name |
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
|
Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2017-03-08
|
2013-05-21
|
not_valid_after |
2027-09-06
|
2019-09-01
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_07en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-30en.pdf
|
status |
active
|
archived
|
manufacturer |
Gemalto
|
Gemalto / NXP Semiconductors
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.gemalto.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_07.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-30fr.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017-07_s01.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': frozenset({'PDCP_V1.3'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': frozenset({'SSCD_TYPE3_V1.05'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': frozenset({'SSCD_TYPE2_V1.04'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 9, 6), 'maintenance_title': 'Reassessment report : ANSSI-CC-2017/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017-07_s01.pdf', 'maintenance_st_link': None}) |
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
d0d1f65fff8123089904e38f5c802b96b487794fb4d4e2ee61a21b38cef972dd
|
None
|
state/cert/txt_hash |
b6a2fc8686088f10baa69c336e8b98426cb19e1ddf303eb66f10d7e401f3bd17
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
f58a58932e6add5b5793f5a1c63ad80d3fdec8ed23181195dfae0ae67bef69fb
|
a5a46670a2719020d4b6773062fa42747a27113424847f65be25759232c2d279
|
state/report/txt_hash |
cbba95096e8927d92cbfe376e03853c4e27bf94435b7d3e98b19884890eaa44f
|
222924ce690799834c694251b0660333f6ca8d5451df79c5b27bb6fe11027bcf
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
e9b8ce4d3b8a8f30a7a28dd663bd183b4cdec5212721f223472b0e6e4f2092ed
|
6eabde68b50de2b237b2955ca3b3dccd3c3f69ba2bf6cb0b6e20819cc65a2c3c
|
state/st/txt_hash |
78bd6f838b207b90bc705403cae3ad4578c426042ea63c54c169467b5aeff062
|
35a9b99717eb4b24b063aac0b55e75d4e21177871c5a31c44da75f774b0bd261
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2017/07
|
ANSSI-CC-2013/30
|
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
4.0 |
2.1 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2017/19, ANSSI-CC-2017/22, ANSSI-CC-2017/20, ANSSI-CC-2017/21, ANSSI-CC-2017/54 |
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0645-2010, ANSSI-CC-2013/29 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2018/58v2, BSI-DSZ-CC-1003-2018, ANSSI-CC-2018/57, ANSSI-CC-2020/42, ANSSI-CC-2018/32, ANSSI-CC-2017/76, ANSSI-CC-2020/43, ANSSI-CC-2018/58, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2017/21, ANSSI-CC-2020/44, ANSSI-CC-2020/33, ANSSI-CC-2018/21, ANSSI-CC-2017/82, ANSSI-CC-2018/56, ANSSI-CC-2017/19, ANSSI-CC-2017/20, ANSSI-CC-2018/56v2, ANSSI-CC-2017/83, ANSSI-CC-2018/57v2, ANSSI-CC-2020/45, ANSSI-CC-2019/07, ANSSI-CC-2017/81, ANSSI-CC-2017/22, ANSSI-CC-2020/49, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24 |
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0645-2010, ANSSI-CC-2013/29 |
heuristics/scheme_data |
None
|
- product:
Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A
- url:
https://cyber.gouv.fr/produits-certifies/application-ias-classic-v3-sur-plateforme-java-card-en-configuration-ouverte-0
- description:
Le produit certifié est « l'application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A, référence IAS Classic V3 on MultiApp ID V2.1, en version MPH119 avec filtre v2.4 », développée par GEMALTO et NXP.
Le produit évalué est composé :
- de l'applet IAS Classic v3 qui permet à l'utilisateur de sig
- sponsor:
GEMALTO
- developer:
GEMALTO / NXP
- cert_id:
2013/30
- level:
EAL4+
- enhanced:
- cert_id:
2013/30
- certification_date:
21/05/2013
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r3
- developer:
GEMALTO / NXP
- sponsor:
GEMALTO
- evaluation_facility:
SERMA Technologies
- level:
EAL4+
- protection_profile:
BSI-PP-0005-2002 / BSI-PP-0006-2002
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2 et AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-30en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-30fr.pdf
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0555-2009 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0555-2009 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-anssi-cc-2017-07_s01.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
1
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
147308
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
DUCLOS Charlene
- /Category:
-S01
- /Comments:
ANSSI-CC-CER-F-14_v14.7
- /Company:
SGDSN
- /CreationDate:
D:20220916174040+02'00'
- /Creator:
Acrobat PDFMaker 21 pour Word
- /Keywords:
version x.x, révision x
- /ModDate:
D:20220916174040+02'00'
- /Producer:
Adobe PDF Library 21.11.71
- /SourceModified:
D:20220916154029
- /Title:
ANSSI-CC-2017/07
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
ANSSI-CC-2017_07.pdf
|
ANSSI-CC_2013-30fr.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
EAL4 Augmenté ALC_DVS.2 et AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1 révision 4
|
CC version 3.1 révision 3
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2017/07
|
ANSSI-CC-2013/30
|
pdf_data/report_frontpage/FR/cert_item |
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12
|
Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A
|
pdf_data/report_frontpage/FR/cert_item_version |
JavaCard version 3.0.4, GP version 2.2.1
|
Référence IAS Classic V3 on MultiApp ID V2.1, Version MPH119 avec filtre v2.4
|
pdf_data/report_frontpage/FR/cert_lab |
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
SERMA Technologies 30 Avenue Gustave Eiffel, 33608 Pessac, France
|
pdf_data/report_frontpage/FR/developer |
Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie CS20001, 92197 Meudon Cedex, France
|
GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France NXP 101 Stresemanallee, D-22502 Hambourg Allemagne Commanditaire GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
pdf_data/report_frontpage/FR/ref_protection_profiles |
PP JCS-O] SUN Java Card System Protection Profile Open Configuration, version 3.0
|
BSI-PP-0005-2002], version v1.04 Protection Profile — Secure Signature-Creation Device Type 2, [BSI-PP-0006-2002], version v1.05 Protection Profile — Secure Signature Creation Device Protection Profile Type 3
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0891-V2-2016:
2
|
|
pdf_data/report_keywords/cc_cert_id/FR |
|
- ANSSI-CC-2013/30:
18
- ANSSI-CC-2013/29:
3
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
- BSI-PP-0005-2002:
3
- BSI-PP-0006-2002:
2
- BSI-CC-PP-0035-2007:
1
- BSI-PP- 0005-2002:
1
- BSI-PP- 0006-2002:
1
- BSI-PP- 0035-2007:
1
- BSI-PP-0035-2007:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
3
|
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
3
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR.1: 1
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_TSS.2: 1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_CCL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_ECD |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_INT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_OBJ |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_REQ |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_SPD |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
3
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
4
|
3
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL2: 2
- EAL6: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
- EAL4: 4
- EAL5: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/Serma |
- Serma Safety & Security:
1
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
- javacardx:
- com:
- com.gemalto.javacardx.pace:
1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG:
2
- Infineon:
2
- Gemalto:
- Gemplus:
- Microsoft:
|
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
17
|
14
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
1690566
- pdf_is_encrypted:
False
- pdf_number_of_pages:
19
- /Producer:
GPL Ghostscript 9.02
- /CreationDate:
- /ModDate:
- /Title:
ANSSI-CC-2017_07fr
- /Creator:
PDFCreator Version 1.2.1
- /Author:
- /Keywords:
- /Subject:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
199616
- pdf_is_encrypted:
False
- pdf_number_of_pages:
17
- /CreationDate:
D:20130521161327+02'00'
- /Creator:
PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
D:20130522105155+02'00'
- /Producer:
GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
|
D:20130521161327+02'00'
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
PDFCreator Version 1.2.1
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
|
D:20130522105155+02'00'
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
GPL Ghostscript 9.02
|
pdf_data/report_metadata//Subject |
|
|
pdf_data/report_metadata//Title |
ANSSI-CC-2017_07fr
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
1690566
|
199616
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
19
|
17
|
pdf_data/st_filename |
ANSSI_cible2017_07en.pdf
|
ANSSI-CC-cible_2013-30en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
11
|
1
|
pdf_data/st_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0891-V2-2016:
1
|
- BSI-DSZ-CC-0555-2009:
1
- BSI-DSZ-CC-0645-2010:
1
|
pdf_data/st_keywords/cc_cert_id/NL/CC-1 |
2
|
2
|
pdf_data/st_keywords/cc_cert_id/NL/CC-2 |
3
|
2
|
pdf_data/st_keywords/cc_cert_id/NL/CC-3 |
3
|
3
|
pdf_data/st_keywords/cc_claims |
- D:
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- O:
- O.SID:
1
- O.FIREWALL:
1
- O.GLOBAL_ARRAYS_CONFID:
1
- O.GLOBAL_ARRAYS_INTEG:
1
- O.NATIVE:
1
- O.OPERATE:
1
- O.REALLOCATION:
1
- O.RESOURCES:
1
- O.ALARM:
1
- O.CIPHER:
2
- O.KEY-MNGT:
2
- O.PIN-MNGT:
2
- O.TRANSACTION:
2
- O.OBJ-DELETION:
1
- O.DELETION:
1
- O.LOAD:
1
- O.INSTALL:
1
- O.SCP:
3
- O.CARD-MANAGEMENT:
1
- O.RND:
1
- O.APPLET:
28
- O.CODE_PKG:
7
- O.JAVAOBJECT:
56
- O.CODE_PCKG:
16
- T:
- T.CONFID-APPLI-DATA:
2
- T.CONFID-JCS-CODE:
2
- T.CONFID-JCS-DATA:
2
- T.INTEG-APPLI-CODE:
3
- T.INTEG-APPLI-DATA:
4
- T.INTEG-JCS-CODE:
1
- T.INTEG-JCS-DATA:
2
- T.SID:
4
- T.EXE-CODE:
4
- T.NATIVE:
2
- T.RESOURCES:
1
- T.DELETION:
1
- T.INSTALL:
2
- T.OBJ-DELETION:
2
- T.PHYSICAL:
2
- A:
- A.APPLET:
2
- A.DELETION:
2
- A.VERIFICATION:
2
- R:
- OP:
- OP.ARRAY_ACCESS:
6
- OP.CREATE:
10
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
7
- OE:
- OE.VERIFICATION:
4
- OE.APPLET:
1
- OE.CODE-EVIDENCE:
1
- OSP:
- OSP.VERIFICATION:
2
- OSP.RND:
2
|
- D:
- D.SCD:
11
- D.SVD:
7
- D.DTBS:
6
- D.VAD:
1
- D.RAD:
5
- D.SSCD:
1
- D.SIG:
3
- A:
- OE:
- OE.SVD_AUTH_CGA:
1
- OE.HI_VAD:
1
|
pdf_data/st_keywords/cc_claims/A |
- A.APPLET:
2
- A.DELETION:
2
- A.VERIFICATION:
2
|
|
pdf_data/st_keywords/cc_claims/D |
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
|
- D.SCD:
11
- D.SVD:
7
- D.DTBS:
6
- D.VAD:
1
- D.RAD:
5
- D.SSCD:
1
- D.SIG:
3
|
pdf_data/st_keywords/cc_claims/OE |
- OE.VERIFICATION:
4
- OE.APPLET:
1
- OE.CODE-EVIDENCE:
1
|
- OE.SVD_AUTH_CGA:
1
- OE.HI_VAD:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0035:
1
- BSI-PP-0004-2002:
1
- BSI-PP-0005-2002:
1
- BSI-PP-0006-2002:
1
- other:
- PP-SSCD /T1:
1
- PP-SSCD /T2:
9
- PP-SSCD /T3:
7
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
- BSI-PP-0035:
1
- BSI-PP-0004-2002:
1
- BSI-PP-0005-2002:
1
- BSI-PP-0006-2002:
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- ALC:
- AVA:
|
- ACM:
- ACM_AUT:
1
- ACM_CAP:
2
- ACM_SCP:
2
- ADO:
- ADV:
- ADV_IMP.2:
1
- ADV_IMP.1:
2
- ADV_ARC:
2
- ADV_LLD:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_HLD:
1
- ADV_ARC.1:
1
- ADV_FSP.4:
1
- ADV_TDS.3:
1
- AGD:
- AGD_PRE:
3
- AGD_USR:
1
- AGD_ADM:
1
- AGD_OPE:
1
- AGD_PRE.1:
3
- AGD_OPE.1:
1
- ALC:
- ALC_DVS.2:
4
- ALC_DVS:
2
- ALC_CMC:
2
- ALC_CMS:
2
- ALC_DEL:
2
- ALC_LCD:
1
- ALC_TAT:
1
- ALC_CMC.4:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- AVA_VAN.5:
4
- AVA_MSU.3:
1
- AVA_VLA.4:
1
- AVA_VAN:
1
- AVA_CCA:
1
- AVA_VLA:
1
- AVA_SOF:
1
- AVA_MSU:
1
- ASE:
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS: 1
|
- ADV_IMP.2: 1
- ADV_IMP.1: 2
- ADV_ARC:
2
- ADV_LLD: 1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_HLD: 1
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_TDS.3: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC |
1
|
2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
|
- ALC_DVS.2:
4
- ALC_DVS: 2
- ALC_CMC: 2
- ALC_CMS: 2
- ALC_DEL: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
4
|
pdf_data/st_keywords/cc_sar/AVA |
|
- AVA_VAN.5:
4
- AVA_MSU.3: 1
- AVA_VLA.4: 1
- AVA_VAN: 1
- AVA_CCA: 1
- AVA_VLA: 1
- AVA_SOF: 1
- AVA_MSU: 1
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
2
|
4
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL6: 1
- EAL6+: 1
- EAL5+: 1
- EAL5:
2
- EAL 6+: 1
- EAL6 augmented: 1
- EAL5 augmented:
2
|
- EAL4+: 9
- EAL4: 7
- EAL5:
1
- EAL4 augmented: 3
- EAL5 augmented:
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
2
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
2
|
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1:
5
- FAU_ARP.1.1:
1
- FCO:
- FCS:
- FCS_RND:
7
- FCS_RND.1:
7
- FCS_CKM.1:
9
- FCS_RND.1.1:
2
- FCS_CKM.1.1:
1
- FCS_CKM.2:
2
- FCS_CKM.2.1:
1
- FCS_CKM.3:
2
- FCS_CKM.3.1:
1
- FCS_CKM.4:
2
- FCS_CKM.4.1:
1
- FCS_COP.1:
14
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC:
14
- FDP_ACC.2:
6
- FDP_ACF:
16
- FDP_ACF.1:
13
- FDP_IFC:
4
- FDP_IFC.1:
1
- FDP_IFF:
4
- FDP_IFF.1:
10
- FDP_RIP:
17
- FDP_RIP.1:
8
- FDP_ROL:
6
- FDP_ROL.1:
2
- FDP_SDI.2:
2
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
4
- FDP_ITC.2:
5
- FDP_IFC.2:
2
- FDP_UIT:
2
- FDP_UIT.1:
2
- FDP_ACC.1:
1
- FIA:
- FIA_SOS.2:
1
- FIA_ATD:
3
- FIA_ATD.1:
1
- FIA_UID:
4
- FIA_UID.2:
1
- FIA_USB:
2
- FIA_USB.1:
3
- FIA_UAU:
2
- FIA_UAI.1:
1
- FIA_UAU.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA:
21
- FMT_MSA.1:
5
- FMT_MSA.2:
1
- FMT_MSA.3:
10
- FMT_SMR:
9
- FMT_SMR.1:
8
- FMT_SMF:
6
- FMT_SMF.1:
3
- FMT_MTD:
4
- FMT_MTD.1:
2
- FMT_MTD.3:
1
- FPR:
- FPR_UNO.1:
3
- FPR_UNO.1.1:
1
- FPR_UNO:
2
- FPT:
- FPT_FLS:
10
- FPT_FLS.1:
5
- FPT_TDC.1:
2
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
4
- FPT_RCV.3:
4
- FPT_TST:
2
- FPT_TST.1:
3
- FPT_PHP:
2
- FPT_PHP.3:
1
- FPT_RCV.4:
1
- FPT_ITT:
2
- FPT_ITT.1:
1
- FTP:
|
- FAU:
- FCS:
- FCS_CKM:
8
- FCS_COP:
6
- FCS_CKM.1:
2
- FCS_CKM.4:
4
- FCS_COP.1:
8
- FDP:
- FDP_ACC:
4
- FDP_ACF:
3
- FDP_ETC:
4
- FDP_ITC:
3
- FDP_RIP:
3
- FDP_SDI:
6
- FDP_UCT:
2
- FDP_UIT:
3
- FDP_ACC.1:
9
- FDP_ACF.1:
24
- FDP_ETC.1:
4
- FDP_ITC.1:
8
- FDP_RIP.1:
2
- FDP_SDI.2:
6
- FDP_UCT.1:
4
- FDP_UIT.1:
6
- FDP_RIP.1.1:
1
- FIA:
- FIA_AFL:
2
- FIA_ATD:
2
- FIA_UAU:
2
- FIA_UID:
3
- FIA_AFL.1:
3
- FIA_ATD.1:
3
- FIA_UAU.1:
3
- FIA_UID.1:
4
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FMT:
- FMT_MOF:
3
- FMT_MSA:
4
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMR:
2
- FMT_MOF.1:
2
- FMT_MSA.1:
4
- FMT_MSA.2:
3
- FMT_MSA.3:
7
- FMT_MTD.1:
3
- FMT_SMF.1:
3
- FMT_SMR.1:
3
- FMT_MOF.1.1:
1
- FMT_MSA.2.1:
1
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_FLS:
2
- FPT_PHP:
2
- FPT_TST:
3
- FPT_AMT.1:
1
- FPT_FLS.1:
3
- FPT_PHP.1:
3
- FPT_PHP.3:
3
- FPT_TST.1:
3
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC:
6
- FTP_TRP:
6
- FTP_ITC.1:
14
- FTP_TRP.1:
3
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_ARP.1:
5
- FAU_ARP.1.1:
1
|
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND: 7
- FCS_RND.1: 7
- FCS_CKM.1:
9
- FCS_RND.1.1: 2
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.2.1: 1
- FCS_CKM.3: 2
- FCS_CKM.3.1: 1
- FCS_CKM.4:
2
- FCS_CKM.4.1: 1
- FCS_COP.1:
14
- FCS_COP.1.1: 1
|
- FCS_CKM: 8
- FCS_COP: 6
- FCS_CKM.1:
2
- FCS_CKM.4:
4
- FCS_COP.1:
8
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
9
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
14
|
8
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC:
14
- FDP_ACC.2: 6
- FDP_ACF:
16
- FDP_ACF.1:
13
- FDP_IFC: 4
- FDP_IFC.1: 1
- FDP_IFF: 4
- FDP_IFF.1: 10
- FDP_RIP:
17
- FDP_RIP.1:
8
- FDP_ROL: 6
- FDP_ROL.1: 2
- FDP_SDI.2:
2
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_ITC:
4
- FDP_ITC.2: 5
- FDP_IFC.2: 2
- FDP_UIT:
2
- FDP_UIT.1:
2
- FDP_ACC.1:
1
|
- FDP_ACC:
4
- FDP_ACF:
3
- FDP_ETC: 4
- FDP_ITC:
3
- FDP_RIP:
3
- FDP_SDI: 6
- FDP_UCT: 2
- FDP_UIT:
3
- FDP_ACC.1:
9
- FDP_ACF.1:
24
- FDP_ETC.1: 4
- FDP_ITC.1: 8
- FDP_RIP.1:
2
- FDP_SDI.2:
6
- FDP_UCT.1: 4
- FDP_UIT.1:
6
- FDP_RIP.1.1: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
14
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
1
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
16
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
13
|
24
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
17
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
8
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
2
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
2
|
6
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_SOS.2: 1
- FIA_ATD:
3
- FIA_ATD.1:
1
- FIA_UID:
4
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FIA_UAU:
2
- FIA_UAI.1: 1
- FIA_UAU.1:
1
- FIA_UID.1:
2
|
- FIA_AFL: 2
- FIA_ATD:
2
- FIA_UAU:
2
- FIA_UID:
3
- FIA_AFL.1: 3
- FIA_ATD.1:
3
- FIA_UAU.1:
3
- FIA_UID.1:
4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1.1: 1
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA:
21
- FMT_MSA.1:
5
- FMT_MSA.2:
1
- FMT_MSA.3:
10
- FMT_SMR:
9
- FMT_SMR.1:
8
- FMT_SMF:
6
- FMT_SMF.1:
3
- FMT_MTD:
4
- FMT_MTD.1:
2
- FMT_MTD.3: 1
|
- FMT_MOF: 3
- FMT_MSA:
4
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMR:
2
- FMT_MOF.1: 2
- FMT_MSA.1:
4
- FMT_MSA.2:
3
- FMT_MSA.3:
7
- FMT_MTD.1:
3
- FMT_SMF.1:
3
- FMT_SMR.1:
3
- FMT_MOF.1.1: 1
- FMT_MSA.2.1: 1
- FMT_MTD.1.1: 1
- FMT_SMF.1.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
21
|
4
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
5
|
4
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
10
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF |
6
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR |
9
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
8
|
3
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS:
10
- FPT_FLS.1:
5
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_RCV: 4
- FPT_RCV.3: 4
- FPT_TST:
2
- FPT_TST.1:
3
- FPT_PHP:
2
- FPT_PHP.3:
1
- FPT_RCV.4: 1
- FPT_ITT: 2
- FPT_ITT.1: 1
|
- FPT_FLS:
2
- FPT_PHP:
2
- FPT_TST:
3
- FPT_AMT.1: 1
- FPT_FLS.1:
3
- FPT_PHP.1: 3
- FPT_PHP.3:
3
- FPT_TST.1:
3
- FPT_FLS.1.1: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS |
10
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
5
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FTP |
|
- FTP_ITC:
6
- FTP_TRP: 6
- FTP_ITC.1:
14
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
2
|
6
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
3
|
14
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-224: 3
- SHA-256:
3
- SHA-512: 3
- SHA224: 1
- SHA-384: 2
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
3
|
3
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version/JavaCard |
- Java Card 2.2.2:
3
- Java Card 3.0.4: 8
|
|
pdf_data/st_keywords/javacard_version/JavaCard/Java Card 2.2.2 |
3
|
7
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/PRNG |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
4
|
3
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
1
- malfunction: 2
- Malfunction: 2
- fault induction: 2
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
4
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent: 2
- physical probing: 2
- DPA:
1
|
- Side channel: 1
- SPA: 1
- DPA:
1
- timing attacks: 1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
1
|
1
|
pdf_data/st_keywords/standard_id/BSI/AIS31 |
2
|
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
|
- FIPS 46-3:
1
- FIPS 180-2:
1
|
pdf_data/st_keywords/standard_id/PKCS |
- PKCS#3:
1
- PKCS#1:
7
- PKCS#5:
5
|
|
pdf_data/st_keywords/standard_id/SCP/SCP01 |
3
|
1
|
pdf_data/st_keywords/standard_id/SCP/SCP02 |
3
|
1
|
pdf_data/st_keywords/standard_id/SCP/SCP03 |
3
|
1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
- 3DES:
1
- Triple-DES: 2
- TDES:
8
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
9
|
8
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
20
|
3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
489
|
74
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1989234
- pdf_is_encrypted:
False
- pdf_number_of_pages:
79
- /Author: Antoine de Lavernette
- /CreationDate:
D:20170224103913+01'00'
- /Creator:
Microsoft® Word 2013
- /Keywords:
Security Target, CC
- /ModDate:
D:20170224103935+01'00'
- /Producer:
Microsoft® Word 2013
- /Subject:
Security Target
- /Title:
eTravel v1.0 Security Target MAÏA3
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
480443
- pdf_is_encrypted:
False
- pdf_number_of_pages:
51
- /CreationDate:
D:20121019145156Z
- /Creator:
PDFCreator Version 0.9.3
- /Keywords:
- /ModDate:
D:20130522105159+02'00'
- /Producer:
GPL Ghostscript 8.54
- /Subject:
- /Title:
- pdf_hyperlinks:
|
pdf_data/st_metadata//CreationDate |
D:20170224103913+01'00'
|
D:20121019145156Z
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2013
|
PDFCreator Version 0.9.3
|
pdf_data/st_metadata//Keywords |
Security Target, CC
|
|
pdf_data/st_metadata//ModDate |
D:20170224103935+01'00'
|
D:20130522105159+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2013
|
GPL Ghostscript 8.54
|
pdf_data/st_metadata//Subject |
Security Target
|
|
pdf_data/st_metadata//Title |
eTravel v1.0 Security Target MAÏA3
|
|
pdf_data/st_metadata/pdf_file_size_bytes |
1989234
|
480443
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
79
|
51
|
dgst |
5b7b6a9b33f1dab4
|
4bef828b961776ae
|