name |
Application eTravel EAC v2.1, en configurationBAC, sur la plateforme ouverte MultiApp V3.1masquée sur le composant P60D080PVC(Version du patch : 1.4) |
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Release Date 28/09/2018) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
12.02.2020 |
03.08.2023 |
not_valid_before |
12.02.2015 |
08.10.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_32v2.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_02.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32v2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015-02_LITE.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_32v2.pdf |
manufacturer |
Gemalto / NXP Semiconductors |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.gemalto.com/ |
https://www.thalesgroup.com/en/europe/france |
security_level |
ALC_DVS.2, EAL4+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
6e5ace1b742af32a |
61c0a87926d6d972 |
heuristics/cert_id |
ANSSI-CC-2015/02 |
ANSSI-CC-2018/32v2 |
heuristics/cert_lab |
SERMA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, AVA_VAN.3, ALC_DVS.2, ASE_TSS.2, ALC_FLR.1 |
ADV_FSP.5, ALC_CMS.5, AGD_PRE.1, ADV_ARC.1, ATE_COV.2, ATE_FUN.1, ALC_DEL.1, ADV_IMP.1, ATE_IND.2, ALC_TAT.2, ALC_LCD.1, ATE_DPT.3, ADV_TDS.4, ALC_DVS.2, AGD_OPE.1, ADV_INT.2, AVA_VAN.5, ALC_CMC.4 |
heuristics/extracted_versions |
3.1, 2.1, 1.4 |
4.1 |
heuristics/prev_certificates |
{} |
ANSSI-CC-2018/32 |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2018/56v2, ANSSI-CC-2018/58v2, ANSSI-CC-2018/57v2 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0837-V2-2014, ANSSI-CC-2014/86 |
ANSSI-CC-2017/24, ANSSI-CC-2018/32 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2018/56v2, ANSSI-CC-2018/58v2, ANSSI-CC-2018/57v2 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2014/86, BSI-DSZ-CC-0837-V2-2014, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
ANSSI-CC-2017/54, ANSSI-CC-2018/32, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/59, ANSSI-CC-2017/24, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2017/07, ANSSI-CC-2015/66 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2015/02
- description: Le produit certifiéest la carte à puce ouverte « MultiApp v3.1 », pouvant être en mode contactou sans contact. Le produit est développé par la société GEMALTO et embarqué sur lemicrocontrôleur P60D080PVC fabriqué par la société NXP SEMICONDUCTORS. Le produit implémente les fonctions de document de voyage électronique conformément auxspécifications de l’organisation de l’aviation civile inte
- developer: Gemalto / NXP Semiconductors
- enhanced:
- level: EAL4+
- product: Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte MultiApp V3.1 masquée sur le composant P60D080PVC (Version du patch : 1.4)
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v21-en-configuration-bac-sur-la-plateforme-ouverte
|
- cert_id: ANSSI-CC-2018/32v2
- description: Le produit certifié est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Java Card version 3.0.4, GP version 2.3 (avec ID configuration version 1.0 et GP Mapping version 1.0) » développé par GEMALTO et par SAMSUNG ELECTRONICS CO.. e produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminolog
- developer: Gemalto, Samsung Electronics Co.
- enhanced:
- level: EAL5+
- product: Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Release Date 28/09/2018)
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur-0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2017/24 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2017/24 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
|
certificat-anssi-cc-2018_32v2.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2018/32v2: 2
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate: D:20211012172651+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20211012172651+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 294035
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2015_02.pdf |
anssi-cc-2018_32v2.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/02
- cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
- cert_item_version: Version de l’application eTravel EAC : 2.1 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0837-V2-2014: 3
- FR:
- ANSSI-CC-2014/86: 3
- ANSSI-CC-2015/02: 22
|
- FR:
- ANSSI-CC-2017/24: 2
- ANSSI-CC-2018/32: 4
- ANSSI-CC-2018/32-M01: 1
- ANSSI-CC-2018/32v2: 2
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 2
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- NXP:
- NXP: 3
- NXP Semiconductors: 3
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto: 1
- com.gemalto.javacard.eid: 1
- com.gemalto.javacard.esign: 1
- com.gemalto.javacard.iasclassic: 1
- com.gemalto.javacard.mspnp: 1
- com.gemalto.mchipadv: 1
- com.gemalto.moc.server: 1
- com.gemalto.mpcos: 1
- com.gemalto.pure: 1
- com.gemalto.puredi: 1
- com.visa.vsdc: 1
- javacard:
- javacard.eid: 1
- javacard.esign: 1
- javacard.iasclassic: 1
- javacard.mspnp: 1
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2015_02
- pdf_file_size_bytes: 289050
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author:
- /CreationDate: D:20211012172552+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20211012172552+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 615939
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
anssi_cible_2015-02_LITE.pdf |
anssi-cible-cc-2018_32v2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0837-2013-MA-01: 1
- NL:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-PP- 0055-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL4: 3
- EAL4 augmented: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 7
- EAL5 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 11
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 6
- ADV_IMP: 1
- ADV_IMP.1: 9
- ADV_INT.2: 3
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 9
- AGD:
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.5: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 5
- ALC_TAT.1: 2
- ALC_TAT.2: 5
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 2
- ATE_DPT.3: 3
- ATE_FUN.1: 9
- ATE_IND.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 27
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_COP: 53
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 13
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 13
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 13
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 21
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 40
- FMT_MTD.1: 6
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SRM.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM: 54
- FCS_CKM.1: 32
- FCS_CKM.1.1: 3
- FCS_CKM.2: 11
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 25
- FCS_CKM.4.1: 2
- FCS_COP: 46
- FCS_COP.1: 31
- FCS_COP.1.1: 5
- FCS_RND: 21
- FCS_RND.1: 9
- FCS_RND.1.1: 3
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 40
- FDP_ACC.1: 14
- FDP_ACC.2: 6
- FDP_ACF: 34
- FDP_ACF.1: 16
- FDP_IFC: 24
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 17
- FDP_IFF.1: 12
- FDP_ITC: 12
- FDP_ITC.1: 12
- FDP_ITC.2: 17
- FDP_ITT.1: 1
- FDP_RIP: 95
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_ROL: 14
- FDP_ROL.1: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 25
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 65
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 41
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 24
- FMT_LIM.1: 16
- FMT_LIM.1.1: 3
- FMT_LIM.2: 15
- FMT_LIM.2.1: 3
- FMT_MSA: 91
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 41
- FMT_MTD.1: 9
- FMT_MTD.3: 1
- FMT_SMF: 61
- FMT_SMF.1: 17
- FMT_SMF.1.1: 2
- FMT_SMR: 75
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 7
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 15
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 47
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_ITT: 7
- FPT_ITT.1: 2
- FPT_PHP: 7
- FPT_PHP.3: 17
- FPT_PHP.3.1: 1
- FPT_RCV: 16
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 9
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FTP:
- FTP_ITC: 18
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 15
- O.APPLET: 28
- O.CARD-MANAGEMENT: 3
- O.CARD_MANAGEMENT: 17
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 8
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INT: 3
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 11
- O.JAVAOBJECT: 56
- O.KEY-MNGT: 6
- O.KEY_MNGT: 4
- O.LOAD: 6
- O.NATIVE: 12
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 14
- O.SCP: 35
- O.SID: 13
- O.TDES: 1
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 10
- OE.NATIVE: 1
- OE.SCP: 6
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Samsung:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 15
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-512: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 2
- SHA-512: 4
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 6
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 9
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 5
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 9
- EF.DG1: 30
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 4
- EF.DG16: 28
- EF.DG2: 12
- EF.DG3: 8
- EF.DG4: 8
- EF.DG5: 8
- EF.DG6: 2
- EF.SOD: 9
|
- EF:
- EF.DG1: 6
- EF.DG16: 6
- EF.DG3: 1
- EF.DG4: 1
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2009-07-004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 5
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 8
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Antoine de Lavernette
- /CreationDate: D:20150106171633+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20150106171633+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel EAC v2 Security Target
- pdf_file_size_bytes: 1110700
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
- /Author: D1417544
- /CreationDate: D:20210709115842+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: 28-03-2018
- /ModDate: D:20210709115842+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 1.12
- /Title: MultiApp V4.1: JCS Security Target
- pdf_file_size_bytes: 3422640
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 141
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |