name |
Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A |
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
28.09.2021 |
not_valid_before |
21.05.2013 |
26.06.2020 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-30fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_65.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-30en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_cc_2020-65en.pdf |
manufacturer |
Gemalto / NXP Semiconductors |
Thales |
manufacturer_web |
https://www.gemalto.com/ |
|
security_level |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
4bef828b961776ae |
3bd742412c869eb9 |
heuristics/cert_id |
ANSSI-CC-2013/30 |
ANSSI-CC-2020/65 |
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_TAT.1, ATE_FUN.1, AVA_VLA.4, ASE_TSS.2, ADV_IMP.2, AGD_PRE.1, ALC_CMS.4, ALC_DVS.2, AVA_VAN.5, ADV_FSP.4, ATE_COV.2, ALC_CMC.4, ADV_ARC.1, AVA_MSU.3, ALC_DEL.1, ATE_DPT.1, ADV_TDS.3, AGD_OPE.1, ALC_LCD.1, ATE_IND.2 |
ADV_FSP.5, AGD_PRE.1, ADV_ARC.1, ATE_COV.2, ATE_FUN.1, ALC_DEL.1, ADV_IMP.1, ATE_IND.2, ALC_TAT.2, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ADV_TDS.4, ALC_DVS.2, ADV_INT.2, AVA_VAN.5, AGD_OPE.1, ALC_CMC.4 |
heuristics/extracted_versions |
2.1 |
4.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
ANSSI-CC-2020/65v2 |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2021/39, ANSSI-CC-2021/38, ANSSI-CC-2020/65v2, ANSSI-CC-2021/41, ANSSI-CC-2020/70 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0645-2010, ANSSI-CC-2013/29 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2021/39, ANSSI-CC-2021/38, ANSSI-CC-2020/65v2, ANSSI-CC-2021/41, ANSSI-CC-2020/70 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0645-2010, ANSSI-CC-2013/29 |
{} |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2013/30
- description: Le produit certifié est « l'application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A, référence IAS Classic V3 on MultiApp ID V2.1, en version MPH119 avec filtre v2.4 », développée par GEMALTO et NXP. Le produit évalué est composé : - de l'applet IAS Classic v3 qui permet à l'utilisateur de sig
- developer: GEMALTO / NXP
- enhanced:
- level: EAL4+
- product: Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A
- sponsor: GEMALTO
- url: https://cyber.gouv.fr/produits-certifies/application-ias-classic-v3-sur-plateforme-java-card-en-configuration-ouverte-0
|
- cert_id: ANSSI-CC-2020/65
- description: Le produit évalué est la « Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h, version 4.2.0 », développé par THALES et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soie
- developer: THALES et INFINEON TECHNOOGIES AG
- enhanced:
- level: EAL5+
- product: Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
- sponsor: THALES
- url: https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-v42-en-configuration-ouverte-sur-le-composant
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0555-2009 |
BSI-DSZ-CC-1079-2018 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0555-2009 |
BSI-DSZ-CC-1079-2018 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC_2013-30fr.pdf |
anssi-cc-2020_65.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL4 Augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: CC version 3.1 révision 3
- cert_id: ANSSI-CC-2013/30
- cert_item: Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A
- cert_item_version: Référence IAS Classic V3 on MultiApp ID V2.1, Version MPH119 avec filtre v2.4
- cert_lab: SERMA Technologies 30 Avenue Gustave Eiffel, 33608 Pessac, France
- developer: GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France NXP 101 Stresemanallee, D-22502 Hambourg Allemagne Commanditaire GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0005-2002], version v1.04 Protection Profile — Secure Signature-Creation Device Type 2, [BSI-PP-0006-2002], version v1.05 Protection Profile — Secure Signature Creation Device Protection Profile Type 3
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2020/65
- cert_item: Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
- cert_item_version: Version 4.2.0 Java Card version 3.0.5 GP version 2.3
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
- developer: THALES 6 rue de la Verrerie, 92190 Meudon, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire THALES 6 rue de la Verrerie, 92190 Meudon, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card System Protection Profile Open Configuration, version 3.0.5 certifié BSI-CC-PP-0099-2017 décembre 2017
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- FR:
- ANSSI-CC-2013/29: 3
- ANSSI-CC-2013/30: 18
|
- DE:
- BSI-DSZ-CC-1079-2018-MA-01: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0035-2007: 1
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0005-2002: 3
- BSI-PP-0006-2002: 2
- BSI-PP-0035-2007: 1
|
- BSI:
- BSI-CC-PP-0099-2017: 1
- BSI-PP-0084-2014: 1
- BSI-PP-0099-2017: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 4
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 6: 1
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 2
- Microsoft:
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.emvapi: 1
- com.gemalto.javacard.filesystem: 1
- com.gemalto.javacard.iasclassic: 1
- com.gemalto.javacard.ism: 1
- com.gemalto.javacard.mspnp: 1
- com.gemalto.javacard.open: 1
- com.gemalto.javacard.securemessaging.builder: 1
- com.gemalto.javacard.security: 1
- com.gemalto.javacard.util: 1
- com.gemalto.javacardx: 1
- com.gemalto.javacardx.biometry: 1
- com.gemalto.javacardx.biometry.biocfg: 1
- com.gemalto.javacardx.crypto: 1
- com.gemalto.javacardx.crypto.asymmetric.rsa: 1
- com.gemalto.javacardx.gapplet: 1
- com.gemalto.moc.server: 1
- java:
- javacard:
- javacard.conformance: 1
- javacard.filesystem: 1
- javacard.framework: 1
- javacard.gpimage: 1
- javacard.iasclassic: 1
- javacard.icao: 1
- javacard.internal: 1
- javacard.ism: 1
- javacard.mspnp: 1
- javacard.open: 1
- javacard.securemessaging: 1
- javacard.securemessaging.builder: 1
- javacard.securemessaging.internal: 1
- javacard.security: 1
- javacard.tlv: 1
- javacard.util: 1
- javacardx:
- javacardx.apdu: 1
- javacardx.apdu.util: 1
- javacardx.biometry: 2
- javacardx.biometry.biocfg: 1
- javacardx.crypto: 2
- javacardx.crypto.asymmetric.ecc: 1
- javacardx.crypto.asymmetric.rsa: 1
- javacardx.gap: 1
- javacardx.gapplet: 1
- javacardx.gdp: 1
- org:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20130521161327+02'00'
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate: D:20130522105155+02'00'
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_file_size_bytes: 199616
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author:
- /CreationDate: D:20200707161142+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20200707161142+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 299041
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
ANSSI-CC-cible_2013-30en.pdf |
anssi_cible_cc_2020-65en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0555-2009: 1
- BSI-DSZ-CC-0645-2010: 1
- FR:
- NL:
|
- DE:
- BSI-DSZ-CC-1079-2018: 1
- BSI-DSZ-CC-1079-2018-MA-01: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0004-2002: 1
- BSI-PP-0005-2002: 1
- BSI-PP-0006-2002: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD /T1: 1
- PP-SSCD /T2: 9
- PP-SSCD /T3: 7
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-2017: 1
- BSI-PP- 0055-2009: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 7
- EAL4 augmented: 3
- EAL4+: 9
- EAL5: 1
- EAL5 augmented: 1
|
- EAL:
- EAL 5+: 1
- EAL 6+: 1
- EAL5: 6
- EAL5 augmented: 2
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.4: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 1
- ADV_LLD: 1
- ADV_TDS.3: 1
- AGD:
- AGD_ADM: 1
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 3
- AGD_USR: 1
- ALC:
- ALC_CMC: 2
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.2: 4
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_VAN: 1
- AVA_VAN.5: 4
- AVA_VLA: 1
- AVA_VLA.4: 1
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 7
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 4
- ADV_IMP: 1
- ADV_IMP.1: 7
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 7
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 7
- AGD_PRE: 2
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 2
- FCS_CKM.4: 4
- FCS_COP: 6
- FCS_COP.1: 8
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 9
- FDP_ACF: 3
- FDP_ACF.1: 24
- FDP_ETC: 4
- FDP_ETC.1: 4
- FDP_ITC: 3
- FDP_ITC.1: 8
- FDP_RIP: 3
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_SDI: 6
- FDP_SDI.2: 6
- FDP_UCT: 2
- FDP_UCT.1: 4
- FDP_UIT: 3
- FDP_UIT.1: 6
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 3
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID: 3
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 3
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 4
- FMT_MSA.1: 4
- FMT_MSA.2: 3
- FMT_MSA.2.1: 1
- FMT_MSA.3: 7
- FMT_MTD: 2
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 3
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 2
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 3
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_TST: 3
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 14
- FTP_TRP: 6
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 16
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM: 46
- FCS_CKM.1: 27
- FCS_CKM.1.1: 3
- FCS_CKM.4: 21
- FCS_CKM.4.1: 2
- FCS_COP: 35
- FCS_COP.1: 24
- FCS_COP.1.1: 5
- FCS_RNG: 17
- FCS_RNG.1: 8
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 35
- FDP_ACC.1: 14
- FDP_ACC.2: 6
- FDP_ACF: 30
- FDP_ACF.1: 16
- FDP_IFC: 20
- FDP_IFC.1: 12
- FDP_IFC.2: 2
- FDP_IFF: 13
- FDP_IFF.1: 17
- FDP_ITC: 10
- FDP_ITC.1: 10
- FDP_ITC.2: 15
- FDP_RIP: 98
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_ROL: 14
- FDP_ROL.1: 5
- FDP_SDI: 6
- FDP_SDI.2: 3
- FDP_UIT: 5
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 7
- FIA_ATD.1: 2
- FIA_UAU: 50
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 33
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 18
- FMT_LIM.1: 15
- FMT_LIM.1.1: 3
- FMT_LIM.2: 14
- FMT_LIM.2.1: 3
- FMT_MSA: 73
- FMT_MSA.1: 11
- FMT_MSA.2: 2
- FMT_MSA.3: 17
- FMT_MTD: 31
- FMT_MTD.1: 9
- FMT_MTD.3: 1
- FMT_SMF: 50
- FMT_SMF.1: 19
- FMT_SMF.1.1: 2
- FMT_SMR: 62
- FMT_SMR.1: 29
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 12
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 34
- FPT_FLS.1: 14
- FPT_FLS.1.1: 2
- FPT_ITT: 5
- FPT_ITT.1: 1
- FPT_PHP: 5
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_RCV: 12
- FPT_RCV.3: 7
- FPT_RCV.4: 2
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 7
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- D:
- D.DTBS: 6
- D.RAD: 5
- D.SCD: 11
- D.SIG: 3
- D.SSCD: 1
- D.SVD: 7
- D.VAD: 1
- OE:
- OE.HI_VAD: 1
- OE.SVD_AUTH_CGA: 1
|
- A:
- A.APPLET: 5
- A.DELETION: 4
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 5
- D.BIO: 1
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 14
- O.APPLET: 28
- O.BIO-MNGT: 6
- O.CARD-MANAGEMENT: 2
- O.CARD_MANAGEMENT: 16
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 5
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CONFID: 8
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 8
- O.JAVAOBJECT: 66
- O.KEY-MNGT: 7
- O.KEY_MNGT: 1
- O.LOAD: 9
- O.NATIVE: 10
- O.OBJ-DELETION: 4
- O.OBJ_DELETION: 2
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 6
- O.PIN_MNGT: 1
- O.REALLOCATION: 5
- O.RESOURCES: 8
- O.RND: 3
- O.RNG: 8
- O.SCP: 29
- O.SID: 12
- O.TDES: 1
- O.TRANSACTION: 7
- OE:
- OE.APPLET: 4
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 10
- OE.CODE_EVIDENCE: 1
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 7
- OP.ARRAY_LENGTH: 3
- OP.CREATE: 11
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 8
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 15
- Infineon Technologies AG: 2
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDES: 8
- Triple-DES: 2
- DES:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 15
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 2
- SHA-512: 4
- SHA2: 1
- SHA224: 2
- SHA256: 1
- SHA384: 1
- SHA512: 1
- SHA3:
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 1
- SPA: 1
- Side channel: 1
- timing attacks: 1
|
- FI:
- Malfunction: 9
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 5
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 1
- PKCS:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 140-2: 3
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- ISO:
- NIST:
- PKCS:
- SCP:
- SCP01: 6
- SCP02: 6
- SCP03: 5
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.5: 5
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 3
- javacard.security: 3
- javacardx:
- javacardx.biometry: 1
- javacardx.crypto: 2
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20121019145156Z
- /Creator: PDFCreator Version 0.9.3
- /Keywords:
- /ModDate: D:20130522105159+02'00'
- /Producer: GPL Ghostscript 8.54
- /Subject:
- /Title:
- pdf_file_size_bytes: 480443
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
- /Author: D1487827
- /CreationDate: D:20200219174719+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: 19-02-2020
- /ModDate: D:20200219174719+01'00'
- /Producer: Microsoft® Word 2013
- /Subject: 1.11
- /Title: MultiApp V4.2: JCS Security Target Lite
- pdf_file_size_bytes: 2463243
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 145
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |