Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
ANSSI-CC-2014/11
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
ANSSI-CC-2020/65
name Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
not_valid_before 2014-02-27 2020-06-26
not_valid_after 2019-09-01 2021-09-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_11en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_cc_2020-65en.pdf
manufacturer Gemalto - Infineon Technologies AG Thales
manufacturer_web https://www.gemalto.com/ None
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_11fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_65.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 23), 'maintenance_title': 'ANSSI-CC-2014/11-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_11-M01.pdf', 'maintenance_st_link': None})
state/report/pdf_hash ac651d3ce62ea160582ef30feed3501cb90963e899fe21ca35c5fd0e1e440e65 1851f32764fbc7ae6fcc0a8a1371100314db571756c0ac1410ad36c56ee80e03
state/report/txt_hash 26039bdbdace7b63953a4b54c7a92f2e4637b89fedfa197257bbdac7c06558c9 be2d099bd50586eddcae54e317df4f95e7cee55e8a65d848e17ec0104297ca17
state/st/pdf_hash 5e77cf4c23609df00dd22b1bc130b05495081c3538dc0125ace0eac30f971814 345b033e4ecef010912441340c7faf726817c4f9752819acc64b866caec57235
state/st/txt_hash 55254d58dccab0380a6cb4a6704b504bc147565fb020943795d052aaef5eac26 b950b4810f9ff5e378e2adc642cf8bdfa879371a5345bba0b0691c29a861681e
heuristics/cert_id ANSSI-CC-2014/11 ANSSI-CC-2020/65
heuristics/extracted_versions 2.0 4.2
heuristics/report_references/directly_referenced_by None ANSSI-CC-2021/39, ANSSI-CC-2020/65v2, ANSSI-CC-2020/70, ANSSI-CC-2021/38, ANSSI-CC-2021/41
heuristics/report_references/directly_referencing ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/07 None
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2021/39, ANSSI-CC-2020/65v2, ANSSI-CC-2020/70, ANSSI-CC-2021/38, ANSSI-CC-2021/41
heuristics/report_references/indirectly_referencing ANSSI-CC-2014/07, ANSSI-CC-2013/33, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, ANSSI-CC-2013/32 None
heuristics/scheme_data/cert_id 2014/13 2020/65
heuristics/scheme_data/description Le produit certifié est la carte à puce ouverte « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civ Le produit évalué est la « Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h, version 4.2.0 », développé par THALES et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soie
heuristics/scheme_data/developer Gemalto / Infineon Technologies AG THALES et INFINEON TECHNOOGIES AG
heuristics/scheme_data/enhanced/augmented ALC_DVS.2 ALC_DVS.2 et AVA_VAN.5
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r4 Critères Communs version 3.1r5
heuristics/scheme_data/enhanced/cert_id 2014/13 2020/65
heuristics/scheme_data/enhanced/certification_date 27/02/2014 26/06/2020
heuristics/scheme_data/enhanced/developer Gemalto / Infineon Technologies AG THALES et INFINEON TECHNOOGIES AG
heuristics/scheme_data/enhanced/evaluation_facility Serma Technologies Serma Safety & Security
heuristics/scheme_data/enhanced/level EAL4+ EAL5+
heuristics/scheme_data/enhanced/protection_profile BSI-CC-PP-0055, PP BAC Java Card System Protection Profile Open Configuration, version 3.0.5, certifié BSI-CC-PP-0099-2017 décembre 2017
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-13fr.pdf https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cc-2020_65.pdf
heuristics/scheme_data/enhanced/sponsor Gemalto THALES
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-13en.pdf https://cyber.gouv.fr/sites/default/files/2020/07/anssi_cible_cc_2020-65en.pdf
heuristics/scheme_data/level EAL4+ EAL5+
heuristics/scheme_data/product Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
heuristics/scheme_data/sponsor Gemalto THALES
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-bac-sur-la-plateforme-ouverte https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-v42-en-configuration-ouverte-sur-le-composant
heuristics/st_references/directly_referencing BSI-DSZ-CC-0829-2012 BSI-DSZ-CC-1079-2018
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 BSI-DSZ-CC-1079-2018
pdf_data/report_filename Rapport ANSSI-CC-2014_11fr.pdf anssi-cc-2020_65.pdf
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 4 Critères Communs version 3.1 révision 5
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2014/11 ANSSI-CC-2020/65
pdf_data/report_frontpage/FR/cert_item Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
pdf_data/report_frontpage/FR/cert_item_version Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5 Version 4.2.0 Java Card version 3.0.5 GP version 2.3
pdf_data/report_frontpage/FR/cert_lab Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
pdf_data/report_frontpage/FR/developer Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France THALES 6 rue de la Verrerie, 92190 Meudon, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire THALES 6 rue de la Verrerie, 92190 Meudon, France
pdf_data/report_frontpage/FR/ref_protection_profiles BSI-CC-PP-0056-V2, [PP EAC PACE], version 1.3.1 Machine Readable Travel Document with ICAO Application, Extended Access Control with PACE Java Card System Protection Profile Open Configuration, version 3.0.5 certifié BSI-CC-PP-0099-2017 décembre 2017
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0829-2012: 3
  • BSI-DSZ-CC-1079-2018-MA-01: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2014/11: 23
  • ANSSI-CC-2014/06: 4
  • ANSSI-CC-2014/07: 1
  • ANSSI-CC-2020/65: 18
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0056-V2: 1
  • BSI-PP-0035-2007: 2
  • BSI-CC-PP- 0056-V2-2012-MA-01: 1
  • BSI-PP- 0035-2007: 1
  • BSI-CC-PP-0099-2017: 1
  • BSI-PP-0099-2017: 1
  • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 1 3
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 1 3
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 2
  • ALC_FLR.1: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 3 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 6 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL4: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL2: 2
  • EAL 6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/crypto_protocol/PACE/PACE 5 2
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 3
  • CESTI:
    • CESTI: 1
  • Serma:
    • Serma Safety & Security: 1
pdf_data/report_keywords/eval_facility/Serma
  • Serma Technologies: 3
  • Serma Safety & Security: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.io: 1
  • javacard:
    • javacard.framework: 1
    • javacard.filesystem: 1
    • javacard.util: 1
    • javacard.open: 1
    • javacard.internal: 1
    • javacard.ism: 1
    • javacard.securemessaging: 1
    • javacard.securemessaging.builder: 1
    • javacard.securemessaging.internal: 1
    • javacard.security: 1
    • javacard.tlv: 1
    • javacard.iasclassic: 1
    • javacard.icao: 1
    • javacard.mspnp: 1
    • javacard.conformance: 1
    • javacard.gpimage: 1
  • javacardx:
    • javacardx.apdu: 1
    • javacardx.crypto: 2
    • javacardx.gap: 1
    • javacardx.gapplet: 1
    • javacardx.biometry: 2
    • javacardx.crypto.asymmetric.ecc: 1
    • javacardx.crypto.asymmetric.rsa: 1
    • javacardx.apdu.util: 1
    • javacardx.biometry.biocfg: 1
    • javacardx.gdp: 1
  • org:
    • org.globalplatform: 1
  • com:
    • com.gemalto.javacard.filesystem: 1
    • com.gemalto.javacard.util: 1
    • com.gemalto.javacardx.crypto: 1
    • com.gemalto.javacard.open: 1
    • com.gemalto.javacardx.gapplet: 1
    • com.gemalto.javacard.ism: 1
    • com.gemalto.javacard.securemessaging.builder: 1
    • com.gemalto.javacard.security: 1
    • com.gemalto.javacardx: 1
    • com.gemalto.javacardx.biometry: 1
    • com.gemalto.javacardx.crypto.asymmetric.rsa: 1
    • com.gemalto.javacard.iasclassic: 1
    • com.gemalto.moc.server: 1
    • com.gemalto.javacard.mspnp: 1
    • com.gemalto.javacardx.biometry.biocfg: 1
    • com.gemalto.emvapi: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 3
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • BSI:
    • AIS31: 1
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
    • Infineon Technologies: 23
    • Infineon: 2
  • Gemalto:
    • Gemalto: 39
  • Infineon:
    • Infineon Technologies AG: 2
  • Gemalto:
    • Gemalto: 5
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/vendor/Gemalto/Gemalto 39 5
pdf_data/report_keywords/vendor/Infineon
  • Infineon Technologies AG: 1
  • Infineon Technologies: 23
  • Infineon: 2
  • Infineon Technologies AG: 2
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 1 2
pdf_data/report_metadata//Author Duquesnoy
pdf_data/report_metadata//CreationDate D:20140310105223+01'00' D:20200707161142+02'00'
pdf_data/report_metadata//ModDate D:20140310105223+01'00' D:20200707161142+02'00'
pdf_data/report_metadata//Producer Acrobat Distiller 9.0.0 (Windows) Acrobat Distiller 11.0 (Windows)
pdf_data/report_metadata//Title Microsoft Word - Rapport ANSSI-CC-2014_11fr.doc
pdf_data/report_metadata/pdf_file_size_bytes 268204 299041
pdf_data/report_metadata/pdf_number_of_pages 22 17
pdf_data/st_filename Cible ANSSI-CC-2014_11en.pdf anssi_cible_cc_2020-65en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 9
      • DH: 6
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 6
    • ECC:
      • ECC: 11
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 4
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 2 11
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 2 6
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 6 10
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 9 4
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0829-2012: 1
  • BSI-DSZ-CC-1079-2018: 1
  • BSI-DSZ-CC-1079-2018-MA-01: 1
pdf_data/st_keywords/cc_cert_id/NL/CC-1 6 2
pdf_data/st_keywords/cc_cert_id/NL/CC-2 6 3
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.BAC-PP: 1
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.PIN: 4
    • D.BIO: 1
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 12
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 8
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.NATIVE: 10
    • O.OPERATE: 15
    • O.REALLOCATION: 5
    • O.RESOURCES: 8
    • O.ALARM: 14
    • O.CIPHER: 10
    • O.RNG: 8
    • O.KEY-MNGT: 7
    • O.PIN-MNGT: 6
    • O.TRANSACTION: 7
    • O.BIO-MNGT: 6
    • O.OBJ-DELETION: 4
    • O.DELETION: 5
    • O.LOAD: 9
    • O.INSTALL: 8
    • O.SCP: 29
    • O.CARD-MANAGEMENT: 2
    • O.PIN_MNGT: 1
    • O.KEY_MNGT: 1
    • O.CARD_MANAGEMENT: 16
    • O.PIN-: 1
    • O.RND: 3
    • O.TDES: 1
    • O.AES: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 66
    • O.CODE_PCKG: 16
    • O.OBJ_DELETION: 2
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.SID: 8
    • T.EXE-CODE: 8
    • T.NATIVE: 4
    • T.RESOURCES: 3
    • T.DELETION: 3
    • T.INSTALL: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
  • A:
    • A.APPLET: 5
    • A.DELETION: 4
    • A.VERIFICATION: 4
  • R:
    • R.JAVA: 10
  • OT:
    • OT.X: 1
  • OP:
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_AASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
  • OE:
    • OE.APPLET: 4
    • OE.VERIFICATION: 25
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.CARD-MANAGEMENT: 1
  • OSP:
    • OSP.VERIFICATION: 4
    • OSP.RNG: 1
    • OSP.RND: 3
pdf_data/st_keywords/cc_claims/OE
  • OE.BAC-PP: 1
  • OE.APPLET: 4
  • OE.VERIFICATION: 25
  • OE.CODE-EVIDENCE: 10
  • OE.CODE_EVIDENCE: 1
  • OE.CARD-MANAGEMENT: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002: 1
  • BSI-PP-0035: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP-0055: 1
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0099-2017: 1
  • BSI-CC-PP- 0068-V2-2011-MA-01: 1
  • BSI-PP- 0055-2009: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 2
  • ADV:
    • ADV_ARC.1: 7
    • ADV_TDS.1: 2
    • ADV_TDS.4: 7
    • ADV_IMP.1: 7
    • ADV_TDS.3: 4
    • ADV_INT.2: 1
    • ADV_FSP.5: 4
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_PRE: 2
    • AGD_OPE: 2
    • AGD_OPE.1: 7
    • AGD_PRE.1: 6
  • ALC:
    • ALC_DVS.2: 7
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_CMC.4: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 3
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_FUN.1: 6
    • ATE_COV.1: 2
    • ATE_IND.2: 1
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_ARC.1: 7
  • ADV_TDS.1: 2
  • ADV_TDS.4: 7
  • ADV_IMP.1: 7
  • ADV_TDS.3: 4
  • ADV_INT.2: 1
  • ADV_FSP.5: 4
  • ADV_FSP.1: 1
  • ADV_FSP.2: 2
  • ADV_FSP.4: 2
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_TDS: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 7
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_DVS.2: 7
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 2 7
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.3: 1
  • AVA_VAN.5: 2
  • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 2 7
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 2
  • EAL 5+: 1
  • EAL5 augmented: 1
  • EAL 5+: 1
  • EAL6: 1
  • EAL6+: 1
  • EAL5+: 1
  • EAL5: 6
  • EAL 6+: 1
  • EAL6 augmented: 1
  • EAL5 augmented: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 2 6
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 6
    • FAU_GEN: 1
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 7
    • FCS_CKM: 27
    • FCS_COP: 41
    • FCS_CKM.1: 10
    • FCS_RND.1: 6
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 4
    • FCS_COP.1: 5
    • FCS_CKM.4: 25
    • FCS_CKM.1.1: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 7
  • FDP:
    • FDP_ACF: 4
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_ACC.1: 4
    • FDP_ACC: 5
    • FDP_ACF.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 1
    • FDP_UCT.1: 2
    • FDP_UCT: 2
    • FDP_IFC.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 2
    • FDP_UIT: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 10
    • FIA_AFL: 11
    • FIA_SOS.2: 1
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_UAU.4: 2
    • FIA_UAU: 25
    • FIA_UAU.1: 2
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID: 10
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.1: 3
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.6.1: 2
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 16
    • FMT_LIM.2: 15
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MTD: 27
    • FMT_MSA.3: 1
    • FMT_SMF.1: 22
    • FMT_SMR.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR: 14
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 3
    • FMT_MTD.3.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 2
    • FPT_EMS.1: 8
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 4
    • FPT_TST.1: 5
    • FPT_PHP.3: 5
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
    • FTP_ITC: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP.1: 16
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RNG: 17
    • FCS_CKM: 46
    • FCS_COP: 35
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1: 27
    • FCS_CKM.1.1: 3
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 24
    • FCS_COP.1.1: 5
  • FDP:
    • FDP_ACF: 30
    • FDP_ACC: 35
    • FDP_ACC.2: 6
    • FDP_ACF.1: 16
    • FDP_IFC: 20
    • FDP_IFC.1: 12
    • FDP_IFF: 13
    • FDP_IFF.1: 17
    • FDP_RIP: 98
    • FDP_RIP.1: 11
    • FDP_ROL.1: 5
    • FDP_ROL: 14
    • FDP_SDI: 6
    • FDP_SDI.2: 3
    • FDP_ITC: 10
    • FDP_ITC.2: 15
    • FDP_IFC.2: 2
    • FDP_UIT: 5
    • FDP_UIT.1: 2
    • FDP_ACC.1: 14
    • FDP_ITC.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL: 21
    • FIA_ATD: 7
    • FIA_ATD.1: 2
    • FIA_UID: 33
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
    • FIA_UAU: 50
    • FIA_UAU.1: 6
    • FIA_UID.1: 18
    • FIA_UAU.4: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
  • FMT:
    • FMT_LIM: 18
    • FMT_LIM.1: 15
    • FMT_LIM.2: 14
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MSA: 73
    • FMT_MSA.1: 11
    • FMT_MSA.2: 2
    • FMT_MSA.3: 17
    • FMT_SMR: 62
    • FMT_SMR.1: 29
    • FMT_SMF: 50
    • FMT_SMF.1: 19
    • FMT_MTD: 31
    • FMT_MTD.1: 9
    • FMT_MTD.3: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
    • FPR_UNO: 5
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 7
    • FPT_EMS.1: 12
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 34
    • FPT_FLS.1: 14
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 7
    • FPT_FLS.1.1: 2
    • FPT_TST.1: 13
    • FPT_PHP: 5
    • FPT_PHP.3: 12
    • FPT_RCV.4: 2
    • FPT_ITT: 5
    • FPT_ITT.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 2
  • FAU_ARP.1: 16
  • FAU_ARP.1.1: 1
  • FAU_SAA.1: 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 7
  • FCS_CKM: 27
  • FCS_COP: 41
  • FCS_CKM.1: 10
  • FCS_RND.1: 6
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 4
  • FCS_COP.1: 5
  • FCS_CKM.4: 25
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 7
  • FCS_RNG: 17
  • FCS_CKM: 46
  • FCS_COP: 35
  • FCS_RNG.1: 8
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1: 27
  • FCS_CKM.1.1: 3
  • FCS_CKM.4: 21
  • FCS_CKM.4.1: 2
  • FCS_COP.1: 24
  • FCS_COP.1.1: 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 27 46
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 10 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 25 21
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 41 35
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 5 24
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 7 5
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF: 4
  • FDP_ITC.1: 8
  • FDP_ITC.2: 8
  • FDP_ACC.1: 4
  • FDP_ACC: 5
  • FDP_ACF.1: 7
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1: 2
  • FDP_RIP.1.1: 1
  • FDP_UCT.1: 2
  • FDP_UCT: 2
  • FDP_IFC.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 2
  • FDP_UIT: 2
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ACF: 30
  • FDP_ACC: 35
  • FDP_ACC.2: 6
  • FDP_ACF.1: 16
  • FDP_IFC: 20
  • FDP_IFC.1: 12
  • FDP_IFF: 13
  • FDP_IFF.1: 17
  • FDP_RIP: 98
  • FDP_RIP.1: 11
  • FDP_ROL.1: 5
  • FDP_ROL: 14
  • FDP_SDI: 6
  • FDP_SDI.2: 3
  • FDP_ITC: 10
  • FDP_ITC.2: 15
  • FDP_IFC.2: 2
  • FDP_UIT: 5
  • FDP_UIT.1: 2
  • FDP_ACC.1: 14
  • FDP_ITC.1: 10
  • FDP_RIP.1.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 5 35
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 4 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 4 30
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 7 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 2 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 8 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 8 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 2 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 2 5
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 10
  • FIA_AFL: 11
  • FIA_SOS.2: 1
  • FIA_API.1: 5
  • FIA_API.1.1: 1
  • FIA_UAU.4: 2
  • FIA_UAU: 25
  • FIA_UAU.1: 2
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID: 10
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID.1: 3
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.5: 3
  • FIA_UAU.6.1: 2
  • FIA_AFL: 21
  • FIA_ATD: 7
  • FIA_ATD.1: 2
  • FIA_UID: 33
  • FIA_UID.2: 1
  • FIA_USB: 6
  • FIA_USB.1: 3
  • FIA_UAU: 50
  • FIA_UAU.1: 6
  • FIA_UID.1: 18
  • FIA_UAU.4: 1
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 11 21
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 25 50
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 2 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 10 33
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 3 18
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 7
  • FMT_LIM.1: 16
  • FMT_LIM.2: 15
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 27
  • FMT_MSA.3: 1
  • FMT_SMF.1: 22
  • FMT_SMR.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR: 14
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 10
  • FMT_MTD.1.1: 1
  • FMT_MTD.3: 3
  • FMT_MTD.3.1: 1
  • FMT_LIM: 18
  • FMT_LIM.1: 15
  • FMT_LIM.2: 14
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MSA: 73
  • FMT_MSA.1: 11
  • FMT_MSA.2: 2
  • FMT_MSA.3: 17
  • FMT_SMR: 62
  • FMT_SMR.1: 29
  • FMT_SMF: 50
  • FMT_SMF.1: 19
  • FMT_MTD: 31
  • FMT_MTD.1: 9
  • FMT_MTD.3: 1
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 7 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 16 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 15 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 1 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 27 31
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 10 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.3 3 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 14 62
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 2 29
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 4
  • FPT_TST: 2
  • FPT_EMS.1: 8
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 4
  • FPT_TST.1: 5
  • FPT_PHP.3: 5
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_EMS: 4
  • FPT_TST: 7
  • FPT_EMS.1: 12
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS: 34
  • FPT_FLS.1: 14
  • FPT_TDC.1: 7
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 12
  • FPT_RCV.3: 7
  • FPT_FLS.1.1: 2
  • FPT_TST.1: 13
  • FPT_PHP: 5
  • FPT_PHP.3: 12
  • FPT_RCV.4: 2
  • FPT_ITT: 5
  • FPT_ITT.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 8 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 4 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 1 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 5 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 2 7
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 5 13
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 4 14
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 2 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 4 2
pdf_data/st_keywords/crypto_protocol/PACE/PACE 92 162
pdf_data/st_keywords/crypto_scheme/KA
  • Key Agreement: 8
  • Key Agreement: 3
  • Key agreement: 2
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 8 3
pdf_data/st_keywords/crypto_scheme/MAC/MAC 6 16
pdf_data/st_keywords/eval_facility/Serma
  • Serma Technologies: 1
  • Serma Safety & Security: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-224: 1
  • SHA1:
    • SHA1: 2
    • SHA-1: 4
  • SHA2:
    • SHA-224: 4
    • SHA224: 2
    • SHA256: 1
    • SHA384: 1
    • SHA512: 1
    • SHA-256: 4
    • SHA-512: 4
    • SHA-384: 2
    • SHA2: 1
  • SHA3:
