Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)
ANSSI-CC-2020/65v2
Application eTravel EAC v2.0, en configurationSAC, sur la carte à puce fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 5.0)
ANSSI-CC-2014/62
name Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) Application eTravel EAC v2.0, en configurationSAC, sur la carte à puce fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 5.0)
not_valid_before 2021-09-28 2014-09-16
not_valid_after 2025-06-26 2019-09-16
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible-anssi-cc-2020-65v2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-62en.pdf
status active archived
manufacturer THALES DIS FRANCE SA Gemalto
manufacturer_web https://www.thalesgroup.com/en/europe/france https://www.gemalto.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_65v2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_62fr.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020-65v2.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': frozenset({'EPASS_PACE_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0'})})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 4cd0982b954a019eb3c343c539948aa268bca50a5e1b79de557393146da50220 None
state/cert/txt_hash 0a56c1990efb616ab129cad19db0ced8506235cb7e0511dfe8713d97d01153c0 None
state/report/pdf_hash 8dd4c4edd973a7e452c641db48c8eb33354f85e05844f701c90561e1c43a694d a9c0da05a5ffbb7d3351fa9586189d186e2507d0207d4e04b8253c93ec0843f7
state/report/txt_hash 7483bc89235d6fc41cffa0952905a7fa4ea415e2556190e4f0b0c48e132685ed a4e2a9865609a0f9e1d9631d252c3ca6923fd38a3451c4eb0410ca6d50d1ecc7
state/st/pdf_hash 9ec9bc244cd2cdfa133da188f67f6302f7086acec87b2c453d19e5b906713150 bc7a3cd29cf3fa17f79aaa0f9215bf24d108e53d77a0e7e8fdbed1dd91d99ed7
state/st/txt_hash fe1f6fa6f2e466702df203929aa00510b8e554f774195f4ef29eddf064801fdb 8b69d634a168b66bb62b33af9778988f19bf674659f010e0c321a65bb414660d
heuristics/cert_id ANSSI-CC-2020/65v2 ANSSI-CC-2014/62
heuristics/cert_lab None SERMA
heuristics/extracted_versions 3.0.5, 4.2.0, 2.3, 4.2 5.0, 2.0
heuristics/report_references/directly_referenced_by None ANSSI-CC-2016/75
heuristics/report_references/directly_referencing ANSSI-CC-2020/65 BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06, ANSSI-CC-2014/08
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2016/75
heuristics/report_references/indirectly_referencing ANSSI-CC-2020/65 ANSSI-CC-2014/08, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06
heuristics/scheme_data None
  • product: Application eTravel EAC v2.0 sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
  • url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-sur-la-carte-puce-fermee-multiapp-v3-masquee-sur-0
  • description: Le produit certifié est la carte à puce fermée « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civi
  • sponsor: Gemalto
  • developer: Gemalto / Infineon Technologies AG
  • cert_id: 2014/07
  • level: EAL5+
  • enhanced:
    • cert_id: 2014/07
    • certification_date: 03/02/2014
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r4
    • developer: Gemalto / Infineon Technologies AG
    • sponsor: Gemalto
    • evaluation_facility: Serma Technologies
    • level: EAL5+
    • protection_profile: BSI-CC-PP-0056-V2, PP EAC PACE
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-07en.pdf
    • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-07fr.pdf
heuristics/st_references/directly_referencing BSI-DSZ-CC-1079-2018 BSI-DSZ-CC-0829-2012
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-1079-2018 BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
pdf_data/cert_filename certificat-anssi-cc-2020-65v2.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2020/65v2: 2
  • cc_protection_profile_id:
    • BSI:
      • BSI-PP-0099-2: 1
  • cc_security_level:
    • EAL:
      • EAL5: 1
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • Serma:
      • SERMA: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 280367
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20211004103608+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211004103608+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
None
pdf_data/report_filename anssi-cc-2020_65v2.pdf Rapport ANSSI-CC-2014_62fr.pdf
pdf_data/report_frontpage/FR
  • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
  • cert_id: ANSSI-CC-2014/62
  • cert_item: Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11
  • cert_item_version: Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 5.0
  • ref_protection_profiles: BSI-CC-PP-0068-V2, [PP SAC], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
  • cc_version: Critères Communs version 3.1 révision 4
  • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
  • developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
  • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-1079-2018-MA-01: 1
  • BSI-DSZ-CC-0829-2012: 3
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2020/65v2: 2
  • ANSSI-CC-2020/65: 3
  • ANSSI-CC-2014/62: 22
  • ANSSI-CC-2014/06: 2
  • ANSSI-CC-2014/08: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0099-2017: 1
  • BSI-PP-0099-2017: 1
  • BSI-PP-0084-2014: 1
  • BSI-CC-PP-0068-V2: 1
  • BSI-PP-0035-2007: 2
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP- 0035-2007: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 2 1
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 2 3
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 4 5
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL4: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/crypto_protocol/PACE/PACE 2 3
pdf_data/report_keywords/eval_facility
  • Serma:
    • SERMA: 1
  • CESTI:
    • CESTI: 1
  • Serma:
    • Serma Technologies: 2
pdf_data/report_keywords/eval_facility/Serma
  • SERMA: 1
  • Serma Technologies: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.io: 1
  • javacard:
    • javacard.framework: 1
    • javacard.filesystem: 1
    • javacard.util: 1
    • javacard.open: 1
    • javacard.internal: 1
    • javacard.ism: 1
    • javacard.securemessaging: 1
    • javacard.securemessaging.builde: 1
    • javacard.securemessaging.intern: 1
    • javacard.security: 1
    • javacard.tlv: 1
    • javacard.iasclassic: 1
    • javacard.icao: 1
    • javacard.mspnp: 1
    • javacard.conformance: 1
    • javacard.gpimage: 1
  • javacardx:
    • javacardx.apdu: 1
    • javacardx.crypto: 2
    • javacardx.gap: 1
    • javacardx.gapplet: 1
    • javacardx.biometry: 2
    • javacardx.crypto.asymmetric.ecc: 1
    • javacardx.crypto.asymmetric.rsa: 1
    • javacardx.apdu.util: 1
    • javacardx.biometry.biocfg: 1
    • javacardx.gdp: 1
  • org:
    • org.globalplatform: 1
  • com:
    • com.gemalto.javacard.filesystem: 1
    • com.gemalto.javacard.util: 1
    • com.gemalto.javacardx.crypto: 1
    • com.gemalto.javacard.open: 1
    • com.gemalto.javacardx.gapplet: 1
    • com.gemalto.javacard.ism: 1
    • com.gemalto.javacard.securemessaging.builde: 1
    • com.gemalto.javacard.securemessaging.intern: 1
    • com.gemalto.javacard.security: 1
    • com.gemalto.javacardx: 1
    • com.gemalto.javacardx.biometry: 1
    • com.gemalto.javacardx.crypto.asymmetric.rsa: 1
    • com.gemalto.javacard.iasclassic: 1
    • com.gemalto.moc.server: 1
    • com.gemalto.javacard.mspnp: 1
    • com.gemalto.javacardx.biometry.biocfg: 1
    • com.gemalto.emvapi: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 3
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS31: 1
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Gemalto:
    • Gemalto: 5
  • Microsoft:
    • Microsoft: 1
  • Infineon:
    • Infineon Technologies AG: 1
    • Infineon Technologies: 23
    • Infineon: 2
  • Gemalto:
    • Gemalto: 35
pdf_data/report_keywords/vendor/Gemalto/Gemalto 5 35
pdf_data/report_keywords/vendor/Infineon
  • Infineon Technologies AG: 1
  • Infineon Technologies AG: 1
  • Infineon Technologies: 23
  • Infineon: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 349522
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author:
  • /CreationDate: D:20211004103519+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211004103519+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 254218
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Producer: GPL Ghostscript 9.02
  • /CreationDate: D:20140926163330+02'00'
  • /ModDate: D:20140926163330+02'00'
  • /Title: Rapport ANSSI-CC-2014_62fr
  • /Creator: PDFCreator Version 1.2.1
  • /Author: torno
  • /Keywords:
  • /Subject:
  • pdf_hyperlinks:
pdf_data/report_metadata//Author torno
pdf_data/report_metadata//CreationDate D:20211004103519+02'00' D:20140926163330+02'00'
pdf_data/report_metadata//Creator PScript5.dll Version 5.2.2 PDFCreator Version 1.2.1
pdf_data/report_metadata//ModDate D:20211004103519+02'00' D:20140926163330+02'00'
pdf_data/report_metadata//Producer Acrobat Distiller 11.0 (Windows) GPL Ghostscript 9.02
pdf_data/report_metadata//Title Rapport ANSSI-CC-2014_62fr
pdf_data/report_metadata/pdf_file_size_bytes 349522 254218
pdf_data/st_filename cible-anssi-cc-2020-65v2.pdf ANSSI-CC-cible_2014-62en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 3
    • ECC:
      • ECC: 10
  • FF:
    • DH:
      • Diffie-Hellman: 4
      • DH: 8
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 1
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 5
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 10 1
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 3 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 8 7
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 4 5
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-1079-2018: 1
  • BSI-DSZ-CC-1079-2018-MA-01: 1
  • BSI-DSZ-CC-0829-2012: 1
pdf_data/st_keywords/cc_cert_id/NL/CC-1 2 6
pdf_data/st_keywords/cc_cert_id/NL/CC-2 3 4
pdf_data/st_keywords/cc_cert_id/NL/CC-3 3 2
pdf_data/st_keywords/cc_claims
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.PIN: 4
    • D.BIO: 1
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 13
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.NATIVE: 11
    • O.OPERATE: 15
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.ALARM: 15
    • O.CIPHER: 11
    • O.RNG: 9
    • O.KEY-MNGT: 7
    • O.PIN-MNGT: 6
    • O.TRANSACTION: 7
    • O.BIO-MNGT: 7
    • O.OBJ-DELETION: 4
    • O.DELETION: 5
    • O.LOAD: 10
    • O.INSTALL: 8
    • O.SCP: 32
    • O.CARD-MANAGEMENT: 2
    • O.PIN_MNGT: 1
    • O.KEY_MNGT: 1
    • O.CARD_MANAGEMENT: 17
    • O.PIN-: 1
    • O.RND: 3
    • O.TDES: 1
    • O.AES: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 66
    • O.CODE_PCKG: 16
    • O.OBJ_DELETION: 3
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.SID: 8
    • T.EXE-CODE: 8
    • T.NATIVE: 4
    • T.RESOURCES: 3
    • T.DELETION: 3
    • T.INSTALL: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
  • A:
    • A.APPLET: 5
    • A.DELETION: 4
    • A.VERIFICATION: 4
  • R:
    • R.JAVA: 10
  • OT:
    • OT.X: 1
  • OP:
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_AASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
  • OE:
    • OE.APPLET: 4
    • OE.VERIFICATION: 25
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.CARD-MANAGEMENT: 1
  • OSP:
    • OSP.VERIFICATION: 4
    • OSP.RNG: 1
    • OSP.RND: 3
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0099-2017: 1
  • BSI-CC-PP- 0068-V2-2011-MA-01: 1
  • BSI-PP- 0055-2009: 1
  • BSI-PP-0035: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP-0055: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 7
    • ADV_TDS.1: 2
    • ADV_TDS.4: 7
    • ADV_IMP.1: 7
    • ADV_TDS.3: 4
    • ADV_INT.2: 1
    • ADV_FSP.5: 4
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_PRE: 2
    • AGD_OPE: 2
    • AGD_OPE.1: 7
    • AGD_PRE.1: 6
  • ALC:
    • ALC_DVS.2: 7
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_CMC.4: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 3
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_FUN.1: 6
    • ATE_COV.1: 2
    • ATE_IND.2: 1
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
  • AVA:
    • AVA_VAN.5: 7
  • ADV:
    • ADV_ARC.1: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 7
  • ADV_TDS.1: 2
  • ADV_TDS.4: 7
  • ADV_IMP.1: 7
  • ADV_TDS.3: 4
  • ADV_INT.2: 1
  • ADV_FSP.5: 4
  • ADV_FSP.1: 1
  • ADV_FSP.2: 2
  • ADV_FSP.4: 2
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_TDS: 1
  • ADV_ARC.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 7 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 7
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_DEL.1: 1
  • ALC_DVS.2: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 7 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 7 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 5+: 1
  • EAL6: 1
  • EAL6+: 1
  • EAL5+: 1
  • EAL5: 6
  • EAL 6+: 1
  • EAL6 augmented: 1
  • EAL5 augmented: 2
  • EAL5: 2
  • EAL 5+: 1
  • EAL5 augmented: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 6 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 16
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RNG: 18
    • FCS_CKM: 46
    • FCS_COP: 35
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1: 27
    • FCS_CKM.1.1: 3
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 24
    • FCS_COP.1.1: 5
  • FDP:
    • FDP_ACF: 30
    • FDP_ACC: 35
    • FDP_ACC.2: 6
    • FDP_ACF.1: 16
    • FDP_IFC: 20
    • FDP_IFC.1: 12
    • FDP_IFF: 13
    • FDP_IFF.1: 17
    • FDP_RIP: 98
    • FDP_RIP.1: 11
    • FDP_ROL.1: 5
    • FDP_ROL: 14
    • FDP_SDI: 6
    • FDP_SDI.2: 3
    • FDP_ITC: 10
    • FDP_ITC.2: 15
    • FDP_IFC.2: 2
    • FDP_UIT: 5
    • FDP_UIT.1: 2
    • FDP_ACC.1: 14
    • FDP_ITC.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL: 21
    • FIA_ATD: 7
    • FIA_ATD.1: 2
    • FIA_UID: 33
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
    • FIA_UAU: 50
    • FIA_UAU.1: 6
    • FIA_UID.1: 18
    • FIA_UAU.4: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
  • FMT:
    • FMT_LIM: 18
    • FMT_LIM.1: 15
    • FMT_LIM.2: 14
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MSA: 73
    • FMT_MSA.1: 11
    • FMT_MSA.2: 2
    • FMT_MSA.3: 17
    • FMT_SMR: 62
    • FMT_SMR.1: 29
    • FMT_SMF: 50
    • FMT_SMF.1: 19
    • FMT_MTD: 31
    • FMT_MTD.1: 9
    • FMT_MTD.3: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
    • FPR_UNO: 5
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 7
    • FPT_EMS.1: 12
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 34
    • FPT_FLS.1: 14
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 7
    • FPT_FLS.1.1: 2
    • FPT_TST.1: 13
    • FPT_PHP: 5
    • FPT_PHP.3: 12
    • FPT_RCV.4: 2
    • FPT_ITT: 5
    • FPT_ITT.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FAU:
    • FAU_SAS: 8
    • FAU_GEN: 1
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 8
    • FCS_CKM.1: 8
    • FCS_COP.1: 5
    • FCS_RND.1: 8
    • FCS_CKM: 23
    • FCS_COP: 24
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.4: 16
    • FCS_CKM.1.1: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_ACF: 7
    • FDP_RIP: 2
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_ACC: 5
    • FDP_ACF.1: 1
    • FDP_ACC.1.1: 1
    • FDP_ACC.1: 3
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1.1: 1
    • FDP_UCT: 2
    • FDP_IFC.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_API: 7
    • FIA_AFL: 12
    • FIA_SOS.2: 1
    • FIA_API.1: 4
    • FIA_API.1.1: 1
    • FIA_UAU: 25
    • FIA_UID: 11
    • FIA_UAU.4: 1
    • FIA_UAU.1: 2
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.1: 3
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 15
    • FMT_LIM.2: 14
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 3
    • FMT_SMR: 10
    • FMT_MTD: 15
    • FMT_MSA.3: 2
    • FMT_MSA.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MTD.1.1: 4
    • FMT_MTD.1: 1
  • FPT:
    • FPT_EMS: 6
    • FPT_TST: 3
    • FPT_EMS.1: 6
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 2
    • FPT_TST.1: 3
    • FPT_PHP.3: 4
    • FPT_FLS: 1
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_ARP.1: 16
  • FAU_ARP.1.1: 1
  • FAU_SAA.1: 2
  • FAU_SAS: 8
  • FAU_GEN: 1
  • FAU_SAS.1: 5
  • FAU_SAS.1.1: 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 18
  • FCS_CKM: 46
  • FCS_COP: 35
  • FCS_RNG.1: 8
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1: 27
  • FCS_CKM.1.1: 3
  • FCS_CKM.4: 21
  • FCS_CKM.4.1: 2
  • FCS_COP.1: 24
  • FCS_COP.1.1: 5
  • FCS_RND: 8
  • FCS_CKM.1: 8
  • FCS_COP.1: 5
  • FCS_RND.1: 8
  • FCS_CKM: 23
  • FCS_COP: 24
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 3
  • FCS_CKM.4: 16
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 46 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 27 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 3 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 21 16
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 35 24
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 24 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 5 4
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF: 30
  • FDP_ACC: 35
  • FDP_ACC.2: 6
  • FDP_ACF.1: 16
  • FDP_IFC: 20
  • FDP_IFC.1: 12
  • FDP_IFF: 13
  • FDP_IFF.1: 17
  • FDP_RIP: 98
  • FDP_RIP.1: 11
  • FDP_ROL.1: 5
  • FDP_ROL: 14
  • FDP_SDI: 6
  • FDP_SDI.2: 3
  • FDP_ITC: 10
  • FDP_ITC.2: 15
  • FDP_IFC.2: 2
  • FDP_UIT: 5
  • FDP_UIT.1: 2
  • FDP_ACC.1: 14
  • FDP_ITC.1: 10
  • FDP_RIP.1.1: 1
  • FDP_ACF: 7
  • FDP_RIP: 2
  • FDP_ITC.1: 5
  • FDP_ITC.2: 5
  • FDP_ACC: 5
  • FDP_ACF.1: 1
  • FDP_ACC.1.1: 1
  • FDP_ACC.1: 3
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1.1: 1
  • FDP_UCT: 2
  • FDP_IFC.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT: 2
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 35 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 14 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 30 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 16 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 12 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 15 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 98 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 11 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 5 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL: 21
  • FIA_ATD: 7
  • FIA_ATD.1: 2
  • FIA_UID: 33
  • FIA_UID.2: 1
  • FIA_USB: 6
  • FIA_USB.1: 3
  • FIA_UAU: 50
  • FIA_UAU.1: 6
  • FIA_UID.1: 18
  • FIA_UAU.4: 1
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6.1: 1
  • FIA_API: 7
  • FIA_AFL: 12
  • FIA_SOS.2: 1
  • FIA_API.1: 4
  • FIA_API.1.1: 1
  • FIA_UAU: 25
  • FIA_UID: 11
  • FIA_UAU.4: 1
  • FIA_UAU.1: 2
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID.1: 3
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 21 12
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 50 25
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 6 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 33 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 18 3
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 18
  • FMT_LIM.1: 15
  • FMT_LIM.2: 14
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MSA: 73
  • FMT_MSA.1: 11
  • FMT_MSA.2: 2
  • FMT_MSA.3: 17
  • FMT_SMR: 62
  • FMT_SMR.1: 29
  • FMT_SMF: 50
  • FMT_SMF.1: 19
  • FMT_MTD: 31
  • FMT_MTD.1: 9
  • FMT_MTD.3: 1
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_LIM: 6
  • FMT_LIM.1: 15
  • FMT_LIM.2: 14
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 3
  • FMT_SMR: 10
  • FMT_MTD: 15
  • FMT_MSA.3: 2
  • FMT_MSA.1: 1
  • FMT_SMF.1: 13
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MTD.1.1: 4
  • FMT_MTD.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 18 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 3 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 11 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 17 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 31 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 9 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 19 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 62 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 2 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 4
  • FPT_TST: 7
  • FPT_EMS.1: 12
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS: 34
  • FPT_FLS.1: 14
  • FPT_TDC.1: 7
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 12
  • FPT_RCV.3: 7
  • FPT_FLS.1.1: 2
  • FPT_TST.1: 13
  • FPT_PHP: 5
  • FPT_PHP.3: 12
  • FPT_RCV.4: 2
  • FPT_ITT: 5
  • FPT_ITT.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_EMS: 6
  • FPT_TST: 3
  • FPT_EMS.1: 6
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 2
  • FPT_TST.1: 3
  • FPT_PHP.3: 4
  • FPT_FLS: 1
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS 4 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 12 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 34 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 14 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 2 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 12 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 7 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 13 3
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 14 5
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 5 2
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 1
  • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
  • out of scope: 1
  • to the plastic travel document is achieved by physical and organisational security measures being out of scope of the current ST. The TOE comprises: i) the circuitry of the contactless/contact chip incl. all IC: 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 2 3
pdf_data/st_keywords/crypto_protocol/PACE/PACE 162 109
pdf_data/st_keywords/crypto_scheme/KA
  • Key Agreement: 3
  • Key agreement: 2
  • Key Agreement: 7
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 3 7
pdf_data/st_keywords/crypto_scheme/MAC/MAC 16 6
pdf_data/st_keywords/eval_facility/Serma
  • Serma Safety & Security: 1
  • Serma Technologies: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 2
    • SHA-1: 4
  • SHA2:
    • SHA-224: 4
    • SHA224: 3
    • SHA256: 1
    • SHA384: 1
    • SHA512: 1
    • SHA-256: 4
    • SHA-512: 4
    • SHA-384: 2
  • SHA2:
    • SHA-224: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 4
  • SHA224: 3
  • SHA256: 1
  • SHA384: 1
  • SHA512: 1
  • SHA-256: 4
  • SHA-512: 4
  • SHA-384: 2
  • SHA-224: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 4 1
pdf_data/st_keywords/ic_data_group/EF
  • EF.DG1: 6
  • EF.DG16: 6
  • EF.DG1: 7
  • EF.DG2: 5
  • EF.DG16: 5
  • EF.DG15: 2
  • EF.DG5: 1
  • EF.DG3: 1
  • EF.DG4: 1
  • EF.DG6: 2
  • EF.COM: 3
  • EF.SOD: 4
pdf_data/st_keywords/ic_data_group/EF/EF.DG1 6 7
pdf_data/st_keywords/ic_data_group/EF/EF.DG16 6 5
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.security: 3
    • javacard.framework: 3
  • javacardx:
    • javacardx.biometry: 1
    • javacardx.crypto: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.5: 5
pdf_data/st_keywords/randomness/RNG
  • RNG: 32
  • RND: 6
  • RNG: 2
pdf_data/st_keywords/randomness/RNG/RNG 32 2
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 5
    • physical probing: 6
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 1
    • Physical Tampering: 3
    • malfunction: 8
    • Malfunction: 9
    • fault induction: 2
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 3
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 2
    • Physical tampering: 2
    • Malfunction: 3
    • malfunction: 4
    • fault injection: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • Physical Tampering: 3
  • malfunction: 8
  • Malfunction: 9
  • fault induction: 2
  • Physical Tampering: 2
  • Physical tampering: 2
  • Malfunction: 3
  • malfunction: 4
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 9 3
pdf_data/st_keywords/side_channel_analysis/FI/Physical Tampering 3 2
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 8 4
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 5 1
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 6 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 5
    • FIPS 140-2: 3
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS#5: 5
  • BSI:
    • AIS31: 4
    • AIS 31: 1
  • ISO:
    • ISO/IEC 7816-2: 1
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP01: 6
    • SCP02: 6
    • SCP03: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
    • FIPS 186-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 3
  • RFC:
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 13
  • SCP:
    • SCP03: 2
    • SCP01: 1
    • SCP02: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS197: 5
  • FIPS 140-2: 3
  • FIPS 46-3: 1
  • FIPS 197: 1
  • FIPS180-2: 1
  • FIPS46-3: 1
  • FIPS PUB 46-3: 1
  • FIPS 186-3: 1
  • FIPS 197: 1
pdf_data/st_keywords/standard_id/ICAO/ICAO 1 13
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816-2: 1
  • ISO/IEC 14443: 4
  • ISO/IEC 7816-4: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 8
  • PKCS#5: 5
  • PKCS#3: 3
pdf_data/st_keywords/standard_id/SCP/SCP01 6 1
pdf_data/st_keywords/standard_id/SCP/SCP02 6 1
pdf_data/st_keywords/standard_id/SCP/SCP03 5 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 28 8
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDEA: 1
  • 3DES: 2
  • TDES: 15
  • Triple-DES: 3
  • 3DES: 2
  • TDES: 5
  • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 15 5
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 20 1
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 2
  • KMAC: 2
  • CMAC: 2
  • CMAC: 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 15
    • Infineon Technologies AG: 2
  • Gemalto:
    • Gemalto: 30
  • Thales:
    • Thales: 1
  • Microsoft:
    • Microsoft: 1
  • Gemalto:
    • Gemalto: 412
pdf_data/st_keywords/vendor/Gemalto/Gemalto 30 412
pdf_data/st_metadata
  • pdf_file_size_bytes: 2496334
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 157
  • /Title: MultiApp V4.2: JCS Security Target
  • /Author: D1487827
  • /Subject: 1.18
  • /Keywords: 04-05-2021
  • /Creator: Microsoft® Word 2013
  • /CreationDate: D:20210505092700+02'00'
  • /ModDate: D:20210505092700+02'00'
  • /Producer: Microsoft® Word 2013
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 489065
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
  • /CreationDate: D:20141006142952+02'00'
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate: D:20141006152908+02'00'
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20210505092700+02'00' D:20141006142952+02'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 PDFCreator Version 1.2.1
pdf_data/st_metadata//Keywords 04-05-2021
pdf_data/st_metadata//ModDate D:20210505092700+02'00' D:20141006152908+02'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 GPL Ghostscript 9.02
pdf_data/st_metadata//Subject 1.18
pdf_data/st_metadata//Title MultiApp V4.2: JCS Security Target
pdf_data/st_metadata/pdf_file_size_bytes 2496334 489065
pdf_data/st_metadata/pdf_number_of_pages 157 65
dgst 1412d1d9e0d553c1 31ed17eea08c53b0