Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
ANSSI-CC-2014/11
Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
ANSSI-CC-2015/73
name Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
not_valid_before 2014-02-27 2016-01-05
not_valid_after 2019-09-01 2021-01-05
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_11en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2015-73lite.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_11fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-73.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': frozenset({'ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 23), 'maintenance_title': 'ANSSI-CC-2014/11-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_11-M01.pdf', 'maintenance_st_link': None})
state/report/pdf_hash ac651d3ce62ea160582ef30feed3501cb90963e899fe21ca35c5fd0e1e440e65 94c2f7e36a1465d872f5b3adb56253d878f2ec8384155b61451688fb9e0bf0fd
state/report/txt_hash 26039bdbdace7b63953a4b54c7a92f2e4637b89fedfa197257bbdac7c06558c9 0e0f5cbf22978855970ed36c6cf1036cb9eb3c9907eab2f3fc0852560cd9e48f
state/st/pdf_hash 5e77cf4c23609df00dd22b1bc130b05495081c3538dc0125ace0eac30f971814 46b35e14079a5d6dc2992dd45169b3fee1db1153524abbb2fa5842459616b1cc
state/st/txt_hash 55254d58dccab0380a6cb4a6704b504bc147565fb020943795d052aaef5eac26 f7ce3c5d4609e45acf7c2ec1aeccabc0fec932c9ffd829e91ffd4bab8563cbb5
heuristics/cert_id ANSSI-CC-2014/11 ANSSI-CC-2015/73
heuristics/extracted_versions 2.0 1.0
heuristics/report_references/directly_referenced_by None ANSSI-CC-2016/23, ANSSI-CC-2016/06
heuristics/report_references/directly_referencing ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/07 BSI-DSZ-CC-0926-2014
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2016/24, ANSSI-CC-2016/23, ANSSI-CC-2016/06
heuristics/report_references/indirectly_referencing ANSSI-CC-2014/07, ANSSI-CC-2013/33, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, ANSSI-CC-2013/32 BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013
heuristics/scheme_data/cert_id 2014/13 2015/73
heuristics/scheme_data/description Le produit certifié est la carte à puce ouverte « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civ Le produit certifié est la « Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12 » développé par GEMALTO et INFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 et fonctionnant en mode contact (standard ISO 7816-3) ; la plateforme ouverte Java Card est destinée à fournir des services de sécurité aux a
heuristics/scheme_data/developer Gemalto / Infineon Technologies AG Gemalto / Infineon
heuristics/scheme_data/enhanced/augmented ALC_DVS.2 ALC_DVS.2, AVA_VAN.5
heuristics/scheme_data/enhanced/cert_id 2014/13 2015/73
heuristics/scheme_data/enhanced/certification_date 27/02/2014 05/01/2016
heuristics/scheme_data/enhanced/developer Gemalto / Infineon Technologies AG Gemalto / Infineon
heuristics/scheme_data/enhanced/level EAL4+ EAL5+
heuristics/scheme_data/enhanced/protection_profile BSI-CC-PP-0055, PP BAC PP-JCS Open Configuration
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-13fr.pdf https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015-73.pdf
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-13en.pdf https://cyber.gouv.fr/sites/default/files/2016/01/cible2015-73lite.pdf
heuristics/scheme_data/level EAL4+ EAL5+
heuristics/scheme_data/product Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-bac-sur-la-plateforme-ouverte https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-essential-v10-en-configuration-ouverte-sur-le
heuristics/st_references/directly_referencing BSI-DSZ-CC-0829-2012 BSI-DSZ-CC-0926-2014
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 BSI-DSZ-CC-0926-2014
pdf_data/report_filename Rapport ANSSI-CC-2014_11fr.pdf ANSSI-CC-2015-73.pdf
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2014/11 ANSSI-CC-2015/73
pdf_data/report_frontpage/FR/cert_item Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
pdf_data/report_frontpage/FR/cert_item_version Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5 Version 1.0
pdf_data/report_frontpage/FR/developer Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
pdf_data/report_frontpage/FR/ref_protection_profiles BSI-CC-PP-0056-V2, [PP EAC PACE], version 1.3.1 Machine Readable Travel Document with ICAO Application, Extended Access Control with PACE Java Card System Protection Profile – Open Configuration [PP-JCS Open Configuration], version 3.0
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0829-2012: 3
  • BSI-DSZ-CC-0926-2014: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2014/11: 23
  • ANSSI-CC-2014/06: 4
  • ANSSI-CC-2014/07: 1
  • ANSSI-CC-2015/73: 21
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2: 1
    • BSI-PP-0035-2007: 2
    • BSI-CC-PP- 0056-V2-2012-MA-01: 1
    • BSI-PP- 0035-2007: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 1 2
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 1 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 6 5
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL4: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL2: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/crypto_protocol/PACE/PACE 5 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 3
  • CESTI:
    • CESTI: 1
  • Serma:
    • Serma Technologies: 1
    • SERMA: 1
pdf_data/report_keywords/eval_facility/Serma
  • Serma Technologies: 3
  • Serma Technologies: 1
  • SERMA: 1
pdf_data/report_keywords/eval_facility/Serma/Serma Technologies 3 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/vendor/Gemalto/Gemalto 39 3
pdf_data/report_keywords/vendor/Infineon
  • Infineon Technologies AG: 1
  • Infineon Technologies: 23
  • Infineon: 2
  • Infineon: 25
  • Infineon Technologies: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 2 25
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 23 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 268204
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author: Duquesnoy
  • /CreationDate: D:20140310105223+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20140310105223+01'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - Rapport ANSSI-CC-2014_11fr.doc
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 794770
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Title: ANSSI-CC-2015/73
  • /Author: Jonathan Gimenez
  • /Subject: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
  • /Keywords: ANSSI-CC-CER-F-07.017
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20160106150825+01'00'
  • /ModDate: D:20160106150825+01'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/report_metadata//Author Duquesnoy Jonathan Gimenez
pdf_data/report_metadata//CreationDate D:20140310105223+01'00' D:20160106150825+01'00'
pdf_data/report_metadata//Creator PScript5.dll Version 5.2.2 Microsoft® Word 2010
pdf_data/report_metadata//ModDate D:20140310105223+01'00' D:20160106150825+01'00'
pdf_data/report_metadata//Producer Acrobat Distiller 9.0.0 (Windows) Microsoft® Word 2010
pdf_data/report_metadata//Title Microsoft Word - Rapport ANSSI-CC-2014_11fr.doc ANSSI-CC-2015/73
pdf_data/report_metadata/pdf_file_size_bytes 268204 794770
pdf_data/report_metadata/pdf_hyperlinks mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/report_metadata/pdf_number_of_pages 22 20
pdf_data/st_filename Cible ANSSI-CC-2014_11en.pdf cible2015-73lite.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 9
      • DH: 6
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 1
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 8
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 2
  • ECC:
    • ECC: 1
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 2 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 6 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 9 2
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0829-2012: 1
  • BSI-DSZ-CC-0926-2014: 1
pdf_data/st_keywords/cc_cert_id/NL/CC-1 6 2
pdf_data/st_keywords/cc_cert_id/NL/CC-2 6 3
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.BAC-PP: 1
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 4
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 9
    • O.FIREWALL: 11
    • O.GLOBAL_ARRAYS_CONFID: 5
    • O.GLOBAL_ARRAYS_INTEG: 4
    • O.NATIVE: 7
    • O.OPERATE: 14
    • O.REALLOCATION: 4
    • O.RESOURCES: 5
    • O.ALARM: 11
    • O.CIPHER: 5
    • O.KEY-MNGT: 5
    • O.PIN-MNGT: 4
    • O.TRANSACTION: 5
    • O.OBJ-DELETION: 3
    • O.DELETION: 4
    • O.LOAD: 5
    • O.INSTALL: 7
    • O.SCP: 21
    • O.CARD-MANAGEMENT: 2
    • O.RND: 7
    • O.KEY_MNGT: 1
    • O.CARD_MANAGEMENT: 14
    • O.PIN-: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 56
    • O.CODE_PCKG: 16
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.SID: 8
    • T.EXE-CODE: 8
    • T.NATIVE: 4
    • T.RESOURCES: 3
    • T.DELETION: 3
    • T.INSTALL: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
  • A:
    • A.APPLET: 4
    • A.DELETION: 5
    • A.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 7
  • OE:
    • OE.VERIFICATION: 25
    • OE.APPLET: 3
    • OE.CODE-EVIDENCE: 10
    • OE.APPS-VALIDATION: 1
  • OSP:
    • OSP.VERIFICATION: 4
    • OSP.RNG: 1
    • OSP.RND: 3
pdf_data/st_keywords/cc_claims/OE
  • OE.BAC-PP: 1
  • OE.VERIFICATION: 25
  • OE.APPLET: 3
  • OE.CODE-EVIDENCE: 10
  • OE.APPS-VALIDATION: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
    • BSI-PP-0035: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0055: 1
  • BSI:
    • BSI-PP-0035: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0072: 1
    • BSI-CC-PP-0076: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
  • other:
    • PP-SSCD-P2: 1
    • PP-SSCD-P3: 1
    • PP-SSCD-P4: 1
    • PP-SSCD-P5: 1
    • PP-SSCD-P6: 1
    • PP-SSCD-T2: 1
    • PP-SSCD-T3: 1
    • PP-SSCD-T4: 1
    • PP-SSCD-T5: 1
    • PP-SSCD-T6: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002: 1
  • BSI-PP-0035: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP-0055: 1
  • BSI-PP-0035: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075: 1
  • BSI-CC-PP-0071: 1
  • BSI-CC-PP-0072: 1
  • BSI-CC-PP-0076: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_TDS: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.3: 1
  • AVA_VAN.5: 2
  • AVA_VAN.5: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 2
  • EAL 5+: 1
  • EAL5 augmented: 1
  • EAL5+: 1
  • EAL5: 2
  • EAL 5+: 1
  • EAL5 augmented: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 6
    • FAU_GEN: 1
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 7
    • FCS_CKM: 27
    • FCS_COP: 41
    • FCS_CKM.1: 10
    • FCS_RND.1: 6
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 4
    • FCS_COP.1: 5
    • FCS_CKM.4: 25
    • FCS_CKM.1.1: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 7
  • FDP:
    • FDP_ACF: 4
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_ACC.1: 4
    • FDP_ACC: 5
    • FDP_ACF.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 1
    • FDP_UCT.1: 2
    • FDP_UCT: 2
    • FDP_IFC.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 2
    • FDP_UIT: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 10
    • FIA_AFL: 11
    • FIA_SOS.2: 1
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_UAU.4: 2
    • FIA_UAU: 25
    • FIA_UAU.1: 2
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID: 10
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.1: 3
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.6.1: 2
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 16
    • FMT_LIM.2: 15
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MTD: 27
    • FMT_MSA.3: 1
    • FMT_SMF.1: 22
    • FMT_SMR.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR: 14
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 3
    • FMT_MTD.3.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 2
    • FPT_EMS.1: 8
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 4
    • FPT_TST.1: 5
    • FPT_PHP.3: 5
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
    • FTP_ITC: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
  • FCO:
    • FCO_NRO: 2
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RND: 7
    • FCS_RND.1: 7
    • FCS_CKM.1: 6
    • FCS_RND.1.1: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 2
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 14
    • FDP_ACC.2: 6
    • FDP_ACF: 16
    • FDP_ACF.1: 13
    • FDP_IFC: 4
    • FDP_IFC.1: 1
    • FDP_IFF: 4
    • FDP_IFF.1: 10
    • FDP_RIP: 17
    • FDP_RIP.1: 8
    • FDP_ROL: 6
    • FDP_ROL.1: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC: 4
    • FDP_ITC.2: 5
    • FDP_IFC.2: 2
    • FDP_UIT: 2
    • FDP_UIT.1: 2
    • FDP_ACC.1: 1
  • FIA:
    • FIA_SOS.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 1
    • FIA_UID: 4
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
    • FIA_UAU: 2
    • FIA_UAI.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 1
    • FMT_MSA.3: 10
    • FMT_SMR: 9
    • FMT_SMR.1: 8
    • FMT_SMF: 6
    • FMT_SMF.1: 3
    • FMT_MTD.1: 2
    • FMT_MTD: 3
    • FMT_MTD.3: 1
  • FPR:
    • FPR_UNO.1: 3
    • FPR_UNO.1.1: 1
    • FPR_UNO: 2
  • FPT:
    • FPT_FLS: 10
    • FPT_FLS.1: 5
    • FPT_TDC.1: 2
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 4
    • FPT_RCV.3: 4
    • FPT_TST: 2
    • FPT_TST.1: 3
    • FPT_PHP: 2
    • FPT_PHP.3: 1
    • FPT_RCV.4: 1
    • FPT_ITT: 2
    • FPT_ITT.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 2
  • FAU_ARP.1: 5
  • FAU_ARP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 7
  • FCS_CKM: 27
  • FCS_COP: 41
  • FCS_CKM.1: 10
  • FCS_RND.1: 6
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 4
  • FCS_COP.1: 5
  • FCS_CKM.4: 25
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 7
  • FCS_RND: 7
  • FCS_RND.1: 7
  • FCS_CKM.1: 6
  • FCS_RND.1.1: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 2
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 10
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 10 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 4 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 25 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 5 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 7 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 6 7
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF: 4
  • FDP_ITC.1: 8
  • FDP_ITC.2: 8
  • FDP_ACC.1: 4
  • FDP_ACC: 5
  • FDP_ACF.1: 7
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1: 2
  • FDP_RIP.1.1: 1
  • FDP_UCT.1: 2
  • FDP_UCT: 2
  • FDP_IFC.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 2
  • FDP_UIT: 2
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ACC: 14
  • FDP_ACC.2: 6
  • FDP_ACF: 16
  • FDP_ACF.1: 13
  • FDP_IFC: 4
  • FDP_IFC.1: 1
  • FDP_IFF: 4
  • FDP_IFF.1: 10
  • FDP_RIP: 17
  • FDP_RIP.1: 8
  • FDP_ROL: 6
  • FDP_ROL.1: 2
  • FDP_SDI.2: 2
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC: 4
  • FDP_ITC.2: 5
  • FDP_IFC.2: 2
  • FDP_UIT: 2
  • FDP_UIT.1: 2
  • FDP_ACC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 5 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 4 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 7 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 8 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 2 8
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 10
  • FIA_AFL: 11
  • FIA_SOS.2: 1
  • FIA_API.1: 5
  • FIA_API.1.1: 1
  • FIA_UAU.4: 2
  • FIA_UAU: 25
  • FIA_UAU.1: 2
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID: 10
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID.1: 3
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.5: 3
  • FIA_UAU.6.1: 2
  • FIA_SOS.2: 1
  • FIA_ATD: 3
  • FIA_ATD.1: 1
  • FIA_UID: 4
  • FIA_UID.2: 1
  • FIA_USB: 2
  • FIA_USB.1: 3
  • FIA_UAU: 2
  • FIA_UAI.1: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 25 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 10 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 3 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 7
  • FMT_LIM.1: 16
  • FMT_LIM.2: 15
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 27
  • FMT_MSA.3: 1
  • FMT_SMF.1: 22
  • FMT_SMR.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR: 14
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 10
  • FMT_MTD.1.1: 1
  • FMT_MTD.3: 3
  • FMT_MTD.3.1: 1
  • FMT_MSA: 21
  • FMT_MSA.1: 5
  • FMT_MSA.2: 1
  • FMT_MSA.3: 10
  • FMT_SMR: 9
  • FMT_SMR.1: 8
  • FMT_SMF: 6
  • FMT_SMF.1: 3
  • FMT_MTD.1: 2
  • FMT_MTD: 3
  • FMT_MTD.3: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 1 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 27 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 10 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.3 3 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 14 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 2 8
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 4
  • FPT_TST: 2
  • FPT_EMS.1: 8
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 4
  • FPT_TST.1: 5
  • FPT_PHP.3: 5
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_FLS: 10
  • FPT_FLS.1: 5
  • FPT_TDC.1: 2
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 4
  • FPT_RCV.3: 4
  • FPT_TST: 2
  • FPT_TST.1: 3
  • FPT_PHP: 2
  • FPT_PHP.3: 1
  • FPT_RCV.4: 1
  • FPT_ITT: 2
  • FPT_ITT.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 4 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 5 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 5 3
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 2
  • FTP_TRP.1: 2
  • FTP_ITC: 4
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_ITC: 2
  • FTP_ITC.1: 3
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 4 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 2 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 4 1
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/crypto_protocol/PACE/PACE 92 7
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 6
  • KA:
    • Key Agreement: 8
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_scheme/MAC/MAC 6 7
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-224: 1
  • SHA1:
    • SHA1: 1
    • SHA-1: 3
  • SHA2:
    • SHA-224: 3
    • SHA224: 2
    • SHA256: 1
    • SHA-256: 3
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 1
  • SHA-224: 3
  • SHA224: 2
  • SHA256: 1
  • SHA-256: 3
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 1 3
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 8
    • EF.DG2: 5
    • EF.DG3: 9
    • EF.DG4: 9
    • EF.DG5: 3
    • EF.DG16: 6
    • EF.DG14: 4
    • EF.DG15: 2
    • EF.COM: 3
    • EF.SOD: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 7
    • JavaCard 3.0: 1
pdf_data/st_keywords/randomness/RNG
  • RNG: 2
  • RNG: 5
  • RND: 10
pdf_data/st_keywords/randomness/RNG/RNG 2 5
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 3
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 2
    • Physical tampering: 2
    • Malfunction: 3
    • malfunction: 4
    • fault injection: 1
  • other:
    • reverse engineering: 1
  • SCA:
    • Leak-Inherent: 3
    • physical probing: 2
    • DPA: 1
  • FI:
    • physical tampering: 1
    • malfunction: 2
    • Malfunction: 3
    • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical Tampering: 2
  • Physical tampering: 2
  • Malfunction: 3
  • malfunction: 4
  • fault injection: 1
  • physical tampering: 1
  • malfunction: 2
  • Malfunction: 3
  • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 4 2
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 1
  • physical probing: 3
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
  • Leak-Inherent: 3
  • physical probing: 2
  • DPA: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 2 1
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 1 3
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 3 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
    • FIPS 186-3: 1
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 4
    • PKCS#1: 2
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 14
  • SCP:
    • SCP03: 2
    • SCP01: 1
    • SCP02: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 3
  • PKCS:
    • PKCS#3: 1
    • PKCS#1: 8
    • PKCS#5: 3
  • BSI:
    • AIS31: 1
  • SCP:
    • SCP03: 3
    • SCP01: 3
    • SCP02: 3
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS46-3: 1
  • FIPS PUB 46-3: 1
  • FIPS 186-3: 1
  • FIPS 46-3: 1
  • FIPS 197: 1
  • FIPS180-2: 1
  • FIPS197: 3
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 4
  • PKCS#1: 2
  • PKCS#3: 1
  • PKCS#1: 8
  • PKCS#5: 3
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 2 8
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 4 1
pdf_data/st_keywords/standard_id/SCP/SCP01 1 3
pdf_data/st_keywords/standard_id/SCP/SCP02 1 3
pdf_data/st_keywords/standard_id/SCP/SCP03 2 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • Triple-DES: 6
      • TDES: 7
      • 3DES: 2
  • constructions:
    • MAC:
      • CMAC: 3
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • DES:
      • DES: 14
    • 3DES:
      • TDEA: 1
      • 3DES: 1
      • TDES: 7
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 11 14
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 6
  • TDES: 7
  • 3DES: 2
  • TDEA: 1
  • 3DES: 1
  • TDES: 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 2 1
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 1 14
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 458
  • Infineon:
    • Infineon: 5
  • Gemalto:
    • Gemalto: 502
pdf_data/st_keywords/vendor/Gemalto/Gemalto 458 502
pdf_data/st_metadata//CreationDate D:20140127145341+01'00' D:20151126145415+01'00'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 Microsoft® Word 2013
pdf_data/st_metadata//Keywords Security Target, CC, eTravel Security Target, CC
pdf_data/st_metadata//ModDate D:20140127145341+01'00' D:20151126145415+01'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Microsoft® Word 2013
pdf_data/st_metadata//Subject MRTD Security Target
pdf_data/st_metadata//Title eTravel EAC v2 Security Target eTravel v1.0 Security Target MAÏA3
pdf_data/st_metadata/pdf_file_size_bytes 1010629 1708746
pdf_data/st_metadata/pdf_number_of_pages 73 80
dgst 1e8a276062b5313d 37f694d2de25cb63