ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration (Version 2.0 eMRTD (B))

CSV information ?

Status active
Valid from 27.01.2022
Valid until 27.01.2027
Scheme 🇫🇷 FR
Manufacturer Austria Card plastikkarten und Ausweissysteme Gmbh
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2, AVA_VAN.5, ATE_DPT.2, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: ANSSI-CC-2022/07

Certificate ?

Extracted keywords

Protocols
PACE

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0068-V2-2011-
Certificates
ANSSI-CC-2022/08
Evaluation facilities
SERMA

Standards
ICAO

File metadata

Title: ANSSI-CC-20xx/xx
Keywords: version x.x, révision x
Author: DUCLOS Charlene
Creation date: D:20220203171445+01'00'
Modification date: D:20220203171445+01'00'
Pages: 2
Creator: Microsoft® Word 2019
Producer: Microsoft® Word 2019

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Protocols
PACE

Vendor
Infineon, Infineon Technologies AG

Security level
EAL 4, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2, ALC_FLR, ATE_DPT.2, AVA_VAN
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01, BSI-PP-0084-2014, BSI-CC-PP-0056-V2-2012-MAO2
Certificates
BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2022/07
Evaluation facilities
SERMA, CESTI

Standards
ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Subject: ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration
Keywords: [ANSSI Crypto]
Author: qualite@intranet.fr
Creation date: D:20220203170952+01'00'
Modification date: D:20220203170952+01'00'
Pages: 14
Creator: Microsoft® Word 2019
Producer: Microsoft® Word 2019

References

Outgoing
  • BSI-DSZ-CC-1110-V4-2021 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, TDES, Triple-DES, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-256
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
RND
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.DG14, EF.DG13, EF.COM, EF.SOD
Vendor
Infineon Technologies AG, Infineon

Security level
EAL4+, EAL 6+, EAL4, EAL6, EAL6+, EAL4 augmented, EAL6 augmented
Claims
O.RND, T.RND, A.-I
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FUN.1, ADV_FSP.4, ADV_IMP.1, AGD_PRE.1, AGD_OPE.1, ALC_DVS.2, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2, ALC_DEL.1, ATE_DPT.2, AVA_VAN.3, AVA_VAN.5, APE_SRE, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_COMP.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FCS_RNG.1, FDP_RIP.1, FDP_UCT, FDP_UIT, FDP_ACC, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1.1, FDP_RIP, FDP_ACC.1, FDP_IFC.1, FDP_UCT.1, FDP_UIT.1, FDP_ACF.1, FDP_ITT.1, FDP_SDI.1, FDP_SDI.2, FIA_API, FIA_API.1, FIA_AFL, FIA_UAU, FIA_UID, FIA_API.1.1, FIA_SAS, FIA_SOS.2, FIA_UAU.1, FIA_AFL.1, FIA_UAU.6, FIA_UID.1, FIA_UAU.4, FIA_UAU.5, FIA_ACC.1.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_SMF.1, FMT_MTD, FMT_SMR, FMT_MTD.3, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1.1, FMT_MTD.1, FMT_SMR.1, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0068-V2-2011, BSI-PP-0056-V2-2012-132, BSI-CC-PP-0084-2014, BSI-CC-PP-0055-110, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP- 0084-2014, BSI-CC-PP-0055-2009
Certificates
BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-S-0153

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, Physical Tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS PUB 197, FIPS 197, PKCS#3, AIS 31, RFC 2631, RFC3369, ISO/IEC7816-3, ISO/IEC14443, ISO/IEC 18013, ISO/IEC 10116, ISO/IEC 18033-3, ISO/IEC 9797-1, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 7816-3, ISO/IEC 7816-8, ISO/IEC 7816-9, ISO/IEC 10116:2006, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03111

File metadata

Title: Security Target public
Subject: ACOS-IDv2.0 eMRTD (B)
Author: Thomas Aichinger Austria Card Ges.m.b.H.
Creation date: D:20220114140003+01'00'
Modification date: D:20220114140003+01'00'
Pages: 110
Creator: Microsoft® Word 2013
Producer: Microsoft® Word 2013

References

Outgoing
  • BSI-DSZ-CC-1110-V4-2021 - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
Incoming

Heuristics ?

Certificate ID: ANSSI-CC-2022/07

Extracted SARs

ASE_COMP.1, ALC_DEL.1, AGD_OPE.1, ADV_ARC.1, AGD_PRE.1, ADV_IMP.1, ALC_FLR.1, ADV_FUN.1, ADV_TDS.3, AVA_VAN.5, ADV_FSP.4, ALC_TAT.2, ALC_CMS.5, ALC_DVS.2, ATE_DPT.2

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6f9edd88b07e835f0e670284c9fb7a1fa46c68f9da2ad259157e4f93e372105a', 'txt_hash': 'a12258bc7dfb5dc4315df9b69987e4c4833c06af4880fba446d524291c5159ea'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e30c592793fc7a746e39a0ba5c694db594a341e9e5aedc137a0f2441bc850d56', 'txt_hash': '6a7cc917c18a14c946c15c311eb6beaf20ee17469e4d22fbf46c8bbbcafc939c'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1621fb924a8c4d3251a9f4302c09b19f425eff4314fc2119fbc914f6fa59c03d', 'txt_hash': '3127a8a45f7714bf2ab6454ad4d22364c02306e6497faa4df3710bfc3f9a47b4'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 349990, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Title': 'ANSSI-CC-20xx/xx', '/Author': 'DUCLOS Charlene', '/Keywords': 'version x.x, révision x', '/Creator': 'Microsoft® Word 2019', '/CreationDate': "D:20220203171445+01'00'", '/ModDate': "D:20220203171445+01'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2022/08': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-2011-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_CMS.5': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'certificat-anssi-cc-2022_07.pdf'}.
    • The report_frontpage property was set to {'FR': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V4-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2022/07': 15}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-S-0153': 1}, '__update__': {'BSI-DSZ-CC-1110-V4-2021': 2}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V4-2021': 2}}, 'FR': {'__update__': {'ANSSI-CC-2022/07': 30}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V4-2021': 4}, '__delete__': ['BSI-DSZ-CC-S-0153']}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration (Version 2.0 eMRTD (B))', 'url': 'https://cyber.gouv.fr/produits-certifies/acos-idv20-emrtd-b-eacpace-configuration-version-20-emrtd-b', 'description': 'Le produit évalué est « ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration, version 2.0 eMRTD (B) » développé par AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. et INFINEON TECHNOLOGIES AG.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. Lamezanstrasse 4-8, 1230 Vienna, Autriche', 'cert_id': '2022/07', 'level': 'EAL4+', 'expiration_date': '27 Janvier 2027', 'enhanced': {'cert_id': '2022/07', 'certification_date': '27/01/2022', 'expiration_date': '27/01/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': '', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. Lamezanstrasse 4-8, 1230 Vienna, Autriche', 'evaluation_facility': 'SERMA SAFETY & SECURITY 14 rue Galilée – CS 10071 33608 PESSAC Cedex – FRANCE', 'level': 'EAL4+', 'protection_profile': 'Machine Readable Travel Document with “ICAO application”, Extended Access Control with PACE, version 1.3.2 certifié BSI-CC-PP-0056-V2-2012-MA-02 le 5 décembre 2012 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1 certifié BSI-CC-PP-0068-V2-2011-MA-01 le 22 juillet 2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, ATE_DPT.2, AVA_VAN.5, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/certificat-anssi-cc-2022_07.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/anssi-cible-cc-2022_07en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/anssi-cc-2022_07fr.pdf'}}.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1110-V4-2021': 1}}, 'FR': {'__update__': {'ANSSI-CC-2022/07': 15}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-S-0153': 1}, '__update__': {'BSI-DSZ-CC-1110-V4-2021': 2}}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit évalué est « ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration, version 2.0 eMRTD (B) » développé par AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. et INFINEON TECHNOLOGIES AG.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de'} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'url': 'https://cyber.gouv.fr/produits-certifies/acos-idv20-emrtd-b-eacpace-configuration-version-20-emrtd-b', 'enhanced': {'__insert__': {'cert_id': '2022/07', 'sponsor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. Lamezanstrasse 4-8, 1230 Vienna, Autriche', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, ATE_DPT.2, AVA_VAN.5, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2'}, '__update__': {'developer': '', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/anssi-cc-2022_07fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/anssi-cible-cc-2022_07en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2022/03/certificat-anssi-cc-2022_07.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description']}} data.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration (Version 2.0 eMRTD (B))', 'vendor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. Lamezanstrasse 4-8, 1230 Vienna, Autriche', 'id': '2022/07', 'certification_date': '27/01/2022', 'url': 'https://www.ssi.gouv.fr/certification_cc/acos-idv2-0-emrtd-b-eacpace-configuration-version-2-0-emrtd-b/', 'enhanced': {'__update__': {'id': '2022/07', 'certification_date': '27/01/2022', 'expiration_date': '27/01/2027', 'augmentations': 'ALC_DVS.2, ATE_DPT.2, AVA_VAN.5, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2', 'protection_profile': 'Machine Readable Travel Document with “ICAO application”, Extended Access Control with PACE, version 1.3.2 certifié BSI-CC-PP-0056-V2-2012-MA-02 le 5 décembre 2012 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1 certifié BSI-CC-PP-0068-V2-2011-MA-01 le 22 juillet 2014', 'developer': '/ AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. Lamezanstrasse 4-8, 1230 Vienna, Autriche', 'evaluation_facility': 'SERMA SAFETY & SECURITY 14 rue Galilée – CS 10071 33608 PESSAC Cedex – FRANCE', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration, version 2.0 eMRTD (B) » développé par AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. et INFINEON TECHNOLOGIES AG.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à permettre la vérification de l’authenticité du document de voyage et à identifier son porteur lors d’un contrôle frontalier, à l’aide d’un système d’inspection. Ce microcontrôleur et son logiciel embarqué ont vocation à être insérés dans la couverture des passeports traditionnels, dans une eCover ou dans une eDatapage. Le produit final peut prendre différentes formes, de carte ou de module.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2022/03/anssi-cc-2022_07fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2022/03/anssi-cible-cc-2022_07en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2022/03/certificat-anssi-cc-2022_07.pdf'}}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'ACOS-IDv2.1 eMRTD (A) BAC Configuration(Version 2.1 eMRTD (A))', 'vendor': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H., INFINEON TECHNOLOGIES AGAUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'level': 'EAL4+', 'id': '2022/68', 'certification_date': '15/12/2022', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/acos-idv2-1-emrtd-a-bac-configurationversion-2-1-emrtd-a/', 'enhanced': {'id': '2022/68', 'certification_date': '15/12/2022', 'expiration_date': '15/12/2027', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL4+', 'augmentations': 'ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.2, ATE_DPT.3', 'protection_profile': 'Protection Profile, Machine Readable Travel Document with “ICAO Application”, Basic Access Control, version 1.10 certifié BSI-PP-0055-2009 le 25 mars 2009.', 'developer': 'AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H., INFINEON TECHNOLOGIES AG / AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H.', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « ACOS-IDv2.1 eMRTD (A) BAC Configuration, Version 2.1 eMRTD (A) » développé par AUSTRIA CARD PLASTIKKARTEN UND AUSWEISSYSTEME GESELLSCHAFT M.B.H. et INFINEON TECHNOLOGIES AG.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à permettre la vérification de l’authenticité du document de voyage et à identifier son porteur lors d’un contrôle frontalier, à l’aide d’un système d’inspection. Ce microcontrôleur et son logiciel embarqué ont vocation à être insérés dans la couverture des passeports traditionnels, dans une eCover ou dans une eDatapage. Le produit final peut prendre différentes formes, de carte ou de module.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2022/12/anssi-cc-2022_68fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2022/12/anssi-cible-cc-2022_68en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2022/12/certificat-anssi-cc-2022_68.pdf'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The report_txt_hash property was set to a12258bc7dfb5dc4315df9b69987e4c4833c06af4880fba446d524291c5159ea.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.
    • The report_keywords property was updated, with the {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V4-2021': 2}, 'FR': {'ANSSI-CC-2022/07': 30}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012-MA-02': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 2, 'BSI-PP-0084-2014': 1, 'BSI-CC-PP-0056-V2-2012-MAO2': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_CMS.5': 1, 'ALC_TAT.2': 1, 'ALC_FLR': 1}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN': 2}}, 'vendor': {'Infineon': {'Infineon': 1, 'Infineon Technologies AG': 1}}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'crypto_protocol': {'PACE': {'PACE': 8}}, 'standard_id': {'ICAO': {'ICAO': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}} data.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The cert_id property was set to ANSSI-CC-2022/07.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/19', 'ANSSI-CC-2022/20', 'ANSSI-CC-2022/67']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/20', 'ANSSI-CC-2022/67', 'ANSSI-CC-2022/65', 'ANSSI-CC-2022/19', 'ANSSI-CC-2022/64']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-1110-V3-2020', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-1110-2019', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-1110-V4-2021', 'BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-1110-V2-2019']}} data.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_07fr.pdf, code: nok'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to e30c592793fc7a746e39a0ba5c694db594a341e9e5aedc137a0f2441bc850d56.
    • The st_txt_hash property was set to 6a7cc917c18a14c946c15c311eb6beaf20ee17469e4d22fbf46c8bbbcafc939c.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3223695, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 110, '/Title': 'Security Target public', '/Author': 'Thomas Aichinger Austria Card Ges.m.b.H.', '/Subject': 'ACOS-IDv2.0 eMRTD (B)', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20220114140003+01'00'", '/ModDate': "D:20220114140003+01'00'", '/Producer': 'Microsoft® Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V4-2021': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-2011': 14, 'BSI-PP-0056-V2-2012-132': 10, 'BSI-CC-PP-0084-2014': 2, 'BSI-CC-PP-0055-110': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1, 'BSI-CC-PP- 0084-2014': 1, 'BSI-CC-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL 6+': 1, 'EAL4': 12, 'EAL6': 2, 'EAL6+': 1, 'EAL4 augmented': 2, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_TDS.3': 2, 'ADV_FUN.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 2}, 'AGD': {'AGD_PRE.1': 2, 'AGD_OPE.1': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_FLR.1': 6, 'ALC_CMS.5': 5, 'ALC_TAT.2': 5, 'ALC_DEL.1': 1}, 'ATE': {'ATE_DPT.2': 5}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN.5': 5}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 3, 'ASE_OBJ': 3, 'ASE_ECD': 3, 'ASE_REQ': 3, 'ASE_TSS': 2, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 4, 'FAU_SAS.1': 15, 'FAU_GEN': 1, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 6, 'FCS_RND.1': 20, 'FCS_CKM': 71, 'FCS_CKM.4': 43, 'FCS_COP': 77, 'FCS_CKM.1': 17, 'FCS_RND.1.1': 2, 'FCS_CKM.2': 8, 'FCS_COP.1': 13, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 1}, 'FDP': {'FDP_RIP.1': 10, 'FDP_UCT': 7, 'FDP_UIT': 7, 'FDP_ACC': 13, 'FDP_ACF': 20, 'FDP_ITC.1': 14, 'FDP_ITC.2': 12, 'FDP_RIP.1.1': 1, 'FDP_RIP': 1, 'FDP_ACC.1': 6, 'FDP_IFC.1': 3, 'FDP_UCT.1': 1, 'FDP_UIT.1': 2, 'FDP_ACF.1': 17, 'FDP_ITT.1': 2, 'FDP_SDI.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_API': 22, 'FIA_API.1': 9, 'FIA_AFL': 6, 'FIA_UAU': 72, 'FIA_UID': 17, 'FIA_API.1.1': 1, 'FIA_SAS': 1, 'FIA_SOS.2': 1, 'FIA_UAU.1': 3, 'FIA_AFL.1': 2, 'FIA_UAU.6': 2, 'FIA_UID.1': 7, 'FIA_UAU.4': 1, 'FIA_UAU.5': 4, 'FIA_ACC.1.1': 1}, 'FMT': {'FMT_LIM': 6, 'FMT_LIM.1': 24, 'FMT_LIM.2': 21, 'FMT_SMF.1': 33, 'FMT_MTD': 73, 'FMT_SMR': 20, 'FMT_MTD.3': 9, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 3, 'FMT_MSA.3': 5, 'FMT_MSA.1': 3, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 11, 'FMT_SMR.1': 12, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 19, 'FPT_FLS.1': 15, 'FPT_TST.1': 10, 'FPT_PHP.3': 13, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 4, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 2, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 11, 'FTP_ITC.1': 6, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 1}, 'T': {'T.RND': 1}, 'A': {'A.-I': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 2, 'Infineon': 14}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 29}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 4, 'TDES': 12, 'Triple-DES': 4}}, 'constructions': {'MAC': {'KMAC': 3, 'CMAC': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 16}, 'ECDSA': {'ECDSA': 3}}, 'FF': {'DH': {'Diffie-Hellman': 12, 'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 15}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 186}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 3, 'Physical tampering': 2, 'Malfunction': 6, 'malfunction': 8, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03111': 3}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 11, 'EF.DG2': 5, 'EF.DG3': 15, 'EF.DG4': 15, 'EF.DG5': 3, 'EF.DG16': 9, 'EF.DG15': 4, 'EF.DG14': 5, 'EF.DG13': 1, 'EF.COM': 3, 'EF.SOD': 6}}, 'standard_id': {'FIPS': {'FIPS PUB 197': 2, 'FIPS 197': 1}, 'PKCS': {'PKCS#3': 3}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC 2631': 1, 'RFC3369': 1}, 'ISO': {'ISO/IEC7816-3': 1, 'ISO/IEC14443': 2, 'ISO/IEC 18013': 8, 'ISO/IEC 10116': 2, 'ISO/IEC 18033-3': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 14443': 4, 'ISO/IEC 7816-4': 2, 'ISO/IEC 7816-3': 1, 'ISO/IEC 7816-8': 1, 'ISO/IEC 7816-9': 1, 'ISO/IEC 10116:2006': 1}, 'ICAO': {'ICAO': 18}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2022_07en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_07en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/certificat-anssi-cc-2022_07.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.austriacard.at/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EPASS_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_PACE_V1.0']}}]}.

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_07fr.pdf, code: nok'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'EPASS_PACE_V1.0', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'MRTD_ICAO_EAC_V1.3', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The report_download_ok property was set to True.
    • The report_convert_garbage property was set to True.
    • The st_convert_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to e30c592793fc7a746e39a0ba5c694db594a341e9e5aedc137a0f2441bc850d56.
    • The report_pdf_hash property was set to 6f9edd88b07e835f0e670284c9fb7a1fa46c68f9da2ad259157e4f93e372105a.
    • The st_txt_hash property was set to 6a7cc917c18a14c946c15c311eb6beaf20ee17469e4d22fbf46c8bbbcafc939c.
    • The report_txt_hash property was set to 67f9871d0d166b7f99c508a2f6ba43f0f6ba8e725b96e9e8ee93c970c5c31997.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 2210470, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Author': 'qualite@intranet.fr', '/Subject': 'ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration', '/Keywords': '[ANSSI Crypto]', '/Creator': 'Microsoft® Word 2019', '/CreationDate': "D:20220203170952+01'00'", '/ModDate': "D:20220203170952+01'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.sogis.eu/', 'http://www.commoncriteriaportal.org/', 'mailto:certification@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 3223695, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 110, '/Title': 'Security Target public', '/Author': 'Thomas Aichinger Austria Card Ges.m.b.H.', '/Subject': 'ACOS-IDv2.0 eMRTD (B)', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20220114140003+01'00'", '/ModDate': "D:20220114140003+01'00'", '/Producer': 'Microsoft® Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V4-2021': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-2011': 14, 'BSI-PP-0056-V2-2012-132': 10, 'BSI-CC-PP-0084-2014': 2, 'BSI-CC-PP-0055-110': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1, 'BSI-CC-PP- 0084-2014': 1, 'BSI-CC-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL 6+': 1, 'EAL4': 12, 'EAL6': 2, 'EAL6+': 1, 'EAL4 augmented': 2, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_TDS.3': 2, 'ADV_FUN.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 2}, 'AGD': {'AGD_PRE.1': 2, 'AGD_OPE.1': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_FLR.1': 6, 'ALC_CMS.5': 5, 'ALC_TAT.2': 5, 'ALC_DEL.1': 1}, 'ATE': {'ATE_DPT.2': 5}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN.5': 5}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 3, 'ASE_OBJ': 3, 'ASE_ECD': 3, 'ASE_REQ': 3, 'ASE_TSS': 2, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 4, 'FAU_SAS.1': 15, 'FAU_GEN': 1, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 6, 'FCS_RND.1': 20, 'FCS_CKM': 71, 'FCS_CKM.4': 43, 'FCS_COP': 77, 'FCS_CKM.1': 17, 'FCS_RND.1.1': 2, 'FCS_CKM.2': 8, 'FCS_COP.1': 13, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 1}, 'FDP': {'FDP_RIP.1': 10, 'FDP_UCT': 7, 'FDP_UIT': 7, 'FDP_ACC': 13, 'FDP_ACF': 20, 'FDP_ITC.1': 14, 'FDP_ITC.2': 12, 'FDP_RIP.1.1': 1, 'FDP_RIP': 1, 'FDP_ACC.1': 6, 'FDP_IFC.1': 3, 'FDP_UCT.1': 1, 'FDP_UIT.1': 2, 'FDP_ACF.1': 17, 'FDP_ITT.1': 2, 'FDP_SDI.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_API': 22, 'FIA_API.1': 9, 'FIA_AFL': 6, 'FIA_UAU': 72, 'FIA_UID': 17, 'FIA_API.1.1': 1, 'FIA_SAS': 1, 'FIA_SOS.2': 1, 'FIA_UAU.1': 3, 'FIA_AFL.1': 2, 'FIA_UAU.6': 2, 'FIA_UID.1': 7, 'FIA_UAU.4': 1, 'FIA_UAU.5': 4, 'FIA_ACC.1.1': 1}, 'FMT': {'FMT_LIM': 6, 'FMT_LIM.1': 24, 'FMT_LIM.2': 21, 'FMT_SMF.1': 33, 'FMT_MTD': 73, 'FMT_SMR': 20, 'FMT_MTD.3': 9, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 3, 'FMT_MSA.3': 5, 'FMT_MSA.1': 3, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 11, 'FMT_SMR.1': 12, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 19, 'FPT_FLS.1': 15, 'FPT_TST.1': 10, 'FPT_PHP.3': 13, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 4, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 2, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 11, 'FTP_ITC.1': 6, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 1}, 'T': {'T.RND': 1}, 'A': {'A.-I': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 2, 'Infineon': 14}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 29}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 4, 'TDES': 12, 'Triple-DES': 4}}, 'constructions': {'MAC': {'KMAC': 3, 'CMAC': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 16}, 'ECDSA': {'ECDSA': 3}}, 'FF': {'DH': {'Diffie-Hellman': 12, 'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 15}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 186}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 3, 'Physical tampering': 2, 'Malfunction': 6, 'malfunction': 8, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03111': 3}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 11, 'EF.DG2': 5, 'EF.DG3': 15, 'EF.DG4': 15, 'EF.DG5': 3, 'EF.DG16': 9, 'EF.DG15': 4, 'EF.DG14': 5, 'EF.DG13': 1, 'EF.COM': 3, 'EF.SOD': 6}}, 'standard_id': {'FIPS': {'FIPS PUB 197': 2, 'FIPS 197': 1}, 'PKCS': {'PKCS#3': 3}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC 2631': 1, 'RFC3369': 1}, 'ISO': {'ISO/IEC7816-3': 1, 'ISO/IEC14443': 2, 'ISO/IEC 18013': 8, 'ISO/IEC 10116': 2, 'ISO/IEC 18033-3': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 14443': 4, 'ISO/IEC 7816-4': 2, 'ISO/IEC 7816-3': 1, 'ISO/IEC 7816-8': 1, 'ISO/IEC 7816-9': 1, 'ISO/IEC 10116:2006': 1}, 'ICAO': {'ICAO': 18}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to anssi-cc-2022_07fr.pdf.
    • The st_filename property was set to anssi-cible-cc-2022_07en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The report_download_ok property was set to False.
    • The report_convert_garbage property was set to False.
    • The st_convert_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_07fr.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_07en.pdf, code: 408', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_07fr.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_07en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The report_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The st_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 11.11.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_txt_hash property was set to 67f9871d0d166b7f99c508a2f6ba43f0f6ba8e725b96e9e8ee93c970c5c31997.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'crypto_protocol': {}, 'standard_id': {}} data.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EPASS_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_PACE_V1.0']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': True}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_link': None, 'pp_ids': None}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2022_07fr.pdf', 'st_filename': 'anssi-cible-cc-2022_07en.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'DE': {'BSI-DSZ-CC-1110-V4-2021': 2}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}}}}, 'cc_sar': {'__update__': {'ALC': {'__insert__': {'ALC_FLR': 1}}, 'AVA': {'__update__': {'AVA_VAN': 2}}}, '__delete__': ['AGD']}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'crypto_scheme': {}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 8}}}}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 1}}, 'CC': {'__insert__': {'CCMB-2017-04-003': 1}}}}, 'javacard_api_const': {}} data.
    • The st_keywords property was updated, with the {'cc_protection_profile_id': {'__update__': {'BSI': {'__update__': {'BSI-CC-PP-0068-V2-2011': 14, 'BSI-PP-0056-V2-2012-132': 10}, '__delete__': ['BSI-CC-PP-0068-V2-2011.........................................................................55', 'BSI-PP-0056-V2-2012-132.......................................................................58', 'BSI-CC-PP-0068-V2-2011.........................................................................62', 'BSI-PP-0056-V2-2012-132.......................................................................63', 'BSI-CC-PP-0068-V2-2011.........................................................................67', 'BSI-PP-0056-V2-2012-132.......................................................................68', 'BSI-CC-PP-0068-V2-2011.........................................................................70', 'BSI-CC-PP-0068-V2-2011.........................................................................71', 'BSI-PP-0056-V2-2012-132.......................................................................72', 'BSI-CC-PP-0068-V2-2011.........................................................................77', 'BSI-PP-0056-V2-2012-132.......................................................................78']}}}, 'cc_sar': {'__update__': {'AGD': {'__update__': {'AGD_PRE.1': 2}}, 'ALC': {'__update__': {'ALC_TAT.2': 5}}}, '__delete__': ['ACE']}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 15, 'FAU_SAS': 4}}, 'FCS': {'__insert__': {'FCS_CKM': 71, 'FCS_COP': 77}, '__update__': {'FCS_RND': 6, 'FCS_COP.1': 13, 'FCS_CKM.4': 43, 'FCS_CKM.1': 17}}, 'FDP': {'__insert__': {'FDP_UCT': 7, 'FDP_UIT': 7, 'FDP_ACC': 13, 'FDP_UCT.1': 1, 'FDP_UIT.1': 2}, '__update__': {'FDP_ACF': 20, 'FDP_RIP.1': 10, 'FDP_ACC.1': 6, 'FDP_ACF.1': 17}}, 'FIA': {'__insert__': {'FIA_AFL': 6, 'FIA_UAU': 72, 'FIA_UID': 17, 'FIA_AFL.1': 2, 'FIA_UAU.6': 2, 'FIA_UAU.4': 1, 'FIA_UAU.5': 4}, '__update__': {'FIA_API': 22, 'FIA_API.1': 9, 'FIA_UAU.1': 3, 'FIA_UID.1': 7}}, 'FMT': {'__insert__': {'FMT_MTD': 73, 'FMT_SMR': 20}, '__update__': {'FMT_LIM': 6, 'FMT_LIM.1': 24, 'FMT_LIM.2': 21, 'FMT_LIM.1.1': 1, 'FMT_SMR.1': 12, 'FMT_MTD.1': 11}}, 'FPT': {'__update__': {'FPT_FLS.1': 15, 'FPT_EMS': 6, 'FPT_TST.1': 10, 'FPT_PHP.3': 13}}, 'FTP': {'__insert__': {'FTP_ITC': 11}, '__update__': {'FTP_ITC.1': 6}}}}, 'cc_claims': {'__update__': {'O': {'__delete__': ['O.D']}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 29}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'KMAC': 3, 'CMAC': 7}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 16}}}}, 'FF': {'__update__': {'DH': {'__update__': {'Diffie-Hellman': 12, 'DH': 3}}}, '__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 15}}, 'KA': {'__delete__': ['KA']}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 186}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 2}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 4}}, 'FI': {'__update__': {'Malfunction': 6, 'malfunction': 8}}}}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.DG4': 15}}}}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 18}}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/20', 'ANSSI-CC-2022/19']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2022/20', 'ANSSI-CC-2022/19']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1110-V4-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0891-V2-2016', 'BSI-DSZ-CC-1110-2019', 'BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-1110-V3-2020', 'BSI-DSZ-CC-0891-2015', 'BSI-DSZ-CC-0945-V3-2018', 'BSI-DSZ-CC-0945-V2-2018', 'BSI-DSZ-CC-1110-V4-2021', 'BSI-DSZ-CC-0945-2017', 'BSI-DSZ-CC-1110-V2-2019']}} data.
  • 07.08.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_txt_hash property was set to d46790ab7695d77ee9faf34b935d78fa3663798a8c65d7112c74d6f4291180e6.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EPASS_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_PACE_V1.0']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_txt_hash property was set to e59cc0dac37c55679d90ff3701ad837f5a42978c6055dc483771f0331089329d.

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/', 'mailto:certification@ssi.gouv.fr', 'http://www.ssi.gouv.fr/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2022/07': 30}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-2011-MA-01': 2, 'BSI-CC-PP-0056-V2-2012-MA-02': 1, 'BSI-PP-0084-2014': 1, 'BSI-CC-PP-0056-V2-2012-MAO2': 1}}, 'cc_security_level': {'EAL': {'EAL7': 1, 'EAL2': 1, 'EAL 4': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'AGD': {'AGD_PRE_OPE': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_CMS.5': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 1, 'Infineon Technologies AG': 1}}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'KA': 3}}, 'crypto_protocol': {'PACE': {'PACE': 28}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 3}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {'curves': {'X448': 1}}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1110-V4-2021': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-2011.........................................................................55': 2, 'BSI-PP-0056-V2-2012-132.......................................................................58': 1, 'BSI-CC-PP-0068-V2-2011.........................................................................62': 1, 'BSI-PP-0056-V2-2012-132.......................................................................63': 1, 'BSI-CC-PP-0068-V2-2011.........................................................................67': 1, 'BSI-PP-0056-V2-2012-132.......................................................................68': 1, 'BSI-CC-PP-0068-V2-2011.........................................................................70': 1, 'BSI-CC-PP-0068-V2-2011.........................................................................71': 1, 'BSI-PP-0056-V2-2012-132.......................................................................72': 1, 'BSI-CC-PP-0068-V2-2011.........................................................................77': 1, 'BSI-PP-0056-V2-2012-132.......................................................................78': 1, 'BSI-CC-PP-0084-2014': 2, 'BSI-CC-PP-0055-110': 1, 'BSI-CC-PP-0068-V2-2011': 7, 'BSI-PP-0056-V2-2012-132': 5, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1, 'BSI-CC-PP- 0084-2014': 1, 'BSI-CC-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL 6+': 1, 'EAL4': 12, 'EAL6': 2, 'EAL6+': 1, 'EAL4 augmented': 2, 'EAL6 augmented': 2}}, 'cc_sar': {'ACE': {'ACE_ENC': 10, 'ACE_MAC': 8}, 'ADV': {'ADV_ARC.1': 2, 'ADV_TDS.3': 2, 'ADV_FUN.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_FLR.1': 6, 'ALC_CMS.5': 5, 'ALC_TAT.2': 4, 'ALC_DEL.1': 1}, 'ATE': {'ATE_DPT.2': 5}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN.5': 5}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 3, 'ASE_OBJ': 3, 'ASE_ECD': 3, 'ASE_REQ': 3, 'ASE_TSS': 2, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 12, 'FAU_SAS': 3, 'FAU_GEN': 1, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND.1': 20, 'FCS_RND': 5, 'FCS_RND.1.1': 2, 'FCS_CKM.2': 8, 'FCS_COP.1': 7, 'FCS_CKM.4': 41, 'FCS_CKM.1': 13, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ACF': 1, 'FDP_ITC.1': 14, 'FDP_ITC.2': 12, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_RIP': 1, 'FDP_ACC.1': 5, 'FDP_IFC.1': 3, 'FDP_ACF.1': 3, 'FDP_ITT.1': 2, 'FDP_SDI.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_API': 5, 'FIA_API.1': 3, 'FIA_API.1.1': 1, 'FIA_SAS': 1, 'FIA_SOS.2': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 4, 'FIA_ACC.1.1': 1}, 'FMT': {'FMT_LIM': 5, 'FMT_LIM.1': 25, 'FMT_LIM.2': 24, 'FMT_SMF.1': 33, 'FMT_MTD.3': 9, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 3, 'FMT_MSA.3': 5, 'FMT_MSA.1': 3, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 13, 'FMT_MTD.1': 3, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_EMS.1': 19, 'FPT_FLS.1': 16, 'FPT_EMS': 4, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 4, 'FPT_FLS.1.1': 1, 'FPT_TST.1': 9, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3': 11, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 2, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 2, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.D': 2, 'O.RND': 1}, 'T': {'T.RND': 1}, 'A': {'A.-I': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 2, 'Infineon': 14}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 30}}, 'DES': {'DES': {'DES': 22}, '3DES': {'3DES': 4, 'TDES': 12, 'Triple-DES': 4}}, 'constructions': {'MAC': {'KMAC': 7, 'CMAC': 9}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 17}, 'ECDSA': {'ECDSA': 3}}, 'FF': {'DH': {'Diffie-Hellman': 17, 'DH': 22}, 'DSA': {'DSA': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 62}, 'KA': {'Key Agreement': 2, 'KA': 2}}, 'crypto_protocol': {'PACE': {'PACE': 455}}, 'randomness': {'RNG': {'RND': 7}}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 3, 'Physical tampering': 2, 'Malfunction': 12, 'malfunction': 7, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03111': 3}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 11, 'EF.DG2': 5, 'EF.DG3': 15, 'EF.DG4': 14, 'EF.DG5': 3, 'EF.DG16': 9, 'EF.DG15': 4, 'EF.DG14': 5, 'EF.DG13': 1, 'EF.COM': 3, 'EF.SOD': 6}}, 'standard_id': {'FIPS': {'FIPS PUB 197': 2, 'FIPS 197': 1}, 'PKCS': {'PKCS#3': 3}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC 2631': 1, 'RFC3369': 1}, 'ISO': {'ISO/IEC7816-3': 1, 'ISO/IEC14443': 2, 'ISO/IEC 18013': 8, 'ISO/IEC 10116': 2, 'ISO/IEC 18033-3': 2, 'ISO/IEC 9797-1': 1, 'ISO/IEC 14443': 4, 'ISO/IEC 7816-4': 2, 'ISO/IEC 7816-3': 1, 'ISO/IEC 7816-8': 1, 'ISO/IEC 7816-9': 1, 'ISO/IEC 10116:2006': 1}, 'ICAO': {'ICAO': 21}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_id property was set to ANSSI-CC-2022/07.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '6f9edd88b07e835f0e670284c9fb7a1fa46c68f9da2ad259157e4f93e372105a', 'st_pdf_hash': 'e30c592793fc7a746e39a0ba5c694db594a341e9e5aedc137a0f2441bc850d56', 'report_txt_hash': '67f9871d0d166b7f99c508a2f6ba43f0f6ba8e725b96e9e8ee93c970c5c31997', 'st_txt_hash': '6a7cc917c18a14c946c15c311eb6beaf20ee17469e4d22fbf46c8bbbcafc939c'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 30, '3DES': 4, 'DES': 6, 'TDES': 12, 'KMAC': 7}, 'rules_asymmetric_crypto': {'ECDH': 17, 'ECDSA': 3, 'Diffie-Hellman': 12, 'DH': 22, 'DSA': 3}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 2, 'SHA-224': 1, 'SHA-256': 1}, 'rules_crypto_schemes': {'PACE': 455, 'MAC': 62}, 'rules_randomness': {'RND': 7}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 12, 'malfunction': 7, 'Leak-Inherent': 2, 'physical probing': 3, 'Physical Tampering': 3, 'Physical tampering': 2, 'SPA': 1, 'DPA': 2, 'fault injection': 1, 'timing attacks': 1, 'reverse engineering': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration (Version 2.0 eMRTD (B)) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat-anssi-cc-2022_07.pdf",
  "dgst": "f8a79eb20ade29af",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2022/07",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FUN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2022/20",
          "ANSSI-CC-2022/19",
          "ANSSI-CC-2022/67"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V4-2021"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2022/19",
          "ANSSI-CC-2022/20",
          "ANSSI-CC-2022/65",
          "ANSSI-CC-2022/67",
          "ANSSI-CC-2022/64"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0945-2017",
          "BSI-DSZ-CC-1110-2019",
          "BSI-DSZ-CC-1110-V3-2020",
          "BSI-DSZ-CC-1110-V4-2021",
          "BSI-DSZ-CC-1110-V2-2019",
          "BSI-DSZ-CC-0945-V3-2018",
          "BSI-DSZ-CC-0945-V2-2018",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0782-2012"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V4-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1110-V4-2021"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Austria Card plastikkarten und Ausweissysteme Gmbh",
  "manufacturer_web": "https://www.austriacard.at/",
  "name": "ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration (Version 2.0 eMRTD (B))",
  "not_valid_after": "2027-01-27",
  "not_valid_before": "2022-01-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-anssi-cc-2022_07.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2022/08": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0068-V2-2011-": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMS.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_DPT.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ICAO": {
          "ICAO": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "DUCLOS Charlene",
      "/CreationDate": "D:20220203171445+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "version x.x, r\u00e9vision x",
      "/ModDate": "D:20220203171445+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Title": "ANSSI-CC-20xx/xx",
      "pdf_file_size_bytes": 349990,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2022_07fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V4-2021": 1
        },
        "FR": {
          "ANSSI-CC-2022/07": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012-MA-02": 1,
          "BSI-CC-PP-0056-V2-2012-MAO2": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 2,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMS.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_DPT.2": 1
        },
        "AVA": {
          "AVA_VAN": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 8
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "ICAO": {
          "ICAO": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "qualite@intranet.fr",
      "/CreationDate": "D:20220203170952+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "[ANSSI Crypto]",
      "/ModDate": "D:20220203170952+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Subject": "ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration",
      "pdf_file_size_bytes": 2210470,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogis.eu/",
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/",
          "mailto:certification@ssi.gouv.fr"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "anssi-cible-cc-2022_07en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 16
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 12
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1110-V4-2021": 2,
          "BSI-DSZ-CC-S-0153": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.-I": 1
        },
        "O": {
          "O.RND": 1
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0084-2014": 1,
          "BSI-CC-PP-0055-110": 1,
          "BSI-CC-PP-0055-2009": 1,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011": 14,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0084-2014": 2,
          "BSI-PP-0056-V2-2012-132": 10
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 1,
          "ADV_FUN.1": 1,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMS.5": 5,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR.1": 6,
          "ALC_TAT.2": 5
        },
        "APE": {
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_COMP.1": 1,
          "ASE_ECD": 3,
          "ASE_INT": 2,
          "ASE_OBJ": 3,
          "ASE_REQ": 3,
          "ASE_SPD": 3,
          "ASE_TSS": 2
        },
        "ATE": {
          "ATE_DPT.2": 5
        },
        "AVA": {
          "AVA_VAN.3": 1,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6+": 1,
          "EAL4": 12,
          "EAL4 augmented": 2,
          "EAL4+": 1,
          "EAL6": 2,
          "EAL6 augmented": 2,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 4,
          "FAU_SAS.1": 15,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 71,
          "FCS_CKM.1": 17,
          "FCS_CKM.2": 8,
          "FCS_CKM.4": 43,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 77,
          "FCS_COP.1": 13,
          "FCS_RND": 6,
          "FCS_RND.1": 20,
          "FCS_RND.1.1": 2,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 13,
          "FDP_ACC.1": 6,
          "FDP_ACF": 20,
          "FDP_ACF.1": 17,
          "FDP_IFC.1": 3,
          "FDP_ITC.1": 14,
          "FDP_ITC.2": 12,
          "FDP_ITT.1": 2,
          "FDP_RIP": 1,
          "FDP_RIP.1": 10,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 1,
          "FDP_UCT": 7,
          "FDP_UCT.1": 1,
          "FDP_UIT": 7,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_ACC.1.1": 1,
          "FIA_AFL": 6,
          "FIA_AFL.1": 2,
          "FIA_API": 22,
          "FIA_API.1": 9,
          "FIA_API.1.1": 1,
          "FIA_SAS": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 72,
          "FIA_UAU.1": 3,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 4,
          "FIA_UAU.6": 2,
          "FIA_UID": 17,
          "FIA_UID.1": 7
        },
        "FMT": {
          "FMT_LIM": 6,
          "FMT_LIM.1": 24,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 21,
          "FMT_LIM.2.1": 3,
          "FMT_MSA.1": 3,
          "FMT_MSA.3": 5,
          "FMT_MTD": 73,
          "FMT_MTD.1": 11,
          "FMT_MTD.3": 9,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 33,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 20,
          "FMT_SMR.1": 12
        },
        "FPT": {
          "FPT_EMS": 6,
          "FPT_EMS.1": 19,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 4,
          "FPT_FLS.1": 15,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 2,
          "FPT_PHP.3": 13,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 2,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 11,
          "FTP_ITC.1": 6,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 186
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 15
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 3,
          "EF.DG1": 11,
          "EF.DG13": 1,
          "EF.DG14": 5,
          "EF.DG15": 4,
          "EF.DG16": 9,
          "EF.DG2": 5,
          "EF.DG3": 15,
          "EF.DG4": 15,
          "EF.DG5": 3,
          "EF.SOD": 6
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 6,
          "Physical Tampering": 3,
          "Physical tampering": 2,
          "fault injection": 1,
          "malfunction": 8
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 2,
          "SPA": 1,
          "physical probing": 4,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 197": 1,
          "FIPS PUB 197": 2
        },
        "ICAO": {
          "ICAO": 18
        },
        "ISO": {
          "ISO/IEC 10116": 2,
          "ISO/IEC 10116:2006": 1,
          "ISO/IEC 14443": 4,
          "ISO/IEC 18013": 8,
          "ISO/IEC 18033-3": 2,
          "ISO/IEC 7816-3": 1,
          "ISO/IEC 7816-4": 2,
          "ISO/IEC 7816-8": 1,
          "ISO/IEC 7816-9": 1,
          "ISO/IEC 9797-1": 1,
          "ISO/IEC14443": 2,
          "ISO/IEC7816-3": 1
        },
        "PKCS": {
          "PKCS#3": 3
        },
        "RFC": {
          "RFC 2631": 1,
          "RFC3369": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 29
          }
        },
        "DES": {
          "3DES": {
            "3DES": 4,
            "TDES": 12,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 7,
            "KMAC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03111": 3
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 14,
          "Infineon Technologies AG": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Thomas Aichinger Austria Card Ges.m.b.H.",
      "/CreationDate": "D:20220114140003+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/ModDate": "D:20220114140003+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "/Subject": "ACOS-IDv2.0 eMRTD (B)",
      "/Title": "Security Target public",
      "pdf_file_size_bytes": 3223695,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 110
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "MRTD_SAC_PACEV2_V1.0",
            "EPASS_V1.0",
            "EPASS_PACE_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf",
        "pp_name": "Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "MRTD-PP_V1.10",
            "MRTD_ICAO_EAC_V1.3"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf",
        "pp_name": "Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_07fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.1",
      "ALC_DVS.2",
      "ATE_DPT.2",
      "ALC_TAT.2",
      "AVA_VAN.5",
      "ALC_CMS.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_07en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1621fb924a8c4d3251a9f4302c09b19f425eff4314fc2119fbc914f6fa59c03d",
      "txt_hash": "3127a8a45f7714bf2ab6454ad4d22364c02306e6497faa4df3710bfc3f9a47b4"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6f9edd88b07e835f0e670284c9fb7a1fa46c68f9da2ad259157e4f93e372105a",
      "txt_hash": "a12258bc7dfb5dc4315df9b69987e4c4833c06af4880fba446d524291c5159ea"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e30c592793fc7a746e39a0ba5c694db594a341e9e5aedc137a0f2441bc850d56",
      "txt_hash": "6a7cc917c18a14c946c15c311eb6beaf20ee17469e4d22fbf46c8bbbcafc939c"
    }
  },
  "status": "active"
}