CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)

CSV information ?

Status active
Valid from 27.07.2020
Valid until 27.07.2025
Scheme 🇫🇷 FR
Manufacturer Idemia
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL5+, AVA_VAN.5, ALC_DVS.2
Maintenance updates ANSSI-CC-2020/56-M01 (05.02.2021) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2020/56

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Vendor
Infineon Technologies AG, Infineon, IDEMIA

Security level
EAL 5, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0056-2009, BSI-PP-0084-2014, BSI-PP-0056-2009
Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/56, ANSSI-CC-2020/07
Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETI

Standards
ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: ANSSI-CC-2020/56
Subject: CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1
Keywords: ANSSI-CC-CER-F-07, v29.2
Author: Géraldine Avoué
Creation date: D:20200729165353+02'00'
Pages: 17
Creator: Writer
Producer: LibreOffice 4.4

Frontpage

Certificate ID: ANSSI-CC-2020/56
Certified item: CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1
Certification lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
Developer: IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France

References

Outgoing
  • BSI-DSZ-CC-1110-V2-2019 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
  • ANSSI-CC-2020/07 - Plateforme ID-One Cosmo V9.1 masquĂ©e sur le composant IFX SLC32

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-, DES, 3DES, Triple-DES, TDES, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH
Hash functions
SHA1, SHA-1, SHA-256, SHA-224, SHA-512, SHA2
Schemes
MAC
Protocols
PACE
Block cipher modes
ECB, CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG15, EF.COM, EF.SOD
Vendor
Oberthur Technologies, IDEMIA, Morpho

Security level
EAL5, EAL4, EAL5 augmented, EAL4 augmented
Claims
A.MRTD_, OT.AC_SM_LEVEL, OE.BAC_PP, OE.MRTD_
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.5, ADV_IMP, ADV_IMP.1, ADV_INT, ADV_INT.2, ADV_TDS, ADV_TDS.4, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_OPE, AGD_OPE.1, AGD_PRE, AGD_PRE.1, ALC_DVS.2, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.5, ALC_DEL, ALC_DEL.1, ALC_DVS, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.2, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ALC_SCT, ALC_STM, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.3, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN.3, AVA_VAN, APE_SRE, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_RND.1.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_CKM.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACC, FDP_ACF, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_DAU, FDP_DAU.1, FDP_ITC, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UID, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.6, FIA_AFL, FIA_AFL.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MTD.1, FMT_MOF, FMT_MOF.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.3, FMT_MTD.3.1, FMT_MSA.3, FMT_MSA.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0056, BSI-PP-0002-2001, BSI-CC-PP-0084-2014, BSI-PP-0055, BSI-PP-0056
Certificates
ANSSI-CC-2020/07
Evaluation facilities
CEA-LETI

Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection

Standards
FIPS 180-4, FIPS 46-3, FIPS 186-3, FIPS 197, FIPS PUB 197, PKCS#3, PKCS#1, RFC3369, ISO/IEC 18013, ISO/IEC 9796-2, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 9797-1, ICAO, SCP02, SCP03, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: Title
Author: Shubham SAGAR
Creation date: D:20200617125409+05'30'
Modification date: D:20200617125409+05'30'
Pages: 135
Creator: Microsoft® Word 2016
Producer: Microsoft® Word 2016

References

Outgoing
  • ANSSI-CC-2020/07 - Plateforme ID-One Cosmo V9.1 masquĂ©e sur le composant IFX SLC32

Heuristics ?

Certificate ID: ANSSI-CC-2020/56

Extracted SARs

ADV_INT.2, ASE_OBJ.2, ASE_TSS.1, ADV_IMP.1, ADV_ARC.1, ADV_TDS.4, ALC_DEL.1, ALC_CMS.5, ALC_TAT.2, ALC_DVS.2, ADV_FSP.5, AVA_VAN.5, ASE_REQ.2, ATE_FUN.1, ATE_COV.2, ASE_CCL.1, ASE_ECD.1, AGD_OPE.1, ALC_CMC.4, ATE_DPT.3, ASE_APD.1, AGD_PRE.1, ASE_SPD.1, ATE_IND.2, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523) was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.1', '9.1']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '158c34334de8c21058d9220630e39b9626cf969f1d172ea8f6f52d90e4bbf011', 'st_pdf_hash': '8f1f3e66a5b0c26a3cce09fb5ed279da74b575b29f9c342317e751db7254f975', 'report_txt_hash': '7769244930c35543c41aeb6209e085afc013a0b575ccec411002ac9760953167', 'st_txt_hash': 'dfcecfab5410d9fee0505064f494398f262882f0a02f40f17e1220b11777d5e6'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 4}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 20, 'AES-': 1, '3DES': 4, 'DES': 16, 'TDES': 1, 'KMAC': 1}, 'rules_asymmetric_crypto': {'ECDH': 4, 'ECDSA': 5, 'Diffie-Hellman': 2, 'DH': 6, 'DSA': 6}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 4, 'SHA-1': 11, 'SHA-256': 8, 'SHA-224': 2, 'SHA-512': 4}, 'rules_crypto_schemes': {'PACE': 8, 'MAC': 50}, 'rules_randomness': {'RND': 2}, 'rules_tee': {'SE': 3}, 'rules_side_channels': {'Malfunction': 19, 'malfunction': 5, 'physical probing': 4, 'Physical Tampering': 5, 'physical tampering': 3, 'Physical tampering': 1, 'SPA': 1, 'DPA': 2, 'fault injection': 1, 'timing attacks': 1}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.sogis.org/', 'mailto:certification@ssi.gouv.fr', 'http://www.commoncriteriaportal.org/', 'http://www.ssi.gouv.fr/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/56': 36, 'ANSSI-CC-2020/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-2009': 1, 'BSI-PP-0084-2014': 1, 'BSI-PP-0056-2009': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL5': 1, 'EAL7': 1, 'EAL2': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 5+': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 3, 'AGD_PRE': 3}, 'ALC': {'ALC_DVS.2': 3, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 1}, 'Idemia': {'IDEMIA': 28}}, 'eval_facility': {'Serma': {'SERMA': 14}, 'CESTI': {'CESTI': 1}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 30}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2020/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056': 1, 'BSI-PP-0002-2001': 1, 'BSI-CC-PP-0084-2014': 1, 'BSI-PP-0055': 1, 'BSI-PP-0056': 1}}, 'cc_security_level': {'EAL': {'EAL5': 7, 'EAL4': 1, 'EAL5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 7, 'ADV_FSP': 1, 'ADV_FSP.5': 10, 'ADV_IMP': 1, 'ADV_IMP.1': 11, 'ADV_INT': 1, 'ADV_INT.2': 2, 'ADV_TDS': 1, 'ADV_TDS.4': 9, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 4, 'ADV_FSP.2': 2, 'ADV_FSP.4': 2}, 'AGD': {'AGD_PRE': 4, 'AGD_OPE': 6, 'AGD_OPE.1': 7, 'AGD_PRE.1': 7}, 'ALC': {'ALC_DVS.2': 10, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.5': 3, 'ALC_DEL': 1, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 4, 'ALC_TAT': 1, 'ALC_TAT.2': 4, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_SCT': 1, 'ALC_STM': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 4, 'ATE_DPT': 1, 'ATE_DPT.3': 3, 'ATE_FUN': 1, 'ATE_FUN.1': 8, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.5': 8, 'AVA_VAN.3': 2, 'AVA_VAN': 1}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 6, 'ASE_INT': 1, 'ASE_INT.1': 6, 'ASE_OBJ': 1, 'ASE_OBJ.2': 4, 'ASE_REQ': 1, 'ASE_REQ.2': 4, 'ASE_SPD': 1, 'ASE_SPD.1': 4, 'ASE_TSS': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS': 3, 'FAU_SAS.1': 11, 'FAU_GEN': 1, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 2, 'FCS_RND.1': 21, 'FCS_RND.1.1': 2, 'FCS_CKM.4': 44, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 12}, 'FDP': {'FDP_ACC.1': 27, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 21, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_ITC.1': 11, 'FDP_ITC.2': 11, 'FDP_IFC.1': 3}, 'FIA': {'FIA_API': 4, 'FIA_API.1': 11, 'FIA_API.1.1': 2, 'FIA_UID.1': 18, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 14, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 15, 'FIA_UAU.4.1': 1}, 'FMT': {'FMT_LIM': 3, 'FMT_LIM.1': 17, 'FMT_LIM.2': 17, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMF.1': 45, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 44, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.3': 8, 'FMT_MTD.3.1': 1, 'FMT_MSA.3': 9, 'FMT_MTD.1': 1, 'FMT_MSA.1': 3}, 'FPT': {'FPT_EMS': 4, 'FPT_EMS.1': 18, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 13, 'FPT_FLS.1.1': 1, 'FPT_TST.1': 11, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 11, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC.1': 6, 'FTP_TRP.1': 6}}, 'cc_claims': {'T': {'T.AC_SM_LEVEL': 1}, 'A': {'A.MRTD_': 1}, 'OT': {'OT.AC_SM_LEVEL': 1}, 'OE': {'OE.BAC_PP': 7, 'OE.MRTD_': 6}}, 'vendor': {'STMicroelectronics': {'STM': 1}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 28, 'Idemia': 1}, 'Morpho': {'Morpho': 2}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 20, 'AES-': 1}}, 'DES': {'DES': {'DES': 21}, '3DES': {'3DES': 4, 'Triple-DES': 11, 'TDES': 1}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 5}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 6}, 'DSA': {'DSA': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 4, 'SHA-1': 11}, 'SHA2': {'SHA-256': 8, 'SHA-224': 2, 'SHA-512': 4, 'SHA2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 50}}, 'crypto_protocol': {'PACE': {'PACE': 8}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 13}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 3, 'Physical tampering': 1, 'Malfunction': 19, 'malfunction': 5, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 25, 'EF.DG2': 6, 'EF.DG3': 21, 'EF.DG4': 20, 'EF.DG5': 5, 'EF.DG16': 24, 'EF.DG14': 5, 'EF.DG15': 1, 'EF.COM': 15, 'EF.SOD': 14}}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 46-3': 1, 'FIPS 186-3': 1, 'FIPS 197': 1, 'FIPS PUB 197': 1}, 'PKCS': {'PKCS#3': 4, 'PKCS#1': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 18013': 6, 'ISO/IEC 9796-2': 1, 'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1, 'ISO/IEC 9797-1': 1}, 'ICAO': {'ICAO': 181}, 'SCP': {'SCP02': 1, 'SCP03': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Machine Readable Travel Document with 'ICAO Application', Extended Access Control, Version ...", 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0026b.pdf', 'pp_ids': None}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2021-02-05', 'maintenance_title': 'ANSSI-CC-2020/56-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_56-m01.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 01.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}}} data.
  • 02.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019']}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2020_56fr.pdf', 'st_filename': 'anssi-cible-cc-2020-56en.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}, '__delete__': ['EAL 2', 'EAL 4', 'EAL 6', 'EAL 5+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR': 2}, '__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 5}}}}, 'vendor': {'__update__': {'Idemia': {'__update__': {'IDEMIA': 34}}}}, 'eval_facility': {'__update__': {'CESTI': {'__update__': {'CESTI': 3}}, 'CEA-LETI': {'__insert__': {'CEA-LETI': 2}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 2}}, 'CC': {'__insert__': {'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 16, 'ADV_FSP.5': 22, 'ADV_IMP.1': 16, 'ADV_INT.2': 8, 'ADV_TDS.4': 23}}, 'AGD': {'__update__': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 16, 'AGD_PRE.1': 12}}, 'ALC': {'__update__': {'ALC_DVS.2': 15, 'ALC_CMC.4': 16, 'ALC_CMS.5': 7, 'ALC_DEL.1': 6, 'ALC_LCD.1': 9, 'ALC_TAT.2': 12}}, 'ATE': {'__update__': {'ATE_COV.2': 8, 'ATE_DPT.3': 7, 'ATE_FUN.1': 14, 'ATE_IND.2': 7}}, 'AVA': {'__update__': {'AVA_VAN.5': 15}}, 'ASE': {'__insert__': {'ASE_APD.1': 1}, '__update__': {'ASE_CCL.1': 15, 'ASE_ECD.1': 14, 'ASE_INT.1': 17, 'ASE_OBJ.2': 13, 'ASE_REQ.2': 15, 'ASE_SPD.1': 8, 'ASE_TSS.1': 6}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 12}}, 'FCS': {'__insert__': {'FCS_CKM': 53, 'FCS_COP': 118}, '__update__': {'FCS_RND.1': 22, 'FCS_COP.1': 12, 'FCS_CKM.1': 15}}, 'FDP': {'__insert__': {'FDP_ACC': 17, 'FDP_ACF': 20, 'FDP_UCT': 10, 'FDP_UCT.1': 1, 'FDP_UIT': 10, 'FDP_UIT.1': 2, 'FDP_DAU': 9, 'FDP_DAU.1': 2, 'FDP_ITC': 14}, '__update__': {'FDP_ACC.1': 28, 'FDP_ACF.1': 27, 'FDP_ITC.1': 14}}, 'FIA': {'__insert__': {'FIA_UID': 12, 'FIA_UAU': 62, 'FIA_UAU.5': 2, 'FIA_UAU.6': 2, 'FIA_AFL': 12, 'FIA_AFL.1': 2}, '__update__': {'FIA_API': 5, 'FIA_UID.1': 20, 'FIA_UAU.1': 16, 'FIA_UAU.4': 16}}, 'FMT': {'__insert__': {'FMT_MTD': 120, 'FMT_MOF': 21, 'FMT_MOF.1': 2}, '__update__': {'FMT_LIM.2': 16, 'FMT_SMF.1': 44, 'FMT_MTD.3': 7, 'FMT_MTD.1': 15}}, 'FPT': {'__update__': {'FPT_TST.1': 13, 'FPT_PHP.3': 14}}, 'FTP': {'__insert__': {'FTP_ITC': 10}, '__update__': {'FTP_ITC.1': 9}}}}, 'cc_claims': {'__delete__': ['T']}, 'vendor': {'__update__': {'Idemia': {'__update__': {'IDEMIA': 26}, '__delete__': ['Idemia']}, 'Morpho': {'__update__': {'Morpho': 1}}}, '__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 21}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 5}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 2}}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA2': 2}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 8}}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 6}}}}, 'randomness': {}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'Physical Tampering': 4, 'Malfunction': 6, 'malfunction': 6}}}}, 'tee_name': {}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.COM': 16}}}}, 'standard_id': {'__insert__': {'CC': {'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, '__update__': {'ICAO': {'__update__': {'ICAO': 12}}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-1110-2019']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}]} values added.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Machine Readable Travel Document with 'ICAO Application', Extended Access Control, Version ...", 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0026b.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Machine Readable Travel Document with 'ICAO Application', Extended Access Control, Version ...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0026b.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "cfdacd53c732343c",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "ANSSI-CC-2020/56",
    "cert_lab": [
      "CEA"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_APD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1",
        "9.1"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V2-2019",
          "ANSSI-CC-2020/07"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0945-V2-2018",
          "BSI-DSZ-CC-1110-2019",
          "BSI-DSZ-CC-0945-2017",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-1110-V2-2019",
          "ANSSI-CC-2020/07",
          "BSI-DSZ-CC-0945-V3-2018",
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/07"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V2-2019",
          "ANSSI-CC-2020/07"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
        "maintenance_date": "2021-02-05",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_56-m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2020/56-M01"
      }
    ]
  },
  "manufacturer": "Idemia",
  "manufacturer_web": "https://www.idemia.com",
  "name": "CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1 (code SAAAAR : 203523)",
  "not_valid_after": "2025-07-27",
  "not_valid_before": "2020-07-27",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "anssi-cc-2020_56fr.pdf",
    "report_frontpage": {
      "anssi": {
        "cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
        "cert_id": "ANSSI-CC-2020/56",
        "cert_item": "CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1",
        "cert_item_version": "code SAAAAR : 203523",
        "cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
        "developer": "IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France",
        "match_rules": [
          "R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
        ],
        "ref_protection_profiles": "Machine Readable Travel Document with \"ICAO Application\", Extended Access Control, version 1.10 certifi\u00e9 BSI-CC-PP-0056-2009 le 25 mars 2009"
      },
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V2-2019": 2
        },
        "FR": {
          "ANSSI-CC-2020/07": 2,
          "ANSSI-CC-2020/56": 36
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-2009": 1,
          "BSI-PP-0056-2009": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 3,
          "AGD_PRE": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 2,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1,
          "CEA-LETI": 2
        },
        "CESTI": {
          "CESTI": 3
        },
        "Serma": {
          "SERMA": 14
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ICAO": {
          "ICAO": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 34
        },
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "G\u00e9raldine Avou\u00e9",
      "/CreationDate": "D:20200729165353+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "ANSSI-CC-CER-F-07, v29.2",
      "/Producer": "LibreOffice 4.4",
      "/Subject": "CombICAO Applet v2.1 in EAC configuration on ID-One Cosmo V9.1",
      "/Title": "ANSSI-CC-2020/56",
      "pdf_file_size_bytes": 262234,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/",
          "mailto:certification@ssi.gouv.fr",
          "http://www.sogis.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    },
    "st_filename": "anssi-cible-cc-2020-56en.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/07": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.MRTD_": 1
        },
        "OE": {
          "OE.BAC_PP": 7,
          "OE.MRTD_": 6
        },
        "OT": {
          "OT.AC_SM_LEVEL": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056": 1,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0055": 1,
          "BSI-PP-0056": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 16,
          "ADV_FSP": 1,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 22,
          "ADV_IMP": 1,
          "ADV_IMP.1": 16,
          "ADV_INT": 1,
          "ADV_INT.2": 8,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 23
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 16,
          "AGD_PRE": 1,
          "AGD_PRE.1": 12
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 16,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 7,
          "ALC_DEL": 1,
          "ALC_DEL.1": 6,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 15,
          "ALC_LCD": 1,
          "ALC_LCD.1": 9,
          "ALC_SCT": 1,
          "ALC_STM": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 12
        },
        "APE": {
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_APD.1": 1,
          "ASE_CCL": 1,
          "ASE_CCL.1": 15,
          "ASE_ECD": 1,
          "ASE_ECD.1": 14,
          "ASE_INT": 1,
          "ASE_INT.1": 17,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 13,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 15,
          "ASE_SPD": 1,
          "ASE_SPD.1": 8,
          "ASE_TSS": 1,
          "ASE_TSS.1": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 2,
          "ATE_COV.2": 8,
          "ATE_DPT": 1,
          "ATE_DPT.1": 2,
          "ATE_DPT.3": 7,
          "ATE_FUN": 1,
          "ATE_FUN.1": 14,
          "ATE_IND": 1,
          "ATE_IND.2": 7
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 2,
          "AVA_VAN.5": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL5": 7,
          "EAL5 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 3,
          "FAU_SAS.1": 12,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 53,
          "FCS_CKM.1": 15,
          "FCS_CKM.2": 3,
          "FCS_CKM.4": 44,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 118,
          "FCS_COP.1": 12,
          "FCS_RND": 2,
          "FCS_RND.1": 22,
          "FCS_RND.1.1": 2
        },
        "FDP": {
          "FDP_ACC": 17,
          "FDP_ACC.1": 28,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 20,
          "FDP_ACF.1": 27,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 2,
          "FDP_DAU": 9,
          "FDP_DAU.1": 2,
          "FDP_IFC.1": 3,
          "FDP_ITC": 14,
          "FDP_ITC.1": 14,
          "FDP_ITC.2": 11,
          "FDP_UCT": 10,
          "FDP_UCT.1": 1,
          "FDP_UIT": 10,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 12,
          "FIA_AFL.1": 2,
          "FIA_API": 5,
          "FIA_API.1": 11,
          "FIA_API.1.1": 2,
          "FIA_UAU": 62,
          "FIA_UAU.1": 16,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 16,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 2,
          "FIA_UAU.6": 2,
          "FIA_UID": 12,
          "FIA_UID.1": 20,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 3,
          "FMT_LIM.1": 17,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 16,
          "FMT_LIM.2.1": 2,
          "FMT_MOF": 21,
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 3,
          "FMT_MSA.3": 9,
          "FMT_MTD": 120,
          "FMT_MTD.1": 15,
          "FMT_MTD.3": 7,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 44,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 44,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 18,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 13,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.3": 14,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 13,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 10,
          "FTP_ITC.1": 9,
          "FTP_TRP.1": 6
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 13
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 6
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA-LETI": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 11,
            "SHA1": 4
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 8,
            "SHA-512": 4,
            "SHA2": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 16,
          "EF.DG1": 25,
          "EF.DG14": 5,
          "EF.DG15": 1,
          "EF.DG16": 24,
          "EF.DG2": 6,
          "EF.DG3": 21,
          "EF.DG4": 20,
          "EF.DG5": 5,
          "EF.SOD": 14
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 6,
          "Physical Tampering": 4,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 6,
          "physical tampering": 3
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 4,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-3": 1,
          "FIPS 197": 1,
          "FIPS 46-3": 1,
          "FIPS PUB 197": 1
        },
        "ICAO": {
          "ICAO": 12
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 18013": 6,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9796-2": 1,
          "ISO/IEC 9797-1": 1
        },
        "PKCS": {
          "PKCS#1": 1,
          "PKCS#3": 4
        },
        "RFC": {
          "RFC3369": 1
        },
        "SCP": {
          "SCP02": 1,
          "SCP03": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 21,
            "AES-": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 4,
            "TDES": 1,
            "Triple-DES": 11
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 7,
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Idemia": {
          "IDEMIA": 26
        },
        "Morpho": {
          "Morpho": 1
        },
        "Oberthur": {
          "Oberthur Technologies": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Shubham SAGAR",
      "/CreationDate": "D:20200617125409+05\u002730\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20200617125409+05\u002730\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Title",
      "pdf_file_size_bytes": 2162368,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 135
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0026b.pdf",
        "pp_name": "Machine Readable Travel Document with \u0027ICAO Application\u0027, Extended Access Control, Version ..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_56fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020-56en.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "158c34334de8c21058d9220630e39b9626cf969f1d172ea8f6f52d90e4bbf011",
    "report_txt_hash": "7769244930c35543c41aeb6209e085afc013a0b575ccec411002ac9760953167",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "8f1f3e66a5b0c26a3cce09fb5ed279da74b575b29f9c342317e751db7254f975",
    "st_txt_hash": "dfcecfab5410d9fee0505064f494398f262882f0a02f40f17e1220b11777d5e6"
  },
  "status": "active"
}