Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
ANSSI-CC-2017/07
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3)
ANSSI-CC-2016/04
name Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12) Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3)
not_valid_before 2017-03-08 2016-02-09
not_valid_after 2027-09-06 2021-02-09
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_07en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_04_LITE.pdf
status active archived
manufacturer Gemalto Gemalto / NXP Semiconductors
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_07.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_04.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017-07_s01.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': frozenset({'PDCP_V1.3'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 9, 6), 'maintenance_title': 'Reassessment report : ANSSI-CC-2017/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017-07_s01.pdf', 'maintenance_st_link': None}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 20), 'maintenance_title': 'ANSSI-CC-2015/37-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_37-M01.pdf', 'maintenance_st_link': None})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash d0d1f65fff8123089904e38f5c802b96b487794fb4d4e2ee61a21b38cef972dd None
state/cert/txt_hash b6a2fc8686088f10baa69c336e8b98426cb19e1ddf303eb66f10d7e401f3bd17 None
state/report/pdf_hash f58a58932e6add5b5793f5a1c63ad80d3fdec8ed23181195dfae0ae67bef69fb 000909a24e93458358f2804019359481c8e5a87faab4e47f71de1eaf26dfb705
state/report/txt_hash cbba95096e8927d92cbfe376e03853c4e27bf94435b7d3e98b19884890eaa44f 59f9104bb5838746174671ce6aeb693c5cf400819f6ccd8cc5c1dce0e939c8e5
state/st/pdf_hash e9b8ce4d3b8a8f30a7a28dd663bd183b4cdec5212721f223472b0e6e4f2092ed 203c2ce4c96e3b711a9bf18531fa6925c945f7a55c7c0f314f0c74be655984a3
state/st/txt_hash 78bd6f838b207b90bc705403cae3ad4578c426042ea63c54c169467b5aeff062 e534e87f2135bbf4c026738d8834088cd82c32d81bb30b4ee9c0c0f167d7843b
heuristics/cert_id ANSSI-CC-2017/07 ANSSI-CC-2016/04
heuristics/extracted_versions 4.0 4.2.0, 3.1, 1.3
heuristics/report_references/directly_referenced_by ANSSI-CC-2017/19, ANSSI-CC-2017/22, ANSSI-CC-2017/20, ANSSI-CC-2017/21, ANSSI-CC-2017/54 None
heuristics/report_references/directly_referencing BSI-DSZ-CC-0891-V2-2016 ANSSI-CC-2015/37, ANSSI-CC-2015/15, BSI-DSZ-CC-0845-V2-2013
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2018/58v2, BSI-DSZ-CC-1003-2018, ANSSI-CC-2018/57, ANSSI-CC-2020/42, ANSSI-CC-2018/32, ANSSI-CC-2017/76, ANSSI-CC-2020/43, ANSSI-CC-2018/58, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2017/21, ANSSI-CC-2020/44, ANSSI-CC-2020/33, ANSSI-CC-2018/21, ANSSI-CC-2017/82, ANSSI-CC-2018/56, ANSSI-CC-2017/19, ANSSI-CC-2017/20, ANSSI-CC-2018/56v2, ANSSI-CC-2017/83, ANSSI-CC-2018/57v2, ANSSI-CC-2020/45, ANSSI-CC-2019/07, ANSSI-CC-2017/81, ANSSI-CC-2017/22, ANSSI-CC-2020/49, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V2-2016 BSI-DSZ-CC-0837-2013, ANSSI-CC-2015/37, ANSSI-CC-2015/15, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0837-V2-2014, ANSSI-CC-2015/08, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0845-2012, ANSSI-CC-2014/06, ANSSI-CC-2014/86, ANSSI-CC-2014/14, BSI-DSZ-CC-0845-V2-2013
heuristics/scheme_data None
  • product: Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA
  • url: https://cyber.gouv.fr/produits-certifies/application-ias-v420b-sur-la-plateforme-javacard-ouverte-multiapp-v31-masquee-1
  • description: Le produit certifié est la carte à puce ouverte « MultiApp V3.1 » pouvant être en mode contact ou sans-contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS. La cible d’évaluation est composée : de l’applet IAS Classic V4.2.0.B, qui permet à l’utilisateur de signer électroniquement des données ; de
  • sponsor: Gemalto
  • developer: Gemalto / NXP Semiconductors
  • cert_id: 2016/04
  • level: EAL5+
  • enhanced:
    • cert_id: 2016/04
    • certification_date: 09/02/2016
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r4
    • developer: Gemalto / NXP Semiconductors
    • sponsor: Gemalto
    • evaluation_facility: Serma Technologies
    • level: EAL5+
    • protection_profile: PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • report_link: https://cyber.gouv.fr/sites/default/files/2016/02/ANSSI-CC-2016_04.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2016/02/anssi_cible_2016_04_LITE.pdf
heuristics/st_references/directly_referencing BSI-DSZ-CC-0891-V2-2016 BSI-DSZ-CC-0845-V2-2013
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0891-V2-2016 BSI-DSZ-CC-0845-V2-2013
pdf_data/cert_filename certificat-anssi-cc-2017-07_s01.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2017/07-S01: 2
  • cc_protection_profile_id:
    • ANSSI:
      • ANSSI-CC-PP-2010/03-M01: 1
  • cc_security_level:
    • EAL:
      • EAL5: 1
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • Serma:
      • SERMA: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 147308
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: DUCLOS Charlene
  • /Category: -S01
  • /Comments: ANSSI-CC-CER-F-14_v14.7
  • /Company: SGDSN
  • /CreationDate: D:20220916174040+02'00'
  • /Creator: Acrobat PDFMaker 21 pour Word
  • /Keywords: version x.x, révision x
  • /ModDate: D:20220916174040+02'00'
  • /Producer: Adobe PDF Library 21.11.71
  • /SourceModified: D:20220916154029
  • /Title: ANSSI-CC-2017/07
  • pdf_hyperlinks:
None
pdf_data/report_filename ANSSI-CC-2017_07.pdf ANSSI-CC-2016_04.pdf
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2017/07 ANSSI-CC-2016/04
pdf_data/report_frontpage/FR/cert_item Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12 Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA
pdf_data/report_frontpage/FR/cert_item_version JavaCard version 3.0.4, GP version 2.2.1 Version de l’application IAS : 4.2.0.B Version de l’application MOCA Server : 1.0 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
pdf_data/report_frontpage/FR/cert_lab Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
pdf_data/report_frontpage/FR/developer Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie CS20001, 92197 Meudon Cedex, France Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Rapport de certification ANSSI-CC-2016/04 Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA Page 4 sur 22 ANSSI-CC-CER-F-07.017 Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
pdf_data/report_frontpage/FR/ref_protection_profiles PP JCS-O] SUN Java Card System Protection Profile Open Configuration, version 3.0 Protection profiles for secure signature creation device – Part 2 : Device with key generation, version 2.0.1, maintenu sous la référence [PP-SSCD-Part2]. Protection profiles for secure signature creation device – Part 3 : Device with key import, version 1.0.2, certifié sous la référence [PP-SSCD-Part3]. Protection profiles for secure signature creation device – Part 4: Extension for device with key generation and trusted communication with certificate generation application, Version 1.0.1, certifié sous la référence [PP-SSCD-Part4]. Protection profiles for secure signature creation device – Part 5: Extension for device with key generation and trusted communication with signature creation application, Version 1.0.1, certifié sous la référence [PP-SSCD-Part5]. Protection profiles for secure signature creation device – Part 6: Extension for device with key import and trusted communication with signature creation application, Version 1.0.4, certifié sous la référence [PP-SSCD-Part6
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0891-V2-2016: 2
  • BSI-DSZ-CC-0845-V2-2013: 2
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2017/07: 20
