This page was not yet optimized for use on mobile devices.
5G PK 5.2.2 Advanced SIM (D00233151F016B)
CSV information ?
Status | active |
---|---|
Valid from | 01.03.2023 |
Valid until | 01.03.2028 |
Scheme | 🇫🇷 FR |
Manufacturer | THALES DIS FRANCE SA |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL4+, ALC_DVS.2 |
Heuristics summary ?
Certificate ID: ANSSI-CC-2022/51
Certificate ?
Extracted keywords
JavaCard versions
Java Card 3.0.5, Global Platform 2.3.1Security level
EAL4, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Certificates
ANSSI-CC-2022/51, 2020-37-INF-3429- v1Certification report ?
Extracted keywords
Symmetric Algorithms
DESJavaCard versions
Java Card 3.0.5Vendor
Gemalto, ThalesSecurity level
EAL 4, EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
AGD_OPE, ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VANProtection profiles
BSI-PP-0084-2014Certificates
ANSSI-CC-2022/51, ANSSI-CC-2017/41, ANSSI-CC-2017/41-S05, 2020-37-INF-3429- v1Evaluation facilities
CESTIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003References
Outgoing- ANSSI-CC-2017/41 - MicrocontrĂ´leur ORION_CB_03
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES128, DES, TDES, 3DES, HMAC, KMAC, CMAC, CBC-MACAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, SHA224, SHA256, SHA384, SHA512, SHA-224, SHA3-224, SHA3-256, SHA3-384, SHA3-512, MD5Schemes
MAC, Key Agreement, Key agreementProtocols
TLSRandomness
RND, RNGBlock cipher modes
ECB, CBC, CTR, GCM, CCMTLS cipher suites
TLS_PSK_WITH_AES_128_CBC_S, TLS_PSK_WITH_NULL_SHA, TLS_PSK_WITH_NULL_SHA256JavaCard versions
Java Card 3.0.5, Global Platform 2.3.1JavaCard API constants
ALG_DES_CBC_NOPAD, ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_ISO9797_M2, ALG_DES_CBC_PKCS5, ALG_DES_ECB_NOPAD, ALG_DES_ECB_ISO9797_M1, ALG_DES_ECB_ISO9797_M2, ALG_DES_ECB_PKCS5, ALG_DES_MAC4_ISO9797_1_M1_ALG3, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC4_PKCS5, ALG_DES_MAC4_NOPAD, ALG_DES_MAC8_ISO9797_1_M1_ALG3, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_DES_MAC8_ISO9797_M1, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_PKCS5, ALG_DES_MAC8_NOPAD, ALG_RSA_MD5_PKCS1, ALG_RSA_MD5_PKCS1_PSS, ALG_RSA_MD5_RFC2409, ALG_RSA_RIPEMD160_ISO9796, ALG_RSA_RIPEMD160_PKCS1, ALG_RSA_RIPEMD160_PKCS1_PSS, ALG_RSA_RIPEMD160_ISO9796_MR, ALG_RSA_SHA_224_PKCS1, ALG_RSA_SHA_224_PKCS1_PSS, ALG_RSA_SHA_256_PKCS1, ALG_RSA_SHA_256_PKCS1_PSS, ALG_RSA_SHA_384_PKCS1, ALG_RSA_SHA_384_PKCS1_PSS, ALG_RSA_SHA_512_PKCS1, ALG_RSA_SHA_512_PKCS1_PSS, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_ISO9796_MR, ALG_RSA_SHA_PKCS1, ALG_RSA_SHA_PKCS1_PSS, ALG_RSA_SHA_RFC2409, ALG_RSA_NOPAD, ALG_RSA_PKCS1_OAEP, ALG_RSA_PKCS1, ALG_ECDSA_SHA, ALG_ECDSA_SHA_224, ALG_ECDSA_SHA_256, ALG_ECDSA_SHA_384, ALG_ECDSA_SHA_512, ALG_AES_BLOCK_128_CBC_NOPAD, ALG_AES_CBC_ISO9797_M1, ALG_AES_CBC_ISO9797_M2, ALG_AES_CBC_PKCS5, ALG_AES_BLOCK_128_ECB_NOPAD, ALG_AES_ECB_ISO9797_M1, ALG_AES_ECB_ISO9797_M2, ALG_AES_ECB_PKCS5, ALG_AES_CTR, ALG_AES_CCM, ALG_AES_GCM, ALG_AES_MAC_128_NOPAD, ALG_AES_CMAC_128, ALG_AES_MAC_192_NOPAD, ALG_AES_MAC_256_NOPAD, ALG_HMAC_MD5, ALG_HMAC_RIPEMD160, ALG_HMAC_SHA1, ALG_HMAC_SHA_256, ALG_HMAC_SHA_384, ALG_HMAC_SHA_512, ALG_EC_FP, ALG_EC_SVDP_DH, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC, ALG_EC_SVDP_DHC_PLAIN, ALG_EC_SVDP_DH_KDF, ALG_EC_SVDP_DH_PLAIN_XY, ALG_EC_SVDP_DHC_KDF, ALG_SHA_224, ALG_SHA_256, ALG_SHA_384, ALG_SHA_512, ALG_SHA3_224, ALG_SHA3_256, ALG_SHA3_384, ALG_SHA3_512, ALG_MD5, ALG_RIPEMD160, ALG_ISO3309_CRC16, ALG_ISO3309_CRC32, SIG_CIPHER_DES_MAC4, SIG_CIPHER_DES_MAC8, SIG_CIPHER_AES_MAC128, SIG_CIPHER_AES_CMAC128, SIG_CIPHER_RSA, SIG_CIPHER_ECDSA, SIG_CIPHER_ECDSA_PLAIN, SIG_CIPHER_HMAC, CIPHER_AES_CCM, CIPHER_AES_GCM, TYPE_ACCESS, TYPE_EC_FP_PRIVATE, TYPE_EC_FP_PRIVATE_TRANSIENT_RESET, TYPE_HMAC_TRANSIENT_RESET, TYPE_HMAC, LENGTH_EC_FP_160, LENGTH_EC_FP_192, LENGTH_EC_FP_224, LENGTH_EC_FP_256, LENGTH_EC_FP_384, LENGTH_EC_FP_521, LENGTH_HMAC_SHA_1_BLOCK_64, LENGTH_HMAC_SHA_256_BLOCK_64, LENGTH_HMAC_SHA_384_BLOCK_64, LENGTH_HMAC_SHA_512_BLOCK_64Trusted Execution Environments
SEVendor
Infineon Technologies, Gemalto, Thales, PhilipsSecurity level
EAL4+, EAL4, EAL5+, EAL5, EAL4 augmented, EAL5 augmentedClaims
D.ISD_KEYS, D.APP_KEYS, D.APSD_KEYS, D.CASD_KEYS, D.GP_REGISTRY, D.GP_CODE, D.TOE_IDENTIFIER, D.CLFDB-DK, D.GS-PARAMETERS, D.CVM_PIN, D.CVM_MGMT_STATE, D.TOKEN-, D.RECEIPT-, D.CONFIRMATION-, D.DAP_BLOCK, D.APSD_DAP_KEYS, D.CASD_DAP_KEYS, D.CCCM_KEYS, D.OLD_ELF, D.NEW_ELF, D.ELF_AID, D.ELF_SESSION_ST, D.ELF_APP_INS, D.ELF_RG_DATA, D.OS-, D.OS-UPDATE_DEC-, D.OS-UPDATE-CODE-, D.APP_CODE, D.APP_C_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.APP_I_DATA, D.RECEIPT-GENERATION-KEY, D.CONFIRMATION-DATA, D.TOKEN-VERIFICATION-KEY, D.OS-UPDATE_ADDITIONALCODE, D.OS-UPDATE_SGNVER-KEY, D.OS, D.OS-UPDATE-CODE-ID, D.OS-UPDATE_DEC-KEY, O.KEY-MNGT, O.CARD-, O.DOMAIN-RIGHTS, O.APPLI-AUTH, O.SECURITY-, O.COMM-AUTH, O.COMM-INTEGRITY, O.COMM-, O.NO-KEY-REUSE, O.PRIVILEGES-, O.LC-MANAGEMENT, O.CLFDB-DECIPHER, O.GLOBAL-CVM, O.CVM-BLOCK, O.CVM-MGMT, O.RECEIPT, O.TOKEN, O.CCCM, O.ELF_AUTHORISED, O.ELF_INTEGRITY, O.ELF_APP_DATA, O.ELF_SESSION, O.ELF_DELE_IRR, O.ELF_DATA_PRO, O.SECURE_LOAD_AC, O.SECURE_AC_ACTIV, O.TOE_IDENTIFICATI, O.CONFID-OS-, O.SID, O.FIREWALL, O.GLOBAL_ARRAY, O.ARRAY_VIEWS_, O.ARRAY_VIEWS_I, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.SCP-SUPPORT, O.SENSITIVE_ARR, O.SENSITIVE_RES, O.CARD-MANAGEMENT, O.COMM-CONFIDENTIALITY, O.APPLI-, O.PRIVILEGES-MANAGEMENT, O.DOMAIN-, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, O.GLOBAL_ARRAYS_CONFID, O.ARRAY_VIEWS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEWS_INTEG, O.SENSITIVE_ARRAYS_INTEG, O.SENSITIVE_RESULTS_INTEG, O.SECURITY-DOMAINS, O.RND, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.JAVAOB, O.JAVAO, O.CODE_, O.JAVAOBJE, O.CODE_PKG, T.UNAUTHORISED-, T.LIFE-CYCLE, T.COM-EXPLOIT, T.BRUTE-FORCE-SCP, T.CLFDB-DISC, T.CVM-IMPERSONATE, T.CVM-UPDATE, T.BRUTE-FORCE-CVM, T.RECEIPT, T.TOKEN, T.ELF-UNAUTHORISED, T.ELF-VERSION, T.ELF-DATA-ACCESS, T.ELF-DATA-INTEGRITY, T.ELF-SESSION, T.ELF-ILL-COMMAND, T.ELF-RES-DATA, T.UNAUTHORISED-TOE-, T.FAKE-SGNVER-KEY, T.WRONG-UPDATE-, T.INTEG-OS-UPDATE-, T.CONFID-OS-UPDATE-, T.CONFID-APPLI-, T.CONFID-JCS-, T.INTEG-APPLI-, T.INTEG-JCS-, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.UNAUTHORISED-CARD-MGMT, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-APPLI-DATA, T.INTEG-APPLI-DATA, T.UNAUTHORISED-TOE-CODE-, T.WRONG-UPDATE-STATE, T.INTEG-OS-UPDATE-LOAD, T.CONFID-OS-UPDATE-LOAD, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-JCS-CODE, T.UNAUTHORISED-TOE-CODE-UPDATE, T.RND, A.PERSONALISER, A.KEY-ESCROW, A.ISSUER, A.ADMIN, A.APPS-PROVIDER, A.VERIFICATION-, A.CONTROLLING-, A.PRODUCTION, A.SCP-SUPP, A.KEYS-PROT, A.OS-UPDATE-, A.SECURE_ACODE_, A.CAP_FILE, A.VERIFICA, A.VERIFICATION-AUTHORITY, A.CONTROLLING-AUTHORITY, A.OS-UPDATE-EVIDENCE, A.SECURE_ACODE_MANAGEMENT, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_ALOAD, OP.ARRAY_T_ASTORE, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUTFIELD, OP.PUTSTATIC, OP.PUT, OE.SCP, OE.OS-UPDATE-ENCRYPTION, OE.ISSUER, OE.ADMIN, OE.APPS-PROVIDER, OE.VERIFICATION-, OE.KEY-ESCROW, OE.PERSONALISER, OE.CONTROLLING-, OE.SCP-SUPP, OE.KEYS-PROT, OE.PRODUCTION, OE.APPLICATIONS, OE.AID-MANAGEMENT, OE.LOADING, OE.SERVERS, OE.AP-KEYS, OE.ISD-KEYS, OE.KEY-GENERATION, OE.CA-KEYS, OE.KEY-CHANGE, OE.CLFDB-ENC-PR, OE.TOKEN-GEN, OE.RECEIPT-VER, OE.DAP_BLOCK_GEN, OE.OS-UPDATE-EVIDENCE, OE.OS-UPDATE-, OE.SECURE_ACODE_MANA, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-, OE.CODE-EVIDENCE, OE.VERIFICATION-AUTHORITY, OE.CONTROLLING-AUTHORITY, OE.SECURE_ACODE_MANAGEMENT, OE.TOE, OSP.AID-MANAGEMENT, OSP.LOADING, OSP.SERVERS, OSP.APSD-KEYS, OSP.ISD-KEYS, OSP.KEY-GENERATION, OSP.CASD-KEYS, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.APPLICATIONS, OSP.PERSONALISER, OSP.KEY-ESCROW, OSP.CLFDB-ENC-PR, OSP.TOKEN-GEN, OSP.RECEIPT-VER, OSP.DAP_BLOCK_GEN, OSP.CCCM, OSP.ELF_DELE_OP, OSP.ATOMIC_ACTIVATION, OSP.TOE_IDENTIFICATION, OSP.ADDITIONAL_CODE_SIG, OSP.ADDITIONAL_CODE_EN, OSP.VERIFICATION, OSP.ADDITIONAL_CODE_SIGNING, OSP.ADDITIONAL_CODE_ENCRYPT, OSP.ADDITIONAL_CODE_ENCRYPTIONSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, ADV_FSP.5, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ALC_CMS.5, ALC_TAT.2, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, ATE_IND.2, AVA_VAN.5, AVA_VAN, APE_ECD, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FAU_GEN.1, FCO_NRO, FCO_NRO.2, FCO_NRR, FCO_NRR.1, FCS_RNG.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_COP, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_CKM.2, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_ITC, FDP_ITC.2, FDP_UIT, FDP_UIT.1, FDP_ROL, FDP_ROL.1, FDP_UCT, FDP_UCT.1, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_ACC.2, FDP_IFC.1, FDP_RIP, FDP_RIP.1, FDP_SDI, FDP_SDI.2, FDP_SDI.2.2, FDP_ITC.1, FDP_SDC.1, FDP_ITT.1, FDP_SDC, FDP_SDC.1.1, FDP_SDI.1, FDP_ITT.1.1, FDP_IFC.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_UID, FIA_UID.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_API.1, FIA_API, FIA_API.1.1, FMT_MTD, FMT_MTD.1, FMT_MSA, FMT_MSA.1, FMT_SMR, FMT_MSA.3, FMT_SMR.1, FMT_SMF, FMT_SMF.1, FMT_MTD.3, FMT_MSA.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_RCV, FPT_RCV.3, FPT_FLS, FPT_FLS.1, FPT_TDC, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.4, FPT_PHP.3, FPT_ITT.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_ITT.1.1, FRU_FLT.2, FRU_FLT.1, FRU_FLT.2.1, FTP_TRP, FTP_TRP.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014, BSI-PP-0084, BSI-CC-PP-0084-, BSI-CC-PP- 0084-2014Certificates
ANSSI-CC-2017/41, CC-1, CC-2, CC-3Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP-SUPPORT areSide-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side channel, DPA, timing attacks, physical tampering, malfunction, Malfunction, reverse engineeringCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP-SUPPORT areStandards
FIPS 198, FIPS 197, FIPS 180, FIPS 197108, FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 197, FIPS PUB 186-4159, FIPS 180-4, FIPS 202, FIPS140-2, PKCS#1, PKCS#5135, PKCS#5139, PKCS#5143, AIS20, AIS31, RFC 5758, RFC2409151, RFC2409, ISO/IEC 9797-1, ISO/IEC 9796-2, ISO/IEC 3309179, ISO/IEC 7816-3, SCP11, SCP02, SCP80, SCP81, SCP03, SCP10, SCP21, SCP22, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004References
Outgoing- ANSSI-CC-2017/41 - MicrocontrĂ´leur ORION_CB_03
Heuristics ?
Certificate ID: ANSSI-CC-2022/51
Extracted SARs
AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, ASE_TSS.1, ALC_CMC.4, ADV_FSP.5, ASE_CCL.1, ASE_INT.1, AVA_VAN.5, ADV_TDS.4, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ATE_FUN.1, ADV_INT.2, ALC_DVS.2, ALC_CMS.5, ASE_SPD.1, ATE_COV.2, ATE_DPT.3, ATE_IND.2, ADV_IMP.1, ADV_ARC.1, ALC_TAT.2Scheme data ?
Product | 5G PK 5.2.2 Advanced SIM (D00233151F016B) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/5g-pk-522-advanced-sim-d00233151f016b | |
Description | Le produit évalué est une carte à puce « 5G PK 5.2.2 Advanced SIM, version D00233151F016B » développée par THALES DIS. Ce produit est destiné à être utilisé dans un smartphone ou un modem. En tant que tel, il assure l’authentification de l’abonné au réseau MNO, donnant accès aux services et applications MNO1. Le produit est également destiné à héberger et exécuter une ou plusieurs applications ( | |
Sponsor | THALES DIS | |
Developer | THALES DIS | |
Cert Id | ANSSI-CC-2022/51 | |
Level | EAL4+ | |
Expiration Date | 29 FĂ©vrier 2028 | |
Enhanced | ||
Cert Id | ANSSI-CC-2022/51 | |
Certification Date | 01/03/2023 | |
Expiration Date | 29/02/2028 | |
Category | Cartes Ă puce | |
Cc Version | Critères Communs version 2.1 | |
Developer | THALES DIS | |
Sponsor | THALES DIS | |
Evaluation Facility | THALES / CNES | |
Level | EAL4+ | |
Protection Profile | GlobalPlatform Technology - Secure Element Protection Profile, référence GPC_SPE_174, version 1.0. Certifié par le OC-CCN sous la référence 2020-37-INF-3429- v1. | |
Mutual Recognition | CCRA SOG-IS | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat_ANSSI-CC-2022_51.pdf |
References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': False, 'pdf_hash': '363facd1597b7b798223dfbfbe9ef926ecad20a03360b9d77697648bf4903c85', 'txt_hash': '17095831020369c87c2075a54051217b7bab4c079b35a8fa68604d829f794216'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': False, 'pdf_hash': 'c3f316a4ec67b39f5519a464002b1e9b8e5ae2e82ff930b67fd16c16d0ced720', 'txt_hash': 'df6f8fc6c4ac73f101c2269c70b36a024a211f0c83ccad3f7dcabc26a034c5c9'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': False, 'pdf_hash': 'de27d5c2664945cfa24db0ab2a8084fd620af0d5726f650c35e8e78885bed0bb', 'txt_hash': 'db7d6ccc49e65ac5f4c70bbdeffeed82a4cfaf688cc2b5d0974bf4a0293b47ec'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2022/51': 2}, 'ES': {'2020-37-INF-3429- v1': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {'JavaCard': {'Java Card 3.0.5': 1}, 'GlobalPlatform': {'Global Platform 2.3.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'certificat_anssi-cc-2022_51.pdf'}
. - The report_frontpage property was set to
{'FR': {}}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2022/51': 2, 'ANSSI-CC-2017/41': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 3}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2017/41': 1}}}}}
data.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2022/51': 4, 'ANSSI-CC-2017/41': 2}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2017/41': 2}}}, '__delete__': ['NL']}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__delete__': ['CA']}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'CA': {'7 5 7': 1, '2 0 2': 16, '5 1 5': 16, '0 0 2': 16, '3 1 5': 16, '0 1 6': 16, '1 7 1': 2, '1 7 2': 2, '1 7 3': 2}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2022/51': 2, 'ANSSI-CC-2017/41': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'NL': {'CC-1': 2, 'CC-2': 3, 'CC-3': 3}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2017/41': 1}}}}}
data.
- The report_keywords property was updated, with the
-
05.02.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est une carte à puce « 5G PK 5.2.2 Advanced SIM, version D00233151F016B » développée par THALES DIS.\nCe produit est destiné à être utilisé dans un smartphone ou un modem. En tant que tel, il assure l’authentification de l’abonné au réseau MNO, donnant accès aux services et applications MNO1.\nLe produit est également destiné à héberger et exécuter une ou plusieurs applications ('}
data.
- The scheme_data property was updated, with the
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
. - The scheme_data property was updated, with the
{'url': 'https://cyber.gouv.fr/produits-certifies/5g-pk-522-advanced-sim-d00233151f016b', 'enhanced': {'__insert__': {'cert_id': 'ANSSI-CC-2022/51', 'sponsor': 'THALES DIS', 'protection_profile': 'GlobalPlatform Technology - Secure Element Protection Profile, référence GPC_SPE_174, version 1.0.\nCertifié par le OC-CCN sous la référence 2020-37-INF-3429- v1.', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}, '__update__': {'expiration_date': '29/02/2028', 'cc_version': 'Critères Communs version 2.1', 'developer': 'THALES DIS', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat_ANSSI-CC-2022_51.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description', 'report_link', 'target_link']}}
data.
- The following values were inserted:
-
27.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': '5G PK 5.2.2 Advanced SIM (D00233151F016B)', 'vendor': 'THALES DISTHALES DIS', 'level': 'EAL4+', 'id': '2022/51', 'certification_date': '01/03/2023', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/5g-pk-5-2-2-advanced-sim-d00233151f016b/', 'enhanced': {'id': '2022/51', 'certification_date': '01/03/2023', 'expiration_date': '01/03/2028', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL4+', 'augmentations': '(ALC_DVS.2, AVA_VAN.5)', 'developer': 'THALES DIS / THALES DIS', 'evaluation_facility': 'THALES / CNES', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est une carte à puce « 5G PK 5.2.2 Advanced SIM, version D00233151F016B » développée par THALES DIS.\nCe produit est destiné à être utilisé dans un smartphone ou un modem. En tant que tel, il assure l’authentification de l’abonné au réseau MNO, donnant accès aux services et applications MNO1\nLe produit est également destiné à héberger et exécuter une ou plusieurs applications (telles que l’application e-ID), dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soient « sensibles » ou « basiques ») et peuvent être chargées et instanciées avant ou après émission du produit.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2023/03/anssi-cc-2022_51.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2023/03/anssi-cible-cc-2022_51.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2023/03/certificat_anssi-cc-2022_51.pdf'}}
.
- The scheme_data property was set to
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
-
12.03.2023 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name 5G PK 5.2.2 Advanced SIM (D00233151F016B) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat_anssi-cc-2022_51.pdf",
"dgst": "cb872473562ed2cf",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2022/51",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.2.2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/41"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/41"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2022/51",
"description": "Le produit \u00e9valu\u00e9 est une carte \u00e0 puce \u00ab 5G PK 5.2.2 Advanced SIM, version D00233151F016B \u00bb d\u00e9velopp\u00e9e par THALES DIS.\nCe produit est destin\u00e9 \u00e0 \u00eatre utilis\u00e9 dans un smartphone ou un modem. En tant que tel, il assure l\u2019authentification de l\u2019abonn\u00e9 au r\u00e9seau MNO, donnant acc\u00e8s aux services et applications MNO1.\nLe produit est \u00e9galement destin\u00e9 \u00e0 h\u00e9berger et ex\u00e9cuter une ou plusieurs applications (",
"developer": "THALES DIS",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 2.1",
"cert_id": "ANSSI-CC-2022/51",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat_ANSSI-CC-2022_51.pdf",
"certification_date": "01/03/2023",
"developer": "THALES DIS",
"evaluation_facility": "THALES / CNES",
"expiration_date": "29/02/2028",
"level": "EAL4+",
"mutual_recognition": "CCRA\n SOG-IS",
"protection_profile": "GlobalPlatform Technology - Secure Element Protection Profile, r\u00e9f\u00e9rence GPC_SPE_174, version 1.0.\nCertifi\u00e9 par le OC-CCN sous la r\u00e9f\u00e9rence 2020-37-INF-3429- v1.",
"sponsor": "THALES DIS"
},
"expiration_date": "29 F\u00e9vrier 2028",
"level": "EAL4+",
"product": "5G PK 5.2.2 Advanced SIM (D00233151F016B)",
"sponsor": "THALES DIS",
"url": "https://cyber.gouv.fr/produits-certifies/5g-pk-522-advanced-sim-d00233151f016b"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/41"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/41"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "THALES DIS FRANCE SA",
"manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
"name": "5G PK 5.2.2 Advanced SIM (D00233151F016B)",
"not_valid_after": "2028-03-01",
"not_valid_before": "2023-03-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat_anssi-cc-2022_51.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2020-37-INF-3429- v1": 1
},
"FR": {
"ANSSI-CC-2022/51": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.3.1": 1
},
"JavaCard": {
"Java Card 3.0.5": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "anssi-cc-2022_51.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2020-37-INF-3429- v1": 2
},
"FR": {
"ANSSI-CC-2017/41": 1,
"ANSSI-CC-2017/41-S05": 1,
"ANSSI-CC-2022/51": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"AGD": {
"AGD_OPE": 2
},
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 3.0.5": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 1
},
"Thales": {
"Thales": 9
}
},
"vulnerability": {}
},
"report_metadata": null,
"st_filename": "anssi-cible-cc-2022_51.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 12
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 12
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 4
}
},
"RSA": {
"RSA 1024": 19
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2017/41": 1
},
"NL": {
"CC-1": 2,
"CC-2": 3,
"CC-3": 3
}
},
"cc_claims": {
"A": {
"A.ADMIN": 3,
"A.APPS-PROVIDER": 3,
"A.CAP_FILE": 4,
"A.CONTROLLING-": 1,
"A.CONTROLLING-AUTHORITY": 2,
"A.ISSUER": 3,
"A.KEY-ESCROW": 1,
"A.KEYS-PROT": 3,
"A.OS-UPDATE-": 1,
"A.OS-UPDATE-EVIDENCE": 2,
"A.PERSONALISER": 1,
"A.PRODUCTION": 4,
"A.SCP-SUPP": 3,
"A.SECURE_ACODE_": 1,
"A.SECURE_ACODE_MANAGEMENT": 2,
"A.VERIFICA": 1,
"A.VERIFICATION": 2,
"A.VERIFICATION-": 1,
"A.VERIFICATION-AUTHORITY": 2
},
"D": {
"D.API_DATA": 3,
"D.APP_CODE": 7,
"D.APP_C_DATA": 5,
"D.APP_I_DATA": 6,
"D.APP_KEYS": 9,
"D.APSD_DAP_KEYS": 1,
"D.APSD_KEYS": 3,
"D.CASD_DAP_KEYS": 1,
"D.CASD_KEYS": 1,
"D.CCCM_KEYS": 1,
"D.CLFDB-DK": 1,
"D.CONFIRMATION-": 1,
"D.CONFIRMATION-DATA": 1,
"D.CRYPTO": 4,
"D.CVM_MGMT_STATE": 3,
"D.CVM_PIN": 3,
"D.DAP_BLOCK": 1,
"D.ELF_AID": 3,
"D.ELF_APP_INS": 3,
"D.ELF_RG_DATA": 1,
"D.ELF_SESSION_ST": 2,
"D.GP_CODE": 1,
"D.GP_REGISTRY": 4,
"D.GS-PARAMETERS": 1,
"D.ISD_KEYS": 3,
"D.JCS_CODE": 6,
"D.JCS_DATA": 8,
"D.NEW_ELF": 3,
"D.OLD_ELF": 3,
"D.OS": 1,
"D.OS-": 3,
"D.OS-UPDATE-CODE-": 1,
"D.OS-UPDATE-CODE-ID": 1,
"D.OS-UPDATE_ADDITIONALCODE": 3,
"D.OS-UPDATE_DEC-": 1,
"D.OS-UPDATE_DEC-KEY": 1,
"D.OS-UPDATE_SGNVER-KEY": 1,
"D.PIN": 6,
"D.RECEIPT-": 1,
"D.RECEIPT-GENERATION-KEY": 1,
"D.SEC_DATA": 8,
"D.TOE_IDENTIFIER": 1,
"D.TOKEN-": 1,
"D.TOKEN-VERIFICATION-KEY": 1
},
"O": {
"O.ALARM": 16,
"O.APPLET": 16,
"O.APPLI-": 1,
"O.APPLI-AUTH": 4,
"O.ARRAY_VIEWS_": 1,
"O.ARRAY_VIEWS_CONFID": 4,
"O.ARRAY_VIEWS_I": 1,
"O.ARRAY_VIEWS_INTEG": 4,
"O.CARD-": 11,
"O.CARD-MANAGEMENT": 22,
"O.CCCM": 9,
"O.CIPHER": 8,
"O.CLFDB-DECIPHER": 5,
"O.CODE_": 1,
"O.CODE_CAP_FILE": 12,
"O.CODE_PKG": 1,
"O.COMM-": 2,
"O.COMM-AUTH": 10,
"O.COMM-CONFIDENTIALITY": 8,
"O.COMM-INTEGRITY": 9,
"O.CONFID-OS-": 1,
"O.CONFID-OS-UPDATE": 6,
"O.CVM-BLOCK": 9,
"O.CVM-MGMT": 9,
"O.DELETION": 5,
"O.DOMAIN-": 1,
"O.DOMAIN-RIGHTS": 8,
"O.ELF_APP_DATA": 7,
"O.ELF_AUTHORISED": 5,
"O.ELF_DATA_PRO": 5,
"O.ELF_DELE_IRR": 5,
"O.ELF_INTEGRITY": 5,
"O.ELF_SESSION": 7,
"O.FIREWALL": 19,
"O.GLOBAL-CVM": 5,
"O.GLOBAL_ARRAY": 2,
"O.GLOBAL_ARRAYS_CONFID": 6,
"O.GLOBAL_ARRAYS_INTEG": 6,
"O.INSTALL": 11,
"O.JAVAO": 1,
"O.JAVAOB": 4,
"O.JAVAOBJE": 1,
"O.JAVAOBJECT": 42,
"O.KEY-MNGT": 9,
"O.LC-MANAGEMENT": 6,
"O.LOAD": 11,
"O.NATIVE": 11,
"O.NO-KEY-REUSE": 5,
"O.OBJ-DELETION": 5,
"O.OPERATE": 22,
"O.PIN-MNGT": 8,
"O.PRIVILEGES-": 1,
"O.PRIVILEGES-MANAGEMENT": 4,
"O.REALLOCATION": 7,
"O.RECEIPT": 5,
"O.RESOURCES": 6,
"O.RND": 7,
"O.RNG": 8,
"O.SCP": 20,
"O.SCP-SUPPORT": 21,
"O.SECURE_AC_ACTIV": 1,
"O.SECURE_AC_ACTIVATION": 6,
"O.SECURE_LOAD_AC": 1,
"O.SECURE_LOAD_ACODE": 10,
"O.SECURITY-": 2,
"O.SECURITY-DOMAINS": 3,
"O.SENSITIVE_ARR": 1,
"O.SENSITIVE_ARRAYS_INTEG": 4,
"O.SENSITIVE_RES": 1,
"O.SENSITIVE_RESULTS_INTEG": 4,
"O.SID": 15,
"O.TOE_IDENTIFICATI": 1,
"O.TOE_IDENTIFICATION": 6,
"O.TOKEN": 5,
"O.TRANSACTION": 7
},
"OE": {
"OE.ADMIN": 3,
"OE.AID-MANAGEMENT": 3,
"OE.AP-KEYS": 3,
"OE.APPLICATIONS": 3,
"OE.APPS-PROVIDER": 3,
"OE.CA-KEYS": 3,
"OE.CAP_FILE": 6,
"OE.CLFDB-ENC-PR": 3,
"OE.CODE-": 5,
"OE.CODE-EVIDENCE": 12,
"OE.CONTROLLING-": 1,
"OE.CONTROLLING-AUTHORITY": 2,
"OE.DAP_BLOCK_GEN": 3,
"OE.ISD-KEYS": 3,
"OE.ISSUER": 3,
"OE.KEY-CHANGE": 3,
"OE.KEY-ESCROW": 3,
"OE.KEY-GENERATION": 3,
"OE.KEYS-PROT": 3,
"OE.LOADING": 3,
"OE.OS-UPDATE-": 1,
"OE.OS-UPDATE-ENCRYPTION": 4,
"OE.OS-UPDATE-EVIDENCE": 3,
"OE.PERSONALISER": 3,
"OE.PRODUCTION": 4,
"OE.RECEIPT-VER": 3,
"OE.SCP": 3,
"OE.SCP-SUPP": 3,
"OE.SECURE_ACODE_MANA": 1,
"OE.SECURE_ACODE_MANAGEMENT": 2,
"OE.SERVERS": 3,
"OE.TOE": 1,
"OE.TOKEN-GEN": 3,
"OE.VERIFICATION": 35,
"OE.VERIFICATION-": 1,
"OE.VERIFICATION-AUTHORITY": 2
},
"OP": {
"OP.ARRAY_AASTORE": 3,
"OP.ARRAY_ACCESS": 4,
"OP.ARRAY_LENGTH": 4,
"OP.ARRAY_T_ALOAD": 3,
"OP.ARRAY_T_ASTORE": 3,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_CAP_FILE": 3,
"OP.DELETE_CAP_FILE_APPLET": 3,
"OP.INSTANCE_FIELD": 3,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 5,
"OP.PUT": 5,
"OP.PUTFIELD": 1,
"OP.PUTSTATIC": 1,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.ADDITIONAL_CODE_EN": 1,
"OSP.ADDITIONAL_CODE_ENCRYPT": 1,
"OSP.ADDITIONAL_CODE_ENCRYPTION": 1,
"OSP.ADDITIONAL_CODE_SIG": 1,
"OSP.ADDITIONAL_CODE_SIGNING": 2,
"OSP.AID-MANAGEMENT": 3,
"OSP.APPLICATIONS": 3,
"OSP.APSD-KEYS": 3,
"OSP.ATOMIC_ACTIVATION": 3,
"OSP.CASD-KEYS": 3,
"OSP.CCCM": 3,
"OSP.CLFDB-ENC-PR": 3,
"OSP.DAP_BLOCK_GEN": 3,
"OSP.ELF_DELE_OP": 3,
"OSP.ISD-KEYS": 3,
"OSP.KEY-CHANGE": 3,
"OSP.KEY-ESCROW": 3,
"OSP.KEY-GENERATION": 3,
"OSP.LOADING": 3,
"OSP.PERSONALISER": 3,
"OSP.RECEIPT-VER": 3,
"OSP.SECURITY-DOMAINS": 3,
"OSP.SERVERS": 3,
"OSP.TOE_IDENTIFICATION": 3,
"OSP.TOKEN-GEN": 3,
"OSP.VERIFICATION": 3
},
"R": {
"R.JAVA": 12
},
"T": {
"T.BRUTE-FORCE-CVM": 3,
"T.BRUTE-FORCE-SCP": 3,
"T.CLFDB-DISC": 3,
"T.COM-EXPLOIT": 4,
"T.CONFID-APPLI-": 1,
"T.CONFID-APPLI-DATA": 3,
"T.CONFID-JCS-": 2,
"T.CONFID-JCS-CODE": 2,
"T.CONFID-JCS-DATA": 2,
"T.CONFID-OS-UPDATE-": 1,
"T.CONFID-OS-UPDATE-LOAD": 2,
"T.CVM-IMPERSONATE": 3,
"T.CVM-UPDATE": 3,
"T.DELETION": 4,
"T.ELF-DATA-ACCESS": 3,
"T.ELF-DATA-INTEGRITY": 3,
"T.ELF-ILL-COMMAND": 3,
"T.ELF-RES-DATA": 3,
"T.ELF-SESSION": 3,
"T.ELF-UNAUTHORISED": 3,
"T.ELF-VERSION": 3,
"T.EXE-CODE": 7,
"T.FAKE-SGNVER-KEY": 3,
"T.INSTALL": 4,
"T.INTEG-APPLI-": 4,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 5,
"T.INTEG-JCS-": 1,
"T.INTEG-JCS-CODE": 2,
"T.INTEG-JCS-DATA": 3,
"T.INTEG-OS-UPDATE-": 1,
"T.INTEG-OS-UPDATE-LOAD": 2,
"T.LIFE-CYCLE": 4,
"T.NATIVE": 3,
"T.OBJ-DELETION": 3,
"T.PHYSICAL": 9,
"T.RECEIPT": 3,
"T.RESOURCES": 3,
"T.RND": 5,
"T.SID": 8,
"T.TOKEN": 3,
"T.UNAUTHORISED-": 1,
"T.UNAUTHORISED-CARD-MGMT": 4,
"T.UNAUTHORISED-TOE-": 1,
"T.UNAUTHORISED-TOE-CODE-": 1,
"T.UNAUTHORISED-TOE-CODE-UPDATE": 1,
"T.WRONG-UPDATE-": 1,
"T.WRONG-UPDATE-STATE": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0084-2014": 1,
"BSI-CC-PP-0084-": 1,
"BSI-CC-PP-0084-2014": 24,
"BSI-CC-PP-0099-V2-2020": 1,
"BSI-PP-0084": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 2,
"ADV_ARC.1": 7,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 10,
"ADV_FSP.5": 2,
"ADV_IMP.1": 6,
"ADV_INT.2": 2,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 5,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE.1": 11,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMS.1": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 2,
"ALC_DEL.1": 2,
"ALC_DVS.1": 2,
"ALC_DVS.2": 15,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3,
"ALC_TAT.2": 2
},
"APE": {
"APE_ECD": 1
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 5,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 4,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 4,
"ATE_DPT.1": 3,
"ATE_DPT.3": 2,
"ATE_FUN.1": 6,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 16
}
},
"cc_security_level": {
"EAL": {
"EAL4": 5,
"EAL4 augmented": 3,
"EAL4+": 2,
"EAL5": 8,
"EAL5 augmented": 2,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 15,
"FAU_ARP.1.1": 2,
"FAU_GEN": 2,
"FAU_GEN.1": 1,
"FAU_SAA.1": 3,
"FAU_SAS": 6,
"FAU_SAS.1": 13,
"FAU_SAS.1.1": 2
},
"FCO": {
"FCO_NRO": 28,
"FCO_NRO.2": 9,
"FCO_NRR": 5,
"FCO_NRR.1": 3
},
"FCS": {
"FCS_CKM": 60,
"FCS_CKM.1": 29,
"FCS_CKM.2": 7,
"FCS_CKM.4": 60,
"FCS_CKM.4.1": 1,
"FCS_COP": 148,
"FCS_COP.1": 28,
"FCS_RNG": 11,
"FCS_RNG.1": 20,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 4
},
"FDP": {
"FDP_ACC": 63,
"FDP_ACC.1": 42,
"FDP_ACC.1.1": 1,
"FDP_ACC.2": 5,
"FDP_ACF": 57,
"FDP_ACF.1": 51,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC": 67,
"FDP_IFC.1": 42,
"FDP_IFC.1.1": 1,
"FDP_IFC.2": 6,
"FDP_IFF": 53,
"FDP_IFF.1": 30,
"FDP_ITC": 32,
"FDP_ITC.1": 23,
"FDP_ITC.2": 32,
"FDP_ITT.1": 19,
"FDP_ITT.1.1": 1,
"FDP_RIP": 111,
"FDP_RIP.1": 9,
"FDP_ROL": 21,
"FDP_ROL.1": 9,
"FDP_SDC": 4,
"FDP_SDC.1": 13,
"FDP_SDC.1.1": 2,
"FDP_SDI": 37,
"FDP_SDI.1": 3,
"FDP_SDI.2": 12,
"FDP_SDI.2.2": 1,
"FDP_UCT": 5,
"FDP_UCT.1": 1,
"FDP_UIT": 8,
"FDP_UIT.1": 12,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 11,
"FIA_AFL.1": 8,
"FIA_API": 4,
"FIA_API.1": 12,
"FIA_API.1.1": 2,
"FIA_ATD": 13,
"FIA_ATD.1": 3,
"FIA_UAU": 26,
"FIA_UAU.1": 4,
"FIA_UAU.4": 1,
"FIA_UID": 32,
"FIA_UID.1": 13,
"FIA_UID.2": 1,
"FIA_USB": 7,
"FIA_USB.1": 3
},
"FMT": {
"FMT_LIM": 22,
"FMT_LIM.1": 30,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 34,
"FMT_LIM.2.1": 2,
"FMT_MSA": 165,
"FMT_MSA.1": 28,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 2,
"FMT_MSA.3": 42,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 38,
"FMT_MTD.1": 5,
"FMT_MTD.3": 2,
"FMT_SMF": 66,
"FMT_SMF.1": 36,
"FMT_SMF.1.1": 2,
"FMT_SMR": 70,
"FMT_SMR.1": 45,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO": 12,
"FPR_UNO.1": 14,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 57,
"FPT_FLS.1": 27,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 17,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 20,
"FPT_PHP.3.1": 1,
"FPT_RCV": 24,
"FPT_RCV.3": 10,
"FPT_RCV.4": 1,
"FPT_TDC": 9,
"FPT_TDC.1": 9,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1
},
"FRU": {
"FRU_FLT.1": 1,
"FRU_FLT.2": 18,
"FRU_FLT.2.1": 1
},
"FTP": {
"FTP_ITC": 27,
"FTP_ITC.1": 12,
"FTP_TRP": 10,
"FTP_TRP.1": 23,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP-SUPPORT are": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 34
},
"CCM": {
"CCM": 8
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 8
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 7,
"Key agreement": 5
},
"MAC": {
"MAC": 18
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 5
}
},
"SHA": {
"SHA1": {
"SHA-1": 3,
"SHA1": 8
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 5,
"SHA-384": 5,
"SHA-512": 4,
"SHA224": 3,
"SHA256": 4,
"SHA384": 4,
"SHA512": 4
},
"SHA3": {
"SHA3-224": 1,
"SHA3-256": 1,
"SHA3-384": 1,
"SHA3-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"ALG": {
"AES": {
"ALG_AES_BLOCK_128_CBC_NOPAD": 2,
"ALG_AES_BLOCK_128_ECB_NOPAD": 2,
"ALG_AES_CBC_ISO9797_M1": 2,
"ALG_AES_CBC_ISO9797_M2": 2,
"ALG_AES_CBC_PKCS5": 2,
"ALG_AES_CCM": 2,
"ALG_AES_CMAC_128": 2,
"ALG_AES_CTR": 2,
"ALG_AES_ECB_ISO9797_M1": 2,
"ALG_AES_ECB_ISO9797_M2": 2,
"ALG_AES_ECB_PKCS5": 2,
"ALG_AES_GCM": 2,
"ALG_AES_MAC_128_NOPAD": 2,
"ALG_AES_MAC_192_NOPAD": 2,
"ALG_AES_MAC_256_NOPAD": 2
},
"DES": {
"ALG_DES_CBC_ISO9797_M1": 2,
"ALG_DES_CBC_ISO9797_M2": 1,
"ALG_DES_CBC_NOPAD": 2,
"ALG_DES_CBC_PKCS5": 2,
"ALG_DES_ECB_ISO9797_M1": 2,
"ALG_DES_ECB_ISO9797_M2": 2,
"ALG_DES_ECB_NOPAD": 2,
"ALG_DES_ECB_PKCS5": 2,
"ALG_DES_MAC4_ISO9797_1_M1_ALG3": 2,
"ALG_DES_MAC4_ISO9797_1_M2_ALG3": 2,
"ALG_DES_MAC4_ISO9797_M1": 2,
"ALG_DES_MAC4_ISO9797_M2": 2,
"ALG_DES_MAC4_NOPAD": 2,
"ALG_DES_MAC4_PKCS5": 2,
"ALG_DES_MAC8_ISO9797_1_M1_ALG3": 2,
"ALG_DES_MAC8_ISO9797_1_M2_ALG3": 2,
"ALG_DES_MAC8_ISO9797_M1": 2,
"ALG_DES_MAC8_ISO9797_M2": 2,
"ALG_DES_MAC8_NOPAD": 2,
"ALG_DES_MAC8_PKCS5": 2
},
"EC": {
"ALG_EC_FP": 6,
"ALG_EC_SVDP_DH": 2,
"ALG_EC_SVDP_DHC": 2,
"ALG_EC_SVDP_DHC_KDF": 1,
"ALG_EC_SVDP_DHC_PLAIN": 2,
"ALG_EC_SVDP_DH_KDF": 1,
"ALG_EC_SVDP_DH_PLAIN": 2,
"ALG_EC_SVDP_DH_PLAIN_XY": 1
},
"ECDSA": {
"ALG_ECDSA_SHA": 2,
"ALG_ECDSA_SHA_224": 2,
"ALG_ECDSA_SHA_256": 2,
"ALG_ECDSA_SHA_384": 2,
"ALG_ECDSA_SHA_512": 2
},
"HMAC": {
"ALG_HMAC_MD5": 2,
"ALG_HMAC_RIPEMD160": 2,
"ALG_HMAC_SHA1": 2,
"ALG_HMAC_SHA_256": 2,
"ALG_HMAC_SHA_384": 2,
"ALG_HMAC_SHA_512": 2
},
"ISO3309": {
"ALG_ISO3309_CRC16": 2,
"ALG_ISO3309_CRC32": 2
},
"MD": {
"ALG_MD5": 2
},
"RIPEMD": {
"ALG_RIPEMD160": 2
},
"RSA": {
"ALG_RSA_MD5_PKCS1": 2,
"ALG_RSA_MD5_PKCS1_PSS": 2,
"ALG_RSA_MD5_RFC2409": 2,
"ALG_RSA_NOPAD": 2,
"ALG_RSA_PKCS1": 1,
"ALG_RSA_PKCS1_OAEP": 2,
"ALG_RSA_RIPEMD160_ISO9796": 2,
"ALG_RSA_RIPEMD160_ISO9796_MR": 2,
"ALG_RSA_RIPEMD160_PKCS1": 2,
"ALG_RSA_RIPEMD160_PKCS1_PSS": 2,
"ALG_RSA_SHA_224_PKCS1": 2,
"ALG_RSA_SHA_224_PKCS1_PSS": 2,
"ALG_RSA_SHA_256_PKCS1": 2,
"ALG_RSA_SHA_256_PKCS1_PSS": 2,
"ALG_RSA_SHA_384_PKCS1": 2,
"ALG_RSA_SHA_384_PKCS1_PSS": 2,
"ALG_RSA_SHA_512_PKCS1": 2,
"ALG_RSA_SHA_512_PKCS1_PSS": 2,
"ALG_RSA_SHA_ISO9796": 2,
"ALG_RSA_SHA_ISO9796_MR": 2,
"ALG_RSA_SHA_PKCS1": 2,
"ALG_RSA_SHA_PKCS1_PSS": 2,
"ALG_RSA_SHA_RFC2409": 2
},
"SHA": {
"ALG_SHA_224": 2,
"ALG_SHA_256": 2,
"ALG_SHA_384": 2,
"ALG_SHA_512": 2
},
"SHA3": {
"ALG_SHA3_224": 2,
"ALG_SHA3_256": 2,
"ALG_SHA3_384": 2,
"ALG_SHA3_512": 2
}
},
"misc": {
"CIPHER_AES_CCM": 2,
"CIPHER_AES_GCM": 2,
"LENGTH_EC_FP_160": 2,
"LENGTH_EC_FP_192": 2,
"LENGTH_EC_FP_224": 2,
"LENGTH_EC_FP_256": 2,
"LENGTH_EC_FP_384": 2,
"LENGTH_EC_FP_521": 2,
"LENGTH_HMAC_SHA_1_BLOCK_64": 1,
"LENGTH_HMAC_SHA_256_BLOCK_64": 1,
"LENGTH_HMAC_SHA_384_BLOCK_64": 1,
"LENGTH_HMAC_SHA_512_BLOCK_64": 1,
"SIG_CIPHER_AES_CMAC128": 2,
"SIG_CIPHER_AES_MAC128": 2,
"SIG_CIPHER_DES_MAC4": 2,
"SIG_CIPHER_DES_MAC8": 2,
"SIG_CIPHER_ECDSA": 1,
"SIG_CIPHER_ECDSA_PLAIN": 1,
"SIG_CIPHER_HMAC": 1,
"SIG_CIPHER_RSA": 1,
"TYPE_ACCESS": 5,
"TYPE_EC_FP_PRIVATE": 6,
"TYPE_EC_FP_PRIVATE_TRANSIENT_RESET": 1,
"TYPE_HMAC": 4,
"TYPE_HMAC_TRANSIENT_RESET": 1
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 5,
"javacard.security": 8
},
"javacardx": {
"javacardx.crypto": 1,
"javacardx.security": 3
}
},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.3.1": 1
},
"JavaCard": {
"Java Card 3.0.5": 4
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 13,
"RNG": 17
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 25,
"malfunction": 15,
"physical tampering": 3
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 20,
"Physical Probing": 7,
"Physical probing": 1,
"physical probing": 11,
"side channel": 3,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 2,
"AIS31": 7
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2,
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 180": 1,
"FIPS 180-4": 5,
"FIPS 197": 3,
"FIPS 197108": 1,
"FIPS 198": 2,
"FIPS 202": 4,
"FIPS PUB 186-4159": 1,
"FIPS PUB 197": 2,
"FIPS PUB 46-3": 2,
"FIPS PUB 81": 2,
"FIPS140-2": 1
},
"ISO": {
"ISO/IEC 3309179": 2,
"ISO/IEC 7816-3": 1,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9797-1": 3
},
"PKCS": {
"PKCS#1": 10,
"PKCS#5135": 1,
"PKCS#5139": 1,
"PKCS#5143": 1
},
"RFC": {
"RFC 5758": 2,
"RFC2409": 2,
"RFC2409151": 1
},
"SCP": {
"SCP02": 16,
"SCP03": 13,
"SCP10": 2,
"SCP11": 13,
"SCP21": 2,
"SCP22": 2,
"SCP80": 15,
"SCP81": 11
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 40,
"AES128": 2
}
},
"DES": {
"3DES": {
"3DES": 11,
"TDES": 49
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CBC-MAC": 2,
"CMAC": 3,
"HMAC": 15,
"KMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 15
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_PSK_WITH_AES_128_CBC_S": 1,
"TLS_PSK_WITH_NULL_SHA": 1,
"TLS_PSK_WITH_NULL_SHA256": 1
}
},
"vendor": {
"Gemalto": {
"Gemalto": 1
},
"Infineon": {
"Infineon Technologies": 1
},
"Philips": {
"Philips": 1
},
"Thales": {
"Thales": 263
}
},
"vulnerability": {}
},
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/CCN-CC-PP-5-2021.pdf",
"pp_name": "Secure Element Protection Profile - GPC_SPE_174, version 1.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_51.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_51.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "de27d5c2664945cfa24db0ab2a8084fd620af0d5726f650c35e8e78885bed0bb",
"txt_hash": "db7d6ccc49e65ac5f4c70bbdeffeed82a4cfaf688cc2b5d0974bf4a0293b47ec"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "363facd1597b7b798223dfbfbe9ef926ecad20a03360b9d77697648bf4903c85",
"txt_hash": "17095831020369c87c2075a54051217b7bab4c079b35a8fa68604d829f794216"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "c3f316a4ec67b39f5519a464002b1e9b8e5ae2e82ff930b67fd16c16d0ced720",
"txt_hash": "df6f8fc6c4ac73f101c2269c70b36a024a211f0c83ccad3f7dcabc26a034c5c9"
}
},
"status": "active"
}