name |
Carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqu� par le logiciel SESAM VITALE v1.0.1 avec correctif version 1
|
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0.
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Boundary Protection Devices and Systems
|
not_valid_before |
2012-06-07
|
2019-06-03
|
not_valid_after |
2019-09-01
|
2024-06-02
|
scheme |
FR
|
IN
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-68en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST-version1.4.pdf
|
status |
archived
|
archived
|
manufacturer |
MORPHO / ST Microelectronics
|
Haltdos.com Private Limited E – 52, Sector -3, Noida, UP, 201301, India
|
manufacturer_web |
https://www.morpho.com
|
https://www.haltdos.com/
|
security_level |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
ALC_CMC.3, ALC_CMS.3, EAL2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-68fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-%20HaltDOS_EAL2.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HaltDoS%20Certificate.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': frozenset({'SSCD_TYPE3_V1.05'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP Embedded Software for Smart Secure Devices Basic and Extended Configurations, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/anssi-cc_PP-2009-02en.pdf', 'pp_ids': frozenset({'PP_EMBEDDED_SOFTWARE_V1.0'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': frozenset({'SSCD_TYPE2_V1.04'})}) |
|
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
c37ddae4e7353c9209a5225d7c76caf80eeef6e8b93f38ad3b7620cdc1c19323
|
state/cert/txt_hash |
None
|
73e2f528736c4653aabc3f92ba9e0b96e4657bcfaa34bc373f11273edbb71c47
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
00c92a01e77741223a06c2c6d712bbabd68b59803bef0e8248d9705d307f1824
|
9aeafe749cabc47d09371539c3fe31069cddec0c64ff5dcb1f3b77e6cb80125c
|
state/report/txt_hash |
2419b01971150dfaf67cb7baa546bf06d87811c3dd06f05005070f181eb7232c
|
f688cb8020060bc5a003cf01f309718d2e96a3cfb2bded72d4954b13cf44fa3b
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
58b7a64efc6ecdfedd1ddacfe753cf97fc34cb4ac31016672fadd711d000d017
|
38c6bb37d83f066055bb6748a12152f16a12fac92d8174d5656db70e74ee5e76
|
state/st/txt_hash |
c3d640ec3a44f2d19209208c4c4c11b207b7dd7f7ba3065475b65718e0ddce57
|
eafe4bc50bf269ecb030359b185117f6b77a39ab9ef2fcb26e6d1121121a6863
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2011/68
|
IC3S/BG01/HALTDOS/EAL2/0317/0008
|
heuristics/cert_lab |
CEA |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.0.1 |
1.1, 2.0, 1.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2015/35 |
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2010/08 |
None
|
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2015/35 |
None
|
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2010/08 |
None
|
heuristics/scheme_data |
- product:
Carte VITALE 2 - Application ADELE
- url: https://cyber.gouv.fr/produits-certifies/carte-vitale-2-application-adele
- description: Le produit certifié est la « carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1 » développée par Morpho et STMicroelectronics.
Suivant une règle de nommage interne de Morpho, la version du correctif (1) correspond au dernier digit de la version du système d'exploitation (1.0.1).
La cible d'évaluation (TOE – Targ
- sponsor:
Morpho
- developer:
Morpho et STMicroelectronics
- cert_id: 2011/68
- level:
EAL4+
- enhanced:
- cert_id:
2011/68
- certification_date:
07/06/2012
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r3
- developer:
Morpho et STMicroelectronics
- sponsor:
Morpho
- evaluation_facility:
CEA - LETI
- level:
EAL4+
- protection_profile:
[PP ESforSSD] certifié par l'ANSSI, BSI-PP-0005-2002 et BSI-PP-0006-2002
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-68en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-68fr.pdf
|
- serial_number: 2
- product:
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0.
- sponsor:
Haltdos.com Private Limited
- developer:
Haltdos.com Private Limited .
- level:
EAL2+
- target_link: https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/ST-version1.4.pdf
- target_name: ST-version1.4.pdf
- cert_link: https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/HaltDoS%20Certificate.pdf
- cert_name: HaltDoS Certificate.pdf
- certification_date: 06/Mar/2019
- report_link: https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/CR-%20HaltDOS_EAL2.pdf
- report_name: CR- HaltDOS_EAL2.pdf
|
heuristics/scheme_data/developer |
Morpho et STMicroelectronics
|
Haltdos.com Private Limited .
|
heuristics/scheme_data/level |
EAL4+
|
EAL2+
|
heuristics/scheme_data/product |
Carte VITALE 2 - Application ADELE
|
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0.
|
heuristics/scheme_data/sponsor |
Morpho
|
Haltdos.com Private Limited
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
ANSSI-CC-2010/08 |
None
|
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2010/08 |
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
HaltDoS Certificate.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
1212653
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Creator:
Canon
- /CreationDate:
D:20190405145224+05'30'
- /Producer:
- pdf_hyperlinks:
|
pdf_data/report_filename |
ANSSI-CC_2011-68fr.pdf
|
CR- HaltDOS_EAL2.pdf
|
pdf_data/report_frontpage |
- FR:
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité aux profils de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2011/68
- cert_item:
Carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.1 avec correctif version 1
- cert_item_version:
- Version système d’exploitation : 1.0.1 - Version du correctif : 1
- ref_protection_profiles:
- [PP ESforSSD] certifié par l’ANSSI Protection Profile Embedded software for Smart Secure Devices Basic and Extended configurations – Basic configuration, version 1.0 - [BSI-PP-0005-2002] : SSCD Type 2, version 1.04 - [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
- cc_version:
Critères Communs version 3.1 révision 3
- cc_security_level:
EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- developer:
Morpho 18 Chaussée Jules César, 95520 Osny, France STMicroelectronics 29 Boulevard Romain Rolland - 75669 Paris CEDEX 14 Commanditaire Morpho 18 Chaussée Jules César, 95520 Osny, France
- cert_lab:
CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2011/68:
21
- ANSSI-CC-2010_08:
3
|
- IN:
- IC3S/BG01/HALTDOS/EAL2/0317/0008/CR:
15
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.BACKUP:
1
- A.CONNECT:
1
- A.NOEVIL:
1
- A.PHYSICAL:
1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0005-2002:
2
- BSI-PP-0006-2002:
1
- BSI-PP-0035-2007:
2
- BSI-PP- 0005-2002:
1
- BSI-PP- 0006-2002:
1
- BSI-PP- 0035-2007:
1
- ANSSI:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ALC:
- ALC_CMC.3:
2
- ALC_CMS.3:
3
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_CMC.3:
2
- ALC_CMS.3:
3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4:
2
- EAL4:
2
- EAL5:
1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
- ITSEC:
|
- EAL:
- EAL2+:
2
- EAL2:
2
- EAL 2+:
1
- EAL1:
1
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 4:
2
- EAL4:
2
- EAL5:
1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
|
- EAL2+:
2
- EAL2:
2
- EAL 2+:
1
- EAL1:
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- CESTI:
- CEA-LETI:
- CEA - LETI:
1
- CEA-LETI:
2
|
- ETDC:
- Common Criteria Test Laboratory, ETDC:
1
|
pdf_data/report_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- STMicroelectronics:
- Morpho:
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
417135
- pdf_is_encrypted:
False
- pdf_number_of_pages:
20
- /CreationDate:
D:20120607110747+02'00'
- /Creator:
PScript5.dll Version 5.2
- /ModDate:
D:20120618193327+02'00'
- /Producer:
Acrobat Distiller 8.1.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
409310
- pdf_is_encrypted:
False
- pdf_number_of_pages:
15
- /Author:
- /CreationDate:
D:20190405104104+05'30'
- /Creator:
- /Keywords:
- /ModDate:
D:20190405104122+05'30'
- /Producer:
Foxit PhantomPDF Printer Version 6.0.4.1129
- /Subject:
- /Title:
- pdf_hyperlinks:
http://www.commoncriteria-india.gov.in/
|
pdf_data/report_metadata//CreationDate |
D:20120607110747+02'00'
|
D:20190405104104+05'30'
|
pdf_data/report_metadata//Creator |
PScript5.dll Version 5.2
|
|
pdf_data/report_metadata//ModDate |
D:20120618193327+02'00'
|
D:20190405104122+05'30'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.1.0 (Windows)
|
Foxit PhantomPDF Printer Version 6.0.4.1129
|
pdf_data/report_metadata//Title |
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
417135
|
409310
|
pdf_data/report_metadata/pdf_hyperlinks |
|
http://www.commoncriteria-india.gov.in/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
20
|
15
|
pdf_data/st_filename |
ANSSI-CC-cible_2011-68en.pdf
|
ST-version1.4.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- T:
- A:
- OE:
- OE.HI_VAD:
10
- OE.RND:
11
- OE.SVD_AUTH_CGA:
2
- OSP:
- OSP.MANAGEMENT_OF_SECRETS:
1
|
- O:
- O.AUDIT:
12
- O.FAILSAFE:
6
- O.IDAUTH:
10
- O.MANAGE:
9
- O.PROCOM:
10
- T:
- T.AUDIT:
3
- T.FAILURE:
3
- T.MANAGE:
4
- T.NOAUTH:
3
- T.PROCOM:
3
- A:
- A.BACKUP:
3
- A.CONNECT:
3
- A.NOEVIL:
3
- A.PHYSICAL:
3
- OE:
- OE.AUDIT:
4
- OE.BACKUP:
3
- OE.CONNECT:
3
- OE.NOEVIL:
3
- OE.PHYSICAL:
3
|
pdf_data/st_keywords/cc_claims/A |
|
- A.BACKUP:
3
- A.CONNECT:
3
- A.NOEVIL:
3
- A.PHYSICAL:
3
|
pdf_data/st_keywords/cc_claims/O |
|
- O.AUDIT:
12
- O.FAILSAFE:
6
- O.IDAUTH:
10
- O.MANAGE:
9
- O.PROCOM:
10
|
pdf_data/st_keywords/cc_claims/OE |
- OE.HI_VAD:
10
- OE.RND:
11
- OE.SVD_AUTH_CGA:
2
|
- OE.AUDIT:
4
- OE.BACKUP:
3
- OE.CONNECT:
3
- OE.NOEVIL:
3
- OE.PHYSICAL:
3
|
pdf_data/st_keywords/cc_claims/T |
|
- T.AUDIT:
3
- T.FAILURE:
3
- T.MANAGE:
4
- T.NOAUTH:
3
- T.PROCOM:
3
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- ANSSI:
- ANSSI-CC-PP-ESforSSD_Basic:
1
- ANSSI-CC-PP-ESforSSD_Extended:
1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_IMP.1:
1
- ADV_TDS.3:
1
- AGD:
- AGD_PRE:
1
- AGD_OPE:
1
- AGD_PRE.1:
1
- AGD_OPE.1:
1
- ALC:
- ALC_DVS.2:
8
- ALC_DVS.1:
1
- AVA:
|
- ADV:
- ADV_ARC.1:
11
- ADV_FSP.2:
11
- ADV_TDS.1:
11
- AGD:
- AGD_OPE.1:
11
- AGD_PRE.1:
6
- ALC:
- ALC_CMC.3:
18
- ALC_CMS.3:
11
- ALC_DEL.1:
6
- ALC_DVS.1:
5
- ALC_LCD.1:
7
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ATE:
- ATE_COV.1:
5
- ATE_FUN.1:
9
- ATE_IND.2:
6
- AVA:
- ASE:
- ASE_CCL.1:
15
- ASE_ECD.1:
10
- ASE_INT.1:
12
- ASE_OBJ.2:
11
- ASE_REQ.2:
14
- ASE_SPD.1:
8
- ASE_TSS.1:
5
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
|
- ADV_ARC.1:
11
- ADV_FSP.2:
11
- ADV_TDS.1: 11
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
11
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 |
1
|
11
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_PRE: 1
- AGD_OPE: 1
- AGD_PRE.1:
1
- AGD_OPE.1:
1
|
- AGD_OPE.1:
11
- AGD_PRE.1:
6
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
11
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
1
|
6
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.2: 8
- ALC_DVS.1:
1
|
- ALC_CMC.3: 18
- ALC_CMS.3: 11
- ALC_DEL.1: 6
- ALC_DVS.1:
5
- ALC_LCD.1: 7
- ALC_CMC.2: 1
- ALC_CMS.2: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 |
1
|
5
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 4:
1
- EAL5:
1
- EAL4+:
3
- EAL4:
3
- EAL 5+:
1
- EAL 4 augmented:
1
- EAL5 augmented:
1
- EAL4 augmented:
1
|
- EAL2:
2
- EAL2+:
1
- EAL 2+:
2
- EAL 2:
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP:
4
- FAU_SAA:
4
- FAU_GEN:
1
- FAU_ARP.1:
2
- FAU_SAA.1:
3
- FCS:
- FCS_CKM.1:
3
- FCS_CKM:
9
- FCS_CKM.4:
5
- FCS_COP.1:
9
- FCS_COP:
10
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.1.1:
1
- FCS_CKM.2:
1
- FCS_CKM.3:
1
- FDP:
- FDP_ACC:
31
- FDP_ACF:
31
- FDP_ETC:
4
- FDP_ITC:
6
- FDP_RIP.1:
5
- FDP_RIP:
3
- FDP_ROL:
3
- FDP_SDI:
9
- FDP_UCT:
9
- FDP_UIT:
15
- FDP_ACC.1:
14
- FDP_ACF.1:
41
- FDP_ETC.1:
2
- FDP_ITC.1:
8
- FDP_RIP.1.1:
1
- FDP_SDI.2:
7
- FDP_UCT.1:
4
- FDP_UIT.1:
11
- FDP_ROL.1:
3
- FDP_UNO.1:
1
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FIA:
- FIA_AFL.1:
3
- FIA_ATD.1:
3
- FIA_SOS:
3
- FIA_UAU.1:
4
- FIA_UID.1:
8
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.2:
3
- FIA_UID:
2
- FMT:
- FMT_MOF.1:
6
- FMT_MOF:
3
- FMT_MSA:
23
- FMT_MSA.2:
3
- FMT_MSA.3:
16
- FMT_MTD:
3
- FMT_SMR.1:
5
- FMT_MOF.1.1:
1
- FMT_MSA.1:
9
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
5
- FMT_MTD.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMR:
2
- FPR:
- FPT:
- FPT_EMS:
2
- FPT_AMT.1:
2
- FPT_EMS.1:
5
- FPT_FLS.1:
5
- FPT_FLS:
3
- FPT_ITC:
3
- FPT_ITI:
3
- FPT_PHP.1:
3
- FPT_PHP.3:
3
- FPT_TST:
3
- FPT_TST.1:
9
- FPT_EMS.1.1:
2
- FPT_EMS.1.2:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_ITC.1:
2
- FPT_ITI.1:
3
- FTP:
- FTP_ITC:
22
- FTP_TRP:
10
- FTP_ITC.1:
20
- FTP_TRP.1:
6
|
- FAU:
- FAU_GEN.1:
15
- FAU_GEN.2:
8
- FAU_SAR.1:
9
- FAU_SAR.3:
7
- FAU_STG.1:
6
- FAU_GEN:
3
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.3.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FCS:
- FDP:
- FDP_IFC.1:
15
- FDP_IFF.1:
7
- FDP_ITC.1:
13
- FDP_ITT.1:
6
- FDP_IFC.1.1:
2
- FDP_IFF:
1
- FDP_IFF.1.1:
2
- FDP_IFF.1.2:
1
- FDP_IFF.1.3:
1
- FDP_IFF.1.4:
1
- FDP_IFF.1.5:
1
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_ITT.1.1:
1
- FIA:
- FIA_UAU_EXT.2:
15
- FIA_UAU:
3
- FIA_ATD.1:
8
- FIA_SOS.1:
8
- FIA_UAU.5:
8
- FIA_UID.1:
9
- FIA_UID.2:
7
- FIA_UAU.1:
2
- FIA_UAU_EXT.2.1:
2
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UID.2.1:
1
- FMT:
- FMT_MTD.1:
14
- FMT_SMF.1:
12
- FMT_SMR.1:
10
- FMT_MSA.1:
8
- FMT_MSA.3:
11
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMF:
1
- FMT_MTD:
1
- FPT:
- FPT_FLS.1:
8
- FPT_STM.1:
10
- FPT_FLS.1.1:
1
- FPT_STM.1.1:
1
- FTP:
- FTP_ITC.1:
9
- FTP_TRP.1:
9
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_ARP: 4
- FAU_SAA: 4
- FAU_GEN:
1
- FAU_ARP.1: 2
- FAU_SAA.1: 3
|
- FAU_GEN.1: 15
- FAU_GEN.2: 8
- FAU_SAR.1: 9
- FAU_SAR.3: 7
- FAU_STG.1: 6
- FAU_GEN:
3
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2.1: 1
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1: 3
- FCS_CKM: 9
- FCS_CKM.4: 5
- FCS_COP.1:
9
- FCS_COP:
10
- FCS_CKM.4.1: 1
- FCS_COP.1.1: 1
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.3: 1
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
10
|
18
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC: 31
- FDP_ACF: 31
- FDP_ETC: 4
- FDP_ITC: 6
- FDP_RIP.1: 5
- FDP_RIP: 3
- FDP_ROL: 3
- FDP_SDI: 9
- FDP_UCT: 9
- FDP_UIT: 15
- FDP_ACC.1: 14
- FDP_ACF.1: 41
- FDP_ETC.1: 2
- FDP_ITC.1:
8
- FDP_RIP.1.1: 1
- FDP_SDI.2: 7
- FDP_UCT.1: 4
- FDP_UIT.1: 11
- FDP_ROL.1: 3
- FDP_UNO.1: 1
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
|
- FDP_IFC.1: 15
- FDP_IFF.1: 7
- FDP_ITC.1:
13
- FDP_ITT.1: 6
- FDP_IFC.1.1: 2
- FDP_IFF: 1
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_ITT.1.1: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
8
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1: 3
- FIA_ATD.1:
3
- FIA_SOS: 3
- FIA_UAU.1:
4
- FIA_UID.1:
8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.2: 3
- FIA_UID: 2
|
- FIA_UAU_EXT.2: 15
- FIA_UAU: 3
- FIA_ATD.1:
8
- FIA_SOS.1: 8
- FIA_UAU.5: 8
- FIA_UID.1:
9
- FIA_UID.2: 7
- FIA_UAU.1:
2
- FIA_UAU_EXT.2.1: 2
- FIA_ATD.1.1:
1
- FIA_SOS.1.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UID.2.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
3
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
8
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MOF.1: 6
- FMT_MOF: 3
- FMT_MSA: 23
- FMT_MSA.2: 3
- FMT_MSA.3:
16
- FMT_MTD:
3
- FMT_SMR.1:
5
- FMT_MOF.1.1: 1
- FMT_MSA.1:
9
- FMT_MSA.2.1: 1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
5
- FMT_MTD.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMR: 2
|
- FMT_MTD.1:
14
- FMT_SMF.1: 12
- FMT_SMR.1:
10
- FMT_MSA.1:
8
- FMT_MSA.3:
11
- FMT_MTD.1.1:
1
- FMT_SMF.1.1: 1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.1.1: 1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMF: 1
- FMT_MTD:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
9
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
16
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
5
|
14
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
10
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS: 2
- FPT_AMT.1: 2
- FPT_EMS.1: 5
- FPT_FLS.1:
5
- FPT_FLS: 3
- FPT_ITC: 3
- FPT_ITI: 3
- FPT_PHP.1: 3
- FPT_PHP.3: 3
- FPT_TST: 3
- FPT_TST.1: 9
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_ITC.1: 2
- FPT_ITI.1: 3
|
- FPT_FLS.1:
8
- FPT_STM.1: 10
- FPT_FLS.1.1:
1
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
5
|
8
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC: 22
- FTP_TRP: 10
- FTP_ITC.1:
20
- FTP_TRP.1:
6
|
- FTP_ITC.1:
9
- FTP_TRP.1:
9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
20
|
9
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
6
|
9
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_protocol/TLS |
|
|
pdf_data/st_keywords/crypto_protocol/TLS/SSL/SSL |
1
|
10
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- physical probing:
2
- side channel:
1
- SPA:
3
- DPA:
3
- timing attacks:
1
- FI:
- physical tampering:
4
- malfunction:
2
- fault injection:
1
- other:
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3:
1
- FIPS 180-1:
1
- FIPS180-2:
1
- PKCS:
- BSI:
|
- FIPS:
- FIPS 197:
1
- FIPS 180-3:
1
- PKCS:
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS PUB 46-3:
1
- FIPS 180-1:
1
- FIPS180-2:
1
|
- FIPS 197:
1
- FIPS 180-3:
1
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 |
7
|
1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- STMicroelectronics:
- Morpho:
- Philips:
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1461696
- pdf_is_encrypted:
False
- pdf_number_of_pages:
104
- /Producer:
Microsoft® Office Word 2007
- /Creator:
Microsoft® Office Word 2007
- /CreationDate:
D:20120125094819
- /ModDate:
D:20120125094819
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1450814
- pdf_is_encrypted:
False
- pdf_number_of_pages:
91
- /Title: Microsoft Word - Security Target Document.docx-v1.4.docx
- /Producer:
Mac OS X 10.13.4 Quartz PDFContext
- /Creator:
Word
- /CreationDate:
D:20180918113533Z00'00'
- /ModDate:
D:20180918113533Z00'00'
- /Keywords:
- /AAPL:Keywords: []
- pdf_hyperlinks:
|
pdf_data/st_metadata//CreationDate |
D:20120125094819
|
D:20180918113533Z00'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Office Word 2007
|
Word
|
pdf_data/st_metadata//ModDate |
D:20120125094819
|
D:20180918113533Z00'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Office Word 2007
|
Mac OS X 10.13.4 Quartz PDFContext
|
pdf_data/st_metadata/pdf_file_size_bytes |
1461696
|
1450814
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
104
|
91
|
dgst |
316b14b844c0b4cc
|
0f265653766dcb0c
|