CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)
CSV information ?
Status | active |
---|---|
Valid from | 27.07.2020 |
Valid until | 03.07.2028 |
Scheme | 🇫🇷 FR |
Manufacturer | Idemia |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL5, ALC_DVS.2 |
Protection profiles | |
Maintenance updates | reassessment ANSSI-CC-2020/59-S01 (03.07.2023) Certification report |
ANSSI-CC-2020/59-M01 (05.02.2021) Certification report |
Heuristics summary ?
Certificate ?
Extracted keywords
Vendor
IDEMIASecurity level
EAL5, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP- 0071-2012Certificates
ANSSI-CC-2020/59-S01Evaluation facilities
CEA - LETIFile metadata
Creation date: | D:20230706170456+02'00' |
---|---|
Modification date: | D:20230706170732+02'00' |
Pages: | 2 |
Creator: | Acrobat PDFMaker 23 pour Word |
Producer: | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESVendor
Infineon Technologies AG, Infineon, IDEMIASecurity level
EAL 5, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-PP-0084-2014, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-, PP-SSCD-Part4Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/59, ANSSI-CC-2020/07Evaluation facilities
SERMA, CESTI, CEA - LETI, CEA-LETIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title: | ANSSI-CC-2020/59 |
---|---|
Subject: | CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 |
Keywords: | ANSSI-CC-CER-F-07, v29.2 |
Author: | Géraldine Avoué |
Creation date: | D:20200729170505+02'00' |
Pages: | 17 |
Creator: | Writer |
Producer: | LibreOffice 4.4 |
Frontpage
Certificate ID: | ANSSI-CC-2020/59 |
---|---|
Certified item: | CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 |
Certification lab: | CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France |
Developer: | IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France |
References
Outgoing- BSI-DSZ-CC-1110-V2-2019 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
- ANSSI-CC-2020/07 - Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, KMAC, CMACAsymmetric Algorithms
RSA-1024, ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-224, SHA-384, SHA-512Schemes
MACProtocols
PACE, PGPRandomness
RNDBlock cipher modes
CBCVendor
Infineon, Oberthur Technologies, IDEMIA, MorphoSecurity level
EAL5, EAL 5, EAL4, EAL5 augmented, EAL4 augmentedClaims
A.CGA, A.SCA, A.CSP, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, ADV_FSP, ADV_FSP.5, ADV_IMP, ADV_IMP.1, ADV_TDS, ADV_TDS.4, ADV_INT, ADV_INT.2, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_PRE_PLT, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.5, ALC_DEL, ALC_DEL.1, ALC_LCD, ALC_LCD.1, ALC_TAT, ALC_TAT.2, ALC_TAT.1, ALC_CMS.1, ALC_DVS.1, ATE_COV, ATE_COV.2, ATE_DPT, ATE_DPT.3, ATE_FUN, ATE_FUN.1, ATE_IND, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN, APE_SRE, ASE_CCL, ASE_CCL.1, ASE_ECD, ASE_ECD.1, ASE_INT, ASE_INT.1, ASE_OBJ, ASE_OBJ.2, ASE_REQ, ASE_REQ.2, ASE_SPD, ASE_SPD.1, ASE_APD.1, ASE_TSS, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_ARP.1, FCS_RND, FCS_RND.1, FCS_RND.1.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FCS_RNG.1, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.1, FDP_UCT, FDP_UCT.1, FDP_DAU, FDP_DAU.2, FDP_UIT, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL, FIA_AFL.1, FIA_UID, FIA_UAU, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_MOF.1, FMT_MOF.1.1, FMT_SMR, FMT_MTD.3, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_ITC, FTP_TRP.1Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075, BSI-CC-PP-0071Certificates
BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2020/07Side-channel analysis
physical probing, side channel, SPA, DPA, timing attacks, physical tampering, Malfunction, malfunction, DFA, fault injection, JIL, JIL-COMPStandards
PKCS#1, PKCS #1, PKCS#3, PKCS#15, SCP03, SCP02File metadata
Title: | Title |
---|---|
Author: | Shubham SAGAR |
Creation date: | D:20200617125534+05'30' |
Modification date: | D:20200617125534+05'30' |
Pages: | 99 |
Creator: | Microsoft® Word 2016 |
Producer: | Microsoft® Word 2016 |
References
Outgoing- BSI-DSZ-CC-1110-V2-2019 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h H13 including the products from the second production line and optional software packages: Flash Loader, Asymmetric Crypto Library, Symmetric Cryptographic Library, Hardware Support Layer, Hash Crypto Library, Mifare Compatible Software, and CIPURSE™ Crypto Library
- ANSSI-CC-2020/07 - Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
Heuristics ?
Extracted SARs
AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, ASE_TSS.1, ALC_CMC.4, ADV_FSP.5, ASE_CCL.1, ASE_INT.1, AVA_VAN.5, ADV_TDS.4, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ATE_FUN.1, ADV_INT.2, ALC_DVS.2, ALC_CMS.5, ASE_SPD.1, ATE_COV.2, ATE_DPT.3, ATE_IND.2, ADV_IMP.1, ASE_APD.1, ADV_ARC.1, ALC_TAT.2Scheme data ?
Product | CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523 | |
Description | Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents ( | |
Sponsor | Idemia | |
Developer | Idemia, Infineon Technologies AG | |
Cert Id | 2020/64 | |
Level | EAL5+ | |
Expiration Date | 3 Juillet 2028 | |
Enhanced | ||
Cert Id | 2020/64 | |
Certification Date | 27/07/2020 | |
Expiration Date | 03/07/2028 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | Idemia, Infineon Technologies AG | |
Sponsor | Idemia | |
Evaluation Facility | CEA-Leti | |
Level | EAL5+ | |
Protection Profile | Protection profiles for secure signature creation device (Part 2 à part 4 incluses) | |
Mutual Recognition | CCRA SOG-IS | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Report Link | https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf |
References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8dec1867d0a4649850f4287d765067f407dc9dcd9293bcc6b9cfb933b35611d2', 'txt_hash': '6dd1e2fec0a449d882dd6b6be5ec4ab1dcf5d21093550c4579bac55f7c581371'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b3e81c437b32d2cde805c2f405ee6d8a135d09454db78877252bf3aa369fbb40', 'txt_hash': 'eeaea15d231156b2f3c44aa0b34eef52288a67a20f5fa0d5221193ba947bf5e9'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '07689c589ed31e887d09e1ee09d6e1b5203eef599b7da121860c1290f702619e', 'txt_hash': 'df14e9f077802793836a63e80aa421cbcb61fee35ff575b7cfc7659caf27667a'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': {'pdf_file_size_bytes': 157982, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20230706170456+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20230706170732+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2020/59-S01': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP- 0071-2012': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Idemia': {'IDEMIA': 2}}, 'eval_facility': {'CEA-LETI': {'CEA - LETI': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'Certificat-CC-2020_59-S01fr.pdf'}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2020/59', 'cert_item': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1', 'cert_item_version': 'Code SAAAAR : 203523', 'ref_protection_profiles': 'Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France', 'cert_lab': 'CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France'}}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 1}}, 'FR': {'__update__': {'ANSSI-CC-2020/59': 18, 'ANSSI-CC-2020/07': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 1}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 1}}}}}
data.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523', 'description': 'Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents (', 'cert_id': '2020/64', 'enhanced': {'__update__': {'cert_id': '2020/64', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf'}}}
data.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 2}}, 'FR': {'__update__': {'ANSSI-CC-2020/59': 36, 'ANSSI-CC-2020/07': 2}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 2}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 2}}}}}
data.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v91-code-saaaar-203523', 'description': 'Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents (', 'cert_id': '2020/59', 'enhanced': {'__update__': {'cert_id': '2020/59', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_59fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-59en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_59-S01fr_0.pdf'}}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__delete__': ['CA']}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 21, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 4': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '3 3 2': 1, '1 1 3': 1, '2 2 1': 1, '2 2 3': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 1}}, 'FR': {'__update__': {'ANSSI-CC-2020/59': 18, 'ANSSI-CC-2020/07': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V2-2019': 1}}, 'FR': {'__update__': {'ANSSI-CC-2020/07': 1}}}}}
data.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523', 'description': 'Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents (', 'cert_id': '2020/64', 'enhanced': {'__update__': {'cert_id': '2020/64', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf'}}}
data.
- The report_keywords property was updated, with the
-
05.02.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents ('}
data.
- The scheme_data property was updated, with the
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
. - The scheme_data property was updated, with the
{'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)', 'url': 'https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v91-code-saaaar-203523', 'enhanced': {'__insert__': {'cert_id': '2020/59', 'sponsor': 'Idemia', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ALC_DVS.2, AVA_VAN.5'}, '__update__': {'developer': 'Idemia, Infineon Technologies AG', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_59fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-59en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_59-S01fr_0.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description']}}
data.
- The following values were inserted:
-
21.09.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)\n\t\t\t\n\t\t\tDernier rapport de maintenance :2020/59-M01Dernier rapport de surveillance :2020/59-S01', 'vendor': 'Idemia, Infineon Technologies AGIdemia', 'id': '2020/59', 'certification_date': '27/07/2020', 'url': 'https://www.ssi.gouv.fr/certification_cc/combicao-applet-v2-1-in-sscd-configuration-on-cosmo-v9-1-code-saaaar-203523/', 'enhanced': {'__update__': {'id': '2020/59', 'certification_date': '27/07/2020', 'expiration_date': '03/07/2028', 'protection_profile': 'Protection profiles for secure signature creation device (Part 2 à part 4 incluses)', 'developer': 'Idemia, Infineon Technologies AG / Idemia', 'evaluation_facility': 'CEA-Leti', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1, code SAAAAR : 203523 » développé par IDEMIA et Infineon Technologies AG.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD). Il peut être utilisé dans différents types de documents (carte d’identité, permis de conduire, carte d’entreprise, passeport, etc. ).\n\t\t\t\t\n Rapport de certification\nSecurity target\nSecurity target\nCertificat\n \t\t\t\t\t\n \t\t\t\t\t\n \n \n Rapports de maintenance2020/59-M01 - 05/02/2021\n \n Rapports de surveillance2020/59-S01 - 04/08/2023', 'report_link': 'https://www.ssi.gouv.fr/uploads/2020/08/anssi-cc-2020_59fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2020/08/anssi-cible-cc-2020-59en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2020/08/certificat-cc-2020_59-s01fr.pdf'}}}
data.
- The scheme_data property was updated, with the
-
27.07.2023 The certificate data changed.
Certificate changed
The Valid until date was updated.
- The new value is
2028-07-03
.
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/Certificat-CC-2020_59-S01fr.pdf
.
The Maintenance Updates of the certificate were updated.
- The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2023-07-03', 'maintenance_title': 'reassessment ANSSI-CC-2020/59-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2020_59-S01fr.pdf', 'maintenance_st_link': None}]}
.
- The new value is
-
20.06.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'enhanced': {'__update__': {'cert_link': 'https://www.ssi.gouv.fr/uploads/2023/05/certificat-anssi-cc-2022_18v2fr.pdf'}}}
data.
- The scheme_data property was updated, with the
-
18.05.2023 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The following values were removed:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}]}
. - The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}]}
.
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'vendor': 'IDEMIA INFINEON TECHNOLOGIES AGIDEMIA INFINEON TECHNOLOGIES AG', 'id': '2022/18v2', 'certification_date': '05/05/2023', 'url': 'https://www.ssi.gouv.fr/certification_cc/combicao-applet-v3-on-id-one-cosmo-x-sscd-configuration-saaaar-203742-2/', 'enhanced': {'__insert__': {'recognition': 'SOG-IS - CCRA'}, '__update__': {'id': '2022/18v2', 'certification_date': '05/05/2023', 'developer': 'IDEMIA INFINEON TECHNOLOGIES AG / IDEMIA INFINEON TECHNOLOGIES AG', 'report_link': 'https://www.ssi.gouv.fr/uploads/2023/05/anssi-cc-2022_18v2fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2023/05/anssi-cible-cc-2022_18v2en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2023/05/certificat-anssi-cc-2022_18v2.pdf'}}}
data.
- The following values were removed:
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'product': 'CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742', 'vendor': 'IDEMIA INFINEON TECHNOLOGIES AG', 'level': 'EAL5+', 'id': '2022/18', 'certification_date': '08/03/2022', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/combicao-applet-v3-on-id-one-cosmo-x-sscd-configuration-saaaar-203742/', 'enhanced': {'id': '2022/18', 'certification_date': '08/03/2022', 'expiration_date': '08/03/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL5+', 'augmentations': 'ALC_DVS.2, AVA_VAN.5', 'protection_profile': 'Protection profiles for secure signature creation device: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.', 'developer': '/ IDEMIA INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'CEA - LETI', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration), SAAAAR : 203742 », dont le logiciel embarqué est développé par IDEMIA, sur un microcontrôleur développé par INFINEON.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2022/03/anssi-cc-2022_18.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2022/03/anssi-cible-cc-2022_18en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2022/03/certificat-cc-2022_18.pdf'}}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2021-02-05', 'maintenance_title': 'ANSSI-CC-2020/59-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_59-m01.pdf', 'maintenance_st_link': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
b3e81c437b32d2cde805c2f405ee6d8a135d09454db78877252bf3aa369fbb40
. - The st_txt_hash property was set to
eeaea15d231156b2f3c44aa0b34eef52288a67a20f5fa0d5221193ba947bf5e9
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2209512, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 99, '/Title': 'Title', '/Author': 'Shubham SAGAR', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200617125534+05'30'", '/ModDate': "D:20200617125534+05'30'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1}}, 'cc_security_level': {'EAL': {'EAL5': 3, 'EAL 5': 1, 'EAL4': 1, 'EAL5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 15, 'ADV_FSP': 1, 'ADV_FSP.5': 22, 'ADV_IMP': 1, 'ADV_IMP.1': 15, 'ADV_TDS': 1, 'ADV_TDS.4': 23, 'ADV_INT': 1, 'ADV_INT.2': 7, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 8, 'AGD_OPE': 10, 'AGD_PRE_PLT': 1, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}, 'ALC': {'ALC_DVS.2': 14, 'ALC_DVS': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 16, 'ALC_CMS': 1, 'ALC_CMS.5': 7, 'ALC_DEL': 1, 'ALC_DEL.1': 6, 'ALC_LCD': 1, 'ALC_LCD.1': 9, 'ALC_TAT': 1, 'ALC_TAT.2': 12, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 8, 'ATE_DPT': 1, 'ATE_DPT.3': 7, 'ATE_FUN': 1, 'ATE_FUN.1': 14, 'ATE_IND': 1, 'ATE_IND.2': 7, 'ATE_COV.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 2}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 15, 'ASE_ECD': 1, 'ASE_ECD.1': 14, 'ASE_INT': 1, 'ASE_INT.1': 17, 'ASE_OBJ': 1, 'ASE_OBJ.2': 13, 'ASE_REQ': 1, 'ASE_REQ.2': 15, 'ASE_SPD': 1, 'ASE_SPD.1': 8, 'ASE_APD.1': 1, 'ASE_TSS': 1, 'ASE_TSS.1': 6, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1}, 'FCS': {'FCS_RND': 2, 'FCS_RND.1': 15, 'FCS_RND.1.1': 2, 'FCS_CKM': 53, 'FCS_CKM.1': 13, 'FCS_CKM.4': 40, 'FCS_CKM.4.1': 1, 'FCS_COP': 82, 'FCS_COP.1': 12, 'FCS_RNG.1': 1, 'FCS_CKM.2': 3}, 'FDP': {'FDP_ACC': 83, 'FDP_ACC.1': 18, 'FDP_ACF': 70, 'FDP_ACF.1': 29, 'FDP_RIP.1': 25, 'FDP_RIP.1.1': 1, 'FDP_SDI': 28, 'FDP_SDI.2': 4, 'FDP_ITC': 10, 'FDP_ITC.1': 11, 'FDP_UCT': 25, 'FDP_UCT.1': 2, 'FDP_DAU': 9, 'FDP_DAU.2': 2, 'FDP_UIT': 12, 'FDP_UIT.1': 2, 'FDP_ITC.2': 8, 'FDP_IFC.1': 8}, 'FIA': {'FIA_API': 19, 'FIA_API.1': 15, 'FIA_API.1.1': 2, 'FIA_UID.1': 34, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 31, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL': 31, 'FIA_AFL.1': 4, 'FIA_UID': 27, 'FIA_UAU': 94, 'FIA_UAU.4': 1, 'FIA_UAU.5': 3, 'FIA_UAU.6': 2}, 'FMT': {'FMT_LIM': 3, 'FMT_LIM.1': 17, 'FMT_LIM.2': 15, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1': 53, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 74, 'FMT_SMF.1.1': 1, 'FMT_MSA': 25, 'FMT_MSA.1': 4, 'FMT_MSA.2': 22, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 34, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 18, 'FMT_MSA.4.1': 1, 'FMT_MTD': 193, 'FMT_MTD.1': 28, 'FMT_MOF.1': 12, 'FMT_MOF.1.1': 1, 'FMT_SMR': 28, 'FMT_MTD.3': 13, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 17, 'FPT_EMS.1': 16, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 22, 'FPT_FLS.1': 15, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1': 8, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 16, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC': 45, 'FTP_TRP.1': 3}}, 'cc_claims': {'A': {'A.CGA': 5, 'A.SCA': 4, 'A.CSP': 7}, 'OE': {'OE.HID_VAD': 6}}, 'vendor': {'Infineon': {'Infineon': 1}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 20}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 1, 'Triple-DES': 3}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA-1024': 3}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 3, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {'PACE': {'PACE': 62}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 2, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 6, 'Malfunction': 4, 'malfunction': 4, 'DFA': 2, 'fault injection': 2}, 'other': {'JIL': 1, 'JIL-COMP': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 8, 'PKCS #1': 1, 'PKCS#3': 2, 'PKCS#15': 2}, 'SCP': {'SCP03': 5, 'SCP02': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-cc-2020-59en.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020-59en.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0891-V2-2016']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]}
values discarded.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_59fr.pdf, code: nok']
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V2-2018']}}}
data.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
b3e81c437b32d2cde805c2f405ee6d8a135d09454db78877252bf3aa369fbb40
. - The st_txt_hash property was set to
eeaea15d231156b2f3c44aa0b34eef52288a67a20f5fa0d5221193ba947bf5e9
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 2209512, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 99, '/Title': 'Title', '/Author': 'Shubham SAGAR', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20200617125534+05'30'", '/ModDate': "D:20200617125534+05'30'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1}}, 'cc_security_level': {'EAL': {'EAL5': 3, 'EAL 5': 1, 'EAL4': 1, 'EAL5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 15, 'ADV_FSP': 1, 'ADV_FSP.5': 22, 'ADV_IMP': 1, 'ADV_IMP.1': 15, 'ADV_TDS': 1, 'ADV_TDS.4': 23, 'ADV_INT': 1, 'ADV_INT.2': 7, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 8, 'AGD_OPE': 10, 'AGD_PRE_PLT': 1, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}, 'ALC': {'ALC_DVS.2': 14, 'ALC_DVS': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 16, 'ALC_CMS': 1, 'ALC_CMS.5': 7, 'ALC_DEL': 1, 'ALC_DEL.1': 6, 'ALC_LCD': 1, 'ALC_LCD.1': 9, 'ALC_TAT': 1, 'ALC_TAT.2': 12, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 8, 'ATE_DPT': 1, 'ATE_DPT.3': 7, 'ATE_FUN': 1, 'ATE_FUN.1': 14, 'ATE_IND': 1, 'ATE_IND.2': 7, 'ATE_COV.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 15, 'AVA_VAN': 2}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 15, 'ASE_ECD': 1, 'ASE_ECD.1': 14, 'ASE_INT': 1, 'ASE_INT.1': 17, 'ASE_OBJ': 1, 'ASE_OBJ.2': 13, 'ASE_REQ': 1, 'ASE_REQ.2': 15, 'ASE_SPD': 1, 'ASE_SPD.1': 8, 'ASE_APD.1': 1, 'ASE_TSS': 1, 'ASE_TSS.1': 6, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1}, 'FCS': {'FCS_RND': 2, 'FCS_RND.1': 15, 'FCS_RND.1.1': 2, 'FCS_CKM': 53, 'FCS_CKM.1': 13, 'FCS_CKM.4': 40, 'FCS_CKM.4.1': 1, 'FCS_COP': 82, 'FCS_COP.1': 12, 'FCS_RNG.1': 1, 'FCS_CKM.2': 3}, 'FDP': {'FDP_ACC': 83, 'FDP_ACC.1': 18, 'FDP_ACF': 70, 'FDP_ACF.1': 29, 'FDP_RIP.1': 25, 'FDP_RIP.1.1': 1, 'FDP_SDI': 28, 'FDP_SDI.2': 4, 'FDP_ITC': 10, 'FDP_ITC.1': 11, 'FDP_UCT': 25, 'FDP_UCT.1': 2, 'FDP_DAU': 9, 'FDP_DAU.2': 2, 'FDP_UIT': 12, 'FDP_UIT.1': 2, 'FDP_ITC.2': 8, 'FDP_IFC.1': 8}, 'FIA': {'FIA_API': 19, 'FIA_API.1': 15, 'FIA_API.1.1': 2, 'FIA_UID.1': 34, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 31, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL': 31, 'FIA_AFL.1': 4, 'FIA_UID': 27, 'FIA_UAU': 94, 'FIA_UAU.4': 1, 'FIA_UAU.5': 3, 'FIA_UAU.6': 2}, 'FMT': {'FMT_LIM': 3, 'FMT_LIM.1': 17, 'FMT_LIM.2': 15, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1': 53, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 74, 'FMT_SMF.1.1': 1, 'FMT_MSA': 25, 'FMT_MSA.1': 4, 'FMT_MSA.2': 22, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 34, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 18, 'FMT_MSA.4.1': 1, 'FMT_MTD': 193, 'FMT_MTD.1': 28, 'FMT_MOF.1': 12, 'FMT_MOF.1.1': 1, 'FMT_SMR': 28, 'FMT_MTD.3': 13, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 17, 'FPT_EMS.1': 16, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 22, 'FPT_FLS.1': 15, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1': 8, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 16, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC': 45, 'FTP_TRP.1': 3}}, 'cc_claims': {'A': {'A.CGA': 5, 'A.SCA': 4, 'A.CSP': 7}, 'OE': {'OE.HID_VAD': 6}}, 'vendor': {'Infineon': {'Infineon': 1}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 20}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 1, 'Triple-DES': 3}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA-1024': 3}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 3, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {'PACE': {'PACE': 62}, 'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 2, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 6, 'Malfunction': 4, 'malfunction': 4, 'DFA': 2, 'fault injection': 2}, 'other': {'JIL': 1, 'JIL-COMP': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 8, 'PKCS #1': 1, 'PKCS#3': 2, 'PKCS#15': 2}, 'SCP': {'SCP03': 5, 'SCP02': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-cc-2020-59en.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-V3-2018']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]}
values added.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The manufacturer_web was updated.