  • ANSSI-CC-2016/04: 23
  • ANSSI-CC-2015/15: 3
  • ANSSI-CC-2015/37: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-: 1
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP-0076-: 1
  • other:
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 2
    • PP-SSCD-: 5
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0084-: 1
  • BSI-CC-PP- 0059-2009-MA-01: 1
  • BSI-CC-PP- 0075-2012: 1
  • BSI-CC-PP- 0071-2012: 1
  • BSI-CC-PP- 0072-2012: 1
  • BSI-CC-PP-0076-: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 3 1
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 3 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR.1: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 2 3
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 4 6
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 2
  • EAL4: 2
  • EAL5: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 3 2
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Safety & Security: 1
  • Serma:
    • Serma Technologies: 3
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/eval_facility/Serma
  • Serma Safety & Security: 1
  • Serma Technologies: 3
pdf_data/report_keywords/hash_function/SHA
  • SHA2:
    • SHA-2: 2
  • SHA1:
    • SHA-1: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 2
    • Infineon: 2
  • Gemalto:
    • Gemalto: 17
  • Gemplus:
    • Gemplus: 1
  • Microsoft:
    • Microsoft: 1
  • NXP:
    • NXP Semiconductors: 1
    • NXP: 3
  • Gemalto:
    • Gemalto: 9
pdf_data/report_keywords/vendor/Gemalto/Gemalto 17 9
pdf_data/report_metadata//Title ANSSI-CC-2017_07fr ANSSI-CC-2016_04
pdf_data/report_metadata/pdf_file_size_bytes 1690566 1916006
pdf_data/report_metadata/pdf_number_of_pages 19 22
pdf_data/st_filename ANSSI_cible2017_07en.pdf anssi_cible_2016_04_LITE.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 11 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 4 1
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 4 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 10 2
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 4 2
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0891-V2-2016: 1
  • BSI-DSZ-CC-0845-V2-2013: 2
pdf_data/st_keywords/cc_cert_id/NL/CC-1 2 4
pdf_data/st_keywords/cc_claims
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 4
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.NATIVE: 1
    • O.OPERATE: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.ALARM: 1
    • O.CIPHER: 2
    • O.KEY-MNGT: 2
    • O.PIN-MNGT: 2
    • O.TRANSACTION: 2
    • O.OBJ-DELETION: 1
    • O.DELETION: 1
    • O.LOAD: 1
    • O.INSTALL: 1
    • O.SCP: 3
    • O.CARD-MANAGEMENT: 1
    • O.RND: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 56
    • O.CODE_PCKG: 16
  • T:
    • T.CONFID-APPLI-DATA: 2
    • T.CONFID-JCS-CODE: 2
    • T.CONFID-JCS-DATA: 2
    • T.INTEG-APPLI-CODE: 3
    • T.INTEG-APPLI-DATA: 4
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 2
    • T.SID: 4
    • T.EXE-CODE: 4
    • T.NATIVE: 2
    • T.RESOURCES: 1
    • T.DELETION: 1
    • T.INSTALL: 2
    • T.OBJ-DELETION: 2
    • T.PHYSICAL: 2
  • A:
    • A.APPLET: 2
    • A.DELETION: 2
    • A.VERIFICATION: 2
  • R:
    • R.JAVA: 9
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 7
  • OE:
    • OE.VERIFICATION: 4
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
  • OSP:
    • OSP.VERIFICATION: 2
    • OSP.RND: 2
  • A:
    • A.CGA: 4
    • A.SCA: 4
    • A.CSP: 5
  • OE:
    • OE.HI_VAD: 2
    • OE.HID_VAD: 2
pdf_data/st_keywords/cc_claims/A
  • A.APPLET: 2
  • A.DELETION: 2
  • A.VERIFICATION: 2
  • A.CGA: 4
  • A.SCA: 4
  • A.CSP: 5
pdf_data/st_keywords/cc_claims/OE
  • OE.VERIFICATION: 4
  • OE.APPLET: 1
  • OE.CODE-EVIDENCE: 1
  • OE.HI_VAD: 2
  • OE.HID_VAD: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
  • BSI:
    • BSI-PP-0035: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0076-2013: 1
  • other:
    • PP-SSCD-KG: 38
    • PP-SSCD-KI: 29
    • PP-SSCD: 4
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-: 1
  • BSI-PP-0035: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0071-2012: 1
  • BSI-CC-PP-0072-2012: 1
  • BSI-CC-PP-0076-2013: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 2 3
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 2 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 1
  • EAL6+: 1
  • EAL5+: 1
  • EAL5: 2
  • EAL 6+: 1
  • EAL6 augmented: 1
  • EAL5 augmented: 2
  • EAL 5+: 1
  • EAL5: 3
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 2 3
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 2 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
  • FCO:
    • FCO_NRO: 2
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RND: 7
    • FCS_RND.1: 7
    • FCS_CKM.1: 9
    • FCS_RND.1.1: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 2
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 14
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 14
    • FDP_ACC.2: 6
    • FDP_ACF: 16
    • FDP_ACF.1: 13
    • FDP_IFC: 4
    • FDP_IFC.1: 1
    • FDP_IFF: 4
    • FDP_IFF.1: 10
    • FDP_RIP: 17
    • FDP_RIP.1: 8
    • FDP_ROL: 6
    • FDP_ROL.1: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC: 4
    • FDP_ITC.2: 5
    • FDP_IFC.2: 2
    • FDP_UIT: 2
    • FDP_UIT.1: 2
    • FDP_ACC.1: 1
  • FIA:
    • FIA_SOS.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 1
    • FIA_UID: 4
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
    • FIA_UAU: 2
    • FIA_UAI.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 1
    • FMT_MSA.3: 10
    • FMT_SMR: 9
    • FMT_SMR.1: 8
    • FMT_SMF: 6
    • FMT_SMF.1: 3
    • FMT_MTD: 4
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
  • FPR:
    • FPR_UNO.1: 3
    • FPR_UNO.1.1: 1
    • FPR_UNO: 2
  • FPT:
    • FPT_FLS: 10
    • FPT_FLS.1: 5
    • FPT_TDC.1: 2
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 4
    • FPT_RCV.3: 4
    • FPT_TST: 2
    • FPT_TST.1: 3
    • FPT_PHP: 2
    • FPT_PHP.3: 1
    • FPT_RCV.4: 1
    • FPT_ITT: 2
    • FPT_ITT.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 3
  • FCS:
    • FCS_CKM: 39
    • FCS_CKM.4: 13
    • FCS_COP: 19
    • FCS_CKM.2: 4
    • FCS_COP.1: 7
    • FCS_CKM.1.1: 2
    • FCS_CKM.1: 15
    • FCS_CKM.4.1: 2
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_DAU: 9
    • FDP_UIT: 9
    • FDP_ITC.1: 9
    • FDP_ITC.2: 8
    • FDP_ACC: 44
    • FDP_ACF.1: 11
    • FDP_ACC.1.1: 4
    • FDP_ACF: 31
    • FDP_ACC.1: 28
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_ITC: 10
    • FDP_IFC.1: 18
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_SDI: 17
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_UCT: 8
    • FDP_AFC: 1
    • FDP_SDI.2: 2
    • FDP_DAU.2: 1
    • FDP_ETC.1: 1
    • FDP_UIT.1: 1
    • FDP_RIP: 1
  • FIA:
    • FIA_API: 5
    • FIA_AFL: 15
    • FIA_API.1: 14
    • FIA_API.1.1: 2
    • FIA_UAU.1: 8
    • FIA_UID.1: 11
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 18
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 18
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_AFL.1: 1
  • FMT:
    • FMT_MSA.3: 12
    • FMT_MOF.1: 9
    • FMT_SMR.1: 36
    • FMT_SMF.1: 26
    • FMT_MOF.1.1: 1
    • FMT_MSA: 62
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 9
    • FMT_MSA.1: 7
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4.1: 2
    • FMT_MTD: 16
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.4: 3
    • FMT_MTD.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_TST.1: 12
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_TST: 2
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 36
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
    • FTP_ICT: 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 7
  • FCS_RND.1: 7
  • FCS_CKM.1: 9
  • FCS_RND.1.1: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 2
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 14
  • FCS_COP.1.1: 1
  • FCS_CKM: 39
  • FCS_CKM.4: 13
  • FCS_COP: 19
  • FCS_CKM.2: 4
  • FCS_COP.1: 7
  • FCS_CKM.1.1: 2
  • FCS_CKM.1: 15
  • FCS_CKM.4.1: 2
  • FCS_COP.1.1: 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 9 15
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 13
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 14 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 14
  • FDP_ACC.2: 6
  • FDP_ACF: 16
  • FDP_ACF.1: 13
  • FDP_IFC: 4
  • FDP_IFC.1: 1
  • FDP_IFF: 4
  • FDP_IFF.1: 10
  • FDP_RIP: 17
  • FDP_RIP.1: 8
  • FDP_ROL: 6
  • FDP_ROL.1: 2
  • FDP_SDI.2: 2
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC: 4
  • FDP_ITC.2: 5
  • FDP_IFC.2: 2
  • FDP_UIT: 2
  • FDP_UIT.1: 2
  • FDP_ACC.1: 1
  • FDP_DAU: 9
  • FDP_UIT: 9
  • FDP_ITC.1: 9
  • FDP_ITC.2: 8
  • FDP_ACC: 44
  • FDP_ACF.1: 11
  • FDP_ACC.1.1: 4
  • FDP_ACF: 31
  • FDP_ACC.1: 28
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_DAU.1: 1
  • FDP_DAU.2.1: 1
  • FDP_DAU.2.2: 1
  • FDP_ITC: 10
  • FDP_IFC.1: 18
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_SDI: 17
  • FDP_SDI.1: 2
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_UCT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_UCT: 8
  • FDP_AFC: 1
  • FDP_SDI.2: 2
  • FDP_DAU.2: 1
  • FDP_ETC.1: 1
  • FDP_UIT.1: 1
  • FDP_RIP: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 14 44
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 1 28
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 16 31
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 13 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 1 18
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 4 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 5 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 17 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 2 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 2 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_SOS.2: 1
  • FIA_ATD: 3
  • FIA_ATD.1: 1
  • FIA_UID: 4
  • FIA_UID.2: 1
  • FIA_USB: 2
  • FIA_USB.1: 3
  • FIA_UAU: 2
  • FIA_UAI.1: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 2
  • FIA_API: 5
  • FIA_AFL: 15
  • FIA_API.1: 14
  • FIA_API.1.1: 2
  • FIA_UAU.1: 8
  • FIA_UID.1: 11
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UAU: 18
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UID: 18
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_AFL.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 2 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 1 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 4 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 2 11
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA: 21
  • FMT_MSA.1: 5
  • FMT_MSA.2: 1
  • FMT_MSA.3: 10
  • FMT_SMR: 9
  • FMT_SMR.1: 8
  • FMT_SMF: 6
  • FMT_SMF.1: 3
  • FMT_MTD: 4
  • FMT_MTD.1: 2
  • FMT_MTD.3: 1
  • FMT_MSA.3: 12
  • FMT_MOF.1: 9
  • FMT_SMR.1: 36
  • FMT_SMF.1: 26
  • FMT_MOF.1.1: 1
  • FMT_MSA: 62
  • FMT_MSA.1.1: 3
  • FMT_MSA.2: 9
  • FMT_MSA.1: 7
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.4.1: 2
  • FMT_MTD: 16
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.4: 3
  • FMT_MTD.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 21 62
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 1 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 10 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 4 16
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 3 26
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 8 36
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS: 10
  • FPT_FLS.1: 5
  • FPT_TDC.1: 2
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 4
  • FPT_RCV.3: 4
  • FPT_TST: 2
  • FPT_TST.1: 3
  • FPT_PHP: 2
  • FPT_PHP.3: 1
  • FPT_RCV.4: 1
  • FPT_ITT: 2
  • FPT_ITT.1: 1
  • FPT_EMS: 5
  • FPT_EMS.1: 13
  • FPT_EMS.1.1: 4
  • FPT_EMS.1.2: 3
  • FPT_TST.1: 12
  • FPT_FLS.1: 9
  • FPT_FLS.1.1: 1
  • FPT_TST: 2
  • FPT_PHP.1: 8
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 9
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 1 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 3 12
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 2
  • FTP_ITC.1: 3
  • FTP_ITC: 36
  • FTP_ITC.1: 5
  • FTP_TRP.1: 5
  • FTP_ITC.1.1: 4
  • FTP_ITC.1.2: 4
  • FTP_ITC.1.3: 4
  • FTP_ICT: 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 2 36
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 3 5
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 10
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 10
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_scheme/MAC/MAC 10 3
pdf_data/st_keywords/eval_facility/Serma
  • Serma Technologies: 1
  • SERMA: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA1: 1
    • SHA-1: 3
  • SHA2:
    • SHA-224: 3
    • SHA-256: 3
    • SHA-512: 3
    • SHA224: 1
    • SHA-384: 2
  • SHA2:
    • SHA-224: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 3
  • SHA-256: 3
  • SHA-512: 3
  • SHA224: 1
  • SHA-384: 2
  • SHA-224: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 3 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 8
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 4
    • RND: 3
  • RNG:
    • RNG: 2
    • RND: 1
pdf_data/st_keywords/randomness/RNG/RND 3 1
pdf_data/st_keywords/randomness/RNG/RNG 4 2
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • malfunction: 2
  • Malfunction: 2
  • fault induction: 2
  • physical tampering: 4
  • Malfunction: 1
  • DFA: 1
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 2 1
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 1 4
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 2
  • physical probing: 2
  • DPA: 1
  • Leak-Inherent: 1
  • SPA: 1
  • DPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 2 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 5
  • PKCS:
    • PKCS#3: 1
    • PKCS#1: 7
    • PKCS#5: 5
  • BSI:
    • AIS31: 2
  • SCP:
    • SCP03: 3
    • SCP01: 3
    • SCP02: 3
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
    • FIPS197: 2
  • PKCS:
    • PKCS#3: 3
    • PKCS#1: 2
  • ICAO:
    • ICAO: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS197: 5
  • FIPS180-2: 1
  • FIPS46-3: 1
  • FIPS PUB 46-3: 1
  • FIPS197: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS197 5 2
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 1
  • PKCS#1: 7
  • PKCS#5: 5
  • PKCS#3: 3
  • PKCS#1: 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 7 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 1 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 19 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDEA: 1
  • 3DES: 1
  • TDES: 9
  • TDES: 4
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 9 4
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 20 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 8
  • Gemalto:
    • Gemalto: 489
  • NXP:
    • NXP: 4
  • Gemalto:
    • Gemalto: 83
pdf_data/st_keywords/vendor/Gemalto/Gemalto 489 83
pdf_data/st_metadata//CreationDate D:20170224103913+01'00' D:20150723160151+02'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 Microsoft® Office Word 2007
pdf_data/st_metadata//Keywords Security Target, CC Security Target, CC, eTravel
pdf_data/st_metadata//ModDate D:20170224103935+01'00' D:20150723160151+02'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 Microsoft® Office Word 2007
pdf_data/st_metadata//Subject Security Target MRTD
pdf_data/st_metadata/pdf_file_size_bytes 1989234 1145055
pdf_data/st_metadata/pdf_number_of_pages 79 64
dgst 5b7b6a9b33f1dab4 fd22d93c12fd2799