Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
ANSSI-CC-2015/73
Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP
ANSSI-CC-2010/27
name Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12 Oberthur Technologies Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP
not_valid_before 2016-01-05 2010-05-20
not_valid_after 2021-01-05 2019-09-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2015-73lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-27en.pdf
manufacturer Gemalto - Infineon Technologies AG Oberthur Technologies / NXP Semiconductors GmbH
manufacturer_web https://www.gemalto.com/ https://www.oberthur.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-73.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-27fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': frozenset({'ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 7, 18), 'maintenance_title': 'Rapport de maintenance ANSSI-CC-2010/27-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2010-27-M01fr.pdf', 'maintenance_st_link': None})
state/report/pdf_hash 94c2f7e36a1465d872f5b3adb56253d878f2ec8384155b61451688fb9e0bf0fd dde77ce88c787db261ad33b51caffaa0879b284448fb220b24e13b33ae2c5965
state/report/txt_hash 0e0f5cbf22978855970ed36c6cf1036cb9eb3c9907eab2f3fc0852560cd9e48f 3c40103fd69af45728e6e4d78582913bf90bcad39f08e91eed3ea455040b2fd4
state/st/pdf_hash 46b35e14079a5d6dc2992dd45169b3fee1db1153524abbb2fa5842459616b1cc d4710038a5ea8732419a5199f79ffccdf77223f0616c759a3cf84ded4b4cd6d0
state/st/txt_hash f7ce3c5d4609e45acf7c2ec1aeccabc0fec932c9ffd829e91ffd4bab8563cbb5 d5141c190c80417f61c8d63d3280145fe778b9ab6276eaca8e2ce819046cd740
heuristics/cert_id ANSSI-CC-2015/73 ANSSI-CC-2010/27
heuristics/cert_lab SERMA THALES
heuristics/extracted_versions 1.0 1.01.1, 7.0
heuristics/report_references/directly_referenced_by ANSSI-CC-2016/23, ANSSI-CC-2016/06 None
heuristics/report_references/directly_referencing BSI-DSZ-CC-0926-2014 ANSSI-CC-2010/36, ANSSI-CC-2009/48, ANSSI-CC-2009/36
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2016/24, ANSSI-CC-2016/23, ANSSI-CC-2016/06 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013 BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0411-2007, ANSSI-CC-2010/36, ANSSI-CC-2009/48, BSI-DSZ-CC-0404-2007, ANSSI-CC-2009/11, ANSSI-CC-2009/36
heuristics/scheme_data/cert_id 2015/73 2010/27
heuristics/scheme_data/description Le produit certifié est la « Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12 » développé par GEMALTO et INFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 et fonctionnant en mode contact (standard ISO 7816-3) ; la plateforme ouverte Java Card est destinée à fournir des services de sécurité aux a Le produit certifié est l'applet, d'Oberthur Technologies, ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur la plateforme, d'Oberthur Technologies, Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP. La TOE (Target Of Evaluation - cible d'évaluation) est une carte à puce destinée à être utilisée dans le cadre de projets mettan
heuristics/scheme_data/developer Gemalto / Infineon Oberthur Technologies et NXP Semiconductors GmbH
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r4 Critères Communs version 3.1
heuristics/scheme_data/enhanced/cert_id 2015/73 2010/27
heuristics/scheme_data/enhanced/certification_date 05/01/2016 20/05/2010
heuristics/scheme_data/enhanced/developer Gemalto / Infineon Oberthur Technologies et NXP Semiconductors GmbH
heuristics/scheme_data/enhanced/evaluation_facility Serma Technologies CEACI (Thales Security Systems - CNES)
heuristics/scheme_data/enhanced/level EAL5+ EAL4+
heuristics/scheme_data/enhanced/protection_profile PP-JCS Open Configuration BSI-PP-0005-2002, BSI-PP-0006-2002
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015-73.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2010-27fr.pdf
heuristics/scheme_data/enhanced/sponsor Gemalto Oberthur Technologies
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2016/01/cible2015-73lite.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2010-27en.pdf
heuristics/scheme_data/level EAL5+ EAL4+
heuristics/scheme_data/product Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12 Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP
heuristics/scheme_data/sponsor Gemalto Oberthur Technologies
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-essential-v10-en-configuration-ouverte-sur-le https://cyber.gouv.fr/produits-certifies/applet-id-one-classic-v1011-en-configuration-cns-classic-ou-cie-chargee-sur
heuristics/st_references/directly_referencing BSI-DSZ-CC-0926-2014 ANSSI-CC-2009/48
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0926-2014 ANSSI-CC-2009/48
pdf_data/report_filename ANSSI-CC-2015-73.pdf ANSSI-CC_2010-27fr.pdf
pdf_data/report_frontpage/FR/cc_security_level EAL 5 augmenté ALC_DVS.2, AVA_VAN.5 EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 4 Critères Communs version 3.1
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2015/73 ANSSI-CC-2010/27
pdf_data/report_frontpage/FR/cert_item Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12 Applet ID One Classic v1.01.1 en configuration CNS, Classic ou CIE chargée sur Cosmo v7.0-n Large, Standard et Basic (modes dual ou contact) sur composants NXP
pdf_data/report_frontpage/FR/cert_item_version Version 1.0 Version 1.01.1
pdf_data/report_frontpage/FR/cert_lab Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
pdf_data/report_frontpage/FR/developer Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Oberthur Technologies1 50 quai Michelet 92300 Levallois-Perret, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
pdf_data/report_frontpage/FR/ref_protection_profiles Java Card System Protection Profile – Open Configuration [PP-JCS Open Configuration], version 3.0 BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0926-2014: 1
  • FR:
    • ANSSI-CC-2015/73: 21
  • FR:
    • ANSSI-CC-2010/27: 21
    • ANSSI-CC-2009_48: 6
    • ANSSI-CC-2010_36: 1
    • ANSSI-CC-2009_36: 1
    • ANSSI-CC-2007_02-M02: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2015/73: 21
  • ANSSI-CC-2010/27: 21
  • ANSSI-CC-2009_48: 6
  • ANSSI-CC-2010_36: 1
  • ANSSI-CC-2009_36: 1
  • ANSSI-CC-2007_02-M02: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0005-2002: 2
    • BSI-PP-0006-2002: 2
    • BSI-PP- 0005-2002: 1
    • BSI-PP- 0006-2002: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 2
  • ALC:
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 5
    • AVA_VAN: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_IMP.2: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 4
    • AVA_VAN: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_IMP.2: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_TDS: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 2 1
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 2 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 2
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 3 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 2 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 5 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 4: 2
  • EAL4: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 5: 1
  • EAL 7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 3 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
    • SERMA: 1
  • Thales:
    • THALES - CEACI: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 1 2
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 25
    • Infineon Technologies: 1
  • Gemalto:
    • Gemalto: 3
  • NXP:
    • NXP: 25
    • NXP Semiconductors: 1
  • Oberthur:
    • Oberthur: 1
    • Oberthur Technologies: 10
pdf_data/report_metadata
  • pdf_file_size_bytes: 794770
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Title: ANSSI-CC-2015/73
  • /Author: Jonathan Gimenez
  • /Subject: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7793 A12 ou G12
  • /Keywords: ANSSI-CC-CER-F-07.017
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20160106150825+01'00'
  • /ModDate: D:20160106150825+01'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_file_size_bytes: 263844
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /CreationDate: D:20100525133424+02'00'
  • /Keywords:
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /ModDate: D:20100525133424+02'00'
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20160106150825+01'00' D:20100525133424+02'00'
pdf_data/report_metadata//Keywords ANSSI-CC-CER-F-07.017
pdf_data/report_metadata//ModDate D:20160106150825+01'00' D:20100525133424+02'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 8.0.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 794770 263844
pdf_data/report_metadata/pdf_hyperlinks mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/st_filename cible2015-73lite.pdf ANSSI-CC-cible_2010-27en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 1
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0926-2014: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
  • FR:
    • DCSSI-2009/48: 1
  • NL:
    • CC-2: 2
    • CC-3: 3
    • CC-1: 2
pdf_data/st_keywords/cc_cert_id/NL/CC-2 3 2
pdf_data/st_keywords/cc_claims
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 4
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 9
    • O.FIREWALL: 11
    • O.GLOBAL_ARRAYS_CONFID: 5
    • O.GLOBAL_ARRAYS_INTEG: 4
    • O.NATIVE: 7
    • O.OPERATE: 14
    • O.REALLOCATION: 4
    • O.RESOURCES: 5
    • O.ALARM: 11
    • O.CIPHER: 5
    • O.KEY-MNGT: 5
    • O.PIN-MNGT: 4
    • O.TRANSACTION: 5
    • O.OBJ-DELETION: 3
    • O.DELETION: 4
    • O.LOAD: 5
    • O.INSTALL: 7
    • O.SCP: 21
    • O.CARD-MANAGEMENT: 2
    • O.RND: 7
    • O.KEY_MNGT: 1
    • O.CARD_MANAGEMENT: 14
    • O.PIN-: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 56
    • O.CODE_PCKG: 16
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.SID: 8
    • T.EXE-CODE: 8
    • T.NATIVE: 4
    • T.RESOURCES: 3
    • T.DELETION: 3
    • T.INSTALL: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
  • A:
    • A.APPLET: 4
    • A.DELETION: 5
    • A.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 7
  • OE:
    • OE.VERIFICATION: 25
    • OE.APPLET: 3
    • OE.CODE-EVIDENCE: 10
    • OE.APPS-VALIDATION: 1
  • OSP:
    • OSP.VERIFICATION: 4
    • OSP.RNG: 1
    • OSP.RND: 3
  • O:
    • O.ALARM: 1
    • O.SCP: 1
  • A:
    • A.CGA: 6
    • A.SCA: 5
  • OE:
    • OE.HI_VAD: 6
    • OE.NATIVE: 1
    • OE.APPLET: 1
    • OE.VERIFICATION: 1
  • OSP:
    • OSP: 1
pdf_data/st_keywords/cc_claims/A
  • A.APPLET: 4
  • A.DELETION: 5
  • A.VERIFICATION: 4
  • A.CGA: 6
  • A.SCA: 5
pdf_data/st_keywords/cc_claims/O
  • O.SID: 9
  • O.FIREWALL: 11
  • O.GLOBAL_ARRAYS_CONFID: 5
  • O.GLOBAL_ARRAYS_INTEG: 4
  • O.NATIVE: 7
  • O.OPERATE: 14
  • O.REALLOCATION: 4
  • O.RESOURCES: 5
  • O.ALARM: 11
  • O.CIPHER: 5
  • O.KEY-MNGT: 5
  • O.PIN-MNGT: 4
  • O.TRANSACTION: 5
  • O.OBJ-DELETION: 3
  • O.DELETION: 4
  • O.LOAD: 5
  • O.INSTALL: 7
  • O.SCP: 21
  • O.CARD-MANAGEMENT: 2
  • O.RND: 7
  • O.KEY_MNGT: 1
  • O.CARD_MANAGEMENT: 14
  • O.PIN-: 1
  • O.APPLET: 28
  • O.CODE_PKG: 7
  • O.JAVAOBJECT: 56
  • O.CODE_PCKG: 16
  • O.ALARM: 1
  • O.SCP: 1
pdf_data/st_keywords/cc_claims/O/O.ALARM 11 1
pdf_data/st_keywords/cc_claims/O/O.SCP 21 1
pdf_data/st_keywords/cc_claims/OE
  • OE.VERIFICATION: 25
  • OE.APPLET: 3
  • OE.CODE-EVIDENCE: 10
  • OE.APPS-VALIDATION: 1
  • OE.HI_VAD: 6
  • OE.NATIVE: 1
  • OE.APPLET: 1
  • OE.VERIFICATION: 1
pdf_data/st_keywords/cc_claims/OE/OE.APPLET 3 1
pdf_data/st_keywords/cc_claims/OE/OE.VERIFICATION 25 1
pdf_data/st_keywords/cc_claims/OSP
  • OSP.VERIFICATION: 4
  • OSP.RNG: 1
  • OSP.RND: 3
  • OSP: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0072: 1
    • BSI-CC-PP-0076: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
  • other:
    • PP-SSCD-P2: 1
    • PP-SSCD-P3: 1
    • PP-SSCD-P4: 1
    • PP-SSCD-P5: 1
    • PP-SSCD-P6: 1
    • PP-SSCD-T2: 1
    • PP-SSCD-T3: 1
    • PP-SSCD-T4: 1
    • PP-SSCD-T5: 1
    • PP-SSCD-T6: 1
  • BSI:
    • BSI-PP-0002-2001: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075: 1
  • BSI-CC-PP-0071: 1
  • BSI-CC-PP-0072: 1
  • BSI-CC-PP-0076: 1
  • BSI-PP-0002-2001: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_TDS.1: 2
    • ADV_FSP.4: 8
    • ADV_TDS.3: 10
    • ADV_IMP.1: 5
    • ADV_FSP.2: 4
    • ADV_IMP.2: 1
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_DVS.2: 8
    • ALC_TAT.1: 3
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 3
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 3
    • ATE_FUN.1: 6
    • ATE_COV.1: 2
  • AVA:
    • AVA_VAN.5: 11
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_OBJ.2: 3
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_TDS: 1
  • ADV_ARC.1: 6
  • ADV_FSP.1: 3
  • ADV_TDS.1: 2
  • ADV_FSP.4: 8
  • ADV_TDS.3: 10
  • ADV_IMP.1: 5
  • ADV_FSP.2: 4
  • ADV_IMP.2: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_DVS.2: 8
  • ALC_TAT.1: 3
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 2 8
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 2 11
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 1
  • EAL5: 2
  • EAL 5+: 1
  • EAL5 augmented: 2
  • EAL4: 10
  • EAL5: 1
  • EAL 4+: 1
  • EAL4+: 3
  • EAL4 augmented: 3
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 2 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 2 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
  • FCO:
    • FCO_NRO: 2
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RND: 7
    • FCS_RND.1: 7
    • FCS_CKM.1: 6
    • FCS_RND.1.1: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 2
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 14
    • FDP_ACC.2: 6
    • FDP_ACF: 16
    • FDP_ACF.1: 13
    • FDP_IFC: 4
    • FDP_IFC.1: 1
    • FDP_IFF: 4
    • FDP_IFF.1: 10
    • FDP_RIP: 17
    • FDP_RIP.1: 8
    • FDP_ROL: 6
    • FDP_ROL.1: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC: 4
    • FDP_ITC.2: 5
    • FDP_IFC.2: 2
    • FDP_UIT: 2
    • FDP_UIT.1: 2
    • FDP_ACC.1: 1
  • FIA:
    • FIA_SOS.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 1
    • FIA_UID: 4
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
    • FIA_UAU: 2
    • FIA_UAI.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 1
    • FMT_MSA.3: 10
    • FMT_SMR: 9
    • FMT_SMR.1: 8
    • FMT_SMF: 6
    • FMT_SMF.1: 3
    • FMT_MTD.1: 2
    • FMT_MTD: 3
    • FMT_MTD.3: 1
  • FPR:
    • FPR_UNO.1: 3
    • FPR_UNO.1.1: 1
    • FPR_UNO: 2
  • FPT:
    • FPT_FLS: 10
    • FPT_FLS.1: 5
    • FPT_TDC.1: 2
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 4
    • FPT_RCV.3: 4
    • FPT_TST: 2
    • FPT_TST.1: 3
    • FPT_PHP: 2
    • FPT_PHP.3: 1
    • FPT_RCV.4: 1
    • FPT_ITT: 2
    • FPT_ITT.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 3
  • FCS:
    • FCS_CKM: 43
    • FCS_CKM.1: 10
    • FCS_CKM.4: 23
    • FCS_CKM.4.1: 1
    • FCS_COP: 69
    • FCS_COP.1: 7
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC: 99
    • FDP_ACC.1: 37
    • FDP_ACF: 85
    • FDP_ACF.1: 47
    • FDP_ETC: 8
    • FDP_ETC.1: 2
    • FDP_ITC: 54
    • FDP_ITC.1: 21
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_SDI: 19
    • FDP_SDI.2: 4
    • FDP_UCT: 9
    • FDP_UCT.1: 1
    • FDP_UIT: 19
    • FDP_UIT.1: 4
    • FDP_ITC.2: 9
    • FDP_IFC.1: 14
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UID.1: 15
    • FIA_UAU.1.2: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_AFL: 13
  • FMT:
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA: 47
    • FMT_MSA.1: 13
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 34
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMR.1: 28
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 30
    • FMT_SMF.1.1: 1
  • FPT:
    • FPT_TEE.1: 13
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
    • FPT_AMT.1: 5
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_EMS.1: 1
  • FTP:
    • FTP_ITC: 36
    • FTP_TRP: 12
    • FTP_ITC.1: 14
    • FTP_TRP.1: 6
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 7
  • FCS_RND.1: 7
  • FCS_CKM.1: 6
  • FCS_RND.1.1: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 2
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 10
  • FCS_COP.1.1: 1
  • FCS_CKM: 43
  • FCS_CKM.1: 10
  • FCS_CKM.4: 23
  • FCS_CKM.4.1: 1
  • FCS_COP: 69
  • FCS_COP.1: 7
  • FCS_CKM.2: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 6 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 10 7
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 14
  • FDP_ACC.2: 6
  • FDP_ACF: 16
  • FDP_ACF.1: 13
  • FDP_IFC: 4
  • FDP_IFC.1: 1
  • FDP_IFF: 4
  • FDP_IFF.1: 10
  • FDP_RIP: 17
  • FDP_RIP.1: 8
  • FDP_ROL: 6
  • FDP_ROL.1: 2
  • FDP_SDI.2: 2
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC: 4
  • FDP_ITC.2: 5
  • FDP_IFC.2: 2
  • FDP_UIT: 2
  • FDP_UIT.1: 2
  • FDP_ACC.1: 1
  • FDP_ACC: 99
  • FDP_ACC.1: 37
  • FDP_ACF: 85
  • FDP_ACF.1: 47
  • FDP_ETC: 8
  • FDP_ETC.1: 2
  • FDP_ITC: 54
  • FDP_ITC.1: 21
  • FDP_RIP.1: 11
  • FDP_RIP.1.1: 1
  • FDP_SDI: 19
  • FDP_SDI.2: 4
  • FDP_UCT: 9
  • FDP_UCT.1: 1
  • FDP_UIT: 19
  • FDP_UIT.1: 4
  • FDP_ITC.2: 9
  • FDP_IFC.1: 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 14 99
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 1 37
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 16 85
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 13 47
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 1 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 4 54
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 5 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 8 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 2 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 2 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 2 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_SOS.2: 1
  • FIA_ATD: 3
  • FIA_ATD.1: 1
  • FIA_UID: 4
  • FIA_UID.2: 1
  • FIA_USB: 2
  • FIA_USB.1: 3
  • FIA_UAU: 2
  • FIA_UAI.1: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 2
  • FIA_AFL.1: 11
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_UAU.1: 14
  • FIA_UAU.1.1: 1
  • FIA_UID.1: 15
  • FIA_UAU.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_AFL: 13
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 1 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 1 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 2 15
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA: 21
  • FMT_MSA.1: 5
  • FMT_MSA.2: 1
  • FMT_MSA.3: 10
  • FMT_SMR: 9
  • FMT_SMR.1: 8
  • FMT_SMF: 6
  • FMT_SMF.1: 3
  • FMT_MTD.1: 2
  • FMT_MTD: 3
  • FMT_MTD.3: 1
  • FMT_MOF.1: 10
  • FMT_MOF.1.1: 1
  • FMT_MSA: 47
  • FMT_MSA.1: 13
  • FMT_MSA.2: 9
  • FMT_MSA.2.1: 1
  • FMT_MSA.3: 34
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1: 9
  • FMT_MTD.1.1: 1
  • FMT_SMR.1: 28
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 30
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 21 47
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 5 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 1 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 10 34
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 2 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 3 30
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 8 28
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS: 10
  • FPT_FLS.1: 5
  • FPT_TDC.1: 2
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 4
  • FPT_RCV.3: 4
  • FPT_TST: 2
  • FPT_TST.1: 3
  • FPT_PHP: 2
  • FPT_PHP.3: 1
  • FPT_RCV.4: 1
  • FPT_ITT: 2
  • FPT_ITT.1: 1
  • FPT_TEE.1: 13
  • FPT_TEE.1.1: 1
  • FPT_TEE.1.2: 1
  • FPT_AMT.1: 5
  • FPT_FLS.1: 8
  • FPT_FLS.1.1: 1
  • FPT_PHP.1: 8
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 10
  • FPT_PHP.3.1: 1
  • FPT_TST.1: 9
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_EMS.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 1 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 3 9
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 2
  • FTP_ITC.1: 3
  • FTP_ITC: 36
  • FTP_TRP: 12
  • FTP_ITC.1: 14
  • FTP_TRP.1: 6
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 2 36
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 3 14
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 1
  • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
  • Out of scope: 1
  • 3 Smartcard product life-cycle for the TOE 1 For details regarding phases see [COSMO-ST] §3.5. Out of scope TOE usage Applet Installation and Pre-personalisation Evaluation scope FQR : 110 5042 Issue: 1: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 1
  • CBC:
    • CBC: 3
pdf_data/st_keywords/cipher_mode/CBC/CBC 1 3
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 7
pdf_data/st_keywords/crypto_scheme/MAC/MAC 7 10
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
      • SHA-1: 3
    • SHA2:
      • SHA-224: 3
      • SHA224: 2
      • SHA256: 1
      • SHA-256: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/javacard_version/JavaCard
  • Java Card 2.2.2: 3
  • Java Card 3.0.4: 7
  • JavaCard 3.0: 1
  • Java Card 2.2.1: 1
  • Java Card 2.2: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 5
    • RND: 10
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • malfunction: 2
  • Malfunction: 3
  • fault induction: 2
  • physical tampering: 4
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 1 4
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 3
  • physical probing: 2
  • DPA: 1
  • physical probing: 1
  • side channel: 1
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 2 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 3
  • PKCS:
    • PKCS#3: 1
    • PKCS#1: 8
    • PKCS#5: 3
  • BSI:
    • AIS31: 1
  • SCP:
    • SCP03: 3
    • SCP01: 3
    • SCP02: 3
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS PUB 46-3: 3
  • PKCS:
    • PKCS#1: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS197: 3
  • FIPS PUB 46-3: 3
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 1
  • PKCS#1: 8
  • PKCS#5: 3
  • PKCS#1: 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 8 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • DES:
      • DES: 14
    • 3DES:
      • TDEA: 1
      • 3DES: 1
      • TDES: 7
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • 3DES: 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDEA: 1
  • 3DES: 1
  • TDES: 7
  • 3DES: 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 1 7
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 14 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 5
  • Gemalto:
    • Gemalto: 502
  • NXP:
    • NXP: 2
  • Oberthur:
    • Oberthur Technologies: 162
pdf_data/st_metadata
  • pdf_file_size_bytes: 1708746
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 80
  • /Title: eTravel v1.0 Security Target MAÏA3
  • /Author: Antoine de Lavernette
  • /Subject: Security Target
  • /Keywords: Security Target, CC
  • /Creator: Microsoft® Word 2013
  • /CreationDate: D:20151126145415+01'00'
  • /ModDate: D:20151126145415+01'00'
  • /Producer: Microsoft® Word 2013
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 958952
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 80
  • /CreationDate: D:20100525133408+02'00'
  • /Keywords:
  • /Producer: AFPL Ghostscript 8.50
  • /ModDate: D:20100525133408+02'00'
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20151126145415+01'00' D:20100525133408+02'00'
pdf_data/st_metadata//Keywords Security Target, CC
pdf_data/st_metadata//ModDate D:20151126145415+01'00' D:20100525133408+02'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 AFPL Ghostscript 8.50
pdf_data/st_metadata/pdf_file_size_bytes 1708746 958952
dgst 37f694d2de25cb63 7bb1d4b3ded1f4fb