    • SHA3: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 1
  • SHA-224: 4
  • SHA224: 2
  • SHA256: 1
  • SHA384: 1
  • SHA512: 1
  • SHA-256: 4
  • SHA-512: 4
  • SHA-384: 2
  • SHA2: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 1 4
pdf_data/st_keywords/ic_data_group/EF
  • EF.DG1: 8
  • EF.DG2: 5
  • EF.DG3: 9
  • EF.DG4: 9
  • EF.DG5: 3
  • EF.DG16: 6
  • EF.DG14: 4
  • EF.DG15: 2
  • EF.COM: 3
  • EF.SOD: 4
  • EF.DG1: 6
  • EF.DG16: 6
pdf_data/st_keywords/ic_data_group/EF/EF.DG1 8 6
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.security: 3
    • javacard.framework: 3
  • javacardx:
    • javacardx.biometry: 1
    • javacardx.crypto: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.5: 5
pdf_data/st_keywords/randomness/RNG
  • RNG: 2
  • RNG: 31
  • RND: 6
pdf_data/st_keywords/randomness/RNG/RNG 2 31
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 3
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 2
    • Physical tampering: 2
    • Malfunction: 3
    • malfunction: 4
    • fault injection: 1
  • other:
    • reverse engineering: 1
  • SCA:
    • Leak-Inherent: 5
    • physical probing: 6
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 1
    • Physical Tampering: 3
    • malfunction: 8
    • Malfunction: 9
    • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical Tampering: 2
  • Physical tampering: 2
  • Malfunction: 3
  • malfunction: 4
  • fault injection: 1
  • physical tampering: 1
  • Physical Tampering: 3
  • malfunction: 8
  • Malfunction: 9
  • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 3 9
pdf_data/st_keywords/side_channel_analysis/FI/Physical Tampering 2 3
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 4 8
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 1 5
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 3 6
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
    • FIPS 186-3: 1
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 4
    • PKCS#1: 2
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 14
  • SCP:
    • SCP03: 2
    • SCP01: 1
    • SCP02: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 5
    • FIPS 140-2: 3
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS#5: 5
  • BSI:
    • AIS31: 4
    • AIS 31: 1
  • ISO:
    • ISO/IEC 7816-2: 1
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP01: 6
    • SCP02: 6
    • SCP03: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS46-3: 1
  • FIPS PUB 46-3: 1
  • FIPS 186-3: 1
  • FIPS 46-3: 1
  • FIPS 197: 1
  • FIPS180-2: 1
  • FIPS197: 5
  • FIPS 140-2: 3
  • FIPS 46-3: 1
  • FIPS 197: 1
pdf_data/st_keywords/standard_id/ICAO/ICAO 14 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 14443: 2
  • ISO/IEC 7816-4: 1
  • ISO/IEC 7816-2: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 4
  • PKCS#1: 2
  • PKCS#1: 8
  • PKCS#5: 5
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 2 8
pdf_data/st_keywords/standard_id/SCP/SCP01 1 6
pdf_data/st_keywords/standard_id/SCP/SCP02 1 6
pdf_data/st_keywords/standard_id/SCP/SCP03 2 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 11 28
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 6
  • TDES: 7
  • 3DES: 2
  • TDEA: 1
  • 3DES: 2
  • TDES: 15
  • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 7 15
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 6 3
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 1 20
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CMAC: 3
  • HMAC: 2
  • KMAC: 2
  • CMAC: 2
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC 3 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 458
  • Infineon:
    • Infineon: 15
    • Infineon Technologies AG: 2
  • Gemalto:
    • Gemalto: 31
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/vendor/Gemalto/Gemalto 458 31
pdf_data/st_metadata//Author Antoine de Lavernette D1487827
pdf_data/st_metadata//CreationDate D:20140127145341+01'00' D:20200219174719+01'00'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 Microsoft® Word 2013
pdf_data/st_metadata//Keywords Security Target, CC, eTravel 19-02-2020
pdf_data/st_metadata//ModDate D:20140127145341+01'00' D:20200219174719+01'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Microsoft® Word 2013
pdf_data/st_metadata//Subject MRTD 1.11
pdf_data/st_metadata//Title eTravel EAC v2 Security Target MultiApp V4.2: JCS Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 1010629 2463243
pdf_data/st_metadata/pdf_number_of_pages 73 145
dgst 1e8a276062b5313d 3bd742412c869eb9