name |
ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE |
ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
23.06.2021 |
01.09.2019 |
not_valid_before |
23.06.2016 |
28.01.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-En_2016_39en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_39_LITE.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-01en.pdf |
manufacturer |
Oberthur Technologies |
Oberthur Technologies / NXP Semiconductors GmbH |
manufacturer_web |
https://www.oberthur.com/ |
https://www.oberthur.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
00bd946e44e82bd4 |
c640b454c967f522 |
heuristics/cert_id |
ANSSI-CC-2016/39 |
ANSSI-CC-2014/01 |
heuristics/cert_lab |
CEA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, ASE_TSS.2, ALC_TAT.2, ATE_DPT.3, ADV_TDS.4, ALC_FLR.1, ADV_INT.2, AVA_VAN.5 |
ASE_TSS.2, ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0978-2016 |
BSI-DSZ-CC-0857-2013, BSI-DSZ-CC-0555-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0978-2016 |
BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0857-2013 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2016/39
- description: Le produit certifié est la carte à puce « ID-One ePass Full EAC v2 MRTD en configurationEAC et PACE avec AA masqué sur le composant P60x144PVA/PVE », pouvant être en modecontact ou sans contact. Le produit est développé par OBERTHUR TECHNOLOGIES sur uncomposant NXP SEMICONDUCTORS. Le produit implémente les fonctions de document de voyage électronique conformément auxspécifications de l’orga
- developer: Oberthur Technologies / NXP Semiconductors
- enhanced:
- level: EAL5+
- product: ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/id-one-epass-full-eac-v2-mrtd-en-configuration-eac-et-pace-avec-aa-masque-sur-0
|
- cert_id: ANSSI-CC-2014/01
- description: Le produit certifié est le passeport électronique « ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA », référence SAAAAR ROM 079161, SAAAAR Codop 079223, développé par Oberthur Technologies sur un composant NXP Semiconductors. Le produit évalué est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique c
- developer: Oberthur Technologies / NXP Semiconductors Germany GmbH
- enhanced:
- level: EAL5+
- product: ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/epass-v3-td-sur-composants-p5cd081v1a-en-configuration-eac-sur-sac-pace-v2-et-aa
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0978-2016 |
BSI-DSZ-CC-0555-2009 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0978-2016 |
BSI-DSZ-CC-0555-2009 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC-En_2016_39en.pdf |
ANSSI-CC_2014-01fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1 revision 4
- cert_id: ANSSI-CC-2016/39
- cert_item: ID-One ePass Full EAC v2 MRTD in EAC and PACE configuration with AA on P60x144PVA/PVE components
- cert_item_version: SAAAAR 080031 : ePass V3 Full EACv2 on NXP SAAAAR 082456 : Code r6.0 Generic SAAAAR 082844 : Optional Code r4.0 Digital Blurred Image
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France NXP Semiconductors Box 54 02 40, D-22502 Hamburg, Allemagne Sponsor Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: BSI-CC-PP-0056-V2, [PP EAC PACE], version 1.3.1 Machine Readable Travel Document with ICAO Application, BSI-CC-PP-0068-V2, [PP SAC], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/01
- cert_item: ePass V3 TD sur composants P5CD081V1A, en configuration EAC sur SAC via PACE v2 et AA
- cert_item_version: SAAAAR ROM 079161, SAAAAR Codop 079223
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France NXP Semiconductors Germany GmbH Box 54 02 40, D-22502 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE, Version 1.3.2, BSI-CC-PP-0056-V2-2012
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0555-2009: 1
- BSI-DSZ-CC-0857-2013: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2: 1
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0068-V2: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP- 0035-2007: 2
- BSI-PP-0035-2007: 1
|
- BSI:
- BSI-CC-PP- 0056-V2-2012: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 2
- EAL 5 augmented: 1
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL5 augmented: 1
- EAL6: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 8
- NXP Semiconductors: 2
- Oberthur:
- OBERTHUR: 4
- Oberthur Technologies: 8
|
- NXP:
- NXP: 1
- NXP Semiconductors: 3
- Oberthur:
- Oberthur Technologies: 15
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-En_2016_39en
- pdf_file_size_bytes: 207356
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /CreationDate: D:20140211175812+01'00'
- /Keywords:
- /ModDate: D:20140211175812+01'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 542967
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
anssi_cible_2016_39_LITE.pdf |
ANSSI-CC-cible_2014-01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035: 1
- BSI-PP-0056: 2
|
- BSI:
- BSI-CC-PP-0056-2009: 1
- BSI-CC-PP-0056-V2-2012: 3
- BSI-CC-PP-0068-V2-2011: 3
- BSI-PP-0035: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 1
- EAL 6: 1
- EAL4: 2
- EAL5: 8
- EAL5 augmented: 2
- EAL5+: 1
|
- EAL:
- EAL5: 4
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- AGD:
- ALC:
- ALC_CMS.5: 2
- ALC_DVS.2: 11
- ALC_FLR.1: 1
- ALC_TAT.2: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 3
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.3: 1
- AVA_VAN.5: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 4
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FAU_STG: 4
- FAU_STG.2: 3
- FCS:
- FCS_CKM: 25
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.4: 2
- FCS_COP: 59
- FCS_COP.1: 25
- FCS_RND: 4
- FCS_RND.1: 6
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 7
- FDP_ACC.1: 1
- FDP_ACC.2: 2
- FDP_ACF: 7
- FDP_ACF.1: 11
- FDP_DAU: 4
- FDP_DAU.1: 2
- FDP_ITC: 9
- FDP_ITC.1: 6
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_UCT: 7
- FDP_UCT.1: 2
- FDP_UIT: 12
- FDP_UIT.1: 6
- FIA:
- FIA_AFL: 7
- FIA_AFL.1: 4
- FIA_API: 4
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_UAU: 53
- FIA_UAU.1: 8
- FIA_UAU.4: 5
- FIA_UAU.5: 15
- FIA_UAU.6: 3
- FIA_UID: 13
- FIA_UID.1: 8
- FMT:
- FMT_LIM: 10
- FMT_LIM.1: 11
- FMT_LIM.1.1: 1
- FMT_LIM.2: 11
- FMT_LIM.2.1: 1
- FMT_MOF: 4
- FMT_MOF.1: 1
- FMT_MTD: 61
- FMT_MTD.1: 18
- FMT_MTD.3: 2
- FMT_SMF: 2
- FMT_SMF.1: 2
- FMT_SMR: 10
- FMT_SMR.1: 8
- FPT:
- FPT_EMS: 13
- FPT_EMS.1: 17
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 2
- FPT_FLS.1: 2
- FPT_PHP: 2
- FPT_PHP.3: 2
- FPT_TST: 6
- FPT_TST.1: 14
- FTP:
|
- FAU:
- FAU_SAS: 3
- FAU_SAS.1: 5
- FAU_SAS.1.1: 2
- FAU_STG.2: 2
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 3
- FCS_CKM.1.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 11
- FCS_COP.1: 2
- FCS_COP.1.1: 1
- FCS_RND: 3
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 2
- FDP_ACC.2: 2
- FDP_ACF: 4
- FDP_ACF.1: 17
- FDP_DAU: 3
- FDP_DAU.1: 2
- FDP_ITC: 6
- FDP_ITC.1: 6
- FDP_RIP: 1
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_UCT: 4
- FDP_UCT.1: 3
- FDP_UIT: 4
- FDP_UIT.1: 5
- FIA:
- FIA_ACC.1.1: 1
- FIA_AFL: 6
- FIA_AFL.1: 5
- FIA_API: 3
- FIA_API.1: 6
- FIA_API.1.1: 2
- FIA_UAU: 24
- FIA_UAU.1: 5
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 5
- FIA_UAU.6: 3
- FIA_UID: 5
- FIA_UID.1: 5
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 8
- FMT_LIM.1.1: 2
- FMT_LIM.2: 8
- FMT_LIM.2.1: 2
- FMT_MOF: 5
- FMT_MOF.1: 2
- FMT_MSA: 5
- FMT_MSA.1: 1
- FMT_MSA.3: 2
- FMT_MTD: 26
- FMT_MTD.1: 8
- FMT_MTD.3: 3
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 3
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 5
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 117
- NXP Semiconductors: 6
- Oberthur:
- Oberthur: 1
- Oberthur Technologies: 117
|
- NXP:
- NXP: 4
- NXP Semiconductors: 5
- Oberthur:
- Oberthur Technologies: 11
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA224: 1
- SHA256: 4
- SHA384: 1
- SHA512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 3
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Malfunction: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- SCA:
- DPA: 1
- physical probing: 3
- other:
|
- FI:
- DFA: 3
- Malfunction: 2
- malfunction: 3
- SCA:
- physical probing: 3
- side channels: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 4
- EF.DG1: 7
- EF.DG14: 3
- EF.DG15: 2
- EF.DG16: 5
- EF.DG2: 3
- EF.DG3: 8
- EF.DG4: 8
- EF.DG5: 1
- EF.SOD: 4
|
- EF:
- EF.COM: 2
- EF.DG1: 5
- EF.DG14: 2
- EF.DG15: 1
- EF.DG16: 4
- EF.DG2: 3
- EF.DG3: 10
- EF.DG4: 10
- EF.DG5: 2
- EF.SOD: 3
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 11770-2: 3
- ISO/IEC 15946: 2
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-9: 1
- NIST:
- PKCS:
- RFC:
- SCP:
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 197: 1
- FIPS 46-3: 3
- FIPS PUB 197: 2
- FIPS PUB 81: 2
- ICAO:
- ISO:
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 9796-2: 1
- ISO/IEC 9797: 4
- NIST:
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- and EAP protocols • Standard and biometric PIN management (therefore PIN associated commands are out of scope) • Watermarking feature 2.1.5 Usage and major security features of the TOE A State or Organisation: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: michetho
- /CreationDate: D:20160318102331+01'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20160318102331+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: <Document name>
- /Title: ID-One ePass Full EAC v2 MRTD in EAC with PACE configuration with AA on NXP P60x144 PVA/PVE - Public Security Target
- pdf_file_size_bytes: 2141209
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 108
|
- /CreationDate: D:20130710164209+02'00'
- /Creator: PDFCreator Version 0.9.5
- /Keywords:
- /ModDate: D:20140211175713+01'00'
- /Producer: GPL Ghostscript 8.61
- /Subject:
- /Title:
- pdf_file_size_bytes: 621505
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |