This page was not yet optimized for use on mobile
devices.
eTravel Essential 1.0, avec SAC, AA et EAC activés sur composant M7794 A12/G12
CSV information
| Status | archived |
|---|---|
| Valid from | 10.09.2015 |
| Valid until | 10.09.2020 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Gemalto |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, EAL5+, AVA_VAN.5 |
| Protection profiles |
Heuristics summary
Certificate ID: ANSSI-CC-2015/32
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
DES, TDESAsymmetric Algorithms
ECC, Diffie-HellmanProtocols
PACELibraries
v1.02.013Vendor
Infineon Technologies AG, Infineon Technologies, GemaltoSecurity level
EAL 5, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011, BSI-PP-0035-2007, BSI-CC-PP-0056-V2-Certificates
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0917-2014-MA-01, ANSSI-CC-2015/32, ANSSI-CC-2014/77Evaluation facilities
Serma Technologies, CESTIStandards
RFC 2785, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
| Title | ANSSI-CC-2015_32 |
|---|---|
| Author | moyal |
| Creation date | D:20150921163135+02'00' |
| Modification date | D:20150921163135+02'00' |
| Pages | 18 |
| Creator | PDFCreator Version 1.2.1 |
| Producer | GPL Ghostscript 9.02 |
Frontpage
| Certificate ID | ANSSI-CC-2015/32 |
|---|---|
| Certified item | eTravel Essential 1.0, avec SAC, AA et EAC activés, sur composant M7794 A12/G12 |
| Certification lab | Serma technologies 14 rue Galilée, CS – 10055, 33615 PESSAC Cedex, France |
| Developer | Gemalto 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la verrerie, 92197 Meudon, France |
References
Outgoing- BSI-DSZ-CC-0917-2014 - archived - Infineon Technologies Security Controller M7794 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
- ANSSI-CC-2014/77 - archived - eTravel Essential 1.0, configuration"full" avec application PACE
- ANSSI-CC-2020/83 - active - eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, 3DES, KMAC, CMACAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-224Schemes
MAC, Key AgreementProtocols
PACERandomness
RNGBlock cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG15, EF.COM, EF.SODVendor
GemaltoSecurity level
EAL5, EAL 5+, EAL5 augmentedClaims
OE.BAC-PPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, AVA_VAN.3, AVA_VAN.5, ASE_ECDSecurity Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_COP, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1, FDP_RIP.1.1, FDP_UCT.1, FDP_UCT, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT, FDP_UIT.1.1, FDP_UIT.1.2, FIA_API, FIA_AFL, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.4, FIA_UAU, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID, FIA_UID.1.1, FIA_UID.1.2, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.5, FIA_UAU.6.1, FIA_UAU.6, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FMT_MSA.1, FPT_EMS, FPT_TST, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-PP-0035, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011, BSI-PP-0055Certificates
BSI-DSZ-CC-917-2014, CC-1, CC-2, CC-3Evaluation facilities
SERMASide-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, Physical Tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS180-2, FIPS46-3, FIPS PUB 46-3, FIPS 186-3, FIPS 46-3, FIPS 197, SP 800-90, SP 800-67, PKCS#3, PKCS#1, RFC 2631, RFC 3369, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004Technical reports
BSI TR-03110File metadata
| Title | eTravel EAC v2 Security Target |
|---|---|
| Subject | MRTD |
| Keywords | Security Target, CC, eTravel |
| Author | Antoine de Lavernette |
| Creation date | D:20150226163908+01'00' |
| Modification date | D:20150226163908+01'00' |
| Pages | 89 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2015/32Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, AVA_VAN.5Similar certificates
Showing 5 out of 15.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "c1e055aa6fc7a187",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2015/32",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"b380aabf93b29692",
"a33327d40f253f46"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/83"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0917-2014",
"ANSSI-CC-2014/77"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/83"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/77",
"BSI-DSZ-CC-0917-2014",
"BSI-DSZ-CC-0786-2012",
"BSI-DSZ-CC-0883-2013",
"BSI-DSZ-CC-0814-2012"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Gemalto",
"manufacturer_web": "https://www.gemalto.com/",
"name": "eTravel Essential 1.0, avec SAC, AA et EAC activ\u00e9s sur composant M7794 A12/G12",
"not_valid_after": "2020-09-10",
"not_valid_before": "2015-09-10",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2015_32.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2015/32",
"cert_item": "eTravel Essential 1.0, avec SAC, AA et EAC activ\u00e9s, sur composant M7794 A12/G12",
"cert_item_version": "Version 1.0",
"cert_lab": "Serma technologies 14 rue Galil\u00e9e, CS \u2013 10055, 33615 PESSAC Cedex, France",
"developer": "Gemalto 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la verrerie, 92197 Meudon, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Machine Readable Travel Document with \u201eICAO Application\u201d, Extended Access Control with PACE (EAC PP) Version 1.3.2, BSI-CC-PP-0056-V2-2012-MA-02 Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE PP) Version 1.0, BSI-CC-PP-0068-V2-2011"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0917-2014": 1,
"BSI-DSZ-CC-0917-2014-MA-01": 1
},
"FR": {
"ANSSI-CC-2014/77": 1,
"ANSSI-CC-2015/32": 19
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-": 1,
"BSI-CC-PP-0056-V2-2012-MA-02": 1,
"BSI-CC-PP-0068-V2-2011": 2,
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL4": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 3
}
},
"crypto_protocol": {
"PACE": {
"PACE": 7
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"Serma": {
"Serma Technologies": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ICAO": {
"ICAO": 1
},
"RFC": {
"RFC 2785": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 2
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 8
},
"Infineon": {
"Infineon Technologies": 1,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "moyal",
"/CreationDate": "D:20150921163135+02\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.1",
"/Keywords": "",
"/ModDate": "D:20150921163135+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.02",
"/Subject": "",
"/Title": "ANSSI-CC-2015_32",
"pdf_file_size_bytes": 143765,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "ANSSI_cible_2015_32_LITE.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 8
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"DH": 9,
"Diffie-Hellman": 9
}
},
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-917-2014": 1
},
"NL": {
"CC-1": 6,
"CC-2": 6,
"CC-3": 3
}
},
"cc_claims": {
"OE": {
"OE.BAC-PP": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0068-V2-2011": 1,
"BSI-PP-0035": 1,
"BSI-PP-0055": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_DVS.2": 4
},
"ASE": {
"ASE_ECD": 1
},
"ATE": {
"ATE_DPT.1": 1
},
"AVA": {
"AVA_VAN.3": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 1,
"EAL5": 5,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 6,
"FAU_SAS.1": 14,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 53,
"FCS_CKM.1": 20,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 8,
"FCS_CKM.4": 55,
"FCS_CKM.4.1": 1,
"FCS_COP": 77,
"FCS_COP.1": 11,
"FCS_COP.1.1": 7,
"FCS_RND": 7,
"FCS_RND.1": 16,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 16,
"FDP_ACC.1": 7,
"FDP_ACC.1.1": 1,
"FDP_ACF": 13,
"FDP_ACF.1": 10,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 4,
"FDP_ITC.1": 16,
"FDP_ITC.2": 16,
"FDP_RIP.1": 9,
"FDP_RIP.1.1": 1,
"FDP_UCT": 7,
"FDP_UCT.1": 3,
"FDP_UCT.1.1": 1,
"FDP_UIT": 7,
"FDP_UIT.1": 3,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 21,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_API": 17,
"FIA_API.1": 7,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 75,
"FIA_UAU.1": 5,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.4": 3,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 4,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 1,
"FIA_UAU.6.1": 2,
"FIA_UID": 26,
"FIA_UID.1": 7,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 22,
"FMT_LIM.1.1": 3,
"FMT_LIM.2": 20,
"FMT_LIM.2.1": 3,
"FMT_MSA.1": 1,
"FMT_MSA.3": 3,
"FMT_MTD": 75,
"FMT_MTD.1": 14,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 8,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 50,
"FMT_SMF.1.1": 1,
"FMT_SMR": 33,
"FMT_SMR.1": 2,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 4,
"FPT_EMS.1": 14,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 11,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 13,
"FPT_PHP.3.1": 1,
"FPT_TST": 2,
"FPT_TST.1": 11,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 4,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 117
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 11
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-224": 1
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 3,
"EF.DG1": 11,
"EF.DG14": 5,
"EF.DG15": 2,
"EF.DG16": 9,
"EF.DG2": 5,
"EF.DG3": 11,
"EF.DG4": 11,
"EF.DG5": 3,
"EF.SOD": 4
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 5,
"Physical Tampering": 3,
"Physical tampering": 2,
"fault injection": 1,
"malfunction": 6
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 2,
"SPA": 1,
"physical probing": 3,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 186-3": 1,
"FIPS 197": 1,
"FIPS 46-3": 1,
"FIPS PUB 46-3": 1,
"FIPS180-2": 1,
"FIPS46-3": 1
},
"ICAO": {
"ICAO": 16
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816-4": 1
},
"NIST": {
"SP 800-67": 1,
"SP 800-90": 2
},
"PKCS": {
"PKCS#1": 2,
"PKCS#3": 5
},
"RFC": {
"RFC 2631": 1,
"RFC 3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDES": 7,
"Triple-DES": 6
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 3,
"KMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 2
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 107
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Antoine de Lavernette",
"/CreationDate": "D:20150226163908+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "Security Target, CC, eTravel",
"/ModDate": "D:20150226163908+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "MRTD",
"/Title": "eTravel EAC v2 Security Target",
"pdf_file_size_bytes": 1650674,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 89
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_32.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL5+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible_2015_32_LITE.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "09c7383c808b59dc35a301d9dcc7214c74acba342fe938db47dd2444f055e793",
"txt_hash": "6e1bff74c05d2ab161def310e1907692170e61d091ec52143898dee14a88b41b"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "540cd7895cda415724df211bc42ed6a84a0b2f3c1d0f7aaf392b3ccabc9eab39",
"txt_hash": "642a11513dddb21c4384a544a916c98bd979867c4eb6719887935f17eeec2cf1"
}
},
"status": "archived"
}