name |
eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02 |
ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G v1.0.7052 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
JP |
status |
active |
active |
not_valid_after |
15.12.2025 |
24.12.2024 |
not_valid_before |
15.12.2020 |
28.08.2019 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2020_83fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0648_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020-83fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0648_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2020_83en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0648_st.pdf |
manufacturer |
Thales |
Maxell, Ltd |
manufacturer_web |
|
https://www.maxell.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
dgst |
340aeee69861d949 |
6b52236346d890ba |
heuristics/cert_id |
ANSSI-CC-2020/83 |
JISEC-CC-CRP-C0648-01-2019 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ALC_DVS.2, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, ATE_DPT.1, AVA_VAN.5 |
ASE_CCL.1, ADV_ARC.1, ASE_INT.1, ASE_REQ.2, ATE_FUN.1, ATE_COV.2, ALC_DEL.1, ADV_IMP.1, ALC_DVS.2, ALC_LCD.1, AGD_OPE.1, ASE_TSS.1, AVA_VAN.5, ALC_CMC.4 |
heuristics/extracted_versions |
1.0 |
1.0.7052, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0964-V4-2019, ANSSI-CC-2015/32 |
BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0869-V2-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-V3-2017, BSI-DSZ-CC-0964-V4-2019, ANSSI-CC-2015/32, ANSSI-CC-2014/77, BSI-DSZ-CC-0814-2012, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0883-2013 |
BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0869-V2-2019 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2020/83
- description: Le produit évalué est « eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12, identifiant : B2 8C 01, version 01 02 » développé par THALES et INFINEON TECHNOLOGIES AG. Le produit certifié est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile
- developer: THALES INFINEON TECHNOLOGIES AG
- enhanced:
- expiration_date: 15.12.2025
- level: EAL5+
- product: eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02
- sponsor: THALES INFINEON TECHNOLOGIES AG
- url: https://cyber.gouv.fr/produits-certifies/etravel-essential-10-avec-sac-aa-et-eac-actives-sur-composants-m7794-a12g12
|
- cert_id: JISEC-CC-CRP-C0648
- certification_date: 01.08.2019
- claim: EAL4+ ALC_DVS.2, AVA_VAN.5 PP
- enhanced:
- assurance_level: EAL4 Augmented with ALC_DVS.2, AVA_VAN.5
- cc_version: 3.1 release5
- cert_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/c0648_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the PACE, and Active Authentication specifications defined by Part11 of “ICAO Doc 9303 Machine readable Travel Documents Seventh Edition”. TOE security functionality The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including: Password Authenticated Connection Establishment function; Active Authentication function; Write protection function; Protection function in transport; and Tamper resistance.
- evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT Security
- product: ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G
- product_type: ICs for e-passports
- protection_profile: Protection Profile for ePassport IC with SAC (PACE) and Active Authentication version 1.00 (Certification Identification: JISEC-C0499)
- report_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/C0648_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/c0648_st.pdf
- toe_version: v1.0.7052
- vendor: Maxell, Ltd.
- expiration_date: 01.09.2026
- supplier: Maxell, Ltd.
- toe_japan_name: ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0648_it8678.html
- toe_overseas_name: ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0964-V4-2019 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0964-V4-2019 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat_2020_83fr.pdf |
c0648_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0648-01-2019: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20210104173220+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210104173220+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 267658
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20191004102920+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20191004103115+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 86462
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
anssi-cc-2020-83fr.pdf |
c0648_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0964-V4-2019: 2
- FR:
- ANSSI-CC-2015/32: 1
- ANSSI-CC-2020/83: 17
|
- DE:
- BSI-DSZ-CC-0869-V2-2019: 2
- BSI-DSZ-CC-0891-V3-2018: 1
- JP:
- JISEC-CC-CRP-C0648-01-2019: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011: 2
- BSI-PP-0084-2014: 1
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL4: 3
- EAL4 augmented: 2
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 11
- TÜViT: 7
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- P-256: 1
- P-384: 1
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Fault Injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- Side channel: 1
- physical probing: 1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
- EF:
- EF.COM: 4
- EF.CardAccess: 8
- EF.DG1: 4
- EF.DG13: 4
- EF.DG14: 6
- EF.DG15: 9
- EF.DG2: 4
- EF.SOD: 4
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20191113095255+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20191113095335+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 546653
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 48
|
pdf_data/st_filename |
anssi-cible-2020_83en.pdf |
c0648_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0964-V4-2019: 1
- NL:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-PP-0035: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 2
- EAL5: 5
- EAL5 augmented: 1
|
- EAL:
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 3
- EAL5: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 4
|
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 10
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 48
- FCS_CKM.1: 18
- FCS_CKM.1.1: 2
- FCS_CKM.2: 8
- FCS_CKM.4: 53
- FCS_CKM.4.1: 1
- FCS_COP: 70
- FCS_COP.1: 9
- FCS_COP.1.1: 7
- FCS_RND: 7
- FCS_RND.1: 14
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF: 11
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_UCT: 6
- FDP_UCT.1: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 6
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 20
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 15
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 69
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 2
- FIA_UID: 24
- FIA_UID.1: 6
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 20
- FMT_LIM.1.1: 3
- FMT_LIM.2: 18
- FMT_LIM.2.1: 3
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 66
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF.1: 48
- FMT_SMF.1.1: 1
- FMT_SMR: 31
- FMT_SMR.1: 3
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 12
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 12
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 31
- FCS_CKM.1: 19
- FCS_CKM.2: 5
- FCS_CKM.3: 1
- FCS_CKM.4: 40
- FCS_CKM.4.1: 1
- FCS_COP: 90
- FCS_COP.1: 45
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 6
- FDP:
- FDP_ACC: 26
- FDP_ACC.1: 10
- FDP_ACF: 22
- FDP_ACF.1: 12
- FDP_IFC: 2
- FDP_IFC.1: 6
- FDP_IFF: 2
- FDP_ITC: 1
- FDP_ITC.1: 32
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 16
- FDP_RIP: 9
- FDP_ROL: 1
- FDP_SDI.2: 2
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UIT: 11
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 24
- FIA_AFL.1: 6
- FIA_ATD: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 3
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FMT:
- FMT_MSA: 13
- FMT_MSA.3: 9
- FMT_MTD: 2
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 2
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_RCV: 3
- FPT_TDC.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 19
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 1
- A.PKI: 5
- A.VERIFICATION: 1
- O:
- O.AA: 8
- O.ALARM: 1
- O.CIPHER: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.KEY-MNGT: 1
- O.OPERATE: 1
- O.OS_SUPPORT: 1
- O.PACE: 11
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RECOVERY: 1
- O.RESOURCES: 1
- O.RND: 1
- O.TRANSACTION: 1
- OE:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-DATA: 1
- T.FAULT: 1
- T.INTEG-APPLI-DATA: 1
- T.INTEG-JCS-DATA: 1
- T.LEAKAGE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RND: 1
- T.SID: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 7
- Triple-DES: 6
- constructions:
|
- AES_competition:
- AES:
- AES: 3
- AES-128: 1
- AES-256: 1
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 5
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- SCA:
- DPA: 2
- SPA: 1
- side-channel: 1
- timing attack: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 11
- EF.DG4: 11
- EF.DG5: 3
- EF.SOD: 4
|
- EF:
- EF.COM: 4
- EF.CardAccess: 6
- EF.DG1: 5
- EF.DG13: 5
- EF.DG14: 5
- EF.DG15: 6
- EF.DG2: 5
- EF.SOD: 5
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
|
- BSI:
- CC:
- FIPS:
- FIPS 180-2: 1
- FIPS 180-4: 4
- FIPS 197: 3
- ICAO:
- ISO:
- NIST:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: D1315455
- /CreationDate: D:20200928110811+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: 10-06-2020
- /ModDate: D:20200928110811+02'00'
- /Producer: Microsoft® Word 2013
- /Subject: 1.7p
- /Title: Erodium2: eTravel Essential 1.0 EAC on PACE Security Target Lite
- pdf_file_size_bytes: 1509090
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 83
|
- /Author: LovaszD
- /CreationDate: D:20190726101904+02'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20190726101904+02'00'
- /Producer: Microsoft® Word for Office 365
- /Title: ID&Trust IDENTITY APPLET-J with SAC (PACE) and AA - Security Target Lite
- pdf_file_size_bytes: 1095310
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |