Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
ANSSI-CC-2014/11
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH
ANSSI-CC-2018/32
name Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH
not_valid_before 2014-02-27 2018-08-03
not_valid_after 2019-09-01 2021-10-08
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_11en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_32en.pdf
manufacturer Gemalto - Infineon Technologies AG Gemalto / Samsung
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_11fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Operating System Protection Profile, Version 2.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0067b_pdf.pdf', 'pp_ids': frozenset({'OSPP_V2.0'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 23), 'maintenance_title': 'ANSSI-CC-2014/11-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_11-M01.pdf', 'maintenance_st_link': None}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2019, 4, 4), 'maintenance_title': 'Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32-m01fr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32-m01fr.pdf'})
state/report/pdf_hash ac651d3ce62ea160582ef30feed3501cb90963e899fe21ca35c5fd0e1e440e65 8cfa16e5d8bbf8ea4aacb3edadbb96a846af8471d442f8f6cf7345c4e9c9443c
state/report/txt_hash 26039bdbdace7b63953a4b54c7a92f2e4637b89fedfa197257bbdac7c06558c9 7480bc39a402605118f1a7f1cee1b6e80ab5cfb923fe3458602ea4361bf79e61
state/st/pdf_hash 5e77cf4c23609df00dd22b1bc130b05495081c3538dc0125ace0eac30f971814 df9957c41228653aa1c2a6ffb3f5481f65db02f71a78b4f87940aa360a2a996a
state/st/txt_hash 55254d58dccab0380a6cb4a6704b504bc147565fb020943795d052aaef5eac26 815e10c9947598ae786e2c363f479f143caaf4d8168f12b73337a3396e987e0e
heuristics/cert_id ANSSI-CC-2014/11 ANSSI-CC-2018/32
heuristics/extracted_versions 2.0 4.1
heuristics/report_references/directly_referenced_by None ANSSI-CC-2019/07, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2018/57, ANSSI-CC-2018/32v2, ANSSI-CC-2018/56, ANSSI-CC-2018/58
heuristics/report_references/directly_referencing ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/07 ANSSI-CC-2017/24, ANSSI-CC-2017/76
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2018/58v2, ANSSI-CC-2019/07, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2018/57, ANSSI-CC-2018/56v2, ANSSI-CC-2018/32v2, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56, ANSSI-CC-2018/58
heuristics/report_references/indirectly_referencing ANSSI-CC-2014/07, ANSSI-CC-2013/33, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, ANSSI-CC-2013/32 ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2017/07, ANSSI-CC-2017/54, ANSSI-CC-2017/24, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016
heuristics/scheme_data/cert_id 2014/13 2018/32v2
heuristics/scheme_data/description Le produit certifié est la carte à puce ouverte « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civ Le produit certifié est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Java Card version 3.0.4, GP version 2.3 (avec ID configuration version 1.0 et GP Mapping version 1.0) » développé par GEMALTO et par SAMSUNG ELECTRONICS CO.. e produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminolog
heuristics/scheme_data/developer Gemalto / Infineon Technologies AG Gemalto, Samsung Electronics Co.
heuristics/scheme_data/enhanced
  • cert_id: 2014/13
  • certification_date: 27/02/2014
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r4
  • developer: Gemalto / Infineon Technologies AG
  • sponsor: Gemalto
  • evaluation_facility: Serma Technologies
  • level: EAL4+
  • protection_profile: BSI-CC-PP-0055, PP BAC
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2
  • target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-13en.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-13fr.pdf
  • cert_id: 2018/32v2
  • certification_date: 08/10/2021
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: Gemalto, Samsung Electronics Co.
  • sponsor: Gemalto
  • evaluation_facility: Serma Safety & Security
  • level: EAL5+
  • protection_profile: Java Card System Protection Profile - Open Configuration, v.3.0
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • cert_link: https://cyber.gouv.fr/sites/default/files/2021/12/certificat-anssi-cc-2018_32v2.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cible-cc-2018_32v2.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cc-2018_32v2.pdf
heuristics/scheme_data/enhanced/augmented ALC_DVS.2 ALC_DVS.2, AVA_VAN.5
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r4 Critères Communs version 3.1r5
heuristics/scheme_data/enhanced/cert_id 2014/13 2018/32v2
heuristics/scheme_data/enhanced/certification_date 27/02/2014 08/10/2021
heuristics/scheme_data/enhanced/developer Gemalto / Infineon Technologies AG Gemalto, Samsung Electronics Co.
heuristics/scheme_data/enhanced/evaluation_facility Serma Technologies Serma Safety & Security
heuristics/scheme_data/enhanced/level EAL4+ EAL5+
heuristics/scheme_data/enhanced/protection_profile BSI-CC-PP-0055, PP BAC Java Card System Protection Profile - Open Configuration, v.3.0
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-13fr.pdf https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cc-2018_32v2.pdf
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-13en.pdf https://cyber.gouv.fr/sites/default/files/2021/12/anssi-cible-cc-2018_32v2.pdf
heuristics/scheme_data/level EAL4+ EAL5+
heuristics/scheme_data/product Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Release Date 28/09/2018)
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-bac-sur-la-plateforme-ouverte https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur-0
heuristics/st_references/directly_referenced_by None ANSSI-CC-2019/31
heuristics/st_references/directly_referencing BSI-DSZ-CC-0829-2012 ANSSI-CC-2017/24
heuristics/st_references/indirectly_referenced_by None ANSSI-CC-2019/31
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 ANSSI-CC-2017/24
pdf_data/report_filename Rapport ANSSI-CC-2014_11fr.pdf anssi-cc-2018_32fr.pdf
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 4 Critères Communs version 3.1 révision 5
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2014/11 ANSSI-CC-2018/32
pdf_data/report_frontpage/FR/cert_item Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH
pdf_data/report_frontpage/FR/cert_item_version Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5 Java Card version 3.0.4, GP version 2.3 (avec ID configuration version 1.0 et GP Mapping version 1.0
pdf_data/report_frontpage/FR/cert_lab Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
pdf_data/report_frontpage/FR/developer Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics Co. 17 Floor, B-Tower, DSR building, Samsungjeonja-ro 1-1, Hwaseong-si, Gyenonggi-do 445-330 South Korea Commanditaire Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France
pdf_data/report_frontpage/FR/ref_protection_profiles BSI-CC-PP-0056-V2, [PP EAC PACE], version 1.3.1 Machine Readable Travel Document with ICAO Application, Extended Access Control with PACE Java Card System Protection Profile – Open Configuration, version 3.0
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0829-2012: 3
  • FR:
    • ANSSI-CC-2014/11: 23
    • ANSSI-CC-2014/06: 4
    • ANSSI-CC-2014/07: 1
  • FR:
    • ANSSI-CC-2018/32: 22
    • ANSSI-CC-2017/24: 3
    • ANSSI-CC-2017/76: 3
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2014/11: 23
  • ANSSI-CC-2014/06: 4
  • ANSSI-CC-2014/07: 1
  • ANSSI-CC-2018/32: 22
  • ANSSI-CC-2017/24: 3
  • ANSSI-CC-2017/76: 3
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2: 1
    • BSI-PP-0035-2007: 2
    • BSI-CC-PP- 0056-V2-2012-MA-01: 1
    • BSI-PP- 0035-2007: 1
  • BSI:
    • BSI-PP-0084-2014: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0056-V2: 1
  • BSI-PP-0035-2007: 2
  • BSI-CC-PP- 0056-V2-2012-MA-01: 1
  • BSI-PP- 0035-2007: 1
  • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 1 4
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 3 2
pdf_data/report_keywords/cc_sar/ASE
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 6 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL4: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL2: 2
  • EAL6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 3
  • CESTI:
    • CESTI: 1
  • Serma:
    • Serma Safety & Security: 1
    • SERMA: 2
pdf_data/report_keywords/eval_facility/Serma
  • Serma Technologies: 3
  • Serma Safety & Security: 1
  • SERMA: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/javacard_packages
  • javacard:
    • javacard.eid: 1
    • javacard.esign: 1
    • javacard.mspnp: 1
    • javacard.iasclassic: 1
  • com:
    • com.gemalto.puredi: 1
    • com.gemalto.javacard.eid: 1
    • com.gemalto.mchipadv: 1
    • com.gemalto.mpcos: 1
    • com.gemalto.javacard.esign: 1
    • com.gemalto.moc.server: 1
    • com.gemalto: 1
    • com.gemalto.javacard.mspnp: 1
    • com.gemalto.pure: 1
    • com.visa.vsdc: 1
    • com.gemalto.javacard.iasclassic: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 4
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • BSI:
    • AIS31: 1
    • AIS 31: 1
  • SCP:
    • SCP01: 2
    • SCP02: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
    • Infineon Technologies: 23
    • Infineon: 2
  • Gemalto:
    • Gemalto: 39
  • Samsung:
    • Samsung: 1
  • Gemalto:
    • Gemalto: 11
pdf_data/report_keywords/vendor/Gemalto/Gemalto 39 11
pdf_data/report_metadata
  • pdf_file_size_bytes: 268204
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author: Duquesnoy
  • /CreationDate: D:20140310105223+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20140310105223+01'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - Rapport ANSSI-CC-2014_11fr.doc
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 845849
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /CreationDate: D:20180822151858+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.026
  • /ModDate: D:20180823113947+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject:
  • /Title:
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/report_metadata//CreationDate D:20140310105223+01'00' D:20180822151858+02'00'
pdf_data/report_metadata//Creator PScript5.dll Version 5.2.2 Microsoft® Word 2010
pdf_data/report_metadata//ModDate D:20140310105223+01'00' D:20180823113947+02'00'
pdf_data/report_metadata//Producer Acrobat Distiller 9.0.0 (Windows) Microsoft® Word 2010
pdf_data/report_metadata//Title Microsoft Word - Rapport ANSSI-CC-2014_11fr.doc
pdf_data/report_metadata/pdf_file_size_bytes 268204 845849
pdf_data/report_metadata/pdf_hyperlinks mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/report_metadata/pdf_number_of_pages 22 21
pdf_data/st_filename Cible ANSSI-CC-2014_11en.pdf anssi-cible-cc-2018_32en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 9
      • DH: 6
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
    • ECC:
      • ECC: 14
  • FF:
    • DH:
      • DH: 11
      • Diffie-Hellman: 4
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 2 14
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 2 4
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 6 11
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 9 4
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0829-2012: 1
  • NL:
    • CC-1: 6
    • CC-2: 6
    • CC-3: 3
  • FR:
    • ANSSI-CC-2017/24: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_cert_id/NL/CC-1 6 2
pdf_data/st_keywords/cc_cert_id/NL/CC-2 6 3
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.BAC-PP: 1
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 4
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 13
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 6
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.NATIVE: 11
    • O.OPERATE: 15
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.ALARM: 15
    • O.CIPHER: 10
    • O.KEY-MNGT: 6
    • O.PIN-MNGT: 5
    • O.TRANSACTION: 6
    • O.OBJ-DELETION: 4
    • O.DELETION: 8
    • O.LOAD: 6
    • O.INSTALL: 11
    • O.SCP: 29
    • O.CARD-MANAGEMENT: 2
    • O.RND: 13
    • O.KEY_MNGT: 4
    • O.CARD_MANAGEMENT: 17
    • O.PIN-: 1
    • O.TDES: 1
    • O.AES: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 56
    • O.CODE_PCKG: 16
    • O.GLOBAL_ARRAYS_CO: 3
    • O.GLOBAL_ARRAYS_INT: 3
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.SID: 8
    • T.EXE-CODE: 8
    • T.NATIVE: 4
    • T.RESOURCES: 3
    • T.DELETION: 3
    • T.INSTALL: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
  • A:
    • A.APPLET: 5
    • A.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • OT:
    • OT.X: 1
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 7
  • OE:
    • OE.VERIFICATION: 25
    • OE.APPLET: 4
    • OE.CODE-EVIDENCE: 10
  • OSP:
    • OSP: 1
    • OSP.VERIFICATION: 4
    • OSP.RNG: 1
    • OSP.RND: 3
pdf_data/st_keywords/cc_claims/OE
  • OE.BAC-PP: 1
  • OE.VERIFICATION: 25
  • OE.APPLET: 4
  • OE.CODE-EVIDENCE: 10
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002: 1
  • BSI-PP-0035: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP-0055: 1
  • BSI-CC-PP-0084-: 1
  • BSI-CC-PP- 0068-V2-2011-MA-01: 1
  • BSI-PP-0056-V2-MA-2012: 1
  • BSI-PP- 0055-2009: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 2
  • ADV:
    • ADV_ARC.1: 9
    • ADV_TDS.1: 2
    • ADV_TDS.4: 7
    • ADV_IMP.1: 7
    • ADV_TDS.3: 4
    • ADV_INT.2: 1
    • ADV_FSP.5: 4
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 6
  • ALC:
    • ALC_DVS.2: 7
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_CMC.4: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 3
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_FUN.1: 6
    • ATE_COV.1: 2
    • ATE_IND.2: 1
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_ARC.1: 9
  • ADV_TDS.1: 2
  • ADV_TDS.4: 7
  • ADV_IMP.1: 7
  • ADV_TDS.3: 4
  • ADV_INT.2: 1
  • ADV_FSP.5: 4
  • ADV_FSP.1: 1
  • ADV_FSP.2: 2
  • ADV_FSP.4: 2
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_TDS: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 9
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_DVS.2: 7
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 2 7
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.3: 1
  • AVA_VAN.5: 2
  • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 2 7
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 2
  • EAL 5+: 1
  • EAL5 augmented: 1
  • EAL5: 7
  • EAL5+: 1
  • EAL 6+: 1
  • EAL5 augmented: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 2 7
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 6
    • FAU_GEN: 1
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 7
    • FCS_CKM: 27
    • FCS_COP: 41
    • FCS_CKM.1: 10
    • FCS_RND.1: 6
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 4
    • FCS_COP.1: 5
    • FCS_CKM.4: 25
    • FCS_CKM.1.1: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 7
  • FDP:
    • FDP_ACF: 4
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_ACC.1: 4
    • FDP_ACC: 5
    • FDP_ACF.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 1
    • FDP_UCT.1: 2
    • FDP_UCT: 2
    • FDP_IFC.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 2
    • FDP_UIT: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 10
    • FIA_AFL: 11
    • FIA_SOS.2: 1
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_UAU.4: 2
    • FIA_UAU: 25
    • FIA_UAU.1: 2
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID: 10
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.1: 3
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.6.1: 2
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 16
    • FMT_LIM.2: 15
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MTD: 27
    • FMT_MSA.3: 1
    • FMT_SMF.1: 22
    • FMT_SMR.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR: 14
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 3
    • FMT_MTD.3.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 2
    • FPT_EMS.1: 8
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 4
    • FPT_TST.1: 5
    • FPT_PHP.3: 5
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
    • FTP_ITC: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP.1: 14
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RND: 18
    • FCS_CKM: 48
    • FCS_COP: 38
    • FCS_CKM.1: 31
    • FCS_RND.1: 8
    • FCS_RND.1.1: 3
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 6
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 24
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 30
    • FCS_COP.1.1: 5
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACF: 31
    • FDP_ACC: 37
    • FDP_ACC.2: 6
    • FDP_ACF.1: 16
    • FDP_IFC: 22
    • FDP_IFC.1: 13
    • FDP_IFF: 15
    • FDP_IFF.1: 12
    • FDP_RIP: 85
    • FDP_RIP.1: 10
    • FDP_ROL: 13
    • FDP_ROL.1: 2
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC: 11
    • FDP_ITC.2: 17
    • FDP_IFC.2: 2
    • FDP_UIT: 6
    • FDP_UIT.1: 2
    • FDP_ACC.1: 14
    • FDP_ITC.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_ITT.1: 1
  • FIA:
    • FIA_AFL: 21
    • FIA_SOS.2: 1
    • FIA_ATD: 8
    • FIA_ATD.1: 2
    • FIA_UID: 35
    • FIA_UID.2: 1
    • FIA_USB: 7
    • FIA_USB.1: 3
    • FIA_UAU: 54
    • FIA_UAU.1: 6
    • FIA_UID.1: 18
    • FIA_UAU.4: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
  • FMT:
    • FMT_LIM: 20
    • FMT_LIM.1: 16
    • FMT_LIM.2: 15
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MSA: 80
    • FMT_MSA.1: 11
    • FMT_MSA.2: 1
    • FMT_MSA.3: 15
    • FMT_SMR: 67
    • FMT_SMR.1: 27
    • FMT_SMF: 53
    • FMT_SMF.1: 17
    • FMT_MTD: 33
    • FMT_MTD.1: 9
    • FMT_MTD.3: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
    • FPR_UNO: 6
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 8
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 42
    • FPT_FLS.1: 14
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 14
    • FPT_RCV.3: 4
    • FPT_TST.1: 13
    • FPT_PHP: 6
    • FPT_PHP.3: 15
    • FPT_RCV.4: 2
    • FPT_ITT: 6
    • FPT_ITT.1: 2
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
    • FPT_TST.2: 1
  • FTP:
    • FTP_ITC: 15
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 2
  • FAU_ARP.1: 14
  • FAU_ARP.1.1: 1
  • FAU_SAA.1: 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 7
  • FCS_CKM: 27
  • FCS_COP: 41
  • FCS_CKM.1: 10
  • FCS_RND.1: 6
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 4
  • FCS_COP.1: 5
  • FCS_CKM.4: 25
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 7
  • FCS_RND: 18
  • FCS_CKM: 48
  • FCS_COP: 38
  • FCS_CKM.1: 31
  • FCS_RND.1: 8
  • FCS_RND.1.1: 3
  • FCS_CKM.1.1: 3
  • FCS_CKM.2: 10
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 6
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 24
  • FCS_CKM.4.1: 2
  • FCS_COP.1: 30
  • FCS_COP.1.1: 5
  • FCS_RNG.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 27 48
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 10 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 4 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 25 24
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 41 38
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 5 30
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 7 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND 7 18
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 6 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1.1 2 3
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF: 4
  • FDP_ITC.1: 8
  • FDP_ITC.2: 8
  • FDP_ACC.1: 4
  • FDP_ACC: 5
  • FDP_ACF.1: 7
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1: 2
  • FDP_RIP.1.1: 1
  • FDP_UCT.1: 2
  • FDP_UCT: 2
  • FDP_IFC.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 2
  • FDP_UIT: 2
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ACF: 31
  • FDP_ACC: 37
  • FDP_ACC.2: 6
  • FDP_ACF.1: 16
  • FDP_IFC: 22
  • FDP_IFC.1: 13
  • FDP_IFF: 15
  • FDP_IFF.1: 12
  • FDP_RIP: 85
  • FDP_RIP.1: 10
  • FDP_ROL: 13
  • FDP_ROL.1: 2
  • FDP_SDI.2: 8
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC: 11
  • FDP_ITC.2: 17
  • FDP_IFC.2: 2
  • FDP_UIT: 6
  • FDP_UIT.1: 2
  • FDP_ACC.1: 14
  • FDP_ITC.1: 12
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 1
  • FDP_ITT.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 5 37
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 4 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 4 31
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 7 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 2 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 8 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 8 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 2 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 2 6
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 10
  • FIA_AFL: 11
  • FIA_SOS.2: 1
  • FIA_API.1: 5
  • FIA_API.1.1: 1
  • FIA_UAU.4: 2
  • FIA_UAU: 25
  • FIA_UAU.1: 2
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID: 10
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID.1: 3
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.5: 3
  • FIA_UAU.6.1: 2
  • FIA_AFL: 21
  • FIA_SOS.2: 1
  • FIA_ATD: 8
  • FIA_ATD.1: 2
  • FIA_UID: 35
  • FIA_UID.2: 1
  • FIA_USB: 7
  • FIA_USB.1: 3
  • FIA_UAU: 54
  • FIA_UAU.1: 6
  • FIA_UID.1: 18
  • FIA_UAU.4: 1
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 11 21
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 25 54
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 2 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 10 35
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 3 18
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 7
  • FMT_LIM.1: 16
  • FMT_LIM.2: 15
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 27
  • FMT_MSA.3: 1
  • FMT_SMF.1: 22
  • FMT_SMR.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR: 14
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 10
  • FMT_MTD.1.1: 1
  • FMT_MTD.3: 3
  • FMT_MTD.3.1: 1
  • FMT_LIM: 20
  • FMT_LIM.1: 16
  • FMT_LIM.2: 15
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MSA: 80
  • FMT_MSA.1: 11
  • FMT_MSA.2: 1
  • FMT_MSA.3: 15
  • FMT_SMR: 67
  • FMT_SMR.1: 27
  • FMT_SMF: 53
  • FMT_SMF.1: 17
  • FMT_MTD: 33
  • FMT_MTD.1: 9
  • FMT_MTD.3: 1
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 7 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 1 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 27 33
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 10 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.3 3 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 14 67
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 2 27
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 4
  • FPT_TST: 2
  • FPT_EMS.1: 8
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 4
  • FPT_TST.1: 5
  • FPT_PHP.3: 5
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_EMS: 4
  • FPT_TST: 8
  • FPT_EMS.1: 13
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS: 42
  • FPT_FLS.1: 14
  • FPT_TDC.1: 8
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 14
  • FPT_RCV.3: 4
  • FPT_TST.1: 13
  • FPT_PHP: 6
  • FPT_PHP.3: 15
  • FPT_RCV.4: 2
  • FPT_ITT: 6
  • FPT_ITT.1: 2
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_TST.2: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 8 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 4 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 5 15
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 2 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 5 13
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 4 15
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 2 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 3
pdf_data/st_keywords/cipher_mode/CBC/CBC 4 3
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/crypto_protocol/PACE/PACE 92 174
pdf_data/st_keywords/crypto_scheme/KA
  • Key Agreement: 8
  • Key Agreement: 3
  • Key agreement: 2
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 8 3
pdf_data/st_keywords/crypto_scheme/MAC/MAC 6 14
pdf_data/st_keywords/eval_facility/Serma
  • Serma Technologies: 1
  • Serma Safety & Security: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-224: 1
  • SHA1:
    • SHA1: 2
    • SHA-1: 4
  • SHA2:
    • SHA-224: 4
    • SHA-256: 4
    • SHA-512: 4
    • SHA224: 1
    • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 1
  • SHA-224: 4
  • SHA-256: 4
  • SHA-512: 4
  • SHA224: 1
  • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 1 4
pdf_data/st_keywords/ic_data_group/EF
  • EF.DG1: 8
  • EF.DG2: 5
  • EF.DG3: 9
  • EF.DG4: 9
  • EF.DG5: 3
  • EF.DG16: 6
  • EF.DG14: 4
  • EF.DG15: 2
  • EF.COM: 3
  • EF.SOD: 4
  • EF.DG1: 6
  • EF.DG16: 6
  • EF.DG3: 1
  • EF.DG4: 1
pdf_data/st_keywords/ic_data_group/EF/EF.DG1 8 6
pdf_data/st_keywords/ic_data_group/EF/EF.DG3 9 1
pdf_data/st_keywords/ic_data_group/EF/EF.DG4 9 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 14
    • RND: 16
pdf_data/st_keywords/randomness/RNG
  • RNG: 2
  • RNG: 14
  • RND: 16
pdf_data/st_keywords/randomness/RNG/RNG 2 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 3
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 2
    • Physical tampering: 2
    • Malfunction: 3
    • malfunction: 4
    • fault injection: 1
  • other:
    • reverse engineering: 1
  • SCA:
    • Leak-Inherent: 5
    • physical probing: 6
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 1
    • Physical Tampering: 3
    • malfunction: 8
    • Malfunction: 9
    • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical Tampering: 2
  • Physical tampering: 2
  • Malfunction: 3
  • malfunction: 4
  • fault injection: 1
  • physical tampering: 1
  • Physical Tampering: 3
  • malfunction: 8
  • Malfunction: 9
  • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 3 9
pdf_data/st_keywords/side_channel_analysis/FI/Physical Tampering 2 3
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 4 8
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 1 5
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 3 6
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
    • FIPS 186-3: 1
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 4
    • PKCS#1: 2
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 14
  • SCP:
    • SCP03: 2
    • SCP01: 1
    • SCP02: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 5
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 5
  • BSI:
    • AIS31: 4
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS46-3: 1
  • FIPS PUB 46-3: 1
  • FIPS 186-3: 1
  • FIPS 46-3: 1
  • FIPS 197: 1
  • FIPS180-2: 1
  • FIPS197: 5
  • FIPS 46-3: 1
  • FIPS 197: 1
pdf_data/st_keywords/standard_id/ICAO/ICAO 14 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 4
  • PKCS#1: 2
  • PKCS#1: 7
  • PKCS#5: 5
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 2 7
pdf_data/st_keywords/standard_id/SCP/SCP01 1 4
pdf_data/st_keywords/standard_id/SCP/SCP02 1 4
pdf_data/st_keywords/standard_id/SCP/SCP03 2 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 11 28
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 6
  • TDES: 7
  • 3DES: 2
  • TDEA: 1
  • 3DES: 2
  • TDES: 15
  • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 7 15
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 6 3
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 1 20
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CMAC: 3
  • HMAC: 3
  • KMAC: 2
  • CMAC: 2
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC 3 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 458
  • Samsung:
    • Samsung: 14
  • Gemalto:
    • Gemalto: 528
pdf_data/st_keywords/vendor/Gemalto/Gemalto 458 528
pdf_data/st_metadata
  • pdf_file_size_bytes: 1010629
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
  • /Title: eTravel EAC v2 Security Target
  • /Author: Antoine de Lavernette
  • /Subject: MRTD
  • /Keywords: Security Target, CC, eTravel
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20140127145341+01'00'
  • /ModDate: D:20140127145341+01'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 2571177
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 127
  • /CreationDate: D:20180328144957+02'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: 28-03-2018
  • /ModDate: D:20180823114004+02'00'
  • /Producer: Microsoft® Word 2013
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20140127145341+01'00' D:20180328144957+02'00'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 Microsoft® Word 2013
pdf_data/st_metadata//Keywords Security Target, CC, eTravel 28-03-2018
pdf_data/st_metadata//ModDate D:20140127145341+01'00' D:20180823114004+02'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Microsoft® Word 2013
pdf_data/st_metadata//Subject MRTD
pdf_data/st_metadata//Title eTravel EAC v2 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1010629 2571177
pdf_data/st_metadata/pdf_number_of_pages 73 127
dgst 1e8a276062b5313d 2ed49e59b7e90e34