name |
ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur les composants P60x080PVC/PVG |
Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v3, masquée sur composants IFX M7820 A11 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
23.06.2021 |
01.09.2019 |
not_valid_before |
23.06.2016 |
06.07.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-En_2016_37en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_2012-31fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_37_LITE.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible_2012-31en.pdf |
manufacturer |
Oberthur Technologies |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://www.oberthur.com/ |
https://www.gemalto.com/ |
security_level |
ADV_INT.2, ADV_TDS.2, ADV_FSP.5, ALC_CMC.5, ALC_TAT.2, ALC_DVS.2, ATE_DPT.3, EAL4+ |
EAL4+, ALC_DVS.2 |
dgst |
5a7ae03fa2b6bdbb |
6f25f0730f592012 |
heuristics/cert_id |
ANSSI-CC-2016/37 |
ANSSI-CC-2012/31 |
heuristics/cert_lab |
CEA |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.5, ADV_TDS.2, ALC_CMS.5, ALC_DVS.2, ATE_DPT.3, ALC_FLR.1, ADV_INT.2, ASE_TSS.2, ALC_CMC.5, AVA_VAN.5, ALC_TAT.2 |
ALC_DVS.2, AVA_VAN.5, ADV_ARC.1 |
heuristics/extracted_versions |
- |
1.4 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0837-V2-2014 |
BSI-DSZ-CC-0813-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0837-V2-2014 |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2016/37
- description: Le produit certifié est la carte à puce « ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur le composant P60x080PVC/PVG », pouvant être en mode contact ou sans contact. Le produit est développé par OBERTHUR TECHNOLOGIES sur un composant NXP SEMICONDUCTORS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organi
- developer: Oberthur Technologies / NXP Semiconductors
- enhanced:
- augmented: ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2016/37
- certification_date: 2016-06-23
- developer: Oberthur Technologies / NXP Semiconductors
- evaluation_facility: CEA - LETI
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0055, [PP BAC]
- report_link: https://cyber.gouv.fr/sites/default/files/2016/06/anssi-cc-en_2016_37en.pdf
- sponsor: Oberthur Technologies
- target_link: https://cyber.gouv.fr/sites/default/files/2016/06/anssi-cc-2016-37-m01-cible-lite.pdf
- level: EAL4+
- product: ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur les composants P60x080PVC/PVG
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/id-one-epass-full-eac-v2-mrtd-en-configuration-bac-avec-aa-et-ca-masque-sur-les
|
- cert_id: ANSSI-CC-2012/31
- description: Le produit certifié est le passeport électronique intitulé « Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v3, masquée sur composants IFX M7820 A11 ». La version de l'application et de la plateforme est 023078 pour SLE78CLXxxxxP et 023079 pour SLE78CLXxxxxPM, la version de l'AMD (patch dans la terminologie Multos) est 113v3 quelle que soit la variante du composant, l
- developer: Gemalto et Infineon Technologies AG
- enhanced:
- augmented: ALC_DVS.2
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r3
- cert_id: ANSSI-CC-2012/31
- certification_date: 2012-07-06
- developer: Gemalto et Infineon Technologies AG
- evaluation_facility: THALES (TCS – CNES)
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0055-2009, [PP BAC], version 1.10
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI_2012-31fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-cible_2012-31en.pdf
- level: EAL4+
- product: Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v3, masquée sur composants IFX M7820 A11
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-14-avec-aa-configuration-bac-avec-amd-113v3-masquee-sur
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0837-V2-2014 |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0640-2010 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0837-V2-2014 |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC-En_2016_37en.pdf |
ANSSI_2012-31fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmented ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
- cc_version: Common Criteria version 3.1 revision 4
- cert_id: ANSSI-CC-2016/37
- cert_item: ID-One ePass Full EAC v2 MRTD in BAC configuration with AA and CA on P60x080PVC/PVG components
- cert_item_version: SAAAAR 080031 : ePass V3 Full EACv2 on NXP SAAAAR 082456 : Code r6.0 Generic SAAAAR 082844 : Optional Code r4.0 Digital Blurred Image
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France NXP Semiconductors Box 54 02 40, D-22502 Hamburg, Allemagne Sponsor Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2012/31
- cert_item: Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v3, masquée sur composants IFX M7820 A11
- cert_item_version: Version de l’application et de la plateforme : 023078 / 023079 Version de l’AMD (patch) : 113v3 Version du composant IFX M7820 A11 : SLE78CLXxxxxP / SLE78CLXxxxxPM
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0055-2009, [PP BAC], version 1.10 Machine Readable Travel Document with “ICAO Application”, Basic Access Control
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0837-V2-2014: 3
- FR:
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-2009: 1
- BSI-PP- 0035-2007: 2
- BSI-PP-0035-2007: 1
|
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-2007: 2
- BSI-PP-0055-2009: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_FSP.5: 2
- ADV_IMP: 1
- ADV_INT: 1
- ADV_INT.2: 2
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.4: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_CMS.5: 2
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ALC_TAT.2: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.3: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 8
- NXP Semiconductors: 2
- Oberthur:
- OBERTHUR: 4
- Oberthur Technologies: 8
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ICAO:
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-En_2016_37en
- pdf_file_size_bytes: 205180
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /CreationDate: D:20120706162413+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120711193245+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title:
- pdf_file_size_bytes: 473194
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
anssi_cible_2016_37_LITE.pdf |
ANSSI-cible_2012-31en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0837-v2-2014: 1
- FR:
|
- DE:
- BSI-DSZ-CC-0640-2010: 1
- BSI-DSZ-CC-0813-2012: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-055: 1
- BSI-PP-0035: 1
- BSI-PP-0056: 2
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 3
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 6: 1
- EAL4: 5
- EAL4 augmented: 3
- EAL5: 6
|
- EAL:
- EAL 5+: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 5
- ADV_INT.2: 5
- ADV_TDS.4: 5
- AGD:
- ALC:
- ALC_CMS.5: 5
- ALC_DVS.2: 12
- ALC_TAT.2: 5
- ASE:
- ATE:
- AVA:
- AVA_VAN: 1
- AVA_VAN.3: 2
- AVA_VAN.5: 7
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- ALC:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 4
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FAU_STG: 3
- FAU_STG.2: 3
- FCS:
- FCS_CKM: 18
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.4: 2
- FCS_COP: 49
- FCS_COP.1: 21
- FCS_RND: 4
- FCS_RND.1: 6
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 2
- FDP_ACC.2: 2
- FDP_ACF: 5
- FDP_ACF.1: 9
- FDP_DAU: 3
- FDP_DAU.1: 2
- FDP_ITC: 8
- FDP_ITC.1: 9
- FDP_UCT: 7
- FDP_UCT.1: 4
- FDP_UIT: 11
- FDP_UIT.1: 9
- FIA:
- FIA_AFL: 5
- FIA_AFL.1: 5
- FIA_API: 5
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_UAU: 31
- FIA_UAU.1: 7
- FIA_UAU.4: 4
- FIA_UAU.5: 11
- FIA_UAU.6: 3
- FIA_UID: 8
- FIA_UID.1: 7
- FMT:
- FMT_LIM: 10
- FMT_LIM.1: 11
- FMT_LIM.1.1: 1
- FMT_LIM.2: 11
- FMT_LIM.2.1: 1
- FMT_MOF: 3
- FMT_MOF.1: 1
- FMT_MTD: 42
- FMT_MTD.1: 13
- FMT_SMF: 2
- FMT_SMF.1: 2
- FMT_SMR: 7
- FMT_SMR.1: 7
- FPT:
- FPT_EMS: 12
- FPT_EMS.1: 16
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 2
- FPT_FLS.1: 2
- FPT_PHP: 2
- FPT_PHP.3: 2
- FPT_TST: 6
- FPT_TST.1: 11
- FTP:
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 6
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP: 9
- FCS_COP.1: 8
- FCS_RND: 6
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 5
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 3
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 7
- FDP_ITC.2: 7
- FDP_UCT.1: 3
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 1
- FIA_API.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 2
- FIA_UAU.1: 3
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UAU.5: 2
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 3
- FIA_UAU.6.1: 1
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 14
- FMT_LIM.1.1: 2
- FMT_LIM.2: 13
- FMT_LIM.2.1: 2
- FMT_MSA.3: 1
- FMT_MTD: 5
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 105
- NXP Semiconductors: 6
- Oberthur:
- Oberthur: 1
- Oberthur Technologies: 102
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA256: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Malfunction: 3
- Physical tampering: 1
- fault injection: 1
- malfunction: 3
- physical tampering: 1
- SCA:
- DPA: 1
- physical probing: 3
- other:
|
- FI:
- Malfunction: 1
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 3
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 10
- EF.DG1: 18
- EF.DG13: 2
- EF.DG14: 4
- EF.DG15: 3
- EF.DG16: 17
- EF.DG2: 4
- EF.DG3: 2
- EF.DG4: 2
- EF.DG5: 3
- EF.SOD: 9
|
- EF:
- EF.COM: 10
- EF.DG1: 25
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 4
- EF.DG16: 22
- EF.DG2: 11
- EF.DG3: 6
- EF.DG4: 6
- EF.DG5: 6
- EF.DG6: 2
- EF.SOD: 10
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 11770-2: 3
- ISO/IEC 15946: 2
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-9: 1
- NIST:
- PKCS:
- RFC:
- SCP:
|
- BSI:
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
- FIPS 180-2: 1
- FIPS 48-3: 2
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: michetho
- /CreationDate: D:20160317194315+01'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20160317194315+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: <Document name>
- /Title: ID-One ePass Full EAC v2 MRTD in BAC configuration with AA and CA on NXP P60x080 PVC/PVG - Public Security Target
- pdf_file_size_bytes: 2110955
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
- /CreationDate: D:20120629142901+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120711193301+02'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title:
- pdf_file_size_bytes: 337724
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |