name |
Application eTravel EAC v2.1, en configurationBAC, sur la plateforme ouverte MultiApp V3.1masquée sur le composant P60D080PVC(Version du patch : 1.4) |
Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
12.02.2020 |
01.09.2019 |
not_valid_before |
12.02.2015 |
03.12.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_02.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-76fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015-02_LITE.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-76en.pdf |
manufacturer |
Gemalto / NXP Semiconductors |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.gemalto.com/ |
https://www.gemalto.com/ |
security_level |
ALC_DVS.2, EAL4+ |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
dgst |
6e5ace1b742af32a |
3ccbc80437c97a32 |
heuristics/cert_id |
ANSSI-CC-2015/02 |
ANSSI-CC-2012/76 |
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, AVA_VAN.3, ALC_DVS.2, ASE_TSS.2, ALC_FLR.1 |
ALC_TAT.1, ATE_FUN.1, AVA_VLA.4, ASE_TSS.2, ADV_IMP.2, AGD_PRE.1, ALC_CMS.4, ALC_DVS.2, AVA_VAN.5, ADV_FSP.4, ATE_COV.2, ALC_CMC.4, ADV_ARC.1, AVA_MSU.3, ALC_DEL.1, ATE_DPT.1, ADV_TDS.3, AGD_OPE.1, ALC_LCD.1, ATE_IND.2 |
heuristics/extracted_versions |
3.1, 2.1, 1.4 |
2.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0837-V2-2014, ANSSI-CC-2014/86 |
BSI-DSZ-CC-0555-2009, ANSSI-CC-2012/24 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2014/86, BSI-DSZ-CC-0837-V2-2014, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0555-2009, ANSSI-CC-2012/24 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2015/02
- description: Le produit certifiéest la carte à puce ouverte « MultiApp v3.1 », pouvant être en mode contactou sans contact. Le produit est développé par la société GEMALTO et embarqué sur lemicrocontrôleur P60D080PVC fabriqué par la société NXP SEMICONDUCTORS. Le produit implémente les fonctions de document de voyage électronique conformément auxspécifications de l’organisation de l’aviation civile inte
- developer: Gemalto / NXP Semiconductors
- enhanced:
- level: EAL4+
- product: Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte MultiApp V3.1 masquée sur le composant P60D080PVC (Version du patch : 1.4)
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v21-en-configuration-bac-sur-la-plateforme-ouverte
|
- cert_id: ANSSI-CC-2012/76
- description: Le produit certifié est l'application « IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A », référence IAS Classic V3 on MultiApp ID V2.1, en version MPH117 avec filtre V2.2, développé par GEMALTO et NXP. Le produit évalué est composé : -de l'applet IAS Classic v3 qui permet à l'utilisateur de signer électroniquement d
- developer: GEMALTO / NXP
- enhanced:
- level: EAL4+
- product: Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A Référence : IAS Classic V3 on MultiApp ID V2.1 / Version : MPH117 avec filtre V2.2
- sponsor: GEMALTO
- url: https://cyber.gouv.fr/produits-certifies/application-ias-classic-v3-sur-plateforme-java-card-en-configuration-ouverte-de
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0555-2009 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0555-2009 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC-2015_02.pdf |
ANSSI-CC_2012-76fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/02
- cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
- cert_item_version: Version de l’application eTravel EAC : 2.1 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
|
- FR:
- cc_security_level: EAL4 Augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: CC version 3.1 révision 3
- cert_id: ANSSI-CC-2012/76
- cert_item: Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A
- cert_item_version: Référence IAS Classic V3 on MultiApp ID V2.1, Version MPH117 avec filtre V2.2
- cert_lab: SERMA Technologies 30 Avenue Gustave Eiffel, 33608 Pessac, France
- developer: GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France NXP 101 Stresemanallee, D-22502 Hambourg Allemagne Commanditaire GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0005-2002], version v1.04 Protection Profile — Secure Signature-Creation Device Type 2, [BSI-PP-0006-2002], version v1.05 Protection Profile — Secure Signature Creation Device Type 3
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0837-V2-2014: 3
- FR:
- ANSSI-CC-2014/86: 3
- ANSSI-CC-2015/02: 22
|
- DE:
- FR:
- ANSSI-CC-2012/24: 3
- ANSSI-CC-2012/76: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 2
|
- BSI:
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0005-2002: 3
- BSI-PP-0006-2002: 2
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 4
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- NXP:
- NXP: 3
- NXP Semiconductors: 3
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2015_02
- pdf_file_size_bytes: 289050
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /CreationDate: D:20121203163819+01'00'
- /Keywords:
- /ModDate: D:20121203163819+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- pdf_file_size_bytes: 309844
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
anssi_cible_2015-02_LITE.pdf |
ANSSI-CC-cible_2012-76en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0837-2013-MA-01: 1
- NL:
|
- DE:
- BSI-DSZ-CC-0555-2009: 1
- BSI-DSZ-CC-0645-2010: 1
- FR:
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
|
- BSI:
- BSI-PP-0004-2002: 1
- BSI-PP-0005-2002: 1
- BSI-PP-0006-2002: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD /T1: 1
- PP-SSCD /T2: 9
- PP-SSCD /T3: 7
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL4: 3
- EAL4 augmented: 1
|
- EAL:
- EAL4: 7
- EAL4 augmented: 3
- EAL4+: 9
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.4: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 1
- ADV_LLD: 1
- ADV_TDS.3: 1
- AGD:
- AGD_ADM: 1
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 3
- AGD_USR: 1
- ALC:
- ALC_CMC: 2
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.2: 4
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_VAN: 1
- AVA_VAN.5: 4
- AVA_VLA: 1
- AVA_VLA.4: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 27
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_COP: 53
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 13
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 13
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 13
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 21
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 40
- FMT_MTD.1: 6
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SRM.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
- FAU:
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 2
- FCS_CKM.4: 4
- FCS_COP: 6
- FCS_COP.1: 8
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 9
- FDP_ACF: 3
- FDP_ACF.1: 24
- FDP_ETC: 4
- FDP_ETC.1: 4
- FDP_ITC: 3
- FDP_ITC.1: 8
- FDP_RIP: 3
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_SDI: 6
- FDP_SDI.2: 6
- FDP_UCT: 2
- FDP_UCT.1: 4
- FDP_UIT: 3
- FDP_UIT.1: 6
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 3
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID: 3
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 3
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 4
- FMT_MSA.1: 4
- FMT_MSA.2: 3
- FMT_MSA.2.1: 1
- FMT_MSA.3: 7
- FMT_MTD: 2
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 3
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 2
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 3
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_TST: 3
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 14
- FTP_TRP: 6
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- D:
- D.DTBS: 6
- D.RAD: 5
- D.SCD: 11
- D.SIG: 3
- D.SSCD: 1
- D.SVD: 7
- D.VAD: 1
- OE:
- OE.HI_VAD: 1
- OE.SVD_AUTH_CGA: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDES: 8
- Triple-DES: 2
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 6
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- Side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 9
- EF.DG1: 30
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 4
- EF.DG16: 28
- EF.DG2: 12
- EF.DG3: 8
- EF.DG4: 8
- EF.DG5: 8
- EF.DG6: 2
- EF.SOD: 9
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 1
- PKCS:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Antoine de Lavernette
- /CreationDate: D:20150106171633+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20150106171633+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel EAC v2 Security Target
- pdf_file_size_bytes: 1110700
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
- /CreationDate: D:20121019145156Z
- /Creator: PDFCreator Version 0.9.3
- /Keywords:
- /ModDate: D:20121203163659+01'00'
- /Producer: GPL Ghostscript 8.54
- /Subject:
- /Title:
- pdf_file_size_bytes: 480443
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |