name |
eTravel Essential 1.3-2.0 – PACE, EAC and AA activated (Version 1.0) |
eTravel v2.2 on MultiApp v4.0.1 platform, PACE, EAC and AA activated |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
27.12.2026 |
17.06.2025 |
not_valid_before |
27.12.2021 |
10.01.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021-63.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2017_83-s01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021-63.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_83fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_63en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_83en.pdf |
manufacturer |
THALES DIS FRANCE SA |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
0ea65ddd47e12976 |
b6e776e146165ffc |
heuristics/cert_id |
ANSSI-CC-2021/63 |
ANSSI-CC-2017/83 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ASE_TSS.2, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4 |
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4 |
heuristics/extracted_versions |
2.0, 1.0, 1.3 |
4.0.1, 2.2 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1156-V2-2021 |
BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2017/76 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1156-2021, BSI-DSZ-CC-1156-V2-2021 |
BSI-DSZ-CC-0782-2012, ANSSI-CC-2017/76, ANSSI-CC-2017/54, ANSSI-CC-2017/07, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-2015 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2021/63
- description: Le produit évalué est « eTravel Essential 1.3-2.0 - PACE, EAC and AA activated, version 1.0 » développé par THALES DIS FRANCE SAS et INFINEON TECHNOLOGIES AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile interna
- developer: THALES DIS FRANCE SAS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2021/63
- cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-anssi-cc-2021-63.pdf
- certification_date: 2021-12-27
- developer: THALES DIS FRANCE SAS
- evaluation_facility: CEA - LETI
- expiration_date: 2026-12-27
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: Machine Readable Travel Document with « ICAO Application », Extended Access Control with PACE, version 1.3.2 Certifié BSI-CC-PP-0056-V2-2012-MA-02 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1 Certifié BSI-CC-PP-0068-V2-2011-MA-01
- report_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2021-63.pdf
- sponsor: THALES DIS FRANCE SAS
- target_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2021_63en.pdf
- expiration_date: 2026-12-27
- level: EAL5+
- product: eTravel Essential 1.3-2.0 - PACE, EAC and AA activated (Version 1.0)
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-essential-13-20-pace-eac-and-aa-activated-version-10
|
- cert_id: ANSSI-CC-2017/83
- description: Le produit certifié est l’application « eTravel v2.2 sur la Plate-forme MultiApp v4.0.1, PACE, EAC et AA activés » développée par la société GEMALTO et embarquée sur le microcontrôleur M7892 G12 fabriqué par la société INFINEON TECHNOLOGIES AG. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internatio
- developer: Gemalto, Infineon Technologies AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2017/83
- cert_link: https://cyber.gouv.fr/sites/default/files/2018/01/certificat-cc-2017_83-s01.pdf
- certification_date: 2018-01-10
- developer: Gemalto, Infineon Technologies AG
- evaluation_facility: Serma Safety & Security
- expiration_date: 2025-06-17
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01
- report_link: https://cyber.gouv.fr/sites/default/files/2018/01/anssi-cc-2017_83fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/2018/01/anssi-cible-cc-2017_83en.pdf
- expiration_date: 2025-06-17
- level: EAL5+
- product: eTravel v2.2 on MultiApp v4.0.1 platform, PACE, EAC and AA activated
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/etravel-v22-multiapp-v401-platform-pace-eac-and-aa-activated
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1156-2021 |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1156-2021 |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-anssi-cc-2021-63.pdf |
certificat-cc-2017_83-s01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/cert_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 2
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: DUCLOS Charlene
- /CreationDate: D:20220107145629+01'00'
- /Creator: Microsoft® Word 2019
- /Keywords: version x.x, révision x
- /ModDate: D:20220107145629+01'00'
- /Producer: Microsoft® Word 2019
- /Title: ANSSI-CC-2021/63
- pdf_file_size_bytes: 385256
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: sharbus
- /CreationDate: D:20220107175029+01'00'
- /ModDate: D:20220107175029+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - certificat-CC-2017_83-S01
- pdf_file_size_bytes: 1295972
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
anssi-cc-2021-63.pdf |
anssi-cc-2017_83fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2017/83
- cert_item: eTravel v2.2 on MultiApp v4.0.1 platform, PACE, EAC and AA activated
- cert_item_version: Version de l’application eTravel : 2.2 Version de la plateforme Java Card MultiApp : 4.0.1
- cert_lab: Serma Safety & Security 14, rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0056-V2-2012-MA-02, version 1.3.2 Machine Readable Travel Document with ICAO application, Extended Access Control with PACE BSI-CC-PP-0068-V2-2011-MA-01, version 1.0.1 Machine Readable Travel Document using Standard Inspection Procedure with PACE
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1156-V2-2021: 1
- FR:
|
- DE:
- BSI-DSZ-CC-0891-V2-2016: 2
- FR:
- ANSSI-CC-2017/76: 2
- ANSSI-CC-2017/83: 19
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0056-V2-2012-MAO2: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG: 1
|
- Gemalto:
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
|
- CESTI:
- Serma:
- SERMA: 2
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
anssi-cible-cc-2021_63en.pdf |
anssi-cible-cc-2017_83en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V2-2016: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-V2-: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL5: 7
- EAL5 augmented: 3
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 6
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 17
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 65
- FCS_CKM.1: 31
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.4: 67
- FCS_CKM.4.1: 1
- FCS_COP: 115
- FCS_COP.1: 12
- FCS_COP.1.1: 13
- FCS_RND: 13
- FCS_RND.1: 18
- FCS_RND.1.1: 2
- FCS_RNG: 5
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF: 17
- FDP_ACF.1: 19
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 6
- FDP_ITC.1: 27
- FDP_ITC.2: 27
- FDP_ITT.1: 2
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDC.1: 8
- FDP_SDI: 1
- FDP_SDI.2: 2
- FDP_SMR: 1
- FDP_UCT: 4
- FDP_UCT.1: 4
- FDP_UCT.1.1: 1
- FDP_UIT: 4
- FDP_UIT.1: 6
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 20
- FIA_API.1: 9
- FIA_API.1.1: 1
- FIA_ATD: 7
- FIA_ATD.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 62
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 3
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 1
- FIA_UAU.6.1: 2
- FIA_UID: 33
- FIA_UID.1: 14
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 26
- FMT_LIM.1.1: 3
- FMT_LIM.2: 24
- FMT_LIM.2.1: 3
- FMT_MSA: 7
- FMT_MSA.1: 6
- FMT_MSA.3: 6
- FMT_MTD: 57
- FMT_MTD.1: 14
- FMT_MTD.1.1: 1
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF: 11
- FMT_SMF.1: 52
- FMT_SMF.1.1: 1
- FMT_SMR: 16
- FMT_SMR.1: 6
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 15
- FPT_EMS.1: 20
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 8
- FPT_FLS.1: 20
- FPT_FLS.1.1: 1
- FPT_ITT.1: 3
- FPT_PHP.3: 16
- FPT_PHP.3.1: 1
- FPT_TST: 14
- FPT_TST.1: 9
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 15
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 49
- FCS_CKM.1: 20
- FCS_CKM.1.1: 2
- FCS_CKM.2: 8
- FCS_CKM.4: 54
- FCS_CKM.4.1: 1
- FCS_COP: 73
- FCS_COP.1: 11
- FCS_COP.1.1: 7
- FCS_RND: 7
- FCS_RND.1: 15
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF: 12
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_UCT: 6
- FDP_UCT.1: 3
- FDP_UCT.1.1: 1
- FDP_UIT: 6
- FDP_UIT.1: 3
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 20
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 15
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 69
- FIA_UAU.1: 5
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 3
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 1
- FIA_UAU.6.1: 2
- FIA_UID: 24
- FIA_UID.1: 7
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 21
- FMT_LIM.1.1: 3
- FMT_LIM.2: 19
- FMT_LIM.2.1: 3
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 66
- FMT_MTD.1: 14
- FMT_MTD.1.1: 1
- FMT_MTD.3: 7
- FMT_MTD.3.1: 1
- FMT_SMF.1: 49
- FMT_SMF.1.1: 1
- FMT_SMR: 32
- FMT_SMR.1: 2
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 13
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACODE-EVIDENCE: 3
- A.ACODE-KEY-MANAGEMENT: 3
- D:
- D.ACODE: 8
- D.ACODE-ID: 3
- D.ACODE_: 1
- D.ACODE_CIPHEREDSIGNED: 7
- D.ACODE_DEC-KEY: 4
- D.ACODE_ENC-KEY: 2
- D.ACODE_SGNGEN-KEY: 2
- D.ACODE_SGNVER-: 1
- D.ACODE_SGNVER-KEY: 4
- O:
- O.CONFID-LOAD_ACODE: 4
- O.RND: 1
- O.SECURE_ACTIVATION_ACODE: 4
- O.SECURE_LOAD_ACODE: 10
- O.TOE_IDENTIFICATION: 7
- OE:
- OE.ACODE-: 1
- OE.ACODE-ENCRYPTION: 6
- OE.ACODE-EVIDENCE: 5
- OE.ACODE-KEY-MANAGEMENT: 6
- OE.ACODE-SECURE_LOAD: 1
- OE.ACODE-TRUSTED-: 1
- OE.ACODE-TRUSTED-DEVELOPER: 5
- OE.ACODE-VERIFICATION: 4
- OE.ACODE_SECURE_LOAD: 4
- OE.BAC-PP: 1
- OE.CODE-VERIFICATION: 1
- OE.ENCRYPTION_ACODE: 1
- OSP:
- T:
- T.CONFID-: 1
- T.CONFID-ACODE_LOAD: 2
- T.FAKE-SGNVER-KEY: 3
- T.INTEG-: 1
- T.INTEG-ACODE_LOAD: 2
- T.UNAUTHORIZED_ES_UPDATE: 3
- T.WRONG-UPDATE-STATE: 3
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 7
- Triple-DES: 6
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 7
- Triple-DES: 6
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 6
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 2
- Leak-Inherent: 3
- SPA: 1
- physical probing: 4
- other:
|
- FI:
- Malfunction: 5
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 2
- EF.DG1: 13
- EF.DG14: 6
- EF.DG15: 2
- EF.DG16: 11
- EF.DG2: 6
- EF.DG3: 10
- EF.DG4: 10
- EF.DG5: 3
- EF.SOD: 4
|
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 11
- EF.DG4: 11
- EF.DG5: 3
- EF.SOD: 4
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 2
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS186-4: 2
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
- SCP:
|
- CC:
- CCMB-2012-04-003: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Thales
- /CreationDate: D:20210906102029+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20210906102029+02'00'
- /Producer: Microsoft® Word 2016
- /Title: Security Target eTravel Essential 1.2 - BAC, EAC and AA activated
- pdf_file_size_bytes: 2912238
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 118
|
- /CreationDate: D:20171113143948+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: 12/10/2017
- /ModDate: D:20180116184802+01'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 1931748
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 84
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |