name |
FM1280 V05 |
Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
FR |
status |
archived |
archived |
not_valid_after |
02.07.2023 |
01.09.2019 |
not_valid_before |
02.07.2018 |
27.02.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-109%20C%20v%202.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-109%20Certification%20Report%20Fudan%20EAL5plus%20v2.0_rev.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_11fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FM1280%20EAL5plus%20ST%20lite%20v2.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_11en.pdf |
manufacturer |
Shanghai Fudan Microelectronics Group Co., Ltd. |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://eng.fmsh.com |
https://www.gemalto.com/ |
security_level |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
29eab60d2793d1a1 |
1e8a276062b5313d |
heuristics/cert_id |
SERTIT-109 |
ANSSI-CC-2014/11 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.2, ADV_ARC.1, AVA_VAN.5 |
heuristics/extracted_versions |
- |
2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/07, ANSSI-CC-2014/06 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2014/07, ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011, ANSSI-CC-2013/33, ANSSI-CC-2013/32, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 02.07.2018
- developer: Shanghai Fudan Microelectronics Group Co., Ltd.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-109
- certification_date: 02.07.2018
- description: The TOE is a Dual Interface Smart Card Chip with IC Dedicated Software. It provides TDES, RSA, AES, ECC,True Random Number Generator and other security features. It can be widely and easily applied in various security fields such as banking and financial market, social security card, transport card, small-amount payment and security identification, etc. The TOE supports the following communication interfaces: - ISO/IEC 14443 TYPE A contactless interface - ISO/IEC 7816 contact interface - GPIO - SPI - I2C - UART
- developer: Shanghai Fudan Microelectronics Group Co., Ltd.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135331-1607953855/SERTIT/Sertifikater/2018/109/SERTIT-109%20C%20v%202.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135325-1607953847/SERTIT/Sertifikater/2018/109/FM1280%20EAL5%2B%20ST%20lite.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135328-1607953852/SERTIT/Sertifikater/2018/109/SERTIT-109%20Certification%20Report%20Fudan%20EAL5%2B%20v2.0_rev.pdf'})], 'maintenance': [frozendict({'href': 'https://sertit.no/getfile.php/135322-1607953843/SERTIT/Sertifikater/2018/109/SERTIT-109%20MR%20Maintenance%20Report%20v1.0-.pdf'})]})
- evaluation_facility: Brightsight B.V.
- expiration_date: 02.07.2023
- level: EAL 5, ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: V05
- protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, BSI-CC-PP-0084-2014
- sponsor: Shanghai Fudan Microelectronics Group Co., Ltd.
- product: FM1280
- url: https://sertit.no/certified-products/product-archive/fm1280
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0829-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010 |
heuristics/protection_profiles |
cf0f01bcd7be3e9c |
a33327d40f253f46 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
SERTIT-109 C v 2.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes: 2830569
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
SERTIT-109 Certification Report Fudan EAL5plus v2.0_rev.pdf |
Rapport ANSSI-CC-2014_11fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/11
- cert_item: Application eTravel EAC v2.0, en configuration EAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version: Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0056-V2, [PP EAC PACE], version 1.3.1 Machine Readable Travel Document with ICAO Application, Extended Access Control with PACE
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- FR:
- ANSSI-CC-2014/06: 4
- ANSSI-CC-2014/07: 1
- ANSSI-CC-2014/11: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0056-V2-2012-MA-01: 1
- BSI-CC-PP-0056-V2: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 5: 22
- EAL 5 augmented: 1
- EAL1: 1
- EAL4: 1
- EAL5: 1
- EAL5+: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 8
- FCS_RNG.1: 4
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_SDC.1: 4
- FDP_SDI.2: 3
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies: 23
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408: 8
- ISO/IEC 7816: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Ulrich Isachsen
- /CreationDate: D:20190319130354+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: ugradert
- /ModDate: D:20190319130354+01'00'
- /Producer: Microsoft® Word 2013
- /Title: tittel
- pdf_file_size_bytes: 423796
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Duquesnoy
- /CreationDate: D:20140310105223+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140310105223+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: Microsoft Word - Rapport ANSSI-CC-2014_11fr.doc
- pdf_file_size_bytes: 268204
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
FM1280 EAL5plus ST lite v2.0.pdf |
Cible ANSSI-CC-2014_11en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0002: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ALC:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.4: 9
- FCS_COP.1: 28
- FCS_COP.1.1: 4
- FCS_RNG.1: 6
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 13
- FDP_ITC.2: 5
- FDP_ITT.1: 6
- FDP_SDC.1: 7
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 2
- FMT_MSA.3: 3
- FPT:
- FPT_FLS.1: 6
- FPT_ITT.1: 6
- FPT_PHP.3: 5
- FRU:
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 7
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 27
- FCS_CKM.1: 10
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 25
- FCS_CKM.4.1: 1
- FCS_COP: 41
- FCS_COP.1: 5
- FCS_COP.1.1: 7
- FCS_RND: 7
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 4
- FDP_ACC.1.1: 1
- FDP_ACF: 4
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_UCT: 2
- FDP_UCT.1: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 11
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 10
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 25
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 2
- FIA_UID: 10
- FIA_UID.1: 3
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 16
- FMT_LIM.1.1: 3
- FMT_LIM.2: 15
- FMT_LIM.2.1: 3
- FMT_MSA.3: 1
- FMT_MTD: 27
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_MTD.3: 3
- FMT_MTD.3.1: 1
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR: 14
- FMT_SMR.1: 2
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 8
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 2
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 5
- O.ECC: 5
- O.MEM_ACCCESS: 1
- O.MEM_ACCESS: 4
- O.RND: 3
- O.RSA: 5
- O.TDES: 6
- T:
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 16
- Triple-DES: 7
- DES:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 7
- Triple-DES: 6
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 5
- fault injection: 1
- malfunction: 4
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 2
|
- FI:
- Malfunction: 3
- Physical Tampering: 2
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- SCA:
- DPA: 2
- Leak-Inherent: 1
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 8
- EF.DG14: 4
- EF.DG15: 2
- EF.DG16: 6
- EF.DG2: 5
- EF.DG3: 9
- EF.DG4: 9
- EF.DG5: 3
- EF.SOD: 4
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 4
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 1
- PKCS:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: FMSH
- /CreationDate: D:20180606084137+08'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180606084137+08'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 677458
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20140127145341+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20140127145341+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel EAC v2 Security Target
- pdf_file_size_bytes: 1010629
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 73
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |