name |
Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12 |
Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
archived |
not_valid_after |
22.03.2027 |
28.09.2020 |
not_valid_before |
18.12.2017 |
28.09.2015 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017_76-s02.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_76fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_39.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_76en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015-39_LITE.pdf |
manufacturer |
gemalto |
Gemalto / NXP Semiconductors |
manufacturer_web |
|
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
36f883150757f19a |
56b72a8258d8d420 |
heuristics/cert_id |
ANSSI-CC-2017/76 |
ANSSI-CC-2015/39 |
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.5, ALC_CMS.5, AGD_PRE.1, ADV_ARC.1, ATE_COV.2, ATE_FUN.1, ALC_DEL.1, ADV_IMP.1, ATE_IND.2, ALC_TAT.2, ALC_LCD.1, ATE_DPT.3, ADV_TDS.4, ALC_DVS.2, AGD_OPE.1, ADV_INT.2, AVA_VAN.5, ALC_CMC.4 |
AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ALC_DVS.2, ADV_IMP.1, ADV_TDS.3, ASE_TSS.2, AGD_OPE.1, ATE_DPT.1, ALC_FLR.1, AVA_VAN.5 |
heuristics/extracted_versions |
4.0.1 |
3.1, 2.1, 1.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2017/81, ANSSI-CC-2018/24, ANSSI-CC-2018/32, ANSSI-CC-2020/33, ANSSI-CC-2017/82, ANSSI-CC-2018/21, ANSSI-CC-2020/42, ANSSI-CC-2017/83, ANSSI-CC-2018/11 |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2017/54, BSI-DSZ-CC-0891-V2-2016 |
ANSSI-CC-2015/15, BSI-DSZ-CC-0845-V2-2013 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2018/58v2, ANSSI-CC-2020/43, ANSSI-CC-2018/53, ANSSI-CC-2018/21, ANSSI-CC-2020/42, ANSSI-CC-2020/45, ANSSI-CC-2018/11, ANSSI-CC-2018/56v2, ANSSI-CC-2017/82, ANSSI-CC-2018/57, ANSSI-CC-2017/83, ANSSI-CC-2020/44, ANSSI-CC-2020/33, ANSSI-CC-2018/32v2, ANSSI-CC-2018/57v2, ANSSI-CC-2019/07, ANSSI-CC-2018/56, ANSSI-CC-2018/24, ANSSI-CC-2017/81, ANSSI-CC-2018/32, ANSSI-CC-2019/31, ANSSI-CC-2020/49, ANSSI-CC-2018/58 |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2017/54, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2017/07 |
BSI-DSZ-CC-0666-2012, ANSSI-CC-2014/86, BSI-DSZ-CC-0837-2013, ANSSI-CC-2015/15, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2017/76
- description: Le produit certifié est la « Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12, JavaCard version 3.0.4, GP version 2.2.1 » développée par les sociétés GEMALTO et INFINEON TECHNOLOGIES AG. Le produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie JavaCard. Ces applications peuvent revêtir u
- developer: Gemalto, Infineon Technologies AG
- enhanced:
- expiration_date: 22.03.2027
- level: EAL5+
- product: Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-javacard-multiapp-v401-pace-en-configuration-ouverte-masquee-sur-le
|
- cert_id: ANSSI-CC-2015/39
- description: Le produit certifié est la carte à puce ouverte ou fermée « MultiApp v3.1 », pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation c
- developer: Gemalto / NXP Semiconductors
- enhanced:
- level: EAL5+
- product: Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v21-en-configuration-eac-et-sac-sur-la-plateforme-0
|
heuristics/st_references/directly_referenced_by |
ANSSI-CC-2018/21 |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/st_references/indirectly_referenced_by |
ANSSI-CC-2018/21 |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0845-V2-2013 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-anssi-cc-2017_76-s02.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: DUCLOS Charlene
- /Category: -S02
- /Comments: ANSSI-CC-CER-F-14_v14.6
- /Company: SGDSN
- /CreationDate: D:20220324171927+01'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20220324171928+01'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20220324161910
- /Title: ANSSI-CC-2017/76
- pdf_file_size_bytes: 101065
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
ANSSI-CC-2017_76fr.pdf |
ANSSI-CC-2015_39.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2017/76
- cert_item: Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12
- cert_item_version: JavaCard version 3.0.4, GP version 2.2.1
- cert_lab: Serma Safety & Security 14, rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6, rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6, rue de la Verrerie CS20001 92197 Meudon Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: SUN Java Card System Protection - Profile Open Configuration, version 3.0
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/39
- cert_item: Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
- cert_item_version: Version de l’application eTravel EAC : 2.1 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0056-V2, [PP EAC PACE], version 1.3.1 Machine Readable Travel Document with ICAO Application, BSI-CC-PP-0068-V2, [PP SAC], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0891-V2-2016: 2
- FR:
- ANSSI-CC-2017/54: 2
- ANSSI-CC-2017/76: 20
- ANSSI-CC-PP-2010/03-M01: 1
|
- DE:
- BSI-DSZ-CC-0845-V2-2013: 3
- FR:
- ANSSI-CC-2015/15: 3
- ANSSI-CC-2015/39: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
|
- BSI:
- BSI-CC-PP- 0056-V2-2012-MA-01: 1
- BSI-CC-PP-0056-V2: 1
- BSI-CC-PP-0068-V2: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 2
- Microsoft:
|
- Gemalto:
- NXP:
- NXP: 3
- NXP Semiconductors: 3
|
pdf_data/report_keywords/eval_facility |
- Serma:
- SERMA: 2
- Serma Safety & Security: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Christian Benardeau
- /Category: Référence, Version
- /Comments: Developpeur
- /Company: SGDSN/ANSSI
- /CreationDate: D:20171221143847+01'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.026
- /ModDate: D:20171221143850+01'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20171221133844
- /Subject: Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12
- /Title: ANSSI-CC-2017/76
- pdf_file_size_bytes: 446602
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: Rapport ANSSI-CC-2015_39
- pdf_file_size_bytes: 295104
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
anssi-cible-cc-2017_76en.pdf |
anssi_cible_2015-39_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0891-V2-2016: 1
- FR:
- NL:
|
- DE:
- BSI-DSZ-CC-0837-2013-MA-01: 2
- BSI-DSZ-CC-0845-V2-2013: 2
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0056-V2-2012: 1
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-PP- 0055-2009: 1
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0002: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL5: 6
- EAL5 augmented: 2
- EAL5+: 2
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 11
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 6
- ADV_IMP: 1
- ADV_IMP.1: 9
- ADV_INT.2: 3
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.5: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 5
- ALC_TAT.1: 2
- ALC_TAT.2: 5
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 2
- ATE_DPT.3: 3
- ATE_FUN.1: 9
- ATE_IND.2: 4
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM: 51
- FCS_CKM.1: 30
- FCS_CKM.1.1: 3
- FCS_CKM.2: 12
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 27
- FCS_CKM.4.1: 2
- FCS_COP: 38
- FCS_COP.1: 32
- FCS_COP.1.1: 4
- FCS_RND: 17
- FCS_RND.1: 12
- FCS_RND.1.1: 3
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 40
- FDP_ACC.1: 14
- FDP_ACC.2: 6
- FDP_ACF: 34
- FDP_ACF.1: 16
- FDP_IFC: 24
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 17
- FDP_IFF.1: 12
- FDP_ITC: 12
- FDP_ITC.1: 12
- FDP_ITC.2: 17
- FDP_ITT.1: 1
- FDP_RIP: 95
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_ROL: 14
- FDP_ROL.1: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 25
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 65
- FIA_UAU.1: 5
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 41
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 24
- FMT_LIM.1: 16
- FMT_LIM.1.1: 3
- FMT_LIM.2: 15
- FMT_LIM.2.1: 3
- FMT_MSA: 91
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 41
- FMT_MTD.1: 9
- FMT_MTD.3: 1
- FMT_SMF: 61
- FMT_SMF.1: 17
- FMT_SMF.1.1: 2
- FMT_SMR: 75
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 7
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 15
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 47
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_ITT: 7
- FPT_ITT.1: 2
- FPT_PHP: 7
- FPT_PHP.3: 17
- FPT_PHP.3.1: 1
- FPT_RCV: 16
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 9
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FTP:
- FTP_ITC: 18
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 14
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 53
- FCS_CKM.1: 20
- FCS_CKM.1.1: 2
- FCS_CKM.2: 8
- FCS_CKM.4: 55
- FCS_CKM.4.1: 1
- FCS_COP: 78
- FCS_COP.1: 11
- FCS_COP.1.1: 7
- FCS_RND: 7
- FCS_RND.1: 16
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF: 13
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_UCT: 7
- FDP_UCT.1: 3
- FDP_UCT.1.1: 1
- FDP_UIT: 7
- FDP_UIT.1: 3
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 22
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 17
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 75
- FIA_UAU.1: 5
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 3
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 1
- FIA_UAU.6.1: 2
- FIA_UID: 26
- FIA_UID.1: 7
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 22
- FMT_LIM.1.1: 3
- FMT_LIM.2: 20
- FMT_LIM.2.1: 3
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 75
- FMT_MTD.1: 14
- FMT_MTD.1.1: 1
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 50
- FMT_SMF.1.1: 1
- FMT_SMR: 33
- FMT_SMR.1: 2
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 15
- O.APPLET: 28
- O.CARD-MANAGEMENT: 4
- O.CARD_MANAGEMENT: 16
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 8
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INT: 3
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 11
- O.JAVAOBJECT: 56
- O.KEY-MNGT: 6
- O.KEY_MNGT: 4
- O.LOAD: 6
- O.NATIVE: 12
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 14
- O.SCP: 36
- O.SID: 13
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.APPS-VALIDATION: 1
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 10
- OE.NATIVE: 1
- OE.SCP: 6
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 4
- OSP.VERIFICATION: 4
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 14
- Triple-DES: 3
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 7
- Triple-DES: 7
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 5
- SHA-256: 6
- SHA-384: 4
- SHA-512: 6
- SHA224: 2
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 3
- Key agreement: 2
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 9
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 5
- SPA: 1
- physical probing: 5
- timing attacks: 1
|
- FI:
- Malfunction: 5
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1: 6
- EF.DG16: 6
- EF.DG3: 1
- EF.DG4: 1
|
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 11
- EF.DG4: 11
- EF.DG5: 3
- EF.SOD: 4
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- PKCS#1: 7
- PKCS#3: 1
- PKCS#5: 5
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 6
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 8
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20171122164640+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC
- /ModDate: D:20171221165435+01'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 2750840
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 117
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20150106172306+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20150106172306+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel EAC v2 Security Target
- pdf_file_size_bytes: 1645397
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |