name |
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) |
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
archived |
not_valid_after |
22.09.2028 |
09.02.2021 |
not_valid_before |
22.09.2023 |
09.02.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_35fr.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_35fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_04.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_35en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_04_LITE.pdf |
manufacturer |
THALES DIS FRANCE SA |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, EAL5+ |
dgst |
57f8d990050b2ead |
fd22d93c12fd2799 |
heuristics/cert_id |
ANSSI-CC-2023/35 |
ANSSI-CC-2016/04 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ALC_DVS.2, ADV_IMP.1, ADV_TDS.3, ASE_TSS.2, AGD_OPE.1, ALC_FLR.2, ATE_DPT.1, AVA_VAN.5 |
ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions |
5.1, 3.1, 3.1.0.0 |
3.1, 4.2.0, 1.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
ANSSI-CC-2015/15, ANSSI-CC-2015/37, BSI-DSZ-CC-0845-V2-2013 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
ANSSI-CC-2015/08, BSI-DSZ-CC-0666-2012, ANSSI-CC-2014/86, BSI-DSZ-CC-0837-V2-2014, ANSSI-CC-2015/37, ANSSI-CC-2014/14, BSI-DSZ-CC-0837-2013, ANSSI-CC-2015/15, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/35
- description: Le produit évalué est « eTravel 3.1 EAC on BAC on MultiApp V5.1, Version 3.1.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur notam
- developer: THALES DIS FRANCE SAS
- enhanced:
- expiration_date: 22.09.2028
- level: EAL5+
- product: eTravel 3.1 EAC on BAC on MultiApp V5.1 (Version 3.1.0.0)
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-31-eac-bac-multiapp-v51-version-3100
|
- cert_id: ANSSI-CC-2016/04
- description: Le produit certifié est la carte à puce ouverte « MultiApp V3.1 » pouvant être en mode contact ou sans-contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS. La cible d’évaluation est composée : de l’applet IAS Classic V4.2.0.B, qui permet à l’utilisateur de signer électroniquement des données ; de
- developer: Gemalto / NXP Semiconductors
- enhanced:
- level: EAL5+
- product: Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-ias-v420b-sur-la-plateforme-javacard-ouverte-multiapp-v31-masquee-1
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2023/01 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2023/01 |
BSI-DSZ-CC-0845-V2-2013 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2023_35fr.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230929174932+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230929175423+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 157976
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
ANSSI-CC-2023_35fr.pdf |
ANSSI-CC-2016_04.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/04
- cert_item: Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA
- cert_item_version: Version de l’application IAS : 4.2.0.B Version de l’application MOCA Server : 1.0 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Rapport de certification ANSSI-CC-2016/04 Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA Page 4 sur 22 ANSSI-CC-CER-F-07.017 Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device – Part 2 : Device with key generation, version 2.0.1, maintenu sous la référence [PP-SSCD-Part2]. Protection profiles for secure signature creation device – Part 3 : Device with key import, version 1.0.2, certifié sous la référence [PP-SSCD-Part3]. Protection profiles for secure signature creation device – Part 4: Extension for device with key generation and trusted communication with certificate generation application, Version 1.0.1, certifié sous la référence [PP-SSCD-Part4]. Protection profiles for secure signature creation device – Part 5: Extension for device with key generation and trusted communication with signature creation application, Version 1.0.1, certifié sous la référence [PP-SSCD-Part5]. Protection profiles for secure signature creation device – Part 6: Extension for device with key import and trusted communication with signature creation application, Version 1.0.4, certifié sous la référence [PP-SSCD-Part6
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2023/01: 1
- ANSSI-CC-2023/31: 1
- ANSSI-CC-2023/35: 2
|
- DE:
- BSI-DSZ-CC-0845-V2-2013: 2
- FR:
- ANSSI-CC-2015/15: 3
- ANSSI-CC-2015/37: 1
- ANSSI-CC-2016/04: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-2009: 1
- BSI-PP-0056: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP- 0071-2012: 1
- BSI-CC-PP- 0072-2012: 1
- BSI-CC-PP- 0075-2012: 1
- BSI-CC-PP-0076-: 1
- other:
- PP-SSCD-: 5
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 2
- EAL 7: 1
- EAL4: 2
- EAL5: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 3
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2016_04
- pdf_file_size_bytes: 1916006
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
ANSSI-cible-2023_35en.pdf |
anssi_cible_2016_04_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0845-V2-2013: 2
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 2
- BSI-PP-0055-2009: 1
- BSI-PP-0056-2009: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD: 4
- PP-SSCD-KG: 38
- PP-SSCD-KI: 29
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
- EAL6: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 3
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.2: 4
- ALC_FLR.2: 1
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 4
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 9
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 32
- FCS_CKM.1: 20
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.4: 45
- FCS_CKM.4.1: 1
- FCS_COP: 63
- FCS_COP.1: 10
- FCS_COP.1.1: 4
- FCS_RND: 7
- FCS_RND.1: 10
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 8
- FDP_ACC.1: 18
- FDP_ACF: 9
- FDP_ACF.1: 17
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 17
- FDP_ITC.2: 17
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 13
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_ATD: 4
- FIA_ATD.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 13
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 10
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UID: 17
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 20
- FMT_LIM.1.1: 3
- FMT_LIM.2: 18
- FMT_LIM.2.1: 3
- FMT_MSA: 9
- FMT_MSA.1: 3
- FMT_MSA.3: 6
- FMT_MTD: 39
- FMT_MTD.1: 4
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF: 7
- FMT_SMF.1: 43
- FMT_SMF.1.1: 1
- FMT_SMR: 8
- FMT_SMR.1: 29
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 11
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 6
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 6
- FTP_TRP: 4
- FTP_TRP.1: 10
|
- FCS:
- FCS_CKM: 39
- FCS_CKM.1: 15
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 13
- FCS_CKM.4.1: 2
- FCS_COP: 19
- FCS_COP.1: 7
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 44
- FDP_ACC.1: 28
- FDP_ACC.1.1: 4
- FDP_ACF: 31
- FDP_ACF.1: 11
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_AFC: 1
- FDP_DAU: 9
- FDP_DAU.1: 1
- FDP_DAU.2: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ETC.1: 1
- FDP_IFC.1: 18
- FDP_ITC: 10
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI: 17
- FDP_SDI.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 8
- FDP_UCT.1: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 9
- FDP_UIT.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 15
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 5
- FIA_API.1: 14
- FIA_API.1.1: 2
- FIA_UAU: 18
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 18
- FIA_UID.1: 11
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 62
- FMT_MSA.1: 7
- FMT_MSA.1.1: 3
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 3
- FMT_MSA.4.1: 2
- FMT_MTD: 16
- FMT_MTD.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 36
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 13
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ICT: 2
- FTP_ITC: 36
- FTP_ITC.1: 5
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.MRTD_: 1
- A.OS-UPDATE-EVIDENCE: 3
- A.SECURE_ACODE_MANAGEMENT: 3
- D:
- D.ACODE_: 1
- D.APP_KEYS: 2
- D.JCS_CODE: 5
- D.JCS_DATA: 5
- D.OS-: 1
- D.OS-UPDATE-CODE-: 1
- D.OS-UPDATE-CODE-ID: 2
- D.OS-UPDATE_ADDITIONALCODE: 6
- D.OS-UPDATE_DEC-KEY: 2
- D.OS-UPDATE_SGNVER-KEY: 2
- O:
- O.CONFID-: 1
- O.CONFID-OS-: 1
- O.CONFID-OS-UPDATE: 4
- O.RND: 1
- O.SECURE_AC_ACTIVATION: 5
- O.SECURE_LOAD_ACODE: 9
- O.TOE_IDENTIFICATION: 7
- OE:
- OE.BAC-PP: 3
- OE.BAC_PP: 2
- OE.MRTD_: 2
- OE.OS-UPDATE-ENCRYPTION: 5
- OE.OS-UPDATE-EVIDENCE: 4
- OE.SECURE_ACODE_MANAG: 1
- OE.SECURE_ACODE_MANAGEMENT: 3
- OSP:
- OSP: 2
- OSP.ADDITIONAL_CODE_ENCRYPTION: 3
- OSP.ADDITIONAL_CODE_SIGNING: 3
- OSP.ATOMIC_ACTIVATION: 3
- OSP.TOE_IDENTIFICATION: 3
- T:
- T.CONFID-OS-UPDATE_LOAD: 4
- T.FAKE-SGNVER-KEY: 3
- T.INTEG-OS-UPDATE_LOAD: 3
- T.UNAUTHORISED-TOE-CODE-UPDATE: 3
- T.WRONG-UPDATE-STATE: 3
|
- A:
- A.CGA: 4
- A.CSP: 5
- A.SCA: 4
- OE:
- OE.HID_VAD: 2
- OE.HI_VAD: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 5
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 1
- Physical Probing: 1
- SPA: 1
- physical probing: 5
- timing attacks: 1
- other:
|
- FI:
- DFA: 1
- Malfunction: 1
- fault injection: 1
- physical tampering: 4
- SCA:
- DPA: 1
- Leak-Inherent: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 7
- EF.DG1: 17
- EF.DG14: 7
- EF.DG15: 2
- EF.DG16: 16
- EF.DG2: 8
- EF.DG3: 19
- EF.DG4: 18
- EF.DG5: 6
- EF.SOD: 8
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
- CC:
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS197: 2
- FIPS46-3: 1
- ICAO:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: THALES
- /CreationDate: D:20230517105401+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Security Target LITE
- /ModDate: D:20230517105401+02'00'
- /Producer: Microsoft® Word 2016
- /Title: MultiApp V5.1: eTravel 3.1 EAC on BAC Security Target
- pdf_file_size_bytes: 2212367
- pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20150723160151+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20150723160151+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1145055
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |