This page was not yet optimized for use on mobile
devices.
Application IAS V4.2.0.B sur la plateforme Javacard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3)
CSV information
| Status | archived |
|---|---|
| Valid from | 28.09.2015 |
| Valid until | 28.09.2020 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Gemalto / NXP Semiconductors |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, EAL5+, AVA_VAN.5 |
| Protection profiles | |
| Maintenance updates | ANSSI-CC-2016/03-M01 (20.05.2016) Certification report |
Heuristics summary
Certificate ID: ANSSI-CC-2015/37
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
DESHash functions
SHA-1Protocols
PACEVendor
NXP Semiconductors, NXP, GemaltoSecurity level
EAL 5, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0005-2002T, BSI-PP-0006-, ANSSI-CC-PP-2010/03-M01Certificates
BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2015/37, ANSSI-CC-2015/15, ANSSI-CC-2015/08, ANSSI-CC-PP-2010/03-M01Evaluation facilities
Serma Technologies, CESTIFile metadata
| Title | ANSSI-CC-2015_37 |
|---|---|
| Pages | 21 |
| Creator | PDFCreator Version 1.2.1 |
| Producer | GPL Ghostscript 9.02 |
Frontpage
| Certificate ID | ANSSI-CC-2015/xx |
|---|---|
| Certified item | Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA |
| Certification lab | Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France |
| Developer | Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France |
References
Outgoing- ANSSI-CC-2015/15 - archived - Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (version du patch: 1.3)
- BSI-DSZ-CC-0845-V2-2013 - archived - NXP Secure Smart Card Controller P60x144/080PVA/PVA(Y) with IC Dedicated Software FW5.0
- ANSSI-CC-2015/08 - archived - Application IAS V4.2 sur la plateformeJavaCard ouverte MultiApp V3.1 masquée surle composant P60D080PVC(version du patch : 1.4)
- ANSSI-CC-2016/04 - archived - Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3)
- ANSSI-CC-2016/03 - archived - Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3)
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-224Schemes
MACRandomness
RNG, RNDVendor
NXP, GemaltoSecurity level
EAL 5+, EAL5, EAL5 augmentedClaims
D.SCD, D.SVD, D.DTBS, D.VAD, D.SSCD, D.RAD, D.SIG, O.SCP, A.CGA, A.SCA, OE.SVD_AUTH_CGA, OE.HI_VADSecurity Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.2, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACC, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ETC.1, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UCT.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_UCT, FDP_ACF, FDP_UIT, FDP_SDI.2, FDP_RIP, FIA_AFL, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1, FMT_MSA.3, FMT_MOF.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.4, FMT_MTD.1, FPT_EMS.1, FPT_EMS, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_TRP, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_TRP, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Protection profiles
BSI-PP-0035, BSI-PP-0005, BSI-PP-0006, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, PP-SSCD-KG, PP-SSCD-KI, PP-SSCDCertificates
BSI-DSZ-CC-0845-2012, CC-1, CC-2, CC-3Evaluation facilities
SERMASide-channel analysis
SPA, DPA, timing attacks, physical tampering, DFAStandards
FIPS180-2, FIPS46-3, FIPS PUB 46-3, FIPS197, PKCS#3, PKCS#1, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Title | eTravel v1.0 Security Target MAÏA3 |
|---|---|
| Subject | MRTD |
| Keywords | Security Target, CC, eTravel |
| Author | Antoine de Lavernette |
| Creation date | D:20150729172206+02'00' |
| Modification date | D:20150729172206+02'00' |
| Pages | 61 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
References
Outgoing- BSI-DSZ-CC-0845-2012 - archived - NXP Secure Smart Card Controller P60x144/080PVA with IC Dedicated Software FW5.0
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2015/37Extracted SARs
ALC_DVS.2, AVA_VAN.5Similar certificates
Showing 5 out of 103.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "44135472b53b0015",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2015/37",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.1",
"1.3",
"4.2.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"40002c3611fc465f",
"9863a376f3bb4175"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/04",
"ANSSI-CC-2016/03"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2015/08",
"BSI-DSZ-CC-0845-V2-2013",
"ANSSI-CC-2015/15"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/03",
"ANSSI-CC-2016/04"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/14",
"BSI-DSZ-CC-0837-2013",
"BSI-DSZ-CC-0829-2012",
"ANSSI-CC-2015/08",
"BSI-DSZ-CC-0666-2012",
"ANSSI-CC-2014/86",
"BSI-DSZ-CC-0728-2011",
"ANSSI-CC-2015/15",
"BSI-DSZ-CC-0640-2010",
"BSI-DSZ-CC-0845-V2-2013",
"ANSSI-CC-2014/06",
"BSI-DSZ-CC-0837-V2-2014",
"BSI-DSZ-CC-0845-2012"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0845-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0845-2012"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-05-20",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_03-M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2016/03-M01"
}
]
},
"manufacturer": "Gemalto / NXP Semiconductors",
"manufacturer_web": "https://www.gemalto.com/",
"name": "Application IAS V4.2.0.B sur la plateforme Javacard ouverte MultiApp V3.1 masqu\u00e9e sur le composant P60D144PVA (version du patch: 1.3)",
"not_valid_after": "2020-09-28",
"not_valid_before": "2015-09-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2015_37.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2015/xx",
"cert_item": "Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masqu\u00e9e sur le composant P60D144PVA",
"cert_item_version": "Version de l\u2019application IAS : 4.2.0.B Version de l\u2019application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.1 Version du patch : 1.3",
"cert_lab": "Serma Technologies 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
"developer": "Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Protection Profile \u2013 Secure Signature-Creation Device Type 2, version 1.04, certifi\u00e9 sous la r\u00e9f\u00e9rence [PP-0005]. Protection Profile \u2013 Secure Signature-Creation Device Type 3, version 1.05, certifi\u00e9 sous la r\u00e9f\u00e9rence [PP-0006"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0845-V2-2013": 2
},
"FR": {
"ANSSI-CC-2015/08": 1,
"ANSSI-CC-2015/15": 3,
"ANSSI-CC-2015/37": 21,
"ANSSI-CC-PP-2010/03-M01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-M01": 1
},
"BSI": {
"BSI-PP-0005-2002T": 1,
"BSI-PP-0006-": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 2,
"EAL 7": 1,
"EAL4": 2,
"EAL5": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"Serma": {
"Serma Technologies": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"com": {
"com.gemalto.javacardx.pace": 1
},
"javacardx": {
"javacardx.pace": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 9
},
"NXP": {
"NXP": 4,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "PDFCreator Version 1.2.1",
"/Keywords": "",
"/ModDate": "",
"/Producer": "GPL Ghostscript 9.02",
"/Subject": "",
"/Title": "ANSSI-CC-2015_37",
"pdf_file_size_bytes": 1911630,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "anssi_cible_2015_37_LITE.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0845-2012": 2
},
"NL": {
"CC-1": 2,
"CC-2": 3,
"CC-3": 3
}
},
"cc_claims": {
"A": {
"A.CGA": 4,
"A.SCA": 4
},
"D": {
"D.DTBS": 1,
"D.RAD": 1,
"D.SCD": 1,
"D.SIG": 1,
"D.SSCD": 1,
"D.SVD": 1,
"D.VAD": 1
},
"O": {
"O.SCP": 1
},
"OE": {
"OE.HI_VAD": 5,
"OE.SVD_AUTH_CGA": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-PP-0005": 1,
"BSI-PP-0006": 1,
"BSI-PP-0035": 1
},
"other": {
"PP-SSCD": 1,
"PP-SSCD-KG": 20,
"PP-SSCD-KI": 15
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 3
},
"AVA": {
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 1,
"EAL5": 3,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 54,
"FCS_CKM.1": 14,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 4,
"FCS_CKM.4": 17,
"FCS_CKM.4.1": 2,
"FCS_COP": 34,
"FCS_COP.1": 6,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC": 46,
"FDP_ACC.1": 32,
"FDP_ACC.1.1": 5,
"FDP_ACF": 32,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 5,
"FDP_ACF.1.2": 5,
"FDP_ACF.1.3": 5,
"FDP_ACF.1.4": 5,
"FDP_ETC": 1,
"FDP_ETC.1": 7,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC.1": 23,
"FDP_ITC": 18,
"FDP_ITC.1": 12,
"FDP_ITC.1.1": 2,
"FDP_ITC.1.2": 2,
"FDP_ITC.1.3": 2,
"FDP_ITC.2": 11,
"FDP_RIP": 1,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1,
"FDP_SDI": 17,
"FDP_SDI.1": 2,
"FDP_SDI.2": 2,
"FDP_SDI.2.1": 2,
"FDP_SDI.2.2": 2,
"FDP_UCT": 7,
"FDP_UCT.1": 2,
"FDP_UCT.1.1": 1,
"FDP_UIT": 12,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 2,
"FDP_UIT.1.2": 2
},
"FIA": {
"FIA_AFL": 14,
"FIA_AFL.1": 3,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_UAU": 15,
"FIA_UAU.1": 7,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UID": 14,
"FIA_UID.1": 13,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2
},
"FMT": {
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 1,
"FMT_MSA": 66,
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 3,
"FMT_MSA.2": 8,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 13,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MSA.4": 2,
"FMT_MSA.4.1": 2,
"FMT_MTD": 11,
"FMT_MTD.1": 2,
"FMT_MTD.1.1": 2,
"FMT_SMF.1": 24,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 37,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 3,
"FPT_EMS.1": 14,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS": 1,
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 8,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 10,
"FPT_PHP.3.1": 1,
"FPT_TRP": 1,
"FPT_TST": 2,
"FPT_TST.1": 11,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 30,
"FTP_ITC.1": 7,
"FTP_ITC.1.1": 3,
"FTP_ITC.1.2": 3,
"FTP_ITC.1.3": 3,
"FTP_TRP": 8,
"FTP_TRP.1": 6,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-224": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"physical tampering": 4
},
"SCA": {
"DPA": 1,
"SPA": 1,
"timing attacks": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS PUB 46-3": 1,
"FIPS180-2": 1,
"FIPS197": 2,
"FIPS46-3": 1
},
"ICAO": {
"ICAO": 1
},
"PKCS": {
"PKCS#1": 2,
"PKCS#3": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"TDES": 4
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 80
},
"NXP": {
"NXP": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Antoine de Lavernette",
"/CreationDate": "D:20150729172206+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "Security Target, CC, eTravel",
"/ModDate": "D:20150729172206+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "MRTD",
"/Title": "eTravel v1.0 Security Target MA\u00cfA3",
"pdf_file_size_bytes": 1072696,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 61
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_37.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL5+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_37_LITE.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4b37c55346d8155dac3ceef96a12f4e65b71846ef2f0918b256020947bee83dd",
"txt_hash": "e209c0d2af738cfa9c9fc06f5c00a8da4ae8f16588960b1e07c6d4539b6eafa9"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9f46ddd2394f2a07ac8c15228ee2baf54622ff5daa924f32b7b5f732565d54e4",
"txt_hash": "a79f92bdb645db01fc411d3561ecb9bf510e283b1a14a9295b702f006ea77018"
}
},
"status": "archived"
}