 20.06.2023 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.

    The Valid until date was updated.

    • The new value is 2023-05-05.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/15v2', 'ANSSI-CC-2022/16v2']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/15v2', 'ANSSI-CC-2022/16v2']}} data.
    • The scheme_data property was set to None.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'CombICAO Applet v2.1 in BAC and CA configuration on ID-One Cosmo V9.2 (code SAAAAR : 203523)\n\t\t\t\n\t\t\tDernier rapport de maintenance :2020/60-M01', 'vendor': 'Idemia, Infineon Technologies AGIdemia', 'level': 'EAL4+', 'id': '2020/60', 'certification_date': '27/07/2020', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/combicao-applet-v2-1-in-bac-and-ca-configuration-on-id-one-cosmo-v9-2-code-saaaar-203523/', 'enhanced': {'id': '2020/60', 'certification_date': '27/07/2020', 'expiration_date': '27/07/2025', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL4+', 'augmentations': 'ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3', 'protection_profile': 'Machine Readable Travel Document with "ICAO Application", Basic Access Control, version 1.10, 25th of march 2009, BSI-CC-PP-0055-2009', 'developer': 'Idemia, Infineon Technologies AG / Idemia', 'evaluation_facility': 'CEA-Leti', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « CombICAO Applet v2.1 in BAC and CA configuration on ID-One Cosmo V9.2, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à permettre la vérification de l’authenticité du document de voyage et à identifier son porteur lors d’un contrôle frontalier, à l’aide d’un système d’inspection.\nCe microcontrôleur et son logiciel embarqué ont vocation à être insérés dans la couverture des passeports traditionnels, dans une eCover ou dans une eDatapage. Le produit final peut prendre différentes formes, de carte ou de module.\n\t\t\t\t\n Rapport de certification\nSecurity target\nSecurity target\n \t\t\t\t\t\n \t\t\t\t\t\n \n \n Rapports de maintenance2020/60-M01 - 05/02/2021', 'report_link': 'https://www.ssi.gouv.fr/uploads/2020/08/anssi-cc-2020_60fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2020/08/anssi-cible-cc-2020-60en.pdf'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 5fa70ba1f39d1bdec43f722f9449d8f8e9ee4eb09144cba09aeb2bc7647e2ec6.
    • The st_txt_hash property was set to 37f997a8d61c26dd44290aeda4e0ebea9fb2281301c87509e275fafe8b0888f7.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1617442, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 157, '/Author': 'KUMAR Prem', '/Category': 'Document type', '/Classification': 'Classification', '/Comments': '', '/Company': 'Company', '/CreationDate': "D:20220201141800+05'30'", '/Creator': 'Acrobat PDFMaker 21 for Word', '/DocumentTitle': 'Document title', '/IDEMIAClassification': 'PUBLIC', '/IDEMIATechnology': 'Not Controlled', '/IssueDate': 'Issue date', '/Keywords': '', '/MORPHOClassification': 'PUBLIC', '/MORPHOTechnology': 'Not Controlled', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_ActionId': 'ba849d49-45b6-4445-8835-eea6fcd48c94', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application': 'Microsoft Azure Information Protection', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled': 'True', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method': 'Manual', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name': 'Public', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner': 'g509704@mph.morpho.com', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate': '2021-11-26T12:30:37.2752762Z', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId': '7694d41c-5504-43d9-9e40-cb254ad755ec', '/Manager': '', '/ModDate': "D:20220201144319+05'30'", '/Producer': 'Adobe PDF Library 21.11.71', '/ProjectName': 'Project name', '/Reference': 'Reference', '/Sensitivity': 'Public', '/SourceModified': 'D:20220201072839', '/Status': 'Status', '/Subject': '', '/Title': 'CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) Public Security Target', '/TitusGUID': 'fc098978-a09a-4110-a612-da1ab7eb03a2', '/Version': 'Version', '/aliashClassificationHeaderforWordC': '', '/aliashClassificationHeaderforWordRS': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/29': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055-2009': 1, 'BSI-PP-0056': 2, 'BSI-CC-PP0056-V2-': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0068-V2-': 1, 'BSI-CC-PP-0059-2009-MA-02': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP- 0071-2012-MA-01': 1, 'BSI-CC-PP-0072-2012-': 1, 'BSI-CC-PP-0076-2013-MA-': 1}, 'other': {'PP-SSCD2': 2, 'PP-SSCD3': 2, 'PP-SSCD4': 2, 'PP-SSCD5': 2, 'PP-SSCD6': 2}}, 'cc_security_level': {'EAL': {'EAL5': 7, 'EAL 5': 1, 'EAL 5+': 1, 'EAL5 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 16, 'ADV_FSP': 1, 'ADV_FSP.5': 22, 'ADV_IMP': 1, 'ADV_IMP.1': 16, 'ADV_INT': 1, 'ADV_INT.2': 8, 'ADV_TDS': 1, 'ADV_TDS.4': 23, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 4, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2}, 'AGD': {'AGD_PRE': 8, 'AGD_OPE': 7, 'AGD_OPE.1': 16, 'AGD_PRE.1': 12}, 'ALC': {'ALC_DVS.2': 15, 'ALC_DVS': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 16, 'ALC_CMS': 1, 'ALC_CMS.5': 7, 'ALC_DEL': 1, 'ALC_DEL.1': 6, 'ALC_LCD': 1, 'ALC_LCD.1': 9, 'ALC_TAT': 1, 'ALC_TAT.2': 12, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 8, 'ATE_DPT': 1, 'ATE_DPT.3': 7, 'ATE_FUN': 1, 'ATE_FUN.1': 14, 'ATE_IND': 1, 'ATE_IND.2': 7, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 2, 'AVA_VAN.3': 1}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 15, 'ASE_ECD': 1, 'ASE_ECD.1': 14, 'ASE_INT': 1, 'ASE_INT.1': 17, 'ASE_OBJ': 1, 'ASE_OBJ.2': 13, 'ASE_REQ': 1, 'ASE_REQ.2': 15, 'ASE_SPD': 1, 'ASE_SPD.1': 8, 'ASE_APD.1': 1, 'ASE_TSS': 1, 'ASE_TSS.1': 6, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_SAS.1': 15, 'FAU_GEN': 2, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND': 2, 'FCS_RND.1': 23, 'FCS_CKM': 60, 'FCS_RND.1.1': 2, 'FCS_CKM.1': 15, 'FCS_CKM.4': 44, 'FCS_CKM.4.1': 1, 'FCS_COP': 125, 'FCS_COP.1': 12, 'FCS_CKM.2': 3}, 'FDP': {'FDP_ACC': 18, 'FDP_ACF': 22, 'FDP_DAU': 11, 'FDP_ITC': 15, 'FDP_ACC.1': 28, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 27, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_UCT': 9, 'FDP_UCT.1': 1, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_DAU.1': 2, 'FDP_ITC.1': 14, 'FDP_ITC.2': 11, 'FDP_IFC.1': 3}, 'FIA': {'FIA_API': 4, 'FIA_API.1': 13, 'FIA_UID': 13, 'FIA_UAU': 62, 'FIA_AFL': 13, 'FIA_API.1.1': 2, 'FIA_UID.1': 20, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 16, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 15, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 2, 'FIA_UAU.6': 2, 'FIA_AFL.1': 2}, 'FMT': {'FMT_LIM': 4, 'FMT_LIM.1': 21, 'FMT_LIM.2': 19, 'FMT_MOF': 25, 'FMT_MTD': 148, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_MTD.1': 18, 'FMT_SMF.1': 53, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 52, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.3': 8, 'FMT_MTD.3.1': 1, 'FMT_MOF.1': 2, 'FMT_MSA.3': 9, 'FMT_MSA.1': 3}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 22, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 13, 'FPT_FLS.1.1': 1, 'FPT_TST.1': 13, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 14, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC': 11, 'FTP_ITC.1': 9, 'FTP_TRP.1': 6}}, 'cc_claims': {'A': {'A.MRTD_': 1}, 'OE': {'OE.MRTD_': 6, 'OE.BAC_PP': 6}}, 'vendor': {'Infineon': {'Infineon': 4}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 277}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 23, 'AES128': 3, 'AES192': 3, 'AES256': 3, 'AES-': 1}}, 'DES': {'DES': {'DES': 7}, '3DES': {'Triple-DES': 11, '3DES': 8, 'TDES': 1}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 5}}, 'FF': {'DH': {'Diffie-Hellman': 3, 'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 4, 'SHA-1': 11}, 'SHA2': {'SHA256': 2, 'SHA384': 2, 'SHA512': 2, 'SHA-224': 3, 'SHA-256': 10, 'SHA-384': 5, 'SHA-512': 9, 'SHA2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 10}}, 'crypto_protocol': {'PACE': {'PACE': 20}}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 13}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 3, 'Physical tampering': 1, 'Physical Tampering': 3, 'Malfunction': 5, 'malfunction': 6, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 25, 'EF.DG13': 1, 'EF.DG16': 25, 'EF.DG2': 6, 'EF.DG3': 20, 'EF.DG4': 19, 'EF.DG5': 5, 'EF.DG14': 4, 'EF.DG15': 1, 'EF.COM': 16, 'EF.SOD': 14}}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 186-3': 1, 'FIPS 197': 1, 'FIPS PUB 197': 1, 'FIPS 46-3': 1}, 'PKCS': {'PKCS#3': 4, 'PKCS#1': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 14443': 6, 'ISO/IEC 7816-4': 1, 'ISO/IEC 18013': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 11770-2': 1, 'ISO/IEC 11770-3': 1, 'ISO/IEC 9796-2': 1}, 'ICAO': {'ICAO': 17}, 'SCP': {'SCP02': 1, 'SCP03': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2022_15en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/29']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/29']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]} values added.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_15en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_15.pdf, code: 408'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_15.pdf, code: nok'].
    • The st_pdf_hash property was set to 5fa70ba1f39d1bdec43f722f9449d8f8e9ee4eb09144cba09aeb2bc7647e2ec6.
    • The st_txt_hash property was set to 37f997a8d61c26dd44290aeda4e0ebea9fb2281301c87509e275fafe8b0888f7.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1617442, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 157, '/Author': 'KUMAR Prem', '/Category': 'Document type', '/Classification': 'Classification', '/Comments': '', '/Company': 'Company', '/CreationDate': "D:20220201141800+05'30'", '/Creator': 'Acrobat PDFMaker 21 for Word', '/DocumentTitle': 'Document title', '/IDEMIAClassification': 'PUBLIC', '/IDEMIATechnology': 'Not Controlled', '/IssueDate': 'Issue date', '/Keywords': '', '/MORPHOClassification': 'PUBLIC', '/MORPHOTechnology': 'Not Controlled', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_ActionId': 'ba849d49-45b6-4445-8835-eea6fcd48c94', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application': 'Microsoft Azure Information Protection', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled': 'True', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method': 'Manual', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name': 'Public', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner': 'g509704@mph.morpho.com', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate': '2021-11-26T12:30:37.2752762Z', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId': '7694d41c-5504-43d9-9e40-cb254ad755ec', '/Manager': '', '/ModDate': "D:20220201144319+05'30'", '/Producer': 'Adobe PDF Library 21.11.71', '/ProjectName': 'Project name', '/Reference': 'Reference', '/Sensitivity': 'Public', '/SourceModified': 'D:20220201072839', '/Status': 'Status', '/Subject': '', '/Title': 'CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) Public Security Target', '/TitusGUID': 'fc098978-a09a-4110-a612-da1ab7eb03a2', '/Version': 'Version', '/aliashClassificationHeaderforWordC': '', '/aliashClassificationHeaderforWordRS': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/29': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055-2009': 1, 'BSI-PP-0056': 2, 'BSI-CC-PP0056-V2-': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0068-V2-': 1, 'BSI-CC-PP-0059-2009-MA-02': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP- 0071-2012-MA-01': 1, 'BSI-CC-PP-0072-2012-': 1, 'BSI-CC-PP-0076-2013-MA-': 1}, 'other': {'PP-SSCD2': 2, 'PP-SSCD3': 2, 'PP-SSCD4': 2, 'PP-SSCD5': 2, 'PP-SSCD6': 2}}, 'cc_security_level': {'EAL': {'EAL5': 7, 'EAL 5': 1, 'EAL 5+': 1, 'EAL5 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 16, 'ADV_FSP': 1, 'ADV_FSP.5': 22, 'ADV_IMP': 1, 'ADV_IMP.1': 16, 'ADV_INT': 1, 'ADV_INT.2': 8, 'ADV_TDS': 1, 'ADV_TDS.4': 23, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 4, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2}, 'AGD': {'AGD_PRE': 8, 'AGD_OPE': 7, 'AGD_OPE.1': 16, 'AGD_PRE.1': 12}, 'ALC': {'ALC_DVS.2': 15, 'ALC_DVS': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 16, 'ALC_CMS': 1, 'ALC_CMS.5': 7, 'ALC_DEL': 1, 'ALC_DEL.1': 6, 'ALC_LCD': 1, 'ALC_LCD.1': 9, 'ALC_TAT': 1, 'ALC_TAT.2': 12, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 8, 'ATE_DPT': 1, 'ATE_DPT.3': 7, 'ATE_FUN': 1, 'ATE_FUN.1': 14, 'ATE_IND': 1, 'ATE_IND.2': 7, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 2, 'AVA_VAN.3': 1}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 15, 'ASE_ECD': 1, 'ASE_ECD.1': 14, 'ASE_INT': 1, 'ASE_INT.1': 17, 'ASE_OBJ': 1, 'ASE_OBJ.2': 13, 'ASE_REQ': 1, 'ASE_REQ.2': 15, 'ASE_SPD': 1, 'ASE_SPD.1': 8, 'ASE_APD.1': 1, 'ASE_TSS': 1, 'ASE_TSS.1': 6, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_SAS.1': 15, 'FAU_GEN': 2, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND': 2, 'FCS_RND.1': 23, 'FCS_CKM': 60, 'FCS_RND.1.1': 2, 'FCS_CKM.1': 15, 'FCS_CKM.4': 44, 'FCS_CKM.4.1': 1, 'FCS_COP': 125, 'FCS_COP.1': 12, 'FCS_CKM.2': 3}, 'FDP': {'FDP_ACC': 18, 'FDP_ACF': 22, 'FDP_DAU': 11, 'FDP_ITC': 15, 'FDP_ACC.1': 28, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 27, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_UCT': 9, 'FDP_UCT.1': 1, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_DAU.1': 2, 'FDP_ITC.1': 14, 'FDP_ITC.2': 11, 'FDP_IFC.1': 3}, 'FIA': {'FIA_API': 4, 'FIA_API.1': 13, 'FIA_UID': 13, 'FIA_UAU': 62, 'FIA_AFL': 13, 'FIA_API.1.1': 2, 'FIA_UID.1': 20, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 16, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 15, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 2, 'FIA_UAU.6': 2, 'FIA_AFL.1': 2}, 'FMT': {'FMT_LIM': 4, 'FMT_LIM.1': 21, 'FMT_LIM.2': 19, 'FMT_MOF': 25, 'FMT_MTD': 148, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_MTD.1': 18, 'FMT_SMF.1': 53, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 52, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.3': 8, 'FMT_MTD.3.1': 1, 'FMT_MOF.1': 2, 'FMT_MSA.3': 9, 'FMT_MSA.1': 3}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 22, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 13, 'FPT_FLS.1.1': 1, 'FPT_TST.1': 13, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 14, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC': 11, 'FTP_ITC.1': 9, 'FTP_TRP.1': 6}}, 'cc_claims': {'A': {'A.MRTD_': 1}, 'OE': {'OE.MRTD_': 6, 'OE.BAC_PP': 6}}, 'vendor': {'Infineon': {'Infineon': 4}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 277}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 23, 'AES128': 3, 'AES192': 3, 'AES256': 3, 'AES-': 1}}, 'DES': {'DES': {'DES': 7}, '3DES': {'Triple-DES': 11, '3DES': 8, 'TDES': 1}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 5}}, 'FF': {'DH': {'Diffie-Hellman': 3, 'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 4, 'SHA-1': 11}, 'SHA2': {'SHA256': 2, 'SHA384': 2, 'SHA512': 2, 'SHA-224': 3, 'SHA-256': 10, 'SHA-384': 5, 'SHA-512': 9, 'SHA2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 10}}, 'crypto_protocol': {'PACE': {'PACE': 20}}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 13}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 3, 'Physical tampering': 1, 'Physical Tampering': 3, 'Malfunction': 5, 'malfunction': 6, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 25, 'EF.DG13': 1, 'EF.DG16': 25, 'EF.DG2': 6, 'EF.DG3': 20, 'EF.DG4': 19, 'EF.DG5': 5, 'EF.DG14': 4, 'EF.DG15': 1, 'EF.COM': 16, 'EF.SOD': 14}}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 186-3': 1, 'FIPS 197': 1, 'FIPS PUB 197': 1, 'FIPS 46-3': 1}, 'PKCS': {'PKCS#3': 4, 'PKCS#1': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 14443': 6, 'ISO/IEC 7816-4': 1, 'ISO/IEC 18013': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 11770-2': 1, 'ISO/IEC 11770-3': 1, 'ISO/IEC 9796-2': 1}, 'ICAO': {'ICAO': 17}, 'SCP': {'SCP02': 1, 'SCP03': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2022_15en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/29']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/29']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_15en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/certificat-cc-2022_15.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.idemia.com.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056b.pdf', 'pp_ids': None}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'MRTD-PP_V1.10', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056b.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0056b.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/36']}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2022_15.pdf', 'st_filename': 'anssi-cible-cc-2022_15en.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1107-2020': 4}}}}, 'cc_sar': {'__update__': {'ALC': {'__insert__': {'ALC_FLR': 1}}}}, 'vendor': {'__update__': {'Idemia': {'__update__': {'IDEMIA': 19}}}}, 'eval_facility': {'__insert__': {'CESTI': {'CESTI': 2}}, '__update__': {'CEA-LETI': {'__insert__': {'CEA-LETI': 2}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 2}}, 'CC': {'__insert__': {'CCMB-2017-04-003': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 5+': 1}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 16, 'ADV_FSP.5': 22, 'ADV_IMP.1': 16, 'ADV_INT.2': 8, 'ADV_TDS.4': 23}}, 'AGD': {'__update__': {'AGD_OPE.1': 16, 'AGD_PRE.1': 12}}, 'ALC': {'__update__': {'ALC_DVS.2': 15, 'ALC_CMC.4': 16, 'ALC_CMS.5': 7, 'ALC_DEL.1': 6, 'ALC_DVS': 2, 'ALC_LCD.1': 9, 'ALC_TAT.2': 12}}, 'ATE': {'__update__': {'ATE_COV.2': 8, 'ATE_DPT.3': 7, 'ATE_FUN.1': 14, 'ATE_IND.2': 7}}, 'AVA': {'__update__': {'AVA_VAN.5': 15, 'AVA_VAN': 2}}, 'ASE': {'__insert__': {'ASE_APD.1': 1}, '__update__': {'ASE_CCL.1': 15, 'ASE_ECD.1': 14, 'ASE_INT.1': 17, 'ASE_OBJ.2': 13, 'ASE_REQ.2': 15, 'ASE_SPD.1': 8, 'ASE_TSS.1': 6}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 15}}, 'FCS': {'__insert__': {'FCS_CKM': 60, 'FCS_COP': 125}, '__update__': {'FCS_COP.1': 12, 'FCS_CKM.1': 15}}, 'FDP': {'__insert__': {'FDP_ACC': 18, 'FDP_DAU': 11, 'FDP_ITC': 15, 'FDP_UCT': 9, 'FDP_UCT.1': 1, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_DAU.1': 2}, '__update__': {'FDP_ACF': 22, 'FDP_ACC.1': 28, 'FDP_ACF.1': 27, 'FDP_ITC.1': 14}}, 'FIA': {'__insert__': {'FIA_UID': 13, 'FIA_UAU': 62, 'FIA_AFL': 13, 'FIA_UAU.5': 2, 'FIA_UAU.6': 2, 'FIA_AFL.1': 2}, '__update__': {'FIA_UID.1': 20, 'FIA_UAU.1': 16}}, 'FMT': {'__insert__': {'FMT_MOF': 25, 'FMT_MTD': 148, 'FMT_MOF.1': 2}, '__update__': {'FMT_LIM.2': 19, 'FMT_MTD.1': 18}}, 'FPT': {'__update__': {'FPT_EMS.1': 22, 'FPT_TST.1': 13, 'FPT_PHP.3': 14}}, 'FTP': {'__insert__': {'FTP_ITC': 11}, '__update__': {'FTP_ITC.1': 9}}}}, 'vendor': {'__update__': {'Idemia': {'__update__': {'IDEMIA': 277}}, 'Morpho': {'__update__': {'Morpho': 1}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 23}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 7}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 3}}}, '__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 10}}}, '__delete__': ['KA']}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 20}}}}, 'randomness': {}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'Malfunction': 5, 'malfunction': 6}}}}, 'tee_name': {}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.COM': 16}}}}, 'standard_id': {'__insert__': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, '__update__': {'ISO': {'__insert__': {'ISO/IEC 11770-2': 1, 'ISO/IEC 11770-3': 1}}, 'ICAO': {'__update__': {'ICAO': 17}}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/29']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/29']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-2020', 'ANSSI-CC-2021/29']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-2020', 'ANSSI-CC-2021/29', 'ANSSI-CC-2021/36']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}]} values added.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 197264, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/Author': 'qualite@intranet.fr', '/Category': 'SAAAAR : 203742', '/Comments': 'ANSSI-CC-CER-F-07_v31.2', '/Company': 'IDEMIA', '/CreationDate': "D:20220309145738+01'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/Keywords': '[ANSSI Crypto]', '/ModDate': "D:20220309145739+01'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20220309135730', '/Subject': 'CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration)', '/Title': 'ANSSI-CC-2022/15', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'mailto:certification@ssi.gouv.fr', 'http://www.ssi.gouv.fr/', 'http://www.sogis.eu/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1617442, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 157, '/Author': 'KUMAR Prem', '/Category': 'Document type', '/Classification': 'Classification', '/Comments': '', '/Company': 'Company', '/CreationDate': "D:20220201141800+05'30'", '/Creator': 'Acrobat PDFMaker 21 for Word', '/DocumentTitle': 'Document title', '/IDEMIAClassification': 'PUBLIC', '/IDEMIATechnology': 'Not Controlled', '/IssueDate': 'Issue date', '/Keywords': '', '/MORPHOClassification': 'PUBLIC', '/MORPHOTechnology': 'Not Controlled', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_ActionId': 'ba849d49-45b6-4445-8835-eea6fcd48c94', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application': 'Microsoft Azure Information Protection', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled': 'True', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method': 'Manual', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name': 'Public', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner': 'g509704@mph.morpho.com', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate': '2021-11-26T12:30:37.2752762Z', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId': '7694d41c-5504-43d9-9e40-cb254ad755ec', '/Manager': '', '/ModDate': "D:20220201144319+05'30'", '/Producer': 'Adobe PDF Library 21.11.71', '/ProjectName': 'Project name', '/Reference': 'Reference', '/Sensitivity': 'Public', '/SourceModified': 'D:20220201072839', '/Status': 'Status', '/Subject': '', '/Title': 'CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) Public Security Target', '/TitusGUID': 'fc098978-a09a-4110-a612-da1ab7eb03a2', '/Version': 'Version', '/aliashClassificationHeaderforWordC': '', '/aliashClassificationHeaderforWordRS': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056b.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/c24f7253b10c0356.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/c24f7253b10c0356.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/c24f7253b10c0356.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/c24f7253b10c0356.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1107-2020': 2}, 'FR': {'ANSSI-CC-2022/15': 4, 'ANSSI-CC-2021/29': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-2009': 2}}, 'cc_security_level': {'EAL': {'EAL 5': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'AGD': {'AGD_PRE': 2, 'AGD_OPE': 1}, 'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 15}}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 6}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 13}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/29': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055-2009': 1, 'BSI-PP-0056': 2, 'BSI-CC-PP0056-V2-': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0068-V2-': 1, 'BSI-CC-PP-0059-2009-MA-02': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP- 0071-2012-MA-01': 1, 'BSI-CC-PP-0072-2012-': 1, 'BSI-CC-PP-0076-2013-MA-': 1}, 'other': {'PP-SSCD2': 2, 'PP-SSCD3': 2, 'PP-SSCD4': 2, 'PP-SSCD5': 2, 'PP-SSCD6': 2}}, 'cc_security_level': {'EAL': {'EAL5': 7, 'EAL 5': 1, 'EAL5 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 7, 'ADV_FSP': 1, 'ADV_FSP.5': 10, 'ADV_IMP': 1, 'ADV_IMP.1': 11, 'ADV_INT': 1, 'ADV_INT.2': 2, 'ADV_TDS': 1, 'ADV_TDS.4': 9, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 4, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2}, 'AGD': {'AGD_PRE': 8, 'AGD_OPE': 7, 'AGD_OPE.1': 7, 'AGD_PRE.1': 7}, 'ALC': {'ALC_DVS.2': 10, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.5': 3, 'ALC_DEL': 1, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 4, 'ALC_TAT': 1, 'ALC_TAT.2': 4, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 4, 'ATE_DPT': 1, 'ATE_DPT.3': 3, 'ATE_FUN': 1, 'ATE_FUN.1': 8, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 8, 'AVA_VAN.3': 1, 'AVA_VAN': 1}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 6, 'ASE_INT': 1, 'ASE_INT.1': 6, 'ASE_OBJ': 1, 'ASE_OBJ.2': 4, 'ASE_REQ': 1, 'ASE_REQ.2': 4, 'ASE_SPD': 1, 'ASE_SPD.1': 4, 'ASE_TSS': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_SAS.1': 13, 'FAU_GEN': 2, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND': 2, 'FCS_RND.1': 23, 'FCS_RND.1.1': 2, 'FCS_CKM.4': 44, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 12}, 'FDP': {'FDP_ACF': 1, 'FDP_ACC.1': 27, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 21, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_ITC.1': 11, 'FDP_ITC.2': 11, 'FDP_IFC.1': 3}, 'FIA': {'FIA_API': 4, 'FIA_API.1': 13, 'FIA_API.1.1': 2, 'FIA_UID.1': 18, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 14, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 15, 'FIA_UAU.4.1': 1}, 'FMT': {'FMT_LIM': 4, 'FMT_LIM.1': 21, 'FMT_LIM.2': 20, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMF.1': 53, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 52, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.3': 8, 'FMT_MTD.3.1': 1, 'FMT_MSA.3': 9, 'FMT_MTD.1': 1, 'FMT_MSA.1': 3}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 21, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 13, 'FPT_FLS.1.1': 1, 'FPT_TST.1': 11, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 11, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC.1': 6, 'FTP_TRP.1': 6}}, 'cc_claims': {'A': {'A.MRTD_': 1}, 'OE': {'OE.MRTD_': 6, 'OE.BAC_PP': 6}}, 'vendor': {'Infineon': {'Infineon': 4}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 120}, 'Morpho': {'Morpho': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22, 'AES128': 3, 'AES192': 3, 'AES256': 3, 'AES-': 1}}, 'DES': {'DES': {'DES': 27}, '3DES': {'Triple-DES': 11, '3DES': 8, 'TDES': 1}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 5}}, 'FF': {'DH': {'Diffie-Hellman': 3, 'DH': 7}, 'DSA': {'DSA': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 4, 'SHA-1': 11}, 'SHA2': {'SHA256': 2, 'SHA384': 2, 'SHA512': 2, 'SHA-224': 3, 'SHA-256': 10, 'SHA-384': 5, 'SHA-512': 9, 'SHA2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 53}, 'KA': {'KA': 6}}, 'crypto_protocol': {'PACE': {'PACE': 25}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 13}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 3, 'Physical tampering': 1, 'Physical Tampering': 3, 'Malfunction': 16, 'malfunction': 5, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 14}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 25, 'EF.DG13': 1, 'EF.DG16': 25, 'EF.DG2': 6, 'EF.DG3': 20, 'EF.DG4': 19, 'EF.DG5': 5, 'EF.DG14': 4, 'EF.DG15': 1, 'EF.COM': 15, 'EF.SOD': 14}}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 186-3': 1, 'FIPS 197': 1, 'FIPS PUB 197': 1, 'FIPS 46-3': 1}, 'PKCS': {'PKCS#3': 4, 'PKCS#1': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 14443': 6, 'ISO/IEC 7816-4': 1, 'ISO/IEC 18013': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 9796-2': 1}, 'ICAO': {'ICAO': 74}, 'SCP': {'SCP02': 1, 'SCP03': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '9f82f3dc5e5f18e278c5c27298caa3349333905f548aa899b5e3dbcdeadca6f7', 'st_pdf_hash': '5fa70ba1f39d1bdec43f722f9449d8f8e9ee4eb09144cba09aeb2bc7647e2ec6', 'report_txt_hash': 'f153586915c1d2c9fb070b43c1ecf6111a8683f4143dc44469c4a8ab96add552', 'st_txt_hash': '37f997a8d61c26dd44290aeda4e0ebea9fb2281301c87509e275fafe8b0888f7'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 6}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 22, 'AES128': 3, 'AES192': 3, 'AES256': 3, 'AES-': 1, 'DES': 18, '3DES': 8, 'TDES': 1, 'KMAC': 1}, 'rules_asymmetric_crypto': {'ECDH': 4, 'ECDSA': 5, 'Diffie-Hellman': 3, 'DH': 7, 'DSA': 6}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 4, 'SHA-1': 11, 'SHA256': 2, 'SHA384': 2, 'SHA512': 2, 'SHA-224': 3, 'SHA-256': 10, 'SHA-384': 5, 'SHA-512': 9}, 'rules_crypto_schemes': {'PACE': 25, 'MAC': 53}, 'rules_randomness': {'RND': 2}, 'rules_tee': {'SE': 14}, 'rules_side_channels': {'Malfunction': 16, 'malfunction': 5, 'physical probing': 4, 'physical tampering': 3, 'Physical tampering': 1, 'Physical Tampering': 3, 'SPA': 1, 'DPA': 2, 'fault injection': 1, 'timing attacks': 1, 'reverse engineering': 1}} values inserted.
  • 01.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1617442, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 157, '/Author': 'KUMAR Prem', '/Category': 'Document type', '/Classification': 'Classification', '/Comments': '', '/Company': 'Company', '/CreationDate': "D:20220201141800+05'30'", '/Creator': 'Acrobat PDFMaker 21 for Word', '/DocumentTitle': 'Document title', '/IDEMIAClassification': 'PUBLIC', '/IDEMIATechnology': 'Not Controlled', '/IssueDate': 'Issue date', '/Keywords': '', '/MORPHOClassification': 'PUBLIC', '/MORPHOTechnology': 'Not Controlled', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_ActionId': 'ba849d49-45b6-4445-8835-eea6fcd48c94', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application': 'Microsoft Azure Information Protection', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled': 'True', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method': 'Manual', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name': 'Public', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner': 'g509704@mph.morpho.com', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate': '2021-11-26T12:30:37.2752762Z', '/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId': '7694d41c-5504-43d9-9e40-cb254ad755ec', '/Manager': '', '/ModDate': "D:20220201144319+05'30'", '/Producer': 'Adobe PDF Library 21.11.71', '/ProjectName': 'Project name', '/Reference': 'Reference', '/Sensitivity': 'Public', '/SourceModified': 'D:20220201072839', '/Status': 'Status', '/Subject': '', '/Title': 'CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) Public Security Target', '/TitusGUID': 'fc098978-a09a-4110-a612-da1ab7eb03a2', '/Version': 'Version', '/aliashClassificationHeaderforWordC': '', '/aliashClassificationHeaderforWordRS': ''}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'rules_vendor': {'Infineon': 4, 'Oberthur': 1, 'IDEMIA': 120}, 'rules_cert_id': {'ANSSI-CC-2021/29': 1}, 'rules_protection_profiles': {'BSI-CC-PP-0055-2009': 1, 'BSI-PP-0056': 2, 'BSI-CC-PP0056-V2-': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0068-V2-': 1, 'BSI-CC-PP-0059-2009-MA-02': 1, 'BSI-CC-PP-0075-2012-MA-01': 1, 'BSI-CC-PP- 0071-2012-MA-01': 1, 'BSI-CC-PP-0072-2012-': 1, 'BSI-CC-PP-0076-2013-MA-': 1, 'PP-SSCD2': 2, 'PP-SSCD3': 2, 'PP-SSCD4': 2, 'PP-SSCD5': 2, 'PP-SSCD6': 2}, 'rules_technical_reports': {}, 'rules_device_id': {}, 'rules_os': {}, 'rules_standard_id': {'FIPS 180-4': 1, 'FIPS 186-3': 1, 'FIPS 46-3': 1, 'FIPS 197': 1, 'FIPS PUB 197': 1, 'PKCS#3': 4, 'PKCS#1': 1, 'RFC3369': 1, 'ISO/IEC 14443': 3, 'ISO/IEC 7816-4': 1, 'ISO/IEC 18013': 1, 'ISO/IEC 9797-1': 1, 'ISO/IEC 9796-2': 1, 'ICAO': 74, 'SCP02': 1, 'SCP03': 1}, 'rules_security_level': {'EAL5': 7, 'EAL 5': 1, 'EAL5 augmented': 3}, 'rules_security_assurance_components': {'ADV_ARC': 1, 'ADV_ARC.1': 7, 'ADV_FSP': 1, 'ADV_FSP.5': 10, 'ADV_IMP': 1, 'ADV_IMP.1': 11, 'ADV_INT': 1, 'ADV_INT.2': 2, 'ADV_TDS': 1, 'ADV_TDS.4': 9, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 4, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2, 'AGD_PRE': 8, 'AGD_OPE': 7, 'AGD_OPE.1': 7, 'AGD_PRE.1': 7, 'ALC_DVS.2': 10, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.5': 3, 'ALC_DEL': 1, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 4, 'ALC_TAT': 1, 'ALC_TAT.2': 4, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ATE_COV': 1, 'ATE_COV.2': 4, 'ATE_DPT': 1, 'ATE_DPT.3': 3, 'ATE_FUN': 1, 'ATE_FUN.1': 8, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2, 'ATE_DPT.1': 2, 'AVA_VAN.5': 8, 'AVA_VAN.3': 1, 'AVA_VAN': 1, 'APE_SRE': 1, 'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 6, 'ASE_INT': 1, 'ASE_INT.1': 6, 'ASE_OBJ': 1, 'ASE_OBJ.2': 4, 'ASE_REQ': 1, 'ASE_REQ.2': 4, 'ASE_SPD': 1, 'ASE_SPD.1': 4, 'ASE_TSS': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}, 'rules_security_functional_components': {'FAU_SAS': 6, 'FAU_SAS.1': 13, 'FAU_GEN': 2, 'FAU_SAS.1.1': 1, 'FCS_RND': 2, 'FCS_RND.1': 23, 'FCS_RND.1.1': 2, 'FCS_CKM.4': 44, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 12, 'FDP_ACF': 1, 'FDP_ACC.1': 27, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 21, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_ITC.1': 11, 'FDP_ITC.2': 11, 'FDP_IFC.1': 3, 'FIA_API': 4, 'FIA_API.1': 13, 'FIA_API.1.1': 2, 'FIA_UID.1': 18, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 14, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 15, 'FIA_UAU.4.1': 1, 'FMT_LIM': 4, 'FMT_LIM.1': 21, 'FMT_LIM.2': 20, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMF.1': 53, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 52, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.3': 8, 'FMT_MTD.3.1': 1, 'FMT_MSA.3': 9, 'FMT_MTD.1': 1, 'FMT_MSA.1': 3, 'FPT_EMS': 5, 'FPT_EMS.1': 21, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 13, 'FPT_FLS.1.1': 1, 'FPT_TST.1': 11, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 11, 'FPT_PHP.3.1': 1, 'FTP_ITC.1': 6, 'FTP_TRP.1': 6}, 'rules_cc_claims': {'A.MRTD_': 1, 'OE.MRTD_': 6, 'OE.BAC_PP': 6}, 'rules_javacard': {}, 'rules_javacard_api_consts': {}, 'rules_javacard_packages': {}, 'rules_crypto_algs': {'SHA256': 2, 'SHA384': 2, 'SHA512': 2, 'SHA-224': 3, 'SHA-256': 10, 'SHA-384': 5, 'SHA-512': 9, 'AES': 22, 'AES128': 3, 'AES192': 3, 'AES256': 3, 'AES-': 1, 'SHA-1': 11, 'Diffie-Hellman': 3, 'DH': 7, 'ECDH': 4, 'ECDSA': 5, 'DES': 18, '3DES': 8, 'TDES': 1, 'RND': 2, 'PACE': 25}, 'rules_block_cipher_modes': {'ECB': 2, 'CBC': 13}, 'rules_ecc_curves': {}, 'rules_cplc': {}, 'rules_crypto_engines': {}, 'rules_crypto_libs': {}, 'rules_IC_data_groups': {'EF.DG1': 25, 'EF.DG13': 1, 'EF.DG16': 25, 'EF.DG2': 6, 'EF.DG3': 20, 'EF.DG4': 19, 'EF.DG5': 5, 'EF.DG14': 4, 'EF.DG15': 1, 'EF.COM': 15, 'EF.SOD': 14}, 'rules_defenses': {'Malfunction': 16, 'malfunction': 5, 'physical probing': 4, 'physical tampering': 3, 'Physical tampering': 1, 'Physical Tampering': 3, 'SPA': 1, 'DPA': 2, 'fault injection': 1, 'timing attacks': 1}, 'rules_certification_process': {}, 'rules_vulnerabilities': {}, 'rules_other': {}}.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 31.05.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_15.pdf, code: nok'].

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 30.03.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) SAAAAR : 203742 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat-cc-2022_15.pdf",
  "dgst": "c24f7253b10c0356",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2022/15",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_APD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "203742"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2022/16v2",
          "ANSSI-CC-2022/15v2"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/29",
          "BSI-DSZ-CC-1107-2020"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2022/16v2",
          "ANSSI-CC-2022/15v2"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/29",
          "BSI-DSZ-CC-1107-2020"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "2022/17v2",
      "description": "Le produit \u00e9valu\u00e9 est la carte \u00e0 puce \u00ab CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration), SAAAAR : 203742 \u00bb d\u00e9velopp\u00e9e par IDEMIA, sur un micro-contr\u00f4leur d\u00e9velopp\u00e9 par INFINEON.\n\n\nLe produit \u00e9valu\u00e9 est de type \u00ab carte \u00e0 puce \u00bb pouvant \u00eatre utilis\u00e9 en modes avec et sans contact. Il impl\u00e9mente les fonctions de document de voyage \u00e9lectronique conform\u00e9ment aux sp\u00e9ci",
      "developer": "IDEMIA INFINEON TECHNOLOGIES AG",
      "enhanced": {
        "augmented": "ALC_DVS.2, AVA_VAN.5",
        "category": "",
        "cc_version": "",
        "cert_id": "2022/17v2",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-ANSSI-CC-2022_17v2.pdf",
        "certification_date": "05/05/2023",
        "developer": "IDEMIA INFINEON TECHNOLOGIES AG",
        "evaluation_facility": "CEA - LETI",
        "level": "",
        "mutual_recognition": "",
        "protection_profile": "Machine Readable Travel Document with \"ICAO Application\", Extended Access Control version 1.3.2, BSI-CC-PP-0056-V2-2012-MA02 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1, BSI-CC-PP-0068-V2-2011-MA-01",
        "sponsor": "IDEMIA INFINEON TECHNOLOGIES AG"
      },
      "product": "CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742",
      "sponsor": "IDEMIA INFINEON TECHNOLOGIES AG",
      "url": "https://cyber.gouv.fr/produits-certifies/combicao-applet-v3-id-one-cosmo-x-eac-pace-french-id-configuration-saaaar-0"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/29"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/29"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) SAAAAR : 203742",
  "not_valid_after": "2023-05-05",
  "not_valid_before": "2022-03-08",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-cc-2022_15.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2022/15": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-2009": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "DUCLOS Charlene",
      "/Category": " ",
      "/Comments": "ANSSI-CC-CER-F-14_v14.6",
      "/Company": "SGDSN",
      "/CreationDate": "D:20220309145829+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 pour Word",
      "/Keywords": "version 3.1, r\u00e9vision 5",
      "/ModDate": "D:20220309145830+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 11.0",
      "/SourceModified": "D:20220309135818",
      "/Title": "ANSSI-CC-2022/15",
      "pdf_file_size_bytes": 100984,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2022_15.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-2020": 2
        },
        "FR": {
          "ANSSI-CC-2021/29": 1,
          "ANSSI-CC-2022/15": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-2009": 2
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 2
        },
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1,
          "CEA-LETI": 2
        },
        "CESTI": {
          "CESTI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "ICAO": {
          "ICAO": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 19
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "qualite@intranet.fr",
      "/Category": "SAAAAR : 203742",
      "/Comments": "ANSSI-CC-CER-F-07_v31.2",
      "/Company": "IDEMIA",
      "/CreationDate": "D:20220309145738+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 pour Word",
      "/Keywords": "[ANSSI Crypto]",
      "/ModDate": "D:20220309145739+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 11.0",
      "/SourceModified": "D:20220309135730",
      "/Subject": "CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration)",
      "/Title": "ANSSI-CC-2022/15",
      "pdf_file_size_bytes": 197264,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogis.eu/",
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/",
          "mailto:certification@ssi.gouv.fr"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "anssi-cible-cc-2022_15en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 3
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/29": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.MRTD_": 1
        },
        "OE": {
          "OE.BAC_PP": 6,
          "OE.MRTD_": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0071-2012-MA-01": 1,
          "BSI-CC-PP-0055-2009": 1,
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0068-V2-": 1,
          "BSI-CC-PP-0072-2012-": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1,
          "BSI-CC-PP-0076-2013-MA-": 1,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP0056-V2-": 1,
          "BSI-PP-0056": 2
        },
        "other": {
          "PP-SSCD2": 2,
          "PP-SSCD3": 2,
          "PP-SSCD4": 2,
          "PP-SSCD5": 2,
          "PP-SSCD6": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 16,
          "ADV_FSP": 1,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 22,
          "ADV_IMP": 1,
          "ADV_IMP.1": 16,
          "ADV_INT": 1,
          "ADV_INT.2": 8,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 23
        },
        "AGD": {
          "AGD_OPE": 7,
          "AGD_OPE.1": 16,
          "AGD_PRE": 8,
          "AGD_PRE.1": 12
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 16,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 7,
          "ALC_DEL": 1,
          "ALC_DEL.1": 6,
          "ALC_DVS": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 15,
          "ALC_LCD": 1,
          "ALC_LCD.1": 9,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 12
        },
        "APE": {
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_APD.1": 1,
          "ASE_CCL": 1,
          "ASE_CCL.1": 15,
          "ASE_ECD": 1,
          "ASE_ECD.1": 14,
          "ASE_INT": 1,
          "ASE_INT.1": 17,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 13,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 15,
          "ASE_SPD": 1,
          "ASE_SPD.1": 8,
          "ASE_TSS": 1,
          "ASE_TSS.1": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 2,
          "ATE_COV.2": 8,
          "ATE_DPT": 1,
          "ATE_DPT.1": 2,
          "ATE_DPT.3": 7,
          "ATE_FUN": 1,
          "ATE_FUN.1": 14,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.3": 1,
          "AVA_VAN.5": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5+": 1,
          "EAL5": 7,
          "EAL5 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_SAS": 6,
          "FAU_SAS.1": 15,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 60,
          "FCS_CKM.1": 15,
          "FCS_CKM.2": 3,
          "FCS_CKM.4": 44,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 125,
          "FCS_COP.1": 12,
          "FCS_RND": 2,
          "FCS_RND.1": 23,
          "FCS_RND.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 18,
          "FDP_ACC.1": 28,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 22,
          "FDP_ACF.1": 27,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 2,
          "FDP_DAU": 11,
          "FDP_DAU.1": 2,
          "FDP_IFC.1": 3,
          "FDP_ITC": 15,
          "FDP_ITC.1": 14,
          "FDP_ITC.2": 11,
          "FDP_UCT": 9,
          "FDP_UCT.1": 1,
          "FDP_UIT": 9,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 13,
          "FIA_AFL.1": 2,
          "FIA_API": 4,
          "FIA_API.1": 13,
          "FIA_API.1.1": 2,
          "FIA_UAU": 62,
          "FIA_UAU.1": 16,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 15,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 2,
          "FIA_UAU.6": 2,
          "FIA_UID": 13,
          "FIA_UID.1": 20,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 4,
          "FMT_LIM.1": 21,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 19,
          "FMT_LIM.2.1": 2,
          "FMT_MOF": 25,
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 3,
          "FMT_MSA.3": 9,
          "FMT_MTD": 148,
          "FMT_MTD.1": 18,
          "FMT_MTD.3": 8,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 53,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 52,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 22,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 13,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.3": 14,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 13,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 11,
          "FTP_ITC.1": 9,
          "FTP_TRP.1": 6
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 13
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 20
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 10
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 11,
            "SHA1": 4
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 10,
            "SHA-384": 5,
            "SHA-512": 9,
            "SHA2": 2,
            "SHA256": 2,
            "SHA384": 2,
            "SHA512": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 16,
          "EF.DG1": 25,
          "EF.DG13": 1,
          "EF.DG14": 4,
          "EF.DG15": 1,
          "EF.DG16": 25,
          "EF.DG2": 6,
          "EF.DG3": 20,
          "EF.DG4": 19,
          "EF.DG5": 5,
          "EF.SOD": 14
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 5,
          "Physical Tampering": 3,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 6,
          "physical tampering": 3
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 4,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-3": 1,
          "FIPS 197": 1,
          "FIPS 46-3": 1,
          "FIPS PUB 197": 1
        },
        "ICAO": {
          "ICAO": 17
        },
        "ISO": {
          "ISO/IEC 11770-2": 1,
          "ISO/IEC 11770-3": 1,
          "ISO/IEC 14443": 6,
          "ISO/IEC 18013": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9796-2": 1,
          "ISO/IEC 9797-1": 1
        },
        "PKCS": {
          "PKCS#1": 1,
          "PKCS#3": 4
        },
        "RFC": {
          "RFC3369": 1
        },
        "SCP": {
          "SCP02": 1,
          "SCP03": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 23,
            "AES-": 1,
            "AES128": 3,
            "AES192": 3,
            "AES256": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 8,
            "TDES": 1,
            "Triple-DES": 11
          },
          "DES": {
            "DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 7,
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 277
        },
        "Infineon": {
          "Infineon": 4
        },
        "Morpho": {
          "Morpho": 1
        },
        "Oberthur": {
          "Oberthur Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "KUMAR Prem",
      "/Category": "Document type",
      "/Classification": "Classification",
      "/Comments": "",
      "/Company": "Company",
      "/CreationDate": "D:20220201141800+05\u002730\u0027",
      "/Creator": "Acrobat PDFMaker 21 for Word",
      "/DocumentTitle": "Document title",
      "/IDEMIAClassification": "PUBLIC",
      "/IDEMIATechnology": "Not Controlled",
      "/IssueDate": "Issue date",
      "/Keywords": "",
      "/MORPHOClassification": "PUBLIC",
      "/MORPHOTechnology": "Not Controlled",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_ActionId": "ba849d49-45b6-4445-8835-eea6fcd48c94",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application": "Microsoft Azure Information Protection",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled": "True",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method": "Manual",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name": "Public",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner": "g509704@mph.morpho.com",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate": "2021-11-26T12:30:37.2752762Z",
      "/MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId": "7694d41c-5504-43d9-9e40-cb254ad755ec",
      "/Manager": "",
      "/ModDate": "D:20220201144319+05\u002730\u0027",
      "/Producer": "Adobe PDF Library 21.11.71",
      "/ProjectName": "Project name",
      "/Reference": "Reference",
      "/Sensitivity": "Public",
      "/SourceModified": "D:20220201072839",
      "/Status": "Status",
      "/Subject": "",
      "/Title": "CombICAO Applet v3 on ID-One Cosmo X (EAC Configuration) Public Security Target",
      "/TitusGUID": "fc098978-a09a-4110-a612-da1ab7eb03a2",
      "/Version": "Version",
      "/aliashClassificationHeaderforWordC": "",
      "/aliashClassificationHeaderforWordRS": "",
      "pdf_file_size_bytes": 1617442,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 157
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0056b.pdf",
        "pp_name": "Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_15.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "ALC_DVS.2",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_15en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "739c5d21e0de24e2e388c48fba9d78b76d15a0e55bb90eb3fd8a23bc9048adcb",
      "txt_hash": "b5ada8530076f01120ac770785744fab1353cd0566329f6d6769fa56f5d00e17"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9f82f3dc5e5f18e278c5c27298caa3349333905f548aa899b5e3dbcdeadca6f7",
      "txt_hash": "f153586915c1d2c9fb070b43c1ecf6111a8683f4143dc44469c4a8ab96add552"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5fa70ba1f39d1bdec43f722f9449d8f8e9ee4eb09144cba09aeb2bc7647e2ec6",
      "txt_hash": "37f997a8d61c26dd44290aeda4e0ebea9fb2281301c87509e275fafe8b0888f7"
    }
  },
  "status": "archived"
}