- The new value is
https://www.idemia.com
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020-59en.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0945-V3-2018']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]}
values discarded.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The manufacturer_web was updated.
- The new value is
None
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART2_V1.03', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'P_SSCD_PART4_V1.0.1', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP_SSCD_PART3_V1.0.2', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
22.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015']}}}
data.
- The report_references property was updated, with the
-
21.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015']}}}
data.
- The report_references property was updated, with the
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
26.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The st_keywords property was updated, with the
{'crypto_protocol': {'__insert__': {'PGP': {'PGP': 1}}}}
data.
- The st_keywords property was updated, with the
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'anssi-cc-2020_59fr.pdf', 'st_filename': 'anssi-cible-cc-2020-59en.pdf'}
. - The report_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}, '__delete__': ['EAL 2', 'EAL 4', 'EAL 6', 'EAL 5+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR': 2}, '__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 5}}}}, 'vendor': {'__update__': {'Idemia': {'__update__': {'IDEMIA': 34}}}}, 'eval_facility': {'__update__': {'CESTI': {'__update__': {'CESTI': 3}}, 'CEA-LETI': {'__insert__': {'CEA-LETI': 2}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}}, '__delete__': ['ICAO']}}
data. - The st_keywords property was updated, with the
{'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 15, 'ADV_FSP.5': 22, 'ADV_IMP.1': 15, 'ADV_TDS.4': 23, 'ADV_INT.2': 7}}, 'AGD': {'__update__': {'AGD_PRE': 8, 'AGD_OPE': 10, 'AGD_OPE.1': 15, 'AGD_PRE.1': 11}}, 'ALC': {'__update__': {'ALC_DVS.2': 14, 'ALC_CMC.4': 16, 'ALC_CMS.5': 7, 'ALC_DEL.1': 6, 'ALC_DVS': 2, 'ALC_LCD.1': 9, 'ALC_TAT.2': 12}}, 'ATE': {'__update__': {'ATE_COV.2': 8, 'ATE_DPT.3': 7, 'ATE_FUN.1': 14, 'ATE_IND.2': 7}, '__delete__': ['ATE_MGT']}, 'AVA': {'__update__': {'AVA_VAN.5': 15, 'AVA_VAN': 2}}, 'ASE': {'__insert__': {'ASE_APD.1': 1}, '__update__': {'ASE_CCL.1': 15, 'ASE_ECD.1': 14, 'ASE_INT.1': 17, 'ASE_OBJ.2': 13, 'ASE_REQ.2': 15, 'ASE_SPD.1': 8, 'ASE_TSS.1': 6}}}}, 'cc_sfr': {'__insert__': {'FAU': {'FAU_ARP.1': 1}}, '__update__': {'FCS': {'__insert__': {'FCS_CKM': 53, 'FCS_COP': 82}, '__update__': {'FCS_RND.1': 15, 'FCS_COP.1': 12, 'FCS_CKM.1': 13}}, 'FDP': {'__insert__': {'FDP_ACC': 83, 'FDP_ACF': 70, 'FDP_SDI': 28, 'FDP_SDI.2': 4, 'FDP_ITC': 10, 'FDP_UCT': 25, 'FDP_UCT.1': 2, 'FDP_DAU': 9, 'FDP_DAU.2': 2, 'FDP_UIT': 12, 'FDP_UIT.1': 2}, '__update__': {'FDP_ITC.1': 11, 'FDP_ACF.1': 29, 'FDP_ACC.1': 18}}, 'FIA': {'__insert__': {'FIA_AFL': 31, 'FIA_AFL.1': 4, 'FIA_UID': 27, 'FIA_UAU': 94, 'FIA_UAU.4': 1, 'FIA_UAU.6': 2}, '__update__': {'FIA_API': 19, 'FIA_API.1': 15, 'FIA_UID.1': 34, 'FIA_UAU.1': 31, 'FIA_UAU.5': 3}}, 'FMT': {'__insert__': {'FMT_MSA': 25, 'FMT_MTD': 193, 'FMT_SMR': 28}, '__update__': {'FMT_SMR.1': 53, 'FMT_SMF.1': 74, 'FMT_MSA.4': 18, 'FMT_MTD.1': 28, 'FMT_MSA.1': 4}}, 'FPT': {'__update__': {'FPT_EMS': 17, 'FPT_EMS.1': 16, 'FPT_PHP.3': 16}}, 'FTP': {'__insert__': {'FTP_ITC': 45}, '__update__': {'FTP_ITC.1': 13}}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon': 1}}, 'Idemia': {'__update__': {'IDEMIA': 20}, '__delete__': ['Idemia']}, 'Morpho': {'__update__': {'Morpho': 1}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 4}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'KMAC': 2}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 1, 'Diffie-Hellman': 1}}, 'DSA': {'__update__': {'DSA': 1}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-512': 1}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 7}}}, '__delete__': ['KA']}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 62}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 1}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'malfunction': 4}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'SCP': {'__update__': {'SCP03': 5}}}, '__delete__': ['ICAO']}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-1110-2019', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-0945-V3-2018']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_APD', 'level': 1}]}
values added.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Ve...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device wi...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2021-02-05', 'maintenance_title': 'ANSSI-CC-2020/59-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_59-m01.pdf', 'maintenance_st_link': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'http://www.sogis.org/', 'mailto:certification@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/59': 36, 'ANSSI-CC-2020/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-PP-0084-2014': 1}, 'other': {'PP-SSCD-Part2': 2, 'PP-SSCD-Part3': 2, 'PP-SSCD-': 1, 'PP-SSCD-Part4': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL5': 1, 'EAL7': 1, 'EAL2': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 5+': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 3, 'AGD_PRE': 3}, 'ALC': {'ALC_DVS.2': 3, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 1}, 'Idemia': {'IDEMIA': 28}}, 'eval_facility': {'Serma': {'SERMA': 14}, 'CESTI': {'CESTI': 1}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 27}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V2-2019': 2}, 'FR': {'ANSSI-CC-2020/07': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075': 1, 'BSI-CC-PP-0071': 1}}, 'cc_security_level': {'EAL': {'EAL5': 3, 'EAL 5': 1, 'EAL4': 1, 'EAL5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_ARC.1': 6, 'ADV_FSP': 1, 'ADV_FSP.5': 10, 'ADV_IMP': 1, 'ADV_IMP.1': 10, 'ADV_TDS': 1, 'ADV_TDS.4': 9, 'ADV_INT': 1, 'ADV_INT.2': 2, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_TDS.3': 3, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 11, 'AGD_OPE': 13, 'AGD_PRE_PLT': 1, 'AGD_OPE.1': 6, 'AGD_PRE.1': 6}, 'ALC': {'ALC_DVS.2': 8, 'ALC_CMC': 1, 'ALC_CMC.4': 2, 'ALC_CMS': 1, 'ALC_CMS.5': 3, 'ALC_DEL': 1, 'ALC_DEL.1': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_LCD.1': 4, 'ALC_TAT': 1, 'ALC_TAT.2': 4, 'ALC_TAT.1': 2, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.2': 4, 'ATE_DPT': 1, 'ATE_DPT.3': 3, 'ATE_FUN': 1, 'ATE_FUN.1': 8, 'ATE_IND': 1, 'ATE_IND.2': 2, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_MGT': 8}, 'AVA': {'AVA_VAN.5': 8, 'AVA_VAN': 1}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_CCL.1': 2, 'ASE_ECD': 1, 'ASE_ECD.1': 6, 'ASE_INT': 1, 'ASE_INT.1': 6, 'ASE_OBJ': 1, 'ASE_OBJ.2': 4, 'ASE_REQ': 1, 'ASE_REQ.2': 4, 'ASE_SPD': 1, 'ASE_SPD.1': 4, 'ASE_TSS': 1, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FCS': {'FCS_RND': 2, 'FCS_RND.1': 16, 'FCS_RND.1.1': 2, 'FCS_CKM.4': 40, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 8}, 'FDP': {'FDP_RIP.1': 25, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 8, 'FDP_ITC.2': 8, 'FDP_ACF.1': 5, 'FDP_ACC.1': 13, 'FDP_IFC.1': 8}, 'FIA': {'FIA_API': 3, 'FIA_API.1': 14, 'FIA_API.1.1': 2, 'FIA_UID.1': 33, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 26, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 1}, 'FMT': {'FMT_LIM': 3, 'FMT_LIM.1': 17, 'FMT_LIM.2': 15, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR.1': 45, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 69, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 22, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 34, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 17, 'FMT_MSA.4.1': 1, 'FMT_MOF.1': 12, 'FMT_MOF.1.1': 1, 'FMT_MTD.3': 13, 'FMT_MTD.3.1': 1, 'FMT_MTD.1': 1, 'FMT_MSA.1': 2}, 'FPT': {'FPT_EMS': 4, 'FPT_EMS.1': 14, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_TST.1': 22, 'FPT_FLS.1': 15, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1': 8, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 15, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 3, 'FTP_TRP.1': 3}}, 'cc_claims': {'A': {'A.CGA': 5, 'A.SCA': 4, 'A.CSP': 7}, 'OE': {'OE.HID_VAD': 6}}, 'vendor': {'Infineon': {'Infineon': 2}, 'Oberthur': {'Oberthur Technologies': 1}, 'Idemia': {'IDEMIA': 21, 'Idemia': 1}, 'Morpho': {'Morpho': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 8}, '3DES': {'TDES': 1, 'Triple-DES': 3}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA-1024': 3}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 5, 'Diffie-Hellman': 3}, 'DSA': {'DSA': 12}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 3, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 9}, 'KA': {'KA': 1}}, 'crypto_protocol': {'PACE': {'PACE': 239}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 2, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 6, 'Malfunction': 4, 'malfunction': 3, 'DFA': 2, 'fault injection': 2}, 'other': {'JIL': 1, 'JIL-COMP': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 8, 'PKCS #1': 1, 'PKCS#3': 2, 'PKCS#15': 2}, 'ICAO': {'ICAO': 118}, 'SCP': {'SCP03': 6, 'SCP02': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '8dec1867d0a4649850f4287d765067f407dc9dcd9293bcc6b9cfb933b35611d2', 'st_pdf_hash': 'b3e81c437b32d2cde805c2f405ee6d8a135d09454db78877252bf3aa369fbb40', 'report_txt_hash': '6dd1e2fec0a449d882dd6b6be5ec4ab1dcf5d21093550c4579bac55f7c581371', 'st_txt_hash': 'eeaea15d231156b2f3c44aa0b34eef52288a67a20f5fa0d5221193ba947bf5e9'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'DES': 4}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 8, 'DES': 7, 'TDES': 1, 'KMAC': 1}, 'rules_asymmetric_crypto': {'RSA-1024': 3, 'ECDH': 2, 'ECDSA': 5, 'ECC': 1, 'DH': 5, 'Diffie-Hellman': 1, 'DSA': 12}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 7, 'SHA-256': 3, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 2}, 'rules_crypto_schemes': {'PACE': 239, 'MAC': 9}, 'rules_randomness': {'RND': 2}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'Malfunction': 4, 'malfunction': 3, 'physical probing': 3, 'physical tampering': 6, 'side channel': 2, 'SPA': 1, 'DPA': 1, 'DFA': 2, 'fault injection': 2, 'timing attacks': 1}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V2-2019', 'ANSSI-CC-2020/07']}}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['2.1', '9.1']}
.
- The report_frontpage property was updated, with the
-
01.02.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The following values were removed:
{'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': None}]}
. - The following values were added:
{'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_SSCD_PART3_V1.0.2']}}]}
.
- The following values were removed:
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/Certificat-CC-2020_59-S01fr.pdf",
"dgst": "ec8a2a25cdbda634",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2020/59",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_APD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.1",
"9.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/07",
"BSI-DSZ-CC-1110-V2-2019"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0945-2017",
"BSI-DSZ-CC-1110-2019",
"BSI-DSZ-CC-1110-V2-2019",
"BSI-DSZ-CC-0945-V3-2018",
"BSI-DSZ-CC-0945-V2-2018",
"BSI-DSZ-CC-0891-2015",
"ANSSI-CC-2020/07",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0782-2012"
]
}
},
"scheme_data": {
"cert_id": "2020/64",
"description": "Le produit \u00e9valu\u00e9 est \u00ab CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2, code SAAAAR : 203523 \u00bb d\u00e9velopp\u00e9 par IDEMIA et Infineon Technologies AG. Le produit \u00e9valu\u00e9 est de type \u00ab carte \u00e0 puce \u00bb pouvant \u00eatre utilis\u00e9 en modes avec et sans contact. Il est destin\u00e9 \u00e0 \u00eatre utilis\u00e9 comme dispositif s\u00e9curis\u00e9 de cr\u00e9ation de signature (SSCD). Il peut \u00eatre utilis\u00e9 dans diff\u00e9rents types de documents (",
"developer": "Idemia, Infineon Technologies AG",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "2020/64",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_64-S01fr_0.pdf",
"certification_date": "27/07/2020",
"developer": "Idemia, Infineon Technologies AG",
"evaluation_facility": "CEA-Leti",
"expiration_date": "03/07/2028",
"level": "EAL5+",
"mutual_recognition": "CCRA\n SOG-IS",
"protection_profile": "Protection profiles for secure signature creation device (Part 2 \u00e0 part 4 incluses)",
"report_link": "https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cc-2020_64fr.pdf",
"sponsor": "Idemia",
"target_link": "https://cyber.gouv.fr/sites/default/files/2020/08/anssi-cible-cc-2020-64en.pdf"
},
"expiration_date": "3 Juillet 2028",
"level": "EAL5+",
"product": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.2 (code SAAAAR : 203523)",
"sponsor": "Idemia",
"url": "https://cyber.gouv.fr/produits-certifies/combicao-applet-v21-sscd-configuration-cosmo-v92-code-saaaar-203523"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/07",
"BSI-DSZ-CC-1110-V2-2019"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/07",
"BSI-DSZ-CC-1110-V2-2019"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2023-07-03",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2020_59-S01fr.pdf",
"maintenance_st_link": null,
"maintenance_title": "reassessment ANSSI-CC-2020/59-S01"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2021-02-05",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_59-m01.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2020/59-M01"
}
]
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1 (code SAAAAR : 203523)",
"not_valid_after": "2028-07-03",
"not_valid_before": "2020-07-27",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certificat-CC-2020_59-S01fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2020/59-S01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0071-2012": 1,
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0075-2012": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 2
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20230706170456+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20230706170732+02\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 157982,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "anssi-cc-2020_59fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2020/59",
"cert_item": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1",
"cert_item_version": "Code SAAAAR : 203523",
"cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1110-V2-2019": 1
},
"FR": {
"ANSSI-CC-2020/07": 1,
"ANSSI-CC-2020/59": 18
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071-2012": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-PP-0084-2014": 1
},
"other": {
"PP-SSCD-": 1,
"PP-SSCD-Part2": 2,
"PP-SSCD-Part3": 2,
"PP-SSCD-Part4": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 3,
"AGD_PRE": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1,
"CEA-LETI": 2
},
"CESTI": {
"CESTI": 3
},
"Serma": {
"SERMA": 14
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 34
},
"Infineon": {
"Infineon": 1,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "G\u00e9raldine Avou\u00e9",
"/CreationDate": "D:20200729170505+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "ANSSI-CC-CER-F-07, v29.2",
"/Producer": "LibreOffice 4.4",
"/Subject": "CombICAO Applet v2.1 in SSCD configuration on Cosmo v9.1",
"/Title": "ANSSI-CC-2020/59",
"pdf_file_size_bytes": 268853,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogis.org/",
"http://www.ssi.gouv.fr/",
"http://www.commoncriteriaportal.org/",
"mailto:certification@ssi.gouv.fr"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "anssi-cible-cc-2020-59en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 5
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA-1024": 3
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1110-V2-2019": 1
},
"FR": {
"ANSSI-CC-2020/07": 1
}
},
"cc_claims": {
"A": {
"A.CGA": 5,
"A.CSP": 7,
"A.SCA": 4
},
"OE": {
"OE.HID_VAD": 6
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071": 1,
"BSI-CC-PP-0075": 1,
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 15,
"ADV_FSP": 1,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 22,
"ADV_IMP": 1,
"ADV_IMP.1": 15,
"ADV_INT": 1,
"ADV_INT.2": 7,
"ADV_TDS": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 23
},
"AGD": {
"AGD_OPE": 10,
"AGD_OPE.1": 15,
"AGD_PRE": 8,
"AGD_PRE.1": 11,
"AGD_PRE_PLT": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 16,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.5": 7,
"ALC_DEL": 1,
"ALC_DEL.1": 6,
"ALC_DVS": 2,
"ALC_DVS.1": 1,
"ALC_DVS.2": 14,
"ALC_LCD": 1,
"ALC_LCD.1": 9,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 12
},
"APE": {
"APE_SRE": 1
},
"ASE": {
"ASE_APD.1": 1,
"ASE_CCL": 1,
"ASE_CCL.1": 15,
"ASE_ECD": 1,
"ASE_ECD.1": 14,
"ASE_INT": 1,
"ASE_INT.1": 17,
"ASE_OBJ": 1,
"ASE_OBJ.2": 13,
"ASE_REQ": 1,
"ASE_REQ.1": 2,
"ASE_REQ.2": 15,
"ASE_SPD": 1,
"ASE_SPD.1": 8,
"ASE_TSS": 1,
"ASE_TSS.1": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 2,
"ATE_COV.2": 8,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.3": 7,
"ATE_FUN": 1,
"ATE_FUN.1": 14,
"ATE_IND": 1,
"ATE_IND.2": 7
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 15
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL4": 1,
"EAL4 augmented": 1,
"EAL5": 3,
"EAL5 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCS": {
"FCS_CKM": 53,
"FCS_CKM.1": 13,
"FCS_CKM.2": 3,
"FCS_CKM.4": 40,
"FCS_CKM.4.1": 1,
"FCS_COP": 82,
"FCS_COP.1": 12,
"FCS_RND": 2,
"FCS_RND.1": 15,
"FCS_RND.1.1": 2,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 83,
"FDP_ACC.1": 18,
"FDP_ACF": 70,
"FDP_ACF.1": 29,
"FDP_DAU": 9,
"FDP_DAU.2": 2,
"FDP_IFC.1": 8,
"FDP_ITC": 10,
"FDP_ITC.1": 11,
"FDP_ITC.2": 8,
"FDP_RIP.1": 25,
"FDP_RIP.1.1": 1,
"FDP_SDI": 28,
"FDP_SDI.2": 4,
"FDP_UCT": 25,
"FDP_UCT.1": 2,
"FDP_UIT": 12,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 31,
"FIA_AFL.1": 4,
"FIA_API": 19,
"FIA_API.1": 15,
"FIA_API.1.1": 2,
"FIA_UAU": 94,
"FIA_UAU.1": 31,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 1,
"FIA_UAU.5": 3,
"FIA_UAU.6": 2,
"FIA_UID": 27,
"FIA_UID.1": 34,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 3,
"FMT_LIM.1": 17,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 15,
"FMT_LIM.2.1": 2,
"FMT_MOF.1": 12,
"FMT_MOF.1.1": 1,
"FMT_MSA": 25,
"FMT_MSA.1": 4,
"FMT_MSA.2": 22,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 34,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 18,
"FMT_MSA.4.1": 1,
"FMT_MTD": 193,
"FMT_MTD.1": 28,
"FMT_MTD.3": 13,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 74,
"FMT_SMF.1.1": 1,
"FMT_SMR": 28,
"FMT_SMR.1": 53,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 17,
"FPT_EMS.1": 16,
"FPT_EMS.1.1": 4,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 15,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 8,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 16,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 22,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 45,
"FTP_ITC.1": 13,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 62
},
"PGP": {
"PGP": 1
}
},
"crypto_scheme": {
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 3,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Malfunction": 4,
"fault injection": 2,
"malfunction": 4,
"physical tampering": 6
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 3,
"side channel": 2,
"timing attacks": 1
},
"other": {
"JIL": 1,
"JIL-COMP": 1
}
},
"standard_id": {
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 8,
"PKCS#15": 2,
"PKCS#3": 2
},
"SCP": {
"SCP02": 1,
"SCP03": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"TDES": 1,
"Triple-DES": 3
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"KMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 20
},
"Infineon": {
"Infineon": 1
},
"Morpho": {
"Morpho": 1
},
"Oberthur": {
"Oberthur Technologies": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Shubham SAGAR",
"/CreationDate": "D:20200617125534+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20200617125534+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "Title",
"pdf_file_size_bytes": 2209512,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 99
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0059b_pdf.pdf",
"pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0071b_pdf.pdf",
"pp_name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key gene..."
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"PP_SSCD_PART3_V1.0.2"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf",
"pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2020_59fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ALC_DVS.2",
"EAL5"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2020-59en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "07689c589ed31e887d09e1ee09d6e1b5203eef599b7da121860c1290f702619e",
"txt_hash": "df14e9f077802793836a63e80aa421cbcb61fee35ff575b7cfc7659caf27667a"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8dec1867d0a4649850f4287d765067f407dc9dcd9293bcc6b9cfb933b35611d2",
"txt_hash": "6dd1e2fec0a449d882dd6b6be5ec4ab1dcf5d21093550c4579bac55f7c581371"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b3e81c437b32d2cde805c2f405ee6d8a135d09454db78877252bf3aa369fbb40",
"txt_hash": "eeaea15d231156b2f3c44aa0b34eef52288a67a20f5fa0d5221193ba947bf5e9"
}
},
"status": "active"
}