name |
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
|
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2017-03-08
|
2014-02-07
|
not_valid_after |
2027-09-06
|
2019-09-01
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_07en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_14en.pdf
|
status |
active
|
archived
|
manufacturer |
Gemalto
|
Gemalto - Infineon Technologies AG
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.gemalto.com/
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_07.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_14fr.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017-07_s01.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': frozenset({'PDCP_V1.3'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': frozenset({'SSCD_TYPE3_V1.05'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': frozenset({'SSCD_TYPE2_V1.04'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 9, 6), 'maintenance_title': 'Reassessment report : ANSSI-CC-2017/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017-07_s01.pdf', 'maintenance_st_link': None}) |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 23), 'maintenance_title': 'ANSSI-CC-2014/14-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_14-M01.pdf', 'maintenance_st_link': None}) |
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
d0d1f65fff8123089904e38f5c802b96b487794fb4d4e2ee61a21b38cef972dd
|
None
|
state/cert/txt_hash |
b6a2fc8686088f10baa69c336e8b98426cb19e1ddf303eb66f10d7e401f3bd17
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
f58a58932e6add5b5793f5a1c63ad80d3fdec8ed23181195dfae0ae67bef69fb
|
0dddf8ce40a6d6a357e7cccbe34ba471504480350be7128302792b28cbe2a73c
|
state/report/txt_hash |
cbba95096e8927d92cbfe376e03853c4e27bf94435b7d3e98b19884890eaa44f
|
4b0de8f690a51a8c19b9f11561ff338a4d830bd192640dd00eb096ad67c95752
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
e9b8ce4d3b8a8f30a7a28dd663bd183b4cdec5212721f223472b0e6e4f2092ed
|
4c103beef98d1ffbc34f657914f89279585f7bd485a61a289b149ed4f99b72fe
|
state/st/txt_hash |
78bd6f838b207b90bc705403cae3ad4578c426042ea63c54c169467b5aeff062
|
0c263929e05319fa6321f3cf2ede1d966de187089ced63f9a4e1a54cf90acb4d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2017/07
|
ANSSI-CC-2014/14
|
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
4.0 |
- |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2017/19, ANSSI-CC-2017/22, ANSSI-CC-2017/20, ANSSI-CC-2017/21, ANSSI-CC-2017/54 |
ANSSI-CC-2015/08, ANSSI-CC-2014/50, ANSSI-CC-2014/49 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2018/58v2, BSI-DSZ-CC-1003-2018, ANSSI-CC-2018/57, ANSSI-CC-2020/42, ANSSI-CC-2018/32, ANSSI-CC-2017/76, ANSSI-CC-2020/43, ANSSI-CC-2018/58, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2017/21, ANSSI-CC-2020/44, ANSSI-CC-2020/33, ANSSI-CC-2018/21, ANSSI-CC-2017/82, ANSSI-CC-2018/56, ANSSI-CC-2017/19, ANSSI-CC-2017/20, ANSSI-CC-2018/56v2, ANSSI-CC-2017/83, ANSSI-CC-2018/57v2, ANSSI-CC-2020/45, ANSSI-CC-2019/07, ANSSI-CC-2017/81, ANSSI-CC-2017/22, ANSSI-CC-2020/49, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24 |
ANSSI-CC-2015/38, ANSSI-CC-2015/37, ANSSI-CC-2014/50, ANSSI-CC-2014/49, ANSSI-CC-2015/08, ANSSI-CC-2016/03, ANSSI-CC-2016/04 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011 |
heuristics/scheme_data |
None
|
- product:
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
- url:
https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-le
- description:
Le produit qualifié est l'« application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3masquée sur le composant M7820 A11 », pouvant être en mode contact ou sans-contact. Leproduit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11fabriqué par la société Infineon Technologies.
Ce produit est également proposé sous les noms IDPrime MD 840 (mode contact uni
- sponsor:
Gemalto
- developer:
Gemalto / Infineon Technologies AG
- cert_id:
2014/14
- level:
EAL5+
- enhanced:
- cert_id:
2014/14
- certification_date:
07/02/2014
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Gemalto / Infineon Technologies AG
- sponsor:
Gemalto
- evaluation_facility:
Serma Technologies
- level:
EAL5+
- protection_profile:
BSI-PP-0005-2002, BSI-PP-0006-2002
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-14en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-14fr.pdf
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0727-2011 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0727-2011, BSI-DSZ-CC-0813-2012 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-anssi-cc-2017-07_s01.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
1
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
147308
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
DUCLOS Charlene
- /Category:
-S01
- /Comments:
ANSSI-CC-CER-F-14_v14.7
- /Company:
SGDSN
- /CreationDate:
D:20220916174040+02'00'
- /Creator:
Acrobat PDFMaker 21 pour Word
- /Keywords:
version x.x, révision x
- /ModDate:
D:20220916174040+02'00'
- /Producer:
Adobe PDF Library 21.11.71
- /SourceModified:
D:20220916154029
- /Title:
ANSSI-CC-2017/07
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
ANSSI-CC-2017_07.pdf
|
Rapport ANSSI-CC-2014_14fr.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1 révision 4
|
Critères Communs version 3.1 révision 4
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2017/07
|
ANSSI-CC-2014/14
|
pdf_data/report_frontpage/FR/cert_item |
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12
|
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
|
pdf_data/report_frontpage/FR/cert_item_version |
JavaCard version 3.0.4, GP version 2.2.1
|
Version de l’application IAS : 4.0.2.K Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
|
pdf_data/report_frontpage/FR/cert_lab |
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
pdf_data/report_frontpage/FR/developer |
Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie CS20001, 92197 Meudon Cedex, France
|
Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
pdf_data/report_frontpage/FR/ref_protection_profiles |
PP JCS-O] SUN Java Card System Protection Profile Open Configuration, version 3.0
|
Protection Profile – Secure Signature-Creation Device Type 2, version 1.04, certifié sous la référence [BSI-PP-0005-2002]. Protection Profile – Secure Signature-Creation Device Type 3, version 1.05, certifié sous la référence [BSI-PP-0006-2002
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0891-V2-2016:
2
|
|
pdf_data/report_keywords/cc_cert_id/FR |
|
- ANSSI-CC-2014/14:
23
- ANSSI-CC-2014/06:
4
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
- BSI-PP-0005-2002:
3
- BSI-PP-0006-2002:
3
- BSI-PP-0035-2007:
2
- BSI-PP- 0005-2002:
1
- BSI-PP- 0006-2002:
1
- BSI-PP- 0035-2007:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
3
|
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
3
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR.1: 1
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
4
|
6
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL2: 2
- EAL6: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
- EAL 5:
3
- EAL4: 2
- EAL5: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- Serma:
- Serma Safety & Security:
1
|
|
pdf_data/report_keywords/eval_facility/Serma |
- Serma Safety & Security:
1
|
|
pdf_data/report_keywords/hash_function/SHA |
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-2 |
2
|
1
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
- javacardx:
- com:
- com.gemalto.javacardx.pace:
1
|
- javacardx:
- com:
- com.gemalto.javacardx.pace:
1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG:
2
- Infineon:
2
- Gemalto:
- Gemplus:
- Microsoft:
|
- Infineon:
- Infineon Technologies AG:
1
- Infineon Technologies:
5
- Infineon:
3
- Gemalto:
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
17
|
33
|
pdf_data/report_keywords/vendor/Infineon |
- Infineon Technologies AG:
2
- Infineon:
2
|
- Infineon Technologies AG:
1
- Infineon Technologies: 5
- Infineon:
3
|
pdf_data/report_keywords/vendor/Infineon/Infineon |
2
|
3
|
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG |
2
|
1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
1690566
- pdf_is_encrypted:
False
- pdf_number_of_pages:
19
- /Producer:
GPL Ghostscript 9.02
- /CreationDate:
- /ModDate:
- /Title:
ANSSI-CC-2017_07fr
- /Creator:
PDFCreator Version 1.2.1
- /Author:
- /Keywords:
- /Subject:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
230125
- pdf_is_encrypted:
False
- pdf_number_of_pages:
22
- /Author:
Duquesnoy
- /CreationDate:
D:20140310110235+01'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20140310110235+01'00'
- /Producer:
Acrobat Distiller 9.0.0 (Windows)
- /Title:
Microsoft Word - Rapport ANSSI-CC-2014_14fr.doc
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
|
Duquesnoy
|
pdf_data/report_metadata//CreationDate |
|
D:20140310110235+01'00'
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
|
D:20140310110235+01'00'
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
Acrobat Distiller 9.0.0 (Windows)
|
pdf_data/report_metadata//Title |
ANSSI-CC-2017_07fr
|
Microsoft Word - Rapport ANSSI-CC-2014_14fr.doc
|
pdf_data/report_metadata/pdf_file_size_bytes |
1690566
|
230125
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
19
|
22
|
pdf_data/st_filename |
ANSSI_cible2017_07en.pdf
|
Cible ANSSI-CC-2014_14en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
11
|
3
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH |
4
|
1
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
4
|
1
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
10
|
2
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
4
|
2
|
pdf_data/st_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0891-V2-2016:
1
|
- BSI-DSZ-CC-0695-2011:
1
- BSI-DSZ-CC-0829-2012:
1
- BSI-DSZ-CC-0727-2011:
1
|
pdf_data/st_keywords/cc_cert_id/NL |
|
|
pdf_data/st_keywords/cc_claims |
- D:
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- O:
- O.SID:
1
- O.FIREWALL:
1
- O.GLOBAL_ARRAYS_CONFID:
1
- O.GLOBAL_ARRAYS_INTEG:
1
- O.NATIVE:
1
- O.OPERATE:
1
- O.REALLOCATION:
1
- O.RESOURCES:
1
- O.ALARM:
1
- O.CIPHER:
2
- O.KEY-MNGT:
2
- O.PIN-MNGT:
2
- O.TRANSACTION:
2
- O.OBJ-DELETION:
1
- O.DELETION:
1
- O.LOAD:
1
- O.INSTALL:
1
- O.SCP:
3
- O.CARD-MANAGEMENT:
1
- O.RND:
1
- O.APPLET:
28
- O.CODE_PKG:
7
- O.JAVAOBJECT:
56
- O.CODE_PCKG:
16
- T:
- T.CONFID-APPLI-DATA:
2
- T.CONFID-JCS-CODE:
2
- T.CONFID-JCS-DATA:
2
- T.INTEG-APPLI-CODE:
3
- T.INTEG-APPLI-DATA:
4
- T.INTEG-JCS-CODE:
1
- T.INTEG-JCS-DATA:
2
- T.SID:
4
- T.EXE-CODE:
4
- T.NATIVE:
2
- T.RESOURCES:
1
- T.DELETION:
1
- T.INSTALL:
2
- T.OBJ-DELETION:
2
- T.PHYSICAL:
2
- A:
- A.APPLET:
2
- A.DELETION:
2
- A.VERIFICATION:
2
- R:
- OP:
- OP.ARRAY_ACCESS:
6
- OP.CREATE:
10
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
7
- OE:
- OE.VERIFICATION:
4
- OE.APPLET:
1
- OE.CODE-EVIDENCE:
1
- OSP:
- OSP.VERIFICATION:
2
- OSP.RND:
2
|
- D:
- D.SCD:
1
- D.SVD:
1
- D.DTBS:
1
- D.VAD:
1
- D.SSCD:
1
- D.RAD:
1
- D.SIG:
1
- A:
- OE:
- OE.SVD_AUTH_CGA:
1
- OE.HI_VAD:
1
|
pdf_data/st_keywords/cc_claims/A |
- A.APPLET:
2
- A.DELETION:
2
- A.VERIFICATION:
2
|
|
pdf_data/st_keywords/cc_claims/D |
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
|
- D.SCD:
1
- D.SVD:
1
- D.DTBS:
1
- D.VAD:
1
- D.SSCD:
1
- D.RAD:
1
- D.SIG:
1
|
pdf_data/st_keywords/cc_claims/OE |
- OE.VERIFICATION:
4
- OE.APPLET:
1
- OE.CODE-EVIDENCE:
1
|
- OE.SVD_AUTH_CGA:
1
- OE.HI_VAD:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0035:
1
- BSI-PP-0005:
1
- BSI-PP-0006:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- other:
- PP-SSCD-KG:
16
- PP-SSCD-KI:
14
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
- BSI-PP-0035:
1
- BSI-PP-0005:
1
- BSI-PP-0006:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- ALC:
- AVA:
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL6: 1
- EAL6+: 1
- EAL5+: 1
- EAL5:
2
- EAL 6+: 1
- EAL6 augmented: 1
- EAL5 augmented:
2
|
- EAL 5+: 1
- EAL5:
2
- EAL5 augmented:
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
2
|
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
2
|
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1:
5
- FAU_ARP.1.1:
1
- FCO:
- FCS:
- FCS_RND:
7
- FCS_RND.1:
7
- FCS_CKM.1:
9
- FCS_RND.1.1:
2
- FCS_CKM.1.1:
1
- FCS_CKM.2:
2
- FCS_CKM.2.1:
1
- FCS_CKM.3:
2
- FCS_CKM.3.1:
1
- FCS_CKM.4:
2
- FCS_CKM.4.1:
1
- FCS_COP.1:
14
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC:
14
- FDP_ACC.2:
6
- FDP_ACF:
16
- FDP_ACF.1:
13
- FDP_IFC:
4
- FDP_IFC.1:
1
- FDP_IFF:
4
- FDP_IFF.1:
10
- FDP_RIP:
17
- FDP_RIP.1:
8
- FDP_ROL:
6
- FDP_ROL.1:
2
- FDP_SDI.2:
2
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
4
- FDP_ITC.2:
5
- FDP_IFC.2:
2
- FDP_UIT:
2
- FDP_UIT.1:
2
- FDP_ACC.1:
1
- FIA:
- FIA_SOS.2:
1
- FIA_ATD:
3
- FIA_ATD.1:
1
- FIA_UID:
4
- FIA_UID.2:
1
- FIA_USB:
2
- FIA_USB.1:
3
- FIA_UAU:
2
- FIA_UAI.1:
1
- FIA_UAU.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA:
21
- FMT_MSA.1:
5
- FMT_MSA.2:
1
- FMT_MSA.3:
10
- FMT_SMR:
9
- FMT_SMR.1:
8
- FMT_SMF:
6
- FMT_SMF.1:
3
- FMT_MTD:
4
- FMT_MTD.1:
2
- FMT_MTD.3:
1
- FPR:
- FPR_UNO.1:
3
- FPR_UNO.1.1:
1
- FPR_UNO:
2
- FPT:
- FPT_FLS:
10
- FPT_FLS.1:
5
- FPT_TDC.1:
2
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
4
- FPT_RCV.3:
4
- FPT_TST:
2
- FPT_TST.1:
3
- FPT_PHP:
2
- FPT_PHP.3:
1
- FPT_RCV.4:
1
- FPT_ITT:
2
- FPT_ITT.1:
1
- FTP:
|
- FCS:
- FCS_CKM:
16
- FCS_CKM.4:
10
- FCS_COP:
14
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
6
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
3
- FDP:
- FDP_ITC.1:
5
- FDP_ITC.2:
5
- FDP_ACC.1:
14
- FDP_ACF.1:
3
- FDP_ACC.1.1:
5
- FDP_ACC:
2
- FDP_ACF.1.1:
5
- FDP_ACF.1.2:
5
- FDP_ACF.1.3:
5
- FDP_ACF.1.4:
5
- FDP_ETC.1:
2
- FDP_IFC.1:
11
- FDP_ETC.1.1:
1
- FDP_ETC.1.2:
1
- FDP_ETC:
1
- FDP_ITC:
4
- FDP_ITC.1.1:
2
- FDP_ITC.1.2:
2
- FDP_ITC.1.3:
2
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI:
4
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1:
1
- FDP_UIT.1.1:
2
- FDP_UIT.1.2:
2
- FDP_UCT:
2
- FDP_UIT:
2
- FDP_RIP:
1
- FIA:
- FIA_AFL:
5
- FIA_UAU.1:
2
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_ATD.1:
2
- FIA_ATD.1.1:
1
- FIA_UAU:
4
- FIA_UID.1:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.3:
3
- FMT_MOF.1:
2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1:
1
- FMT_MSA:
16
- FMT_MSA.1.1:
3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_EMS.1:
7
- FPT_EMS:
3
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC.1:
3
- FTP_TRP.1:
2
- FTP_ITC:
13
- FTP_TRP:
4
- FTP_ITC.1.1:
3
- FTP_ITC.1.2:
3
- FTP_ITC.1.3:
3
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND: 7
- FCS_RND.1: 7
- FCS_CKM.1:
9
- FCS_RND.1.1: 2
- FCS_CKM.1.1:
1
- FCS_CKM.2:
2
- FCS_CKM.2.1: 1
- FCS_CKM.3: 2
- FCS_CKM.3.1: 1
- FCS_CKM.4:
2
- FCS_CKM.4.1:
1
- FCS_COP.1:
14
- FCS_COP.1.1:
1
|
- FCS_CKM: 16
- FCS_CKM.4:
10
- FCS_COP: 14
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
6
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
9
|
6
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
2
|
10
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
14
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC:
14
- FDP_ACC.2: 6
- FDP_ACF: 16
- FDP_ACF.1:
13
- FDP_IFC: 4
- FDP_IFC.1:
1
- FDP_IFF: 4
- FDP_IFF.1: 10
- FDP_RIP:
17
- FDP_RIP.1:
8
- FDP_ROL: 6
- FDP_ROL.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
4
- FDP_ITC.2:
5
- FDP_IFC.2: 2
- FDP_UIT:
2
- FDP_UIT.1:
2
- FDP_ACC.1:
1
|
- FDP_ITC.1: 5
- FDP_ITC.2:
5
- FDP_ACC.1:
14
- FDP_ACF.1:
3
- FDP_ACC.1.1: 5
- FDP_ACC:
2
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 5
- FDP_ETC.1: 2
- FDP_IFC.1:
11
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC: 1
- FDP_ITC:
4
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP.1:
1
- FDP_RIP.1.1: 1
- FDP_SDI: 4
- FDP_SDI.1: 2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT.1:
1
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FDP_UCT: 2
- FDP_UIT:
2
- FDP_RIP:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
14
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
1
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
13
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
1
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
17
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
8
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_SOS.2: 1
- FIA_ATD: 3
- FIA_ATD.1:
1
- FIA_UID:
4
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FIA_UAU:
2
- FIA_UAI.1: 1
- FIA_UAU.1:
1
- FIA_UID.1:
2
|
- FIA_AFL: 5
- FIA_UAU.1:
2
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1:
2
- FIA_ATD.1.1: 1
- FIA_UAU:
4
- FIA_UID.1:
5
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID:
4
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA:
21
- FMT_MSA.1:
5
- FMT_MSA.2:
1
- FMT_MSA.3:
10
- FMT_SMR: 9
- FMT_SMR.1:
8
- FMT_SMF: 6
- FMT_SMF.1:
3
- FMT_MTD:
4
- FMT_MTD.1: 2
- FMT_MTD.3: 1
|
- FMT_MSA.3:
3
- FMT_MOF.1: 2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1: 1
- FMT_MSA:
16
- FMT_MSA.1.1: 3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD:
4
- FMT_MTD.1.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
21
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
5
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
10
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
3
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
8
|
11
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS: 10
- FPT_FLS.1:
5
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_RCV: 4
- FPT_RCV.3: 4
- FPT_TST:
2
- FPT_TST.1:
3
- FPT_PHP: 2
- FPT_PHP.3:
1
- FPT_RCV.4: 1
- FPT_ITT: 2
- FPT_ITT.1: 1
|
- FPT_EMS.1: 7
- FPT_EMS: 3
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1: 1
- FPT_TST:
2
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3:
2
- FPT_PHP.3.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
5
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FTP |
|
- FTP_ITC.1:
3
- FTP_TRP.1: 2
- FTP_ITC:
13
- FTP_TRP: 4
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
2
|
13
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
3
|
3
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
10
|
3
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA-224:
3
- SHA-256:
3
- SHA-512:
3
- SHA224:
1
- SHA-384:
2
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-224:
3
- SHA-256: 3
- SHA-512: 3
- SHA224: 1
- SHA-384: 2
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
3
|
1
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.2.2:
3
- Java Card 3.0.4:
8
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
3
|
1
|
pdf_data/st_keywords/randomness/RNG/RNG |
4
|
2
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
1
- malfunction: 2
- Malfunction: 2
- fault induction: 2
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
4
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent: 2
- physical probing: 2
- DPA:
1
|
- SPA: 1
- DPA:
1
- timing attacks: 1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
1
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- PKCS:
- PKCS#3:
1
- PKCS#1:
7
- PKCS#5:
5
- BSI:
- SCP:
- SCP03:
3
- SCP01:
3
- SCP02:
3
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS197:
2
- PKCS:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
|
- FIPS180-2:
1
- FIPS46-3: 1
- FIPS PUB 46-3: 1
- FIPS197:
2
|
pdf_data/st_keywords/standard_id/FIPS/FIPS180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS197 |
5
|
2
|
pdf_data/st_keywords/standard_id/PKCS |
- PKCS#3:
1
- PKCS#1:
7
- PKCS#5: 5
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 |
7
|
2
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 |
1
|
3
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
19
|
6
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
9
|
4
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
20
|
2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
489
|
306
|
pdf_data/st_keywords/vendor/Infineon/Infineon |
8
|
3
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Antoine de Lavernette
|
Antoine de Lavernette
|
pdf_data/st_metadata//CreationDate |
D:20170224103913+01'00'
|
D:20140123111642+01'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2013
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Keywords |
Security Target, CC
|
Security Target, CC, eTravel
|
pdf_data/st_metadata//ModDate |
D:20170224103935+01'00'
|
D:20140123111642+01'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2013
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Subject |
Security Target
|
MRTD
|
pdf_data/st_metadata//Title |
eTravel v1.0 Security Target MAÏA3
|
eTravel v1.0 Security Target MAÏA3
|
pdf_data/st_metadata/pdf_file_size_bytes |
1989234
|
653030
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
79
|
46
|
dgst |
5b7b6a9b33f1dab4
|
5f544899f54919a6
|