eTravel Essential 1.1 (BAC and AA activated)

CSV information

Status active
Valid from 24.01.2022
Valid until 22.04.2027
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_CMS.5, ADV_TDS.4, ADV_FSP.5, ADV_INT.2, EAL4+, ALC_TAT.2, ALC_DVS.2, ATE_DPT.3
Protection profiles
Maintenance updates Reassessment report: ANSSI-CC-2017/17v2-S01 (22.04.2022) Certification report
Maintenance report: ANSSI-CC-2017/17v2-M01 (28.03.2022) Certification report

Heuristics summary

Certificate ID: ANSSI-CC-2017/17v2

Certificate

Extracted keywords

Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_DVS.2, ATE_DPT.3
Protection profiles
BSI-CC-PP-0055-2009
Evaluation facilities
SERMA

File metadata

Title ANSSI-CC-2017/17v2
Keywords version 3.1, révision 4
Author DUCLOS Charlene
Creation date D:20220429161959+02'00'
Modification date D:20220429161959+02'00'
Pages 2
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Certification report

Extracted keywords

Symmetric Algorithms
DES

Security level
EAL 4, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_TAT.2, ALC_DVS.2, ALC_FLR, ATE_DPT.3, AVA_VAN
Protection profiles
BSI-CC-PP-0055-2009
Certificates
ANSSI-CC-2017/17v2, ANSSI-CC-2017/17, ANSSI-CC-2017/17-M01
Evaluation facilities
SERMA, CESTI

Standards
ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Title ANSSI-CC-2017/17v2
Subject eTravel Essential 1.1
Keywords [ANSSI Crypto]
Author [email protected]
Creation date D:20220127173250+01'00'
Modification date D:20220127173250+01'00'
Pages 13
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

References

Outgoing

Security target

Extracted keywords

Symmetric Algorithms
DES, TDES, Triple-DES, KMAC
Asymmetric Algorithms
RSA 1024, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-256, SHA-512
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
RNG
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.DG14, EF.DG15, EF.DG6, EF.COM, EF.SOD
Vendor
Samsung, Gemalto, Thales

Security level
EAL4, EAL 5+, EAL4 augmented
Claims
OT.AC, OE.MRTD_, OE.BAC_PP
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ALC_PAR, ALC_CMS.5, ALC_TAT.2, ALC_DVS.2, ATE_DPT.3, ASE_ECD
Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM, FCS_CKM.4.1, FCS_COP, FCS_COP.1.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.5.2, FIA_UAU.4, FIA_UAU.6, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.6.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD, FMT_MSA.1, FMT_SRM.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014, BSI-PP-0056, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-PP-0055
Certificates
ANSSI-CC-2020/06, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS180-2, FIPS46-3, FIPS PUB 46-3, FIPS 180-2, FIPS 46-3, SP 800-90, PKCS#3, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2012-09-004

File metadata

Title Holbox: eTravel Essential 1.1 BAC+AA Security Target
Subject MRTD
Keywords Security Target, CC, eTravel
Author Jorge VARGAS
Creation date D:20211207105658+01'00'
Modification date D:20211207105658+01'00'
Pages 62
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • ANSSI-CC-2020/06 - active - S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software (Reference : S3FT9MF_20191219, Revision 1 & 2)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2017/17v2

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2017_17v2-s01.pdf",
  "dgst": "24bcd3a0cc7d9602",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2017/17v2",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "60455fc9564e2545"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/17"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/65",
          "ANSSI-CC-2017/17",
          "ANSSI-CC-2014/20",
          "ANSSI-CC-2015/60",
          "ANSSI-CC-2016/01",
          "ANSSI-CC-2014/84"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/06"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/06"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2022-04-22",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_17v2-s01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Reassessment report: ANSSI-CC-2017/17v2-S01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2022-03-28",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_17v2-m01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Maintenance report: ANSSI-CC-2017/17v2-M01"
      }
    ]
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "eTravel Essential 1.1 (BAC and AA activated)",
  "not_valid_after": "2027-04-22",
  "not_valid_before": "2022-01-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-cc-2017_17v2-s01.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055-2009": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.5": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "ALC": {
          "ALC_DVS.2": 1
        },
        "ATE": {
          "ATE_DPT.3": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "DUCLOS Charlene",
      "/CreationDate": "D:20220429161959+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "version 3.1, r\u00e9vision 4",
      "/ModDate": "D:20220429161959+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Title": "ANSSI-CC-2017/17v2",
      "pdf_file_size_bytes": 299175,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2017_17v2.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2017/17": 3,
          "ANSSI-CC-2017/17-M01": 1,
          "ANSSI-CC-2017/17v2": 14
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055-2009": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.5": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "ALC": {
          "ALC_CMS.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_DPT.3": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1
        },
        "ICAO": {
          "ICAO": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "[email protected]",
      "/CreationDate": "D:20220127173250+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "[ANSSI Crypto]",
      "/ModDate": "D:20220127173250+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Subject": "eTravel Essential 1.1",
      "/Title": "ANSSI-CC-2017/17v2",
      "pdf_file_size_bytes": 1762301,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]",
          "http://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "anssi-cible-cc-2017_17v2en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/06": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 5,
          "CC-3": 3
        }
      },
      "cc_claims": {
        "OE": {
          "OE.BAC_PP": 1,
          "OE.MRTD_": 3
        },
        "OT": {
          "OT.AC": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-PP-0055": 1,
          "BSI-PP-0056": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.5": 3,
          "ADV_INT.2": 3,
          "ADV_TDS.4": 3
        },
        "ALC": {
          "ALC_CMS.5": 3,
          "ALC_DVS.2": 3,
          "ALC_PAR": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_ECD": 1
        },
        "ATE": {
          "ATE_DPT.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5+": 1,
          "EAL4": 3,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 6,
          "FAU_SAS.1": 12,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 4,
          "FCS_CKM.1": 27,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 29,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 47,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 1,
          "FCS_RND": 7,
          "FCS_RND.1": 12,
          "FCS_RND.1.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 18,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 11,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 4,
          "FDP_ITC": 2,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 12,
          "FDP_UCT.1": 10,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 9,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 10,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 12,
          "FIA_API.1": 6,
          "FIA_API.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 5,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 11,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 10,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 3,
          "FIA_UAU.6": 11,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 11,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 7,
          "FMT_LIM.1": 20,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 18,
          "FMT_LIM.2.1": 2,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 3,
          "FMT_MTD": 36,
          "FMT_MTD.1": 6,
          "FMT_SMF.1": 19,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 22,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1,
          "FMT_SRM.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 13,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 11,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.3": 12,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 9,
          "EF.DG1": 29,
          "EF.DG13": 3,
          "EF.DG14": 3,
          "EF.DG15": 4,
          "EF.DG16": 27,
          "EF.DG2": 11,
          "EF.DG3": 6,
          "EF.DG4": 6,
          "EF.DG5": 7,
          "EF.DG6": 2,
          "EF.SOD": 9
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 6,
          "Physical Tampering": 5,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 5,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 2,
          "SPA": 1,
          "physical probing": 3,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 1,
          "CCMB-2007-09-002": 1,
          "CCMB-2007-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 46-3": 2,
          "FIPS PUB 46-3": 1,
          "FIPS180-2": 1,
          "FIPS46-3": 3
        },
        "ICAO": {
          "ICAO": 17
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816-4": 1
        },
        "NIST": {
          "SP 800-90": 2
        },
        "PKCS": {
          "PKCS#3": 1
        },
        "RFC": {
          "RFC3369": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 7
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 18
        },
        "Samsung": {
          "Samsung": 4
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Jorge VARGAS",
      "/CreationDate": "D:20211207105658+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "Security Target, CC, eTravel",
      "/ModDate": "D:20211207105658+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "MRTD",
      "/Title": "Holbox: eTravel Essential 1.1 BAC+AA Security Target",
      "pdf_file_size_bytes": 1369684,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 62
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_17v2.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_CMS.5",
      "ADV_FSP.5",
      "ADV_TDS.4",
      "ALC_DVS.2",
      "EAL4+",
      "ADV_INT.2",
      "ALC_TAT.2",
      "ATE_DPT.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_17v2en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "807e73ad04e29138851c5488d0e65a6e6a7bfd90a54b9da3d6fef095bb90ed7c",
      "txt_hash": "abb31127d46c15502026ebdad393908408115d09716b09b3d4f1d3e277894e15"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7befc4a156d3a7cffe63e05e6b24c3137df33ef5edd44aaba9151c82996b3caf",
      "txt_hash": "216d15e8aea76d8294fd70d8654669cd46240c9f5fe55bb188e53775164a3d2a"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8bb8a312523e3c3b10e11e9e675fa6bf46ff5839f09a1d81d637db9b78c1aa29",
      "txt_hash": "cd5eacc4ec414af50270c88f3ea9db19585de9f9bb54a105745c21fa164b1f78"
    }
  },
  "status": "active"
}