Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11)
ANSSI-CC-2024/11
eTravel 2.5.A BAC on MultiApp V5.0.A (version 2.5.A.0.0)
ANSSI-CC-2022/11
name NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) eTravel 2.5.A BAC on MultiApp V5.0.A (version 2.5.A.0.0)
category Trusted Computing ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_after 17.04.2029 16.05.2027
not_valid_before 17.04.2024 16.05.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_11fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_11.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_11fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_11fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_11en.pdf
manufacturer Nuvoton Technology THALES DIS FRANCE SA
manufacturer_web None https://www.thalesgroup.com/en/europe/france
security_level AVA_VAN.4, EAL4+, ALC_FLR.1, ALC_DVS.2 ADV_INT.2, ALC_CMS.5, ADV_FSP.5, ALC_TAT.2, ADV_TDS.4, ALC_DVS.2, ATE_DPT.3, EAL4+
dgst 5d96ca8577702d78 2bbe951ae5b59320
heuristics/cert_id ANSSI-CC-2024/11 ANSSI-CC-2022/11
heuristics/extracted_sars AVA_VAN.4, ALC_FLR.1, ALC_DVS.2 ADV_ARC.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, ATE_DPT.3, ADV_INT.2, ALC_TAT.2, ADV_TDS.4
heuristics/extracted_versions 2.0, 1.4.2.2, 1.59 2.5, 0.0, 5.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/54
heuristics/report_references/directly_referencing {} ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/54
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2021/42, BSI-DSZ-CC-1107-2020, ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021
heuristics/scheme_data
  • cert_id: ANSSI-CC-2024/11
  • description: Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.4.2.2 » développé par NUVOTON TECHNOLOGY CORPORATION. Ce produit est un TPM (Trusted Platform Module). Il est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.
  • developer: NUVOTON TECHNOLOGY CORPORATION
  • enhanced:
    • augmented: ALC_FLR.1, AVA_VAN.4, ALC_DVS.2
    • category: Micro-circuits
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2024/11
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_11fr.pdf
    • certification_date: 2024-04-17
    • developer: NUVOTON TECHNOLOGY CORPORATION
    • evaluation_facility: SERMA SAFETY & SECURITY
    • expiration_date: 2029-04-17
    • level: EAL4+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Protection Profile PC Client Specific TPM PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021 certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021.
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_11fr.pdf
    • sponsor: NUVOTON TECHNOLOGY CORPORATION
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf
  • expiration_date: 2029-04-17
  • level: EAL4+
  • product: NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2)
  • sponsor: NUVOTON TECHNOLOGY CORPORATION
  • url: https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1422
  • cert_id: ANSSI-CC-2022/11
  • description: Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur notamment lors du contrôle aux frontières, à l’aide d’un système d’inspection. Il est disponible en mode contact ou sans conta
  • developer: THALES DIS FRANCE SAS INFINEON TECHNOLOGIES AG
  • enhanced:
    • augmented: ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2022/11
    • cert_link: https://cyber.gouv.fr/sites/default/files/2022/05/certificat-anssi-cc-2022_11.pdf
    • certification_date: 2022-05-16
    • developer: THALES DIS FRANCE SAS INFINEON TECHNOLOGIES AG
    • evaluation_facility: CEA - LETI
    • expiration_date: 2027-05-16
    • level: EAL4+
    • mutual_recognition: SOG-IS CCRA
    • protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Basic Access Control, version 1.10 certifié BSI-PP-0055-2009 le 25 mars 2009.
    • report_link: https://cyber.gouv.fr/sites/default/files/2022/05/anssi-cc-2022_11fr.pdf
    • sponsor: THALES DIS FRANCE SAS INFINEON TECHNOLOGIES AG
    • target_link: https://cyber.gouv.fr/sites/default/files/2022/05/anssi-cible-cc-2022_11en.pdf
  • expiration_date: 2027-05-16
  • level: EAL4+
  • product: eTravel 2.5.A BAC on MultiApp V5.0.A (version 2.5.A.0.0)
  • sponsor: THALES DIS FRANCE SAS INFINEON TECHNOLOGIES AG
  • url: https://cyber.gouv.fr/produits-certifies/etravel-25a-bac-multiapp-v50a-version-25a00
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V2-2021
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V2-2021
protection_profiles
pdf_data/cert_filename Certificat-CC-2024_11fr.pdf certificat-anssi-cc-2022_11.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2024/11: 2
    • ANSSI-CC-PP-2021/02: 1
  • FR:
    • ANSSI-CC-2022/11: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2021/02: 1
  • BSI:
    • BSI-PP-0055-2009: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.1: 2
  • AVA:
    • AVA_VAN.4: 1
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.3: 1
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20240424100246+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240424100716+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 149374
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: mflament
  • /CreationDate: D:20220523132551+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20220523132551+02'00'
  • /Producer: Acrobat Distiller 21.0 (Windows)
  • /Title: Microsoft Word - PS-certificat-ANSSI-CC-2022_11
  • pdf_file_size_bytes: 1553087
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2024_11fr.pdf anssi-cc-2022_11fr.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2024/11: 2
    • ANSSI-CC-PP-2021/02: 3
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • FR:
    • ANSSI-CC-2022/10: 1
    • ANSSI-CC-2022/11: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2021/02: 3
  • BSI:
    • BSI-CC-PP-0055-2009: 1
    • BSI-PP-0055-2009: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL4: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 4: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.4: 1
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_PRE: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_DPT.3: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO: 1
pdf_data/report_metadata
  • /Author: mflament
  • /CreationDate: D:20220523105826+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20220523105826+02'00'
  • /Producer: Acrobat Distiller 21.0 (Windows)
  • /Title: Microsoft Word - PS-ANSSI-CC-2022_11fr
  • pdf_file_size_bytes: 449019
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename ANSSI-cible-CC-2024_11en 1.4.2.2.pdf anssi-cible-cc-2022_11en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-PP-2021/02: 1
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • NL:
    • CC-1: 2
    • CC-2: 4
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2021/02: 1
  • BSI:
    • BSI-CC-PP-0068-: 1
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0055-2009: 1
    • BSI-PP-0056-V2-MA-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
  • EAL:
    • EAL 6+: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 4
    • ALC_FLR.1: 3
  • AVA:
    • AVA_VAN.4: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP.5: 3
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • ALC:
    • ALC_CMS.5: 3
    • ALC_DVS.2: 3
    • ALC_TAT.2: 3
  • ASE:
    • ASE_ECD: 1
  • ATE:
    • ATE_DPT.3: 3
pdf_data/st_keywords/cc_sfr
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.1: 6
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 12
    • FCS_CKM.2: 4
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP: 21
    • FCS_COP.1: 11
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 35
    • FDP_ACC.2: 2
    • FDP_ACF: 23
    • FDP_ACF.1: 35
    • FDP_ETC: 6
    • FDP_ETC.1: 2
    • FDP_ETC.2: 4
    • FDP_IFC.1: 20
    • FDP_ITC: 6
    • FDP_ITC.1: 11
    • FDP_ITC.2: 13
    • FDP_ITT.1: 3
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 3
    • FDP_SDI.1.1: 1
    • FDP_UCT: 7
    • FDP_UCT.1: 2
    • FDP_UIT: 9
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 12
    • FIA_AFL.1: 8
    • FIA_ATD.1: 1
    • FIA_SOS.1: 1
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 3
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 7
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 3
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 3
    • FMT_MOF.1: 1
    • FMT_MSA: 51
    • FMT_MSA.1: 15
    • FMT_MSA.2: 4
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 22
    • FMT_MSA.4: 3
    • FMT_MTD: 6
    • FMT_MTD.1: 2
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS: 7
    • FPT_FLS.1: 2
    • FPT_ITT.1: 3
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 5
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 25
    • FCS_CKM.1: 16
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 30
    • FCS_CKM.4.1: 1
    • FCS_COP: 56
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
    • FCS_RND: 7
    • FCS_RND.1: 15
    • FCS_RND.1.1: 2
    • FCS_RNG: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 5
    • FDP_ITC: 2
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_ITT.1: 1
    • FDP_SDC.1: 1
    • FDP_SDI.2: 1
    • FDP_UCT.1: 11
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 10
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 13
    • FIA_API.1: 6
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 11
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 3
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 9
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 2
    • FMT_MSA.3: 4
    • FMT_MTD: 38
    • FMT_MTD.1: 6
    • FMT_SMF: 1
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SRM.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 11
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • O:
    • O.C: 9
    • O.DAC: 5
  • R:
    • R.O: 9
  • O:
    • O.RND: 5
  • OE:
    • OE.MRTD_: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon: 16
  • Thales:
    • Thales: 13
pdf_data/st_keywords/eval_facility
  • CESTI:
    • CESTI: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
      • AES-: 1
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 31
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 7
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 24
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • RSA:
    • RSA 2048: 2
    • RSA 4096: 1
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 7
      • SHA-384: 8
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 1
    • RNG: 17
  • RNG:
    • RND: 5
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CFB:
    • CFB: 2
  • CTR:
    • CTR: 2
  • OFB:
    • OFB: 2
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-384: 1
    • P-256: 2
    • P-384: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 2
    • Physical Tampering: 2
    • malfunction: 2
    • physical tampering: 2
  • SCA:
    • physical probing: 1
  • FI:
    • Malfunction: 4
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 8
    • EF.DG1: 28
    • EF.DG13: 3
    • EF.DG14: 3
    • EF.DG15: 5
    • EF.DG16: 26
    • EF.DG2: 10
    • EF.DG3: 6
    • EF.DG4: 6
    • EF.DG5: 7
    • EF.DG6: 1
    • EF.SOD: 8
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 180-1: 1
    • FIPS 180-4: 1
    • FIPS 186-3: 4
    • FIPS 197: 2
    • FIPS 198-1: 2
    • FIPS PUB 186-4: 1
    • FIPS140-2: 2
    • FIPS180-4: 1
    • FIPS186-4: 2
    • FIPS198-1: 1
  • ISO:
    • ISO/IEC 10116:2006: 1
    • ISO/IEC 14888-3: 1
    • ISO/IEC 15408: 2
    • ISO/IEC 15946-1: 1
    • ISO/IEC 18033-3: 1
    • ISO/IEC 9797-2: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
  • RFC:
    • RFC 3447: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 46-3: 2
    • FIPS PUB 46-3: 1
    • FIPS46-3: 3
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • NIST:
    • SP 800-90: 1
  • RFC:
    • RFC3369: 1
pdf_data/st_metadata
  • /Author: OHAYON Franck
  • /CreationDate: D:20220222155112+01'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220222155112+01'00'
  • /Producer: Microsoft® Word 2016
  • /Title: MultiApp V5.0.A: eTravel 2.5.A BAC Security Target
  • pdf_file_size_bytes: 1882014
  • pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different