Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3)
ANSSI-CC-2020/65v2
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
ANSSI-CC-2016/24
name Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h (Version 4.2.0, Java Card version 3.0.5, GP version 2.3) Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
not_valid_before 2021-09-28 2016-05-23
not_valid_after 2025-06-26 2021-05-23
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible-anssi-cc-2020-65v2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf
status active archived
manufacturer THALES DIS FRANCE SA Gemalto
manufacturer_web https://www.thalesgroup.com/en/europe/france https://www.gemalto.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_65v2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2020-65v2.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 4cd0982b954a019eb3c343c539948aa268bca50a5e1b79de557393146da50220 None
state/cert/txt_hash 0a56c1990efb616ab129cad19db0ced8506235cb7e0511dfe8713d97d01153c0 None
state/report/pdf_hash 8dd4c4edd973a7e452c641db48c8eb33354f85e05844f701c90561e1c43a694d 30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d
state/report/txt_hash 7483bc89235d6fc41cffa0952905a7fa4ea415e2556190e4f0b0c48e132685ed 1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7
state/st/pdf_hash 9ec9bc244cd2cdfa133da188f67f6302f7086acec87b2c453d19e5b906713150 7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d
state/st/txt_hash fe1f6fa6f2e466702df203929aa00510b8e554f774195f4ef29eddf064801fdb 3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07
heuristics/cert_id ANSSI-CC-2020/65v2 ANSSI-CC-2016/24
heuristics/cert_lab None SERMA
heuristics/extracted_versions 3.0.5, 4.2.0, 2.3, 4.2 1.0
heuristics/report_references/directly_referencing ANSSI-CC-2020/65 ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015
heuristics/report_references/indirectly_referencing ANSSI-CC-2020/65 BSI-DSZ-CC-0814-2012, ANSSI-CC-2016/06, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-2015, BSI-DSZ-CC-0907-2013
heuristics/scheme_data None
  • product: Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
  • url: https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0
  • description: Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr
  • sponsor: Gemalto
  • developer: Gemalto / Infineon
  • cert_id: 2016/24
  • level: EAL5+
  • enhanced:
    • cert_id: 2016/24
    • certification_date: 23/05/2016
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r4
    • developer: Gemalto / Infineon
    • sponsor: Gemalto
    • evaluation_facility: Serma Safety & Security
    • level: EAL5+
    • protection_profile: PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • report_link: https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
heuristics/st_references/directly_referencing BSI-DSZ-CC-1079-2018 BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-1079-2018 BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014
pdf_data/cert_filename certificat-anssi-cc-2020-65v2.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2020/65v2: 2
  • cc_protection_profile_id:
    • BSI:
      • BSI-PP-0099-2: 1
  • cc_security_level:
    • EAL:
      • EAL5: 1
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • Serma:
      • SERMA: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 280367
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20211004103608+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211004103608+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
None
pdf_data/report_filename anssi-cc-2020_65v2.pdf ANSSI-CC-2016-24.pdf
pdf_data/report_frontpage/FR
  • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
  • cert_id: ANSSI-CC-2016/24
  • cert_item: Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
  • cert_item_version: Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0
  • ref_protection_profiles: PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application
  • cc_version: Critères Communs version 3.1 révision 4
  • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
  • developer: Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
  • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-1079-2018-MA-01: 1
  • BSI-DSZ-CC-0964-2015: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2020/65v2: 2
  • ANSSI-CC-2020/65: 3
  • ANSSI-CC-2016/24: 19
  • ANSSI-CC-2016/06: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-2017: 1
    • BSI-PP-0099-2017: 1
    • BSI-PP-0084-2014: 1
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 2
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-PP-0035-2007: 1
  • other:
    • PP-SSCD part: 10
    • PP-SSCD-: 5
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0099-2017: 1
  • BSI-PP-0099-2017: 1
  • BSI-PP-0084-2014: 1
  • BSI-CC-PP- 0059-2009-MA-01: 2
  • BSI-CC-PP- 0075-2012: 1
  • BSI-CC-PP- 0071-2012: 1
  • BSI-CC-PP- 0072-2012: 1
  • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 2 1
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 2 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 2
pdf_data/report_keywords/eval_facility
  • Serma:
    • SERMA: 1
  • CESTI:
    • CESTI: 1
  • Serma:
    • Serma Safety & Security: 1
    • SERMA: 1
pdf_data/report_keywords/eval_facility/Serma
  • SERMA: 1
  • Serma Safety & Security: 1
  • SERMA: 1
pdf_data/report_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.io: 1
  • javacard:
    • javacard.framework: 1
    • javacard.filesystem: 1
    • javacard.util: 1
    • javacard.open: 1
    • javacard.internal: 1
    • javacard.ism: 1
    • javacard.securemessaging: 1
    • javacard.securemessaging.builde: 1
    • javacard.securemessaging.intern: 1
    • javacard.security: 1
    • javacard.tlv: 1
    • javacard.iasclassic: 1
    • javacard.icao: 1
    • javacard.mspnp: 1
    • javacard.conformance: 1
    • javacard.gpimage: 1
  • javacardx:
    • javacardx.apdu: 1
    • javacardx.crypto: 2
    • javacardx.gap: 1
    • javacardx.gapplet: 1
    • javacardx.biometry: 2
    • javacardx.crypto.asymmetric.ecc: 1
    • javacardx.crypto.asymmetric.rsa: 1
    • javacardx.apdu.util: 1
    • javacardx.biometry.biocfg: 1
    • javacardx.gdp: 1
  • org:
    • org.globalplatform: 1
  • com:
    • com.gemalto.javacard.filesystem: 1
    • com.gemalto.javacard.util: 1
    • com.gemalto.javacardx.crypto: 1
    • com.gemalto.javacard.open: 1
    • com.gemalto.javacardx.gapplet: 1
    • com.gemalto.javacard.ism: 1
    • com.gemalto.javacard.securemessaging.builde: 1
    • com.gemalto.javacard.securemessaging.intern: 1
    • com.gemalto.javacard.security: 1
    • com.gemalto.javacardx: 1
    • com.gemalto.javacardx.biometry: 1
    • com.gemalto.javacardx.crypto.asymmetric.rsa: 1
    • com.gemalto.javacard.iasclassic: 1
    • com.gemalto.moc.server: 1
    • com.gemalto.javacard.mspnp: 1
    • com.gemalto.javacardx.biometry.biocfg: 1
    • com.gemalto.emvapi: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RND: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS31: 1
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Gemalto:
    • Gemalto: 5
  • Microsoft:
    • Microsoft: 1
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 1
  • Gemalto:
    • Gemalto: 3
pdf_data/report_keywords/vendor/Gemalto/Gemalto 5 3
pdf_data/report_keywords/vendor/Infineon
  • Infineon Technologies AG: 1
  • Infineon: 2
  • Infineon Technologies: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 349522
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author:
  • /CreationDate: D:20211004103519+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211004103519+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 276790
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Producer: GPL Ghostscript 9.02
  • /CreationDate:
  • /ModDate:
  • /Title: ANSSI-CC-2016-24
  • /Creator: PDFCreator Version 1.2.1
  • /Author:
  • /Keywords:
  • /Subject:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20211004103519+02'00'
pdf_data/report_metadata//Creator PScript5.dll Version 5.2.2 PDFCreator Version 1.2.1
pdf_data/report_metadata//ModDate D:20211004103519+02'00'
pdf_data/report_metadata//Producer Acrobat Distiller 11.0 (Windows) GPL Ghostscript 9.02
pdf_data/report_metadata//Title ANSSI-CC-2016-24
pdf_data/report_metadata/pdf_file_size_bytes 349522 276790
pdf_data/report_metadata/pdf_number_of_pages 21 18
pdf_data/st_filename cible-anssi-cc-2020-65v2.pdf cible_2016-24.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 3
    • ECC:
      • ECC: 10
  • FF:
    • DH:
      • Diffie-Hellman: 4
      • DH: 8
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 8 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 4 2
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-1079-2018: 1
  • BSI-DSZ-CC-1079-2018-MA-01: 1
  • BSI-DSZ-CC-0926-2014: 1
  • BSI-DSZ-CC-0917-2014: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.PIN: 4
    • D.BIO: 1
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 13
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.NATIVE: 11
    • O.OPERATE: 15
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.ALARM: 15
    • O.CIPHER: 11
    • O.RNG: 9
    • O.KEY-MNGT: 7
    • O.PIN-MNGT: 6
    • O.TRANSACTION: 7
    • O.BIO-MNGT: 7
    • O.OBJ-DELETION: 4
    • O.DELETION: 5
    • O.LOAD: 10
    • O.INSTALL: 8
    • O.SCP: 32
    • O.CARD-MANAGEMENT: 2
    • O.PIN_MNGT: 1
    • O.KEY_MNGT: 1
    • O.CARD_MANAGEMENT: 17
    • O.PIN-: 1
    • O.RND: 3
    • O.TDES: 1
    • O.AES: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 66
    • O.CODE_PCKG: 16
    • O.OBJ_DELETION: 3
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.SID: 8
    • T.EXE-CODE: 8
    • T.NATIVE: 4
    • T.RESOURCES: 3
    • T.DELETION: 3
    • T.INSTALL: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
  • A:
    • A.APPLET: 5
    • A.DELETION: 4
    • A.VERIFICATION: 4
  • R:
    • R.JAVA: 10
  • OT:
    • OT.X: 1
  • OP:
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_AASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
  • OE:
    • OE.APPLET: 4
    • OE.VERIFICATION: 25
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.CARD-MANAGEMENT: 1
  • OSP:
    • OSP.VERIFICATION: 4
    • OSP.RNG: 1
    • OSP.RND: 3
  • A:
    • A.CGA: 4
    • A.SCA: 4
    • A.CSP: 5
  • OE:
    • OE.HI_VAD: 2
    • OE.HID_VAD: 2
pdf_data/st_keywords/cc_claims/A
  • A.APPLET: 5
  • A.DELETION: 4
  • A.VERIFICATION: 4
  • A.CGA: 4
  • A.SCA: 4
  • A.CSP: 5
pdf_data/st_keywords/cc_claims/OE
  • OE.APPLET: 4
  • OE.VERIFICATION: 25
  • OE.CODE-EVIDENCE: 10
  • OE.CODE_EVIDENCE: 1
  • OE.CARD-MANAGEMENT: 1
  • OE.HI_VAD: 2
  • OE.HID_VAD: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-2017: 1
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-PP- 0055-2009: 1
  • BSI:
    • BSI-PP-0035: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0076-2013: 1
  • other:
    • PP-SSCD-KG: 36
    • PP-SSCD-KI: 28
    • PP-SSCD: 4
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0099-2017: 1
  • BSI-CC-PP- 0068-V2-2011-MA-01: 1
  • BSI-PP- 0055-2009: 1
  • BSI-PP-0035: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0071-2012: 1
  • BSI-CC-PP-0072-2012: 1
  • BSI-CC-PP-0076-2013: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 7
    • ADV_TDS.1: 2
    • ADV_TDS.4: 7
    • ADV_IMP.1: 7
    • ADV_TDS.3: 4
    • ADV_INT.2: 1
    • ADV_FSP.5: 4
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_PRE: 2
    • AGD_OPE: 2
    • AGD_OPE.1: 7
    • AGD_PRE.1: 6
  • ALC:
    • ALC_DVS.2: 7
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_CMC.4: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 3
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_FUN.1: 6
    • ATE_COV.1: 2
    • ATE_IND.2: 1
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
  • AVA:
    • AVA_VAN.5: 7
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 7
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_DEL.1: 1
  • ALC_DVS.2: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 7 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 7 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 5+: 1
  • EAL6: 1
  • EAL6+: 1
  • EAL5+: 1
  • EAL5: 6
  • EAL 6+: 1
  • EAL6 augmented: 1
  • EAL5 augmented: 2
  • EAL 5+: 1
  • EAL5: 2
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 6 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 2 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 16
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RNG: 18
    • FCS_CKM: 46
    • FCS_COP: 35
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1: 27
    • FCS_CKM.1.1: 3
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 24
    • FCS_COP.1.1: 5
  • FDP:
    • FDP_ACF: 30
    • FDP_ACC: 35
    • FDP_ACC.2: 6
    • FDP_ACF.1: 16
    • FDP_IFC: 20
    • FDP_IFC.1: 12
    • FDP_IFF: 13
    • FDP_IFF.1: 17
    • FDP_RIP: 98
    • FDP_RIP.1: 11
    • FDP_ROL.1: 5
    • FDP_ROL: 14
    • FDP_SDI: 6
    • FDP_SDI.2: 3
    • FDP_ITC: 10
    • FDP_ITC.2: 15
    • FDP_IFC.2: 2
    • FDP_UIT: 5
    • FDP_UIT.1: 2
    • FDP_ACC.1: 14
    • FDP_ITC.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL: 21
    • FIA_ATD: 7
    • FIA_ATD.1: 2
    • FIA_UID: 33
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
    • FIA_UAU: 50
    • FIA_UAU.1: 6
    • FIA_UID.1: 18
    • FIA_UAU.4: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
  • FMT:
    • FMT_LIM: 18
    • FMT_LIM.1: 15
    • FMT_LIM.2: 14
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MSA: 73
    • FMT_MSA.1: 11
    • FMT_MSA.2: 2
    • FMT_MSA.3: 17
    • FMT_SMR: 62
    • FMT_SMR.1: 29
    • FMT_SMF: 50
    • FMT_SMF.1: 19
    • FMT_MTD: 31
    • FMT_MTD.1: 9
    • FMT_MTD.3: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
    • FPR_UNO: 5
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 7
    • FPT_EMS.1: 12
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 34
    • FPT_FLS.1: 14
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 7
    • FPT_FLS.1.1: 2
    • FPT_TST.1: 13
    • FPT_PHP: 5
    • FPT_PHP.3: 12
    • FPT_RCV.4: 2
    • FPT_ITT: 5
    • FPT_ITT.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.4: 8
    • FCS_COP: 8
    • FCS_CKM.2: 2
    • FCS_COP.1: 2
    • FCS_CKM.1.1: 2
    • FCS_CKM.1: 5
    • FCS_CKM.4.1: 2
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_DAU: 4
    • FDP_UIT: 3
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_ACC: 4
    • FDP_ACF.1: 6
    • FDP_ACC.1.1: 4
    • FDP_ACF: 4
    • FDP_ACC.1: 14
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_ITC: 2
    • FDP_IFC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_SDI: 4
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_UCT: 2
    • FDP_RIP: 1
  • FIA:
    • FIA_API: 5
    • FIA_AFL: 6
    • FIA_API.1: 8
    • FIA_API.1.1: 2
    • FIA_UAU.1: 4
    • FIA_UID.1: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 5
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 4
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MSA.3: 5
    • FMT_MOF.1: 2
    • FMT_SMR.1: 11
    • FMT_SMF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 2
    • FMT_MSA.1: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4.1: 2
    • FMT_MTD: 4
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_TST.1: 3
    • FPT_FLS.1: 2
    • FPT_FLS.1.1: 1
    • FPT_TST: 2
    • FPT_PHP.1: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 13
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 18
  • FCS_CKM: 46
  • FCS_COP: 35
  • FCS_RNG.1: 8
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1: 27
  • FCS_CKM.1.1: 3
  • FCS_CKM.4: 21
  • FCS_CKM.4.1: 2
  • FCS_COP.1: 24
  • FCS_COP.1.1: 5
  • FCS_CKM: 14
  • FCS_CKM.4: 8
  • FCS_COP: 8
  • FCS_CKM.2: 2
  • FCS_COP.1: 2
  • FCS_CKM.1.1: 2
  • FCS_CKM.1: 5
  • FCS_CKM.4.1: 2
  • FCS_COP.1.1: 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 46 14
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 27 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 3 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 21 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 35 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 24 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 5 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF: 30
  • FDP_ACC: 35
  • FDP_ACC.2: 6
  • FDP_ACF.1: 16
  • FDP_IFC: 20
  • FDP_IFC.1: 12
  • FDP_IFF: 13
  • FDP_IFF.1: 17
  • FDP_RIP: 98
  • FDP_RIP.1: 11
  • FDP_ROL.1: 5
  • FDP_ROL: 14
  • FDP_SDI: 6
  • FDP_SDI.2: 3
  • FDP_ITC: 10
  • FDP_ITC.2: 15
  • FDP_IFC.2: 2
  • FDP_UIT: 5
  • FDP_UIT.1: 2
  • FDP_ACC.1: 14
  • FDP_ITC.1: 10
  • FDP_RIP.1.1: 1
  • FDP_DAU: 4
  • FDP_UIT: 3
  • FDP_ITC.1: 4
  • FDP_ITC.2: 4
  • FDP_ACC: 4
  • FDP_ACF.1: 6
  • FDP_ACC.1.1: 4
  • FDP_ACF: 4
  • FDP_ACC.1: 14
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_DAU.1: 1
  • FDP_DAU.2.1: 1
  • FDP_DAU.2.2: 1
  • FDP_ITC: 2
  • FDP_IFC.1: 9
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_RIP.1: 1
  • FDP_RIP.1.1: 1
  • FDP_SDI: 4
  • FDP_SDI.1: 2
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_UCT.1: 1
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_UCT: 2
  • FDP_RIP: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 35 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 30 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 16 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 12 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 10 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 15 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 98 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 11 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI 6 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 5 3
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL: 21
  • FIA_ATD: 7
  • FIA_ATD.1: 2
  • FIA_UID: 33
  • FIA_UID.2: 1
  • FIA_USB: 6
  • FIA_USB.1: 3
  • FIA_UAU: 50
  • FIA_UAU.1: 6
  • FIA_UID.1: 18
  • FIA_UAU.4: 1
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6.1: 1
  • FIA_API: 5
  • FIA_AFL: 6
  • FIA_API.1: 8
  • FIA_API.1.1: 2
  • FIA_UAU.1: 4
  • FIA_UID.1: 6
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UAU: 5
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UID: 4
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 21 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 50 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 6 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 33 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 18 6
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 18
  • FMT_LIM.1: 15
  • FMT_LIM.2: 14
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MSA: 73
  • FMT_MSA.1: 11
  • FMT_MSA.2: 2
  • FMT_MSA.3: 17
  • FMT_SMR: 62
  • FMT_SMR.1: 29
  • FMT_SMF: 50
  • FMT_SMF.1: 19
  • FMT_MTD: 31
  • FMT_MTD.1: 9
  • FMT_MTD.3: 1
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_MSA.3: 5
  • FMT_MOF.1: 2
  • FMT_SMR.1: 11
  • FMT_SMF.1: 8
  • FMT_MOF.1.1: 1
  • FMT_MSA: 14
  • FMT_MSA.1.1: 3
  • FMT_MSA.2: 2
  • FMT_MSA.1: 3
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.4.1: 2
  • FMT_MTD: 4
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 73 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 11 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 17 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 31 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 19 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 29 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 2 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 4
  • FPT_TST: 7
  • FPT_EMS.1: 12
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS: 34
  • FPT_FLS.1: 14
  • FPT_TDC.1: 7
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 12
  • FPT_RCV.3: 7
  • FPT_FLS.1.1: 2
  • FPT_TST.1: 13
  • FPT_PHP: 5
  • FPT_PHP.3: 12
  • FPT_RCV.4: 2
  • FPT_ITT: 5
  • FPT_ITT.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_EMS: 5
  • FPT_EMS.1: 7
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_TST.1: 3
  • FPT_FLS.1: 2
  • FPT_FLS.1.1: 1
  • FPT_TST: 2
  • FPT_PHP.1: 2
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 2
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS 4 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 12 7
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 14 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 2 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 12 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 7 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 13 3
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 14 13
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 5 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 1 4
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 1 4
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 1 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 162
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 16
  • KA:
    • Key Agreement: 3
    • Key agreement: 2
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_scheme/MAC/MAC 16 2
pdf_data/st_keywords/eval_facility/Serma
  • Serma Safety & Security: 1
  • Serma Technologies: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 2
    • SHA-1: 4
  • SHA2:
    • SHA-224: 4
    • SHA224: 3
    • SHA256: 1
    • SHA384: 1
    • SHA512: 1
    • SHA-256: 4
    • SHA-512: 4
    • SHA-384: 2
  • SHA2:
    • SHA-224: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 4
  • SHA224: 3
  • SHA256: 1
  • SHA384: 1
  • SHA512: 1
  • SHA-256: 4
  • SHA-512: 4
  • SHA-384: 2
  • SHA-224: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 4 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.security: 3
    • javacard.framework: 3
  • javacardx:
    • javacardx.biometry: 1
    • javacardx.crypto: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.5: 5
pdf_data/st_keywords/randomness/RNG/RND 6 1
pdf_data/st_keywords/randomness/RNG/RNG 32 2
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • Physical Tampering: 3
  • malfunction: 8
  • Malfunction: 9
  • fault induction: 2
  • physical tampering: 4
  • Malfunction: 1
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 9 1
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 1 4
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 5
  • physical probing: 6
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
  • Leak-Inherent: 1
  • SPA: 1
  • DPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 2 1
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 5 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 5
    • FIPS 140-2: 3
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS#5: 5
  • BSI:
    • AIS31: 4
    • AIS 31: 1
  • ISO:
    • ISO/IEC 7816-2: 1
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP01: 6
    • SCP02: 6
    • SCP03: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#3: 2
    • PKCS#1: 2
  • SCP:
    • SCP03: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS197: 5
  • FIPS 140-2: 3
  • FIPS 46-3: 1
  • FIPS 197: 1
  • FIPS180-2: 1
  • FIPS46-3: 1
  • FIPS PUB 46-3: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 8
  • PKCS#5: 5
  • PKCS#3: 2
  • PKCS#1: 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 8 2
pdf_data/st_keywords/standard_id/SCP
  • SCP01: 6
  • SCP02: 6
  • SCP03: 5
  • SCP03: 1
pdf_data/st_keywords/standard_id/SCP/SCP03 5 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 28
  • DES:
    • DES:
      • DES: 20
    • 3DES:
      • TDEA: 1
      • 3DES: 2
      • TDES: 15
      • Triple-DES: 3
  • constructions:
    • MAC:
      • HMAC: 2
      • KMAC: 2
      • CMAC: 2
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • TDES: 4
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 28 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDEA: 1
  • 3DES: 2
  • TDES: 15
  • Triple-DES: 3
  • TDES: 4
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 15 4
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 20 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 15
    • Infineon Technologies AG: 2
  • Gemalto:
    • Gemalto: 30
  • Thales:
    • Thales: 1
  • Microsoft:
    • Microsoft: 1
  • Infineon:
    • Infineon: 4
  • Gemalto:
    • Gemalto: 339
pdf_data/st_keywords/vendor/Gemalto/Gemalto 30 339
pdf_data/st_keywords/vendor/Infineon
  • Infineon: 15
  • Infineon Technologies AG: 2
  • Infineon: 4
pdf_data/st_keywords/vendor/Infineon/Infineon 15 4
pdf_data/st_metadata//Author D1487827 Antoine de Lavernette
pdf_data/st_metadata//CreationDate D:20210505092700+02'00' D:20160504105208+02'00'
pdf_data/st_metadata//Keywords 04-05-2021 Security Target, CC, eTravel
pdf_data/st_metadata//ModDate D:20210505092700+02'00' D:20160504105208+02'00'
pdf_data/st_metadata//Subject 1.18 MRTD
pdf_data/st_metadata//Title MultiApp V4.2: JCS Security Target eTravel v1.0 Security Target MAÏA3
pdf_data/st_metadata/pdf_file_size_bytes 2496334 1225698
pdf_data/st_metadata/pdf_number_of_pages 157 52
dgst 1412d1d9e0d553c1 89df7836e74b174e