Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)
ANSSI-CC-2023/59
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 )
ANSSI-CC-2023/34
name Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59) eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 )
not_valid_after 28.12.2028 22.09.2028
not_valid_before 28.12.2023 22.09.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_34fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_34fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_59en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_34en.pdf
manufacturer Apple Inc. THALES DIS FRANCE SA
manufacturer_web https://www.apple.com/ https://www.thalesgroup.com/en/europe/france
security_level EAL2+, ADV_FSP.3 ADV_INT.2, ALC_CMS.5, ADV_FSP.5, ALC_TAT.2, ADV_TDS.4, ALC_DVS.2, ATE_DPT.3, EAL4+
dgst 204cb8d5dbf8e997 47e2487a9d336183
heuristics/cert_id ANSSI-CC-2023/59 ANSSI-CC-2023/34
heuristics/cpe_matches cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_CCL.1, ALC_DEL.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_ARC.1, ADV_TDS.1, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, ALC_CMS.2, ALC_CMC.2, AVA_VAN.2, ASE_INT.1, AGD_PRE.1, ASE_OBJ.2, ADV_FSP.3 ADV_ARC.1, ADV_FSP.5, ALC_FLR.2, ALC_CMS.5, ALC_DVS.2, ATE_DPT.3, ADV_INT.2, ASE_TSS.2, ALC_TAT.2, ADV_TDS.4
heuristics/extracted_versions 16.4.1 3.1, 3.1.0.0, 5.1
heuristics/related_cves CVE-2023-40417, CVE-2024-44185, CVE-2023-38600, CVE-2023-41065, CVE-2023-38603, CVE-2024-44233, CVE-2023-38133, CVE-2023-32388, CVE-2023-40419, CVE-2023-42937, CVE-2024-40857, CVE-2023-41060, CVE-2023-41174, CVE-2024-27807, CVE-2023-42852, CVE-2024-27863, CVE-2024-40795, CVE-2023-32357, CVE-2023-35993, CVE-2024-23213, CVE-2023-40408, CVE-2024-44207, CVE-2024-44198, CVE-2024-27884, CVE-2023-42949, CVE-2024-40791, CVE-2023-38594, CVE-2023-40409, CVE-2023-32415, CVE-2023-41070, CVE-2023-38593, CVE-2023-40413, CVE-2024-27831, CVE-2024-27873, CVE-2024-44206, CVE-2024-27840, CVE-2024-40856, CVE-2023-36495, CVE-2024-40798, CVE-2024-23217, CVE-2023-32371, CVE-2024-27805, CVE-2023-41061, CVE-2023-32411, CVE-2023-41074, CVE-2023-40403, CVE-2023-41993, CVE-2024-44131, CVE-2023-40416, CVE-2024-44302, CVE-2023-38595, CVE-2023-28204, CVE-2023-32376, CVE-2024-40776, CVE-2024-23251, CVE-2023-38604, CVE-2024-27851, CVE-2024-40853, CVE-2024-23206, CVE-2023-41995, CVE-2023-40438, CVE-2023-32420, CVE-2024-23214, CVE-2024-44191, CVE-2023-42884, CVE-2023-32398, CVE-2024-40780, CVE-2024-40835, CVE-2023-32385, CVE-2023-40394, CVE-2023-40442, CVE-2023-40449, CVE-2024-44164, CVE-2023-37450, CVE-2023-32392, CVE-2023-42919, CVE-2023-42846, CVE-2024-23223, CVE-2023-34425, CVE-2024-44258, CVE-2023-40384, CVE-2023-38612, CVE-2024-44255, CVE-2023-42950, CVE-2024-44205, CVE-2024-23211, CVE-2024-23282, CVE-2023-40395, CVE-2023-42870, CVE-2023-41997, CVE-2024-44171, CVE-2023-41968, CVE-2023-40424, CVE-2024-44235, CVE-2023-42916, CVE-2024-44218, CVE-2024-23218, CVE-2024-44215, CVE-2023-40452, CVE-2023-32368, CVE-2023-40528, CVE-2023-32404, CVE-2024-23270, CVE-2024-40867, CVE-2023-32399, CVE-2023-38136, CVE-2024-40818, CVE-2023-42925, CVE-2024-27815, CVE-2023-32441, CVE-2023-40385, CVE-2024-44183, CVE-2024-44297, CVE-2023-32402, CVE-2024-23212, CVE-2024-40774, CVE-2024-27808, CVE-2024-44252, CVE-2023-32413, CVE-2023-38572, CVE-2023-41986, CVE-2023-40410, CVE-2024-44123, CVE-2023-40446, CVE-2024-27800, CVE-2023-28191, CVE-2024-23215, CVE-2023-32407, CVE-2023-32391, CVE-2024-44124, CVE-2024-44187, CVE-2023-40448, CVE-2023-32367, CVE-2023-40529, CVE-2024-40850, CVE-2023-42849, CVE-2023-42883, CVE-2024-27850, CVE-2023-40441, CVE-2024-44269, CVE-2023-35074, CVE-2023-41071, CVE-2024-44139, CVE-2024-27828, CVE-2023-41983, CVE-2023-32437, CVE-2023-28202, CVE-2023-42866, CVE-2024-40785, CVE-2023-38605, CVE-2023-32372, CVE-2023-42936, CVE-2023-40414, CVE-2023-40437, CVE-2023-40520, CVE-2023-40443, CVE-2023-38599, CVE-2023-41254, CVE-2023-42947, CVE-2023-41984, CVE-2023-32423, CVE-2023-42893, CVE-2023-32409, CVE-2024-44239, CVE-2024-44244, CVE-2024-40815, CVE-2024-44232, CVE-2024-40779, CVE-2024-27811, CVE-2023-40428, CVE-2024-23222, CVE-2024-40812, CVE-2023-35984, CVE-2024-27845, CVE-2023-42824, CVE-2023-42857, CVE-2023-40420, CVE-2023-41232, CVE-2024-44165, CVE-2024-27833, CVE-2023-32352, CVE-2023-41063, CVE-2024-44234, CVE-2024-40822, CVE-2023-32354, CVE-2024-27832, CVE-2023-40400, CVE-2023-42888, CVE-2023-41982, CVE-2023-41991, CVE-2023-40399, CVE-2023-40427, CVE-2023-40439, CVE-2024-44180, CVE-2023-42896, CVE-2023-41974, CVE-2023-38596, CVE-2024-27857, CVE-2023-41992, CVE-2023-40391, CVE-2024-23296, CVE-2023-32408, CVE-2023-40423, CVE-2023-27930, CVE-2023-41980, CVE-2023-38610, CVE-2023-40456, CVE-2023-38565, CVE-2024-27880, CVE-2023-34352, CVE-2024-23273, CVE-2024-40789, CVE-2024-40809, CVE-2024-27817, CVE-2023-42833, CVE-2023-38590, CVE-2023-41073, CVE-2023-42941, CVE-2024-44251, CVE-2023-32373, CVE-2024-40787, CVE-2023-41064, CVE-2024-40793, CVE-2024-27823, CVE-2024-40840, CVE-2024-40851, CVE-2023-32394, CVE-2023-42957, CVE-2023-32428, CVE-2024-27836, CVE-2023-42890, CVE-2024-40806, CVE-2024-40833, CVE-2023-32359, CVE-2023-42841, CVE-2023-32425, CVE-2024-27820, CVE-2023-40429, CVE-2023-32416, CVE-2024-23210, CVE-2024-27855, CVE-2024-44170, CVE-2023-42922, CVE-2024-27802, CVE-2023-35990, CVE-2024-27830, CVE-2023-45866, CVE-2023-42917, CVE-2023-42872, CVE-2023-32734, CVE-2024-44273, CVE-2024-44274, CVE-2023-42923, CVE-2024-23219, CVE-2023-32412, CVE-2023-32422, CVE-2023-40454, CVE-2023-38611, CVE-2023-38410, CVE-2023-42962, CVE-2024-44176, CVE-2023-32396, CVE-2024-27819, CVE-2023-32403, CVE-2023-40434, CVE-2024-23225, CVE-2023-42934, CVE-2023-41069, CVE-2023-38598, CVE-2023-40432, CVE-2023-38592, CVE-2023-32381, CVE-2023-32445, CVE-2023-32433, CVE-2024-40826, CVE-2024-27799, CVE-2024-44282, CVE-2024-44155, CVE-2024-44126, CVE-2024-40778, CVE-2023-41977, CVE-2023-42956, CVE-2023-32390, CVE-2023-32365, CVE-2023-38606, CVE-2024-44144, CVE-2024-40813, CVE-2023-39434, CVE-2023-38261, CVE-2023-32384, CVE-2023-32400, CVE-2024-40863, CVE-2023-32419, CVE-2023-32439, CVE-2023-40412, CVE-2024-27871, CVE-2024-40796, CVE-2023-41981, CVE-2024-44194, CVE-2024-27806, CVE-2023-42899, CVE-2023-32434, CVE-2023-40392, CVE-2024-40830, CVE-2023-38597, CVE-2023-32389, CVE-2024-40786, CVE-2023-38425, CVE-2024-27801, CVE-2023-41068, CVE-2024-44184, CVE-2023-42869, CVE-2023-32361, CVE-2023-38424, CVE-2024-27848, CVE-2023-38580, CVE-2024-23208, CVE-2023-40431, CVE-2024-40788, CVE-2022-3970, CVE-2023-40447, CVE-2023-42914, CVE-2024-40844, CVE-2024-44229, CVE-2024-44254, CVE-2024-44158, CVE-2024-27838, CVE-2024-40799, CVE-2023-42871, CVE-2024-44204, CVE-2024-40794, CVE-2023-32432, CVE-2023-41976 {}
heuristics/report_references/directly_referencing {} ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/scheme_data
  • cert_id: ANSSI-CC-2023/59
  • description: Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC..
  • developer: APPLE INC.
  • enhanced:
    • augmented: ADV_FSP.3
    • category: Divers
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2023/59
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_59en.pdf
    • certification_date: 2023-12-28
    • developer: APPLE INC.
    • evaluation_facility: THALES / CNES
    • expiration_date: 2028-12-28
    • level: EAL2+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile:
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_59en.pdf
    • sponsor: APPLE INC.
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_59en.pdf
  • expiration_date: 2028-12-28
  • level: EAL2+
  • product: Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1 Version iOS 16.4.1 (build 20E252)
  • sponsor: APPLE INC.
  • url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-14-pro-a16-bionic-running-ios
  • cert_id: ANSSI-CC-2023/34
  • description: Le produit évalué est « eTravel 3.1 BAC on MultiApp V5.1, Version 3.1.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur notamment lo
  • developer: THALES DIS FRANCE SAS
  • enhanced:
    • augmented: ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2 et ATE_DPT.3
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2023/34
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_34fr.pdf
    • certification_date: 2023-09-22
    • developer: THALES DIS FRANCE SAS
    • evaluation_facility: CEA-LETI
    • expiration_date: 2028-09-22
    • level: EAL4+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Basic Access Control, version 1.10 certifié BSI-PP-0055 le 25 mars 2009
    • sponsor: THALES DIS FRANCE SAS
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_34-M01en_0.pdf
  • expiration_date: 2028-09-22
  • level: EAL4+
  • product: eTravel 3.1 BAC on MultiApp V5.1 (Version 3.1.0.0 )
  • sponsor: THALES DIS FRANCE SAS
  • url: https://cyber.gouv.fr/produits-certifies/etravel-31-bac-multiapp-v51-version-3100
heuristics/st_references/directly_referencing {} ANSSI-CC-2023/01
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2023/01
maintenance_updates
protection_profiles
pdf_data/cert_filename certificat-CC-2023_59en.pdf Certificat-CC-2023_34fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/59: 2
  • FR:
    • ANSSI-CC-2023/34: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0055: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
  • EAL:
    • EAL2: 1
    • EAL4: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.3: 1
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 2
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20240222154612+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155210+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 138174
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20230929174531+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20230929175424+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 157890
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2023_59en.pdf ANSSI-CC-2023_34fr.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/59: 2
  • FR:
    • ANSSI-CC-2023/01: 1
    • ANSSI-CC-2023/31: 1
    • ANSSI-CC-2023/34: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055-2009: 1
    • BSI-PP-0055: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 1
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Basic: 1
  • EAL:
    • EAL2: 2
    • EAL4: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.3: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO: 1
pdf_data/report_metadata
pdf_data/st_filename ANSSI-cible-CC-2023_59en.pdf ANSSI-cible-2023_34en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/01: 1
  • NL:
    • CC-1: 2
    • CC-2: 5
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0068-: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP- 0056-V2-MA-2012: 1
    • BSI-PP-0055-2009: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
  • EAL:
    • EAL 6+: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL6: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP: 1
    • ADV_FSP.1: 2
    • ADV_FSP.2: 4
    • ADV_FSP.3: 2
    • ADV_TDS.1: 4
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 3
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • ALC:
    • ALC_CMS.5: 3
    • ALC_DVS.2: 3
    • ALC_FLR.2: 1
    • ALC_TAT.2: 3
  • ASE:
    • ASE_ECD: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_DPT.3: 3
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC: 25
    • FDP_ACC.1: 11
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 23
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC: 8
    • FDP_ETC.2: 2
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 9
    • FDP_ITC: 5
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 4
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 15
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 10
    • FDP_SDI.1.1: 1
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 7
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 14
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 10
    • FPT_RPL.1: 4
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 15
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 28
    • FCS_CKM.4.1: 1
    • FCS_COP: 42
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
    • FCS_RND: 7
    • FCS_RND.1: 10
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 2
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 11
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 9
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 3
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 18
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 27
    • FMT_MTD.1: 6
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 23
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.CDCVM: 3
    • A.DE-: 2
    • A.DEVICE_AUTH: 1
    • A.PERSO: 3
    • A.WATCH_USER: 3
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • OE:
    • OE.CDCVM: 3
  • T:
    • T.CORRUPT: 2
    • T.PHYSICAL: 2
    • T.RECOVER: 2
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIMMING: 2
    • T.USURP: 2
  • O:
    • O.RND: 1
  • OE:
    • OE.MRTD_: 2
pdf_data/st_keywords/vendor
  • Thales:
    • Thales: 29
pdf_data/st_keywords/eval_facility
  • CESTI:
    • CESTI: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 7
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
  • PACE:
    • PACE: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 5
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 1
    • Physical Probing: 1
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 6
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 8
    • EF.DG1: 28
    • EF.DG13: 3
    • EF.DG14: 3
    • EF.DG15: 5
    • EF.DG16: 26
    • EF.DG2: 10
    • EF.DG3: 6
    • EF.DG4: 6
    • EF.DG5: 7
    • EF.DG6: 1
    • EF.SOD: 8
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
  • BSI:
    • BSI-AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 46-3: 2
    • FIPS PUB 46-3: 1
    • FIPS46-3: 3
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • NIST:
    • SP 800-90: 1
  • RFC:
    • RFC3369: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • out of scope: 2
    • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
pdf_data/st_metadata
  • /CreationDate: D:20231109105238Z
  • /Creator: Word
  • /ModDate: D:20231109105301Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A16Bionic_iOS16_SecurityTarget_v1.4.docx
  • pdf_file_size_bytes: 2520806
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
  • /Author: THALES
  • /CreationDate: D:20230517105330+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: Security Target
  • /ModDate: D:20230517105330+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: MultiApp V5.1: eTravel 3.1 BAC Security Target
  • pdf_file_size_bytes: 1795365
  • pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different