Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3)
ANSSI-CC-2015/40
Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
ANSSI-CC-2017/23
name Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3) Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
not_valid_after 02.10.2020 23.03.2017
not_valid_before 02.10.2015 23.03.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_40.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_23fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015-40_LITE.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_23en.pdf.pdf
manufacturer Gemalto / NXP Semiconductors STMicroelectronics S.r.l et STMicroelectronics
manufacturer_web https://www.gemalto.com/ https://www.st.com/content/st_com/en.html
security_level EAL4+, ALC_DVS.2 EAL5+, AVA_VAN.5, ALC_DVS.2
dgst 0f7bd25c0253d284 a0ac2d4999a67119
heuristics/cert_id ANSSI-CC-2015/40 ANSSI-CC-2017/23
heuristics/extracted_sars ALC_DVS.2, ALC_FLR.1, ADV_ARC.1, AVA_VAN.3, ASE_TSS.2 ASE_SPD.1, ALC_DVS.2, AGD_OPE.1, ALC_TAT.2, ATE_FUN.1, ATE_IND.2, ASE_REQ.2, ALC_CMS.5, ADV_FSP.5, ADV_IMP.1, ASE_ECD.1, ALC_CMC.4, ADV_TDS.4, ASE_TSS.1, ALC_FLR.1, ADV_INT.2, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, AGD_PRE.1, ADV_ARC.1, ATE_DPT.3, ASE_OBJ.2
heuristics/extracted_versions 2.1, 1.3, 3.1 1.1.4
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-1037-2018
heuristics/report_references/directly_referencing BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2015/15 ANSSI-CC-2015/59, ANSSI-CC-2017/10
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-1037-2018
heuristics/report_references/indirectly_referencing ANSSI-CC-2015/15, ANSSI-CC-2014/06, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0845-2012, ANSSI-CC-2014/86, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0728-2011 ANSSI-CC-2015/59, ANSSI-CC-2017/10
heuristics/scheme_data
  • cert_id: ANSSI-CC-2017/23
  • description: Le produit certifié est la « Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03 » développée par ST MICROELECTRONICS S.r.l sur le microcontrôleur ST31H320 A03 fabriqué par la société STMICROELECTRONICS . La plateforme est une carte à puce en mode contact. Elle est en configuration fermée, et ne correspond pas à un produit utilisable en tant que tel. Elle
  • developer: STMicroelectronics S.r.l., STMicroelectronics
  • enhanced:
  • level: EAL5+
  • product: Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
  • sponsor: STMicroelectronics S.r.l.
  • url: https://cyber.gouv.fr/produits-certifies/plate-forme-stsafe-j-en-configuration-fermee-version-114-sur-le-composant
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-1037-2018
heuristics/st_references/directly_referencing BSI-DSZ-CC-0845-V2-2013 ANSSI-CC-2015/59
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-1037-2018
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0845-V2-2013 ANSSI-CC-2015/59
maintenance_updates
protection_profiles
pdf_data/report_filename ANSSI-CC-2015_40.pdf ANSSI-CC-2017_23fr.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2015/40
    • cert_item: Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
    • cert_item_version: Version de l’application eTravel EAC : 2.1 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2017/23
    • cert_item: Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
    • cert_item_version: Version 1.1.4
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: STMicroelectronics S.r.l. Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 190 Avenue Celestin COQ 13106 ROUSSET CEDEX, FRANCE Commanditaire STMicroelectronics S.r.l. Z.I Marcianise Sud, 81025 Marcianise, Italie
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Java Card Protection profile – Closed Configuration Version 3.0, ANSSI-CC-PP-2010/07-M01
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0845-V2-2013: 3
  • FR:
    • ANSSI-CC-2015/15: 3
    • ANSSI-CC-2015/40: 22
  • FR:
    • ANSSI-CC-2015/59: 2
    • ANSSI-CC-2015/59-M01: 2
    • ANSSI-CC-2015/59-S01: 2
    • ANSSI-CC-2017/10: 1
    • ANSSI-CC-2017/23: 17
    • ANSSI-CC-PP-2010/07-M01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0055-2009: 1
    • BSI-PP-0035-: 1
    • BSI-PP-0035-2007: 2
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 2
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 27
  • NXP:
    • NXP: 3
    • NXP Semiconductors: 3
  • STMicroelectronics:
    • STMicroelectronics: 3
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 3
  • Serma:
    • Serma Safety & Security: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 3
pdf_data/report_metadata
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: Rapport ANSSI-CC-2015_40
  • pdf_file_size_bytes: 289332
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: ANSSI-CC-2017_23fr
  • pdf_file_size_bytes: 760248
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename anssi_cible_2015-40_LITE.pdf ANSSI_cible2017_23en.pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0845: 1
    • BSI-DSZ-CC-0845-V2-2013: 1
  • NL:
    • CC-1: 2
    • CC-2: 5
    • CC-3: 3
  • FR:
    • ANSSI-CC-2015/59: 1
    • ANSSI-CC-2015/59-M01: 1
    • ANSSI-CC-2015/59-S01: 1
    • ANSSI-CC-PP-2010/07-M01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-CC-PP-0055: 2
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL4: 3
    • EAL4 augmented: 1
  • EAL:
    • EAL4+: 1
    • EAL5: 12
    • EAL5 augmented: 2
    • EAL5+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
  • ALC:
    • ALC_DVS.2: 3
  • ASE:
    • ASE_ECD: 1
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 9
    • ADV_IMP.1: 10
    • ADV_INT.2: 2
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 9
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 3
    • ALC_DVS.2: 9
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 4
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD: 2
    • ASE_ECD.1: 5
    • ASE_INT.1: 6
    • ASE_OBJ: 2
    • ASE_OBJ.2: 4
    • ASE_REQ: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 3
    • ASE_SPD: 2
    • ASE_SPD.1: 3
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 7
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 13
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 6
    • FCS_CKM.1: 27
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 30
    • FCS_CKM.4.1: 1
    • FCS_COP: 53
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
    • FCS_RND: 7
    • FCS_RND.1: 13
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 2
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 12
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 13
    • FIA_API.1: 6
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 12
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 3
    • FIA_UAU.6: 12
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 40
    • FMT_MTD.1: 6
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 23
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SRM.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 13
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
  • FAU:
    • FAU_ARP: 5
    • FAU_ARP.1: 3
    • FAU_SAA.1: 2
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 4
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 2
    • FCS_COP: 12
    • FCS_COP.1: 4
    • FCS_RNG: 6
    • FCS_RNG.1: 6
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 10
    • FDP_ACF: 9
    • FDP_ACF.1: 3
    • FDP_IFC: 3
    • FDP_IFC.1: 7
    • FDP_IFF: 3
    • FDP_IFF.1: 5
    • FDP_ITC: 1
    • FDP_ITT.1: 4
    • FDP_RIP: 31
    • FDP_RIP.1: 3
    • FDP_ROL: 10
    • FDP_ROL.1: 3
    • FDP_SDC: 4
    • FDP_SDC.1: 8
    • FDP_SDC.1.1: 1
    • FDP_SDI: 3
    • FDP_SDI.2: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_UID: 3
    • FIA_USB: 2
  • FMT:
    • FMT_LIM: 14
    • FMT_LIM.1: 10
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 10
    • FMT_LIM.2.1: 1
    • FMT_MSA: 20
    • FMT_MSA.1: 1
    • FMT_MSA.2: 2
    • FMT_MSA.3: 3
    • FMT_MTD: 6
    • FMT_SMF: 2
    • FMT_SMF.1: 6
    • FMT_SMR: 2
    • FMT_SMR.1: 3
  • FPR:
    • FPR_UNO: 2
    • FPR_UNO.1: 1
  • FPT:
    • FPT_FLS: 9
    • FPT_FLS.1: 6
    • FPT_ITT.1: 2
    • FPT_PHP.3: 2
    • FPT_TDC.1: 1
    • FPT_TST.1: 2
  • FRU:
    • FRU_FLT.2: 3
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.BAC_PP: 1
    • OE.MRTD_: 3
  • OT:
    • OT.AC: 1
  • A:
    • A.NO-DELETION: 5
    • A.NO-INSTALL: 5
    • A.VERIFICATION: 4
    • A.XXX: 1
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 6
    • D.EMBEDDED_SW_CODE: 4
    • D.EMBEDDED_SW_DATA: 4
    • D.GP_CODE: 3
    • D.GP_SENSITIVE_DATA: 3
    • D.JCS_CODE: 4
    • D.JCS_DATA: 6
    • D.PIN: 9
    • D.SEC_DATA: 5
  • O:
    • O.ALARM: 21
    • O.APPLET: 1
    • O.CIPHER: 45
    • O.FIREWALL: 26
    • O.GLOBAL_ARRAYS_CONFID: 10
    • O.GLOBAL_ARRAYS_INTEG: 8
    • O.GP_REGISTRY: 10
    • O.JAVA: 3
    • O.JAVAOB: 2
    • O.JAVAOBJECT: 20
    • O.KEY-MNGT: 11
    • O.LIFE_CYCLE: 13
    • O.NATIVE: 12
    • O.OBJ-DELETION: 8
    • O.OPERATE: 33
    • O.PIN-MNGT: 16
    • O.PIN_MNGT: 1
    • O.REALLOCATION: 13
    • O.RESOURCES: 9
    • O.RND: 1
    • O.ROLES: 6
    • O.SCP: 70
    • O.SID: 25
    • O.SIDE_CHANNEL: 10
    • O.TRANSACTION: 11
  • OE:
    • OE.CARD-MANAGEMENT: 12
    • OE.CARD_MANAGEMENT: 17
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 17
    • OE.MANAGEMENT_OF_SECRETS: 3
    • OE.NO-DELETION: 6
    • OE.NO-INSTALL: 5
    • OE.SCP: 3
    • OE.VERIFICATION: 33
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CARD_LOCK: 4
    • OP.CARD_TERMINATE: 4
    • OP.CREATE: 7
    • OP.GET_CARD_LIFE_CYCLE_: 1
    • OP.GET_CARD_LIFE_CYCLE_STATE: 2
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.MANAGE_APP_LIFE_CYC: 1
    • OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
    • OP.PUT: 6
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 5
    • OSP.MANAGEMENT_OF_SECRETS: 6
    • OSP.ROLES: 5
    • OSP.VERIFICATION: 5
  • R:
    • R.JAVA: 5
  • T:
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 11
    • T.EXE-CODE: 9
    • T.INTEG-: 1
    • T.INTEG-APPLI-CODE: 12
    • T.INTEG-APPLI-DATA: 23
    • T.INTEG-JCS-CODE: 7
    • T.INTEG-JCS-DATA: 11
    • T.LEAKAGE: 1
    • T.LIFE_CYCLE: 7
    • T.NATIVE: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 9
    • T.RESOURCES: 7
    • T.SID: 16
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 82
  • NXP:
    • NXP: 14
  • STMicroelectronics:
    • STM: 13
    • STMicroelectronics: 6
pdf_data/st_keywords/eval_facility
  • Serma:
    • SERMA: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 8
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • KMAC: 1
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3-DES: 2
      • Triple-DES: 1
      • TripleDES: 1
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-512: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-512: 2
      • SHA224: 2
      • SHA256: 2
      • SHA384: 3
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 3
  • PRNG:
    • DRBG: 1
  • RNG:
    • RND: 1
    • RNG: 19
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 2
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v.4.2.10: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 6
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
  • FI:
    • Malfunction: 1
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • Leak-Inherent: 1
    • SPA: 1
    • physical probing: 4
    • side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 9
    • EF.DG1: 30
    • EF.DG13: 3
    • EF.DG14: 3
    • EF.DG15: 4
    • EF.DG16: 28
    • EF.DG2: 12
    • EF.DG3: 8
    • EF.DG4: 8
    • EF.DG5: 8
    • EF.DG6: 2
    • EF.SOD: 9
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 46-3: 2
    • FIPS PUB 46-3: 1
    • FIPS180-2: 1
    • FIPS46-3: 3
  • ICAO:
    • ICAO: 17
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 1
  • RFC:
    • RFC3369: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 140-2: 1
  • PKCS:
    • PKCS#1: 2
    • PKCS1: 1
  • SCP:
    • SCP02: 2
    • SCP03: 2
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
  • JavaCard:
    • Java Card 3.0.4: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 23
    • javacard.security.interface: 4
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.2 Java Card Platform The Java technology, embedded on the TOE: 1
    • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
    • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: • Product Development • Product: 1
    • out of scope: 4
pdf_data/st_metadata
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20150423185724+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Security Target, CC, eTravel
  • /ModDate: D:20150423185724+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: MRTD
  • /Title: eTravel EAC v2 Security Target
  • pdf_file_size_bytes: 1119178
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /Author: daniela terracciano
  • /CreationDate: D:20170127111137+01'00'
  • /Creator: PDFCreator 2.0.0.0
  • /Keywords:
  • /ModDate: D:20170127111137+01'00'
  • /Producer: PDFCreator 2.0.0.0
  • /Subject:
  • /Title: STSafe-J_SecurityTarget_Lite_A
  • pdf_file_size_bytes: 692327
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 95
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different