name |
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH |
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
08.10.2021 |
09.02.2021 |
not_valid_before |
03.08.2018 |
09.02.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_04.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_32en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_04_LITE.pdf |
manufacturer |
Gemalto / Samsung |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.gemalto.com/ |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, EAL5+ |
dgst |
2ed49e59b7e90e34 |
fd22d93c12fd2799 |
heuristics/cert_id |
ANSSI-CC-2018/32 |
ANSSI-CC-2016/04 |
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, AGD_OPE.1, ADV_ARC.1, ALC_DEL.1, ADV_FSP.5, AGD_PRE.1, ALC_CMC.4, ALC_LCD.1, ALC_DVS.2, ATE_DPT.3, ADV_INT.2, ASE_TSS.2, AVA_VAN.5, ADV_IMP.1, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ADV_TDS.4 |
AVA_VAN.5, ALC_DVS.2 |
heuristics/extracted_versions |
4.1 |
4.2.0, 3.1, 1.3 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2019/31, ANSSI-CC-2018/58, ANSSI-CC-2019/07, ANSSI-CC-2018/32v2, ANSSI-CC-2018/53, ANSSI-CC-2018/57, ANSSI-CC-2018/56 |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2017/24, ANSSI-CC-2017/76 |
BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2015/15, ANSSI-CC-2015/37 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2018/58v2, ANSSI-CC-2019/31, ANSSI-CC-2018/58, ANSSI-CC-2019/07, ANSSI-CC-2018/32v2, ANSSI-CC-2018/53, ANSSI-CC-2018/56v2, ANSSI-CC-2018/57, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56 |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2016/59, BSI-DSZ-CC-0782-2012, ANSSI-CC-2017/76, ANSSI-CC-2017/54, ANSSI-CC-2017/07, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2015/66, ANSSI-CC-2017/24, BSI-DSZ-CC-0891-2015 |
BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/14, BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2015/15, ANSSI-CC-2015/37, ANSSI-CC-2014/86, BSI-DSZ-CC-0728-2011, ANSSI-CC-2015/08, ANSSI-CC-2014/06, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0837-V2-2014, BSI-DSZ-CC-0829-2012 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2018/32
- description: Le produit certifié est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Java Card version 3.0.4, GP version 2.3 (avec ID configuration version 1.0 et GP Mapping version 1.0) » développé par GEMALTO et par SAMSUNG ELECTRONICS CO.. e produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminolog
- developer: Gemalto, Samsung Electronics Co.
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2018/32
- certification_date: 2018-08-03
- developer: Gemalto, Samsung Electronics Co.
- evaluation_facility: Serma Safety & Security
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: Java Card System Protection Profile - Open Configuration, v.3.0
- report_link: https://cyber.gouv.fr/sites/default/files/2018/08/anssi-cc-2018_32fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/2018/08/anssi-cible-cc-2018_32-m01en.pdf
- level: EAL5+
- product: Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur
|
- cert_id: ANSSI-CC-2016/04
- description: Le produit certifié est la carte à puce ouverte « MultiApp V3.1 » pouvant être en mode contact ou sans-contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS. La cible d’évaluation est composée : de l’applet IAS Classic V4.2.0.B, qui permet à l’utilisateur de signer électroniquement des données ; de
- developer: Gemalto / NXP Semiconductors
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2016/04
- certification_date: 2016-02-09
- developer: Gemalto / NXP Semiconductors
- evaluation_facility: Serma Technologies
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6
- report_link: https://cyber.gouv.fr/sites/default/files/2016/02/ANSSI-CC-2016_04.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/2016/02/anssi_cible_2016_04_LITE.pdf
- level: EAL5+
- product: Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-ias-v420b-sur-la-plateforme-javacard-ouverte-multiapp-v31-masquee-1
|
heuristics/st_references/directly_referenced_by |
ANSSI-CC-2019/31 |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2017/24 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/st_references/indirectly_referenced_by |
ANSSI-CC-2019/31 |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2017/24 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
anssi-cc-2018_32fr.pdf |
ANSSI-CC-2016_04.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/32
- cert_item: Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH
- cert_item_version: Java Card version 3.0.4, GP version 2.3 (avec ID configuration version 1.0 et GP Mapping version 1.0
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics Co. 17 Floor, B-Tower, DSR building, Samsungjeonja-ro 1-1, Hwaseong-si, Gyenonggi-do 445-330 South Korea Commanditaire Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card System Protection Profile – Open Configuration, version 3.0
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/04
- cert_item: Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA
- cert_item_version: Version de l’application IAS : 4.2.0.B Version de l’application MOCA Server : 1.0 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Rapport de certification ANSSI-CC-2016/04 Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA Page 4 sur 22 ANSSI-CC-CER-F-07.017 Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device – Part 2 : Device with key generation, version 2.0.1, maintenu sous la référence [PP-SSCD-Part2]. Protection profiles for secure signature creation device – Part 3 : Device with key import, version 1.0.2, certifié sous la référence [PP-SSCD-Part3]. Protection profiles for secure signature creation device – Part 4: Extension for device with key generation and trusted communication with certificate generation application, Version 1.0.1, certifié sous la référence [PP-SSCD-Part4]. Protection profiles for secure signature creation device – Part 5: Extension for device with key generation and trusted communication with signature creation application, Version 1.0.1, certifié sous la référence [PP-SSCD-Part5]. Protection profiles for secure signature creation device – Part 6: Extension for device with key import and trusted communication with signature creation application, Version 1.0.4, certifié sous la référence [PP-SSCD-Part6
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2017/24: 3
- ANSSI-CC-2017/76: 3
- ANSSI-CC-2018/32: 22
- ANSSI-CC-PP-2010/03-M01: 1
|
- DE:
- BSI-DSZ-CC-0845-V2-2013: 2
- FR:
- ANSSI-CC-2015/15: 3
- ANSSI-CC-2015/37: 1
- ANSSI-CC-2016/04: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
|
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP- 0071-2012: 1
- BSI-CC-PP- 0072-2012: 1
- BSI-CC-PP- 0075-2012: 1
- BSI-CC-PP-0076-: 1
- other:
- PP-SSCD-: 5
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 2
- EAL 7: 1
- EAL4: 2
- EAL5: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 3
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
- Serma:
- SERMA: 2
- Serma Safety & Security: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- SCP:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
- com:
- com.gemalto: 1
- com.gemalto.javacard.eid: 1
- com.gemalto.javacard.esign: 1
- com.gemalto.javacard.iasclassic: 1
- com.gemalto.javacard.mspnp: 1
- com.gemalto.mchipadv: 1
- com.gemalto.moc.server: 1
- com.gemalto.mpcos: 1
- com.gemalto.pure: 1
- com.gemalto.puredi: 1
- com.visa.vsdc: 1
- javacard:
- javacard.eid: 1
- javacard.esign: 1
- javacard.iasclassic: 1
- javacard.mspnp: 1
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20180822151858+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.026
- /ModDate: D:20180823113947+02'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 845849
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2016_04
- pdf_file_size_bytes: 1916006
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
anssi-cible-cc-2018_32en.pdf |
anssi_cible_2016_04_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0845-V2-2013: 2
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-PP- 0055-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD: 4
- PP-SSCD-KG: 38
- PP-SSCD-KI: 29
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL5: 7
- EAL5 augmented: 2
- EAL5+: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 3
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 9
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 4
- ADV_IMP: 1
- ADV_IMP.1: 7
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 7
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 14
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM: 48
- FCS_CKM.1: 31
- FCS_CKM.1.1: 3
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 24
- FCS_CKM.4.1: 2
- FCS_COP: 38
- FCS_COP.1: 30
- FCS_COP.1.1: 5
- FCS_RND: 18
- FCS_RND.1: 8
- FCS_RND.1.1: 3
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 37
- FDP_ACC.1: 14
- FDP_ACC.2: 6
- FDP_ACF: 31
- FDP_ACF.1: 16
- FDP_IFC: 22
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 15
- FDP_IFF.1: 12
- FDP_ITC: 11
- FDP_ITC.1: 12
- FDP_ITC.2: 17
- FDP_ITT.1: 1
- FDP_RIP: 85
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_ROL: 13
- FDP_ROL.1: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 8
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 54
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 35
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 7
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 20
- FMT_LIM.1: 16
- FMT_LIM.1.1: 3
- FMT_LIM.2: 15
- FMT_LIM.2.1: 3
- FMT_MSA: 80
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 33
- FMT_MTD.1: 9
- FMT_MTD.3: 1
- FMT_SMF: 53
- FMT_SMF.1: 17
- FMT_SMF.1.1: 2
- FMT_SMR: 67
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 6
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 42
- FPT_FLS.1: 14
- FPT_FLS.1.1: 1
- FPT_ITT: 6
- FPT_ITT.1: 2
- FPT_PHP: 6
- FPT_PHP.3: 15
- FPT_PHP.3.1: 1
- FPT_RCV: 14
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 8
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FTP:
- FTP_ITC: 15
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FCS:
- FCS_CKM: 39
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 13
- FCS_CKM.4.1: 2
- FCS_COP: 19
- FCS_COP.1: 7
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 44
- FDP_ACC.1: 28
- FDP_ACC.1.1: 4
- FDP_ACF: 31
- FDP_ACF.1: 11
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_AFC: 1
- FDP_DAU: 9
- FDP_DAU.1: 1
- FDP_DAU.2: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ETC.1: 1
- FDP_IFC.1: 18
- FDP_ITC: 10
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI: 17
- FDP_SDI.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 8
- FDP_UCT.1: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 9
- FDP_UIT.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 15
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 5
- FIA_API.1: 14
- FIA_API.1.1: 2
- FIA_UAU: 18
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 18
- FIA_UID.1: 11
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 62
- FMT_MSA.1: 7
- FMT_MSA.1.1: 3
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 3
- FMT_MSA.4.1: 2
- FMT_MTD: 16
- FMT_MTD.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 36
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 13
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ICT: 2
- FTP_ITC: 36
- FTP_ITC.1: 5
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 15
- O.APPLET: 28
- O.CARD-MANAGEMENT: 2
- O.CARD_MANAGEMENT: 17
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 8
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INT: 3
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 11
- O.JAVAOBJECT: 56
- O.KEY-MNGT: 6
- O.KEY_MNGT: 4
- O.LOAD: 6
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 13
- O.SCP: 29
- O.SID: 13
- O.TDES: 1
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CODE-EVIDENCE: 10
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP: 1
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
- A:
- A.CGA: 4
- A.CSP: 5
- A.SCA: 4
- OE:
- OE.HID_VAD: 2
- OE.HI_VAD: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
- Serma:
- Serma Safety & Security: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 15
- Triple-DES: 3
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 2
- SHA-512: 4
- SHA224: 1
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 3
- Key agreement: 2
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 9
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 5
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
- FI:
- DFA: 1
- Malfunction: 1
- fault injection: 1
- physical tampering: 4
- SCA:
- DPA: 1
- Leak-Inherent: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1: 6
- EF.DG16: 6
- EF.DG3: 1
- EF.DG4: 1
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2009-07-004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 5
|
- CC:
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS197: 2
- FIPS46-3: 1
- ICAO:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 8
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20180328144957+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: 28-03-2018
- /ModDate: D:20180823114004+02'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 2571177
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 127
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20150723160151+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20150723160151+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1145055
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |