Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Alteon version 32.6.3.50
2021-42-INF-4015
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
ANSSI-CC-2017/07
name Alteon version 32.6.3.50 Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme ES FR
not_valid_after 03.05.2028 06.09.2027
not_valid_before 03.05.2023 08.03.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42_Certificado.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017-07_s01.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42-INF-4015.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_07.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42_ST.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_07en.pdf
manufacturer Radware, LTD. Gemalto
manufacturer_web https://www.radware.com/products/alteon/ https://www.gemalto.com/
security_level EAL2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 69b82608a6c3aa9c 5b7b6a9b33f1dab4
heuristics/cert_id 2021-42-INF-4015 ANSSI-CC-2017/07
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ADV_TDS.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1 AVA_VAN.5, ALC_FLR.1, ALC_DVS.2
heuristics/extracted_versions 32.6.3.50 4.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2017/20, ANSSI-CC-2017/54, ANSSI-CC-2017/22, ANSSI-CC-2017/21, ANSSI-CC-2017/19
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0891-V2-2016
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2017/22, BSI-DSZ-CC-1003-2018, ANSSI-CC-2020/45, ANSSI-CC-2017/21, ANSSI-CC-2020/42, ANSSI-CC-2017/19, ANSSI-CC-2019/07, ANSSI-CC-2018/56, ANSSI-CC-2017/83, ANSSI-CC-2020/49, ANSSI-CC-2018/24, ANSSI-CC-2017/76, ANSSI-CC-2018/53, ANSSI-CC-2018/58, ANSSI-CC-2020/33, ANSSI-CC-2017/82, ANSSI-CC-2018/56v2, ANSSI-CC-2018/11, ANSSI-CC-2020/43, ANSSI-CC-2018/57v2, ANSSI-CC-2018/21, ANSSI-CC-2018/32, ANSSI-CC-2020/44, ANSSI-CC-2017/20, ANSSI-CC-2017/54, ANSSI-CC-2019/31, ANSSI-CC-2018/58v2, ANSSI-CC-2018/57, ANSSI-CC-2017/81, ANSSI-CC-2018/32v2
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0782-2012
heuristics/scheme_data
  • category: Others
  • certification_date: 03.05.2023
  • enhanced:
  • manufacturer: RADWARE, LTD.
  • product: Alteon version 32.6.3.50
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/982-alteon-version-32-6-3-50
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0891-V2-2016
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0891-V2-2016
heuristics/protection_profiles {} 85bef5b6f16c4d33
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/cert_filename 2021-42_Certificado.pdf certificat-anssi-cc-2017-07_s01.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2017/07-S01: 2
    • ANSSI-CC-PP-2010/03-M01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL2: 1
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 2
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
  • Serma:
    • SERMA: 2
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 892166
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: DUCLOS Charlene
  • /Category: -S01
  • /Comments: ANSSI-CC-CER-F-14_v14.7
  • /Company: SGDSN
  • /CreationDate: D:20220916174040+02'00'
  • /Creator: Acrobat PDFMaker 21 pour Word
  • /Keywords: version x.x, révision x
  • /ModDate: D:20220916174040+02'00'
  • /Producer: Adobe PDF Library 21.11.71
  • /SourceModified: D:20220916154029
  • /Title: ANSSI-CC-2017/07
  • pdf_file_size_bytes: 147308
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 2021-42-INF-4015.pdf ANSSI-CC-2017_07.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2017/07
    • cert_item: Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12
    • cert_item_version: JavaCard version 3.0.4, GP version 2.2.1
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie CS20001, 92197 Meudon Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP JCS-O] SUN Java Card System Protection Profile Open Configuration, version 3.0
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2021-42-INF-4015- v1: 1
  • DE:
    • BSI-DSZ-CC-0891-V2-2016: 2
  • FR:
    • ANSSI-CC-2017/07: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 9
    • EAL 4: 2
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_STG.1: 1
  • FCS:
    • FCS_CKM.2: 1
    • FCS_HTS.1: 1
    • FCS_TLS: 1
    • FCS_TLS.2: 1
  • FDP:
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_SMF.1: 1
  • FPT:
    • FPT_STM.1: 1
  • FTA:
    • FTA_SSL.3: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 17
  • Gemplus:
    • Gemplus: 1
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 2
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 4
  • Serma:
    • Serma Safety & Security: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 3
  • SHA:
    • SHA2:
      • SHA-2: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 1
      • TLS1.2: 1
      • TLS1.3: 2
  • PACE:
    • PACE: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/javacard_packages
  • com:
    • com.gemalto.javacardx.pace: 1
  • javacardx:
    • javacardx.pace: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: ANSSI-CC-2017_07fr
  • pdf_file_size_bytes: 1690566
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename 2021-42_ST.pdf ANSSI_cible2017_07en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0891-V2-2016: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2: 2
  • EAL:
    • EAL 6+: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 2
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 6
    • FCS_CKM.1: 6
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_COP: 4
    • FCS_HTS: 4
    • FCS_HTS.1: 10
    • FCS_HTS.1.1: 2
    • FCS_HTS.1.2: 2
    • FCS_TLS: 20
    • FCS_TLS.1: 8
    • FCS_TLS.1.1: 3
    • FCS_TLS.1.2: 3
    • FCS_TLS.1.3: 3
    • FCS_TLS.2: 7
    • FCS_TLS.2.1: 2
    • FCS_TLS.2.2: 2
    • FCS_TLS.2.3: 2
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 10
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 5
    • FMT_SMR.2: 9
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 3
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
  • FCO:
    • FCO_NRO: 2
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 2
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 14
    • FCS_COP.1.1: 1
    • FCS_RND: 7
    • FCS_RND.1: 7
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 14
    • FDP_ACC.1: 1
    • FDP_ACC.2: 6
    • FDP_ACF: 16
    • FDP_ACF.1: 13
    • FDP_IFC: 4
    • FDP_IFC.1: 1
    • FDP_IFC.2: 2
    • FDP_IFF: 4
    • FDP_IFF.1: 10
    • FDP_ITC: 4
    • FDP_ITC.2: 5
    • FDP_RIP: 17
    • FDP_RIP.1: 8
    • FDP_ROL: 6
    • FDP_ROL.1: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 2
    • FDP_UIT.1: 2
  • FIA:
    • FIA_ATD: 3
    • FIA_ATD.1: 1
    • FIA_SOS.2: 1
    • FIA_UAI.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 1
    • FIA_UID: 4
    • FIA_UID.1: 2
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 1
    • FMT_MSA.3: 10
    • FMT_MTD: 4
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 6
    • FMT_SMF.1: 3
    • FMT_SMR: 9
    • FMT_SMR.1: 8
  • FPR:
    • FPR_UNO: 2
    • FPR_UNO.1: 3
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 10
    • FPT_FLS.1: 5
    • FPT_ITT: 2
    • FPT_ITT.1: 1
    • FPT_PHP: 2
    • FPT_PHP.3: 1
    • FPT_RCV: 4
    • FPT_RCV.3: 4
    • FPT_RCV.4: 1
    • FPT_TDC.1: 2
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 2
    • FPT_TST.1: 3
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.LIMITED_FUNCTIONALITY: 2
    • A.MANAGEMENT_SEPARATION: 2
    • A.NO_EVIL: 3
    • A.PHYSICAL_PROTECTION: 3
  • O:
    • O.ACCESS: 9
    • O.ADMINISTRATION: 7
    • O.AUDIT: 11
    • O.TRAFFIC_FLOW: 9
    • O.TRUSTED_CHANNELS: 8
  • OE:
    • OE.NO_GENERAL_PURPOSE: 4
    • OE.PHYSICAL_SECURITY: 5
    • OE.TRUESTED_ADMINS: 1
    • OE.TRUSTED_ADMINS: 5
  • OSP:
    • OSP.ACCOUNTABILITY: 3
    • OSP.LOGS: 2
    • OSP.ROLES: 3
    • OSP.TRUSTED_ADMINISTRATORS: 2
  • T:
    • T.PASSWORD_CRACKING: 4
    • T.UNBALANCED_LOAD: 3
    • T.UNDETECTED_ACTIVITIES: 2
    • T.WEAK_CRYPTOGRAPHY: 3
    • T.WEAK_ENDPOINTS: 2
  • A:
    • A.APPLET: 2
    • A.DELETION: 2
    • A.VERIFICATION: 2
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 1
    • O.APPLET: 28
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 2
    • O.CODE_PCKG: 16
    • O.CODE_PKG: 7
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.JAVAOBJECT: 56
    • O.KEY-MNGT: 2
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 2
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RND: 1
    • O.SCP: 3
    • O.SID: 1
    • O.TRANSACTION: 2
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.VERIFICATION: 4
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 7
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.RND: 2
    • OSP.VERIFICATION: 2
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 2
    • T.CONFID-JCS-CODE: 2
    • T.CONFID-JCS-DATA: 2
    • T.DELETION: 1
    • T.EXE-CODE: 4
    • T.INSTALL: 2
    • T.INTEG-APPLI-CODE: 3
    • T.INTEG-APPLI-DATA: 4
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 2
    • T.NATIVE: 2
    • T.OBJ-DELETION: 2
    • T.PHYSICAL: 2
    • T.RESOURCES: 1
    • T.SID: 4
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 489
  • Infineon:
    • Infineon: 8
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 19
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 9
    • DES:
      • DES: 20
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 10
    • DSA:
      • DSA: 1
  • ECC:
    • ECC:
      • ECC: 11
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 15
      • SHA256: 12
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 1
    • SHA2:
      • SHA-224: 3
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 3
      • SHA224: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 10
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 16
      • SSL 2.0: 5
      • SSL 3.0: 5
    • TLS:
      • TLS: 47
      • TLS 1.0: 5
      • TLS 1.1: 5
      • TLS 1.2: 7
      • TLS 1.3: 10
      • TLS1.2: 1
      • TLS1.3: 3
  • PACE:
    • PACE: 10
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 3
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 3
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 2
    • fault induction: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 2
    • physical probing: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • RFC:
    • RFC 2818: 2
    • RFC 4253: 1
    • RFC 5246: 20
    • RFC 5288: 16
    • RFC 5289: 32
    • RFC 8446: 24
    • RFC2818: 1
    • RFC3164: 4
    • RFC5246: 2
    • RFC5288: 1
    • RFC5289: 1
    • RFC5424: 4
    • RFC8446: 5
  • BSI:
    • AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 5
  • PKCS:
    • PKCS#1: 7
    • PKCS#3: 1
    • PKCS#5: 5
  • SCP:
    • SCP01: 3
    • SCP02: 3
    • SCP03: 3
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 8
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_metadata
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20170224103913+01'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: Security Target, CC
  • /ModDate: D:20170224103935+01'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: Security Target
  • /Title: eTravel v1.0 Security Target MAÏA3
  • pdf_file_size_bytes: 1989234
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different