name |
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) |
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
09.02.2029 |
22.09.2028 |
not_valid_before |
09.02.2024 |
22.09.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2023_12-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_35fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_12-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_35fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2023_12-R01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_35en.pdf |
manufacturer |
NXP Semiconductors Germany GmbH |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.nxp.com |
https://www.thalesgroup.com/en/europe/france |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
6ee673a8fd9cbf07 |
57f8d990050b2ead |
heuristics/cert_id |
ANSSI-CC-2023/12-R01 |
ANSSI-CC-2023/35 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 |
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_DVS.2, ATE_DPT.1, ASE_TSS.2, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4 |
heuristics/extracted_versions |
4.5, 4.0.1.52 |
3.1, 3.1.0.0, 5.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1149-V2-2023, NSCIB-CC-0313985-CR |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1149-V2-2023, NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-2022 |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/12-R01
- description: Le produit évalué est « ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration, Version 4.0.1.52 » développé par NXP SEMICONDUCTORS. Ce produit offre des services d’authentification et de signature électronique (SSCD).
- developer: NXP SEMICONDUCTORS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/12-R01
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-2023_12-R01fr.pdf
- certification_date: 2024-02-09
- developer: NXP SEMICONDUCTORS
- evaluation_facility: THALES / CNES
- expiration_date: 2029-02-09
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_12-R01fr.pdf
- sponsor: NXP SEMICONDUCTORS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2023_12-R01en.pdf
- expiration_date: 2029-02-09
- level: EAL5+
- product: ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52)
- sponsor: NXP SEMICONDUCTORS
- url: https://cyber.gouv.fr/produits-certifies/chipdoc-v4-jcop-45-p71-sscd-configuration-version-40152
|
- cert_id: ANSSI-CC-2023/35
- description: Le produit évalué est « eTravel 3.1 EAC on BAC on MultiApp V5.1, Version 3.1.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur notam
- developer: THALES DIS FRANCE SAS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/35
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_35fr.pdf
- certification_date: 2023-09-22
- developer: THALES DIS FRANCE SAS
- evaluation_facility: CEA - LETI
- expiration_date: 2028-09-22
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10 certifié BSI-PP-0056 le 25 mars 2009
- sponsor: THALES DIS FRANCE SAS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_35-M01en_0.pdf
- expiration_date: 2028-09-22
- level: EAL5+
- product: eTravel 3.1 EAC on BAC on MultiApp V5.1 (Version 3.1.0.0)
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-31-eac-bac-multiapp-v51-version-3100
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1149-V2-2023 |
ANSSI-CC-2023/01 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1149-V2-2023 |
ANSSI-CC-2023/01 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-2023_12-R01fr.pdf |
Certificat-CC-2023_35fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240214225528+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240214231041+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 165401
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20230929174932+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230929175423+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 157976
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2023_12-R01fr.pdf |
ANSSI-CC-2023_35fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1149-V2-2023: 1
- FR:
- NL:
- NSCIB-CC-0313985-1MA2: 1
- NSCIB-CC-0313985-CR: 1
|
- FR:
- ANSSI-CC-2023/01: 1
- ANSSI-CC-2023/31: 1
- ANSSI-CC-2023/35: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
- BSI:
- BSI-CC-PP-0056-2009: 1
- BSI-PP-0056: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 5
- NXP Semiconductors: 1
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-Cible-CC-2023_12-R01en.pdf |
ANSSI-cible-2023_35en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1149-V2-2023: 2
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0086: 1
- BSI-CC-PP-0087-V2-MA-01: 1
|
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 2
- BSI-PP-0055-2009: 1
- BSI-PP-0056-2009: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 8
- EAL5 augmented: 4
|
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
- EAL6: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.4: 1
- ADV_FSP.5: 6
- ADV_IMP.1: 5
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 4
- ASE_OBJ.2: 3
- ASE_REQ.2: 4
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.2: 4
- ALC_FLR.2: 1
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 52
- FCS_CKM.1: 3
- FCS_CKM.4: 2
- FCS_COP: 58
- FCS_COP.1: 2
- FCS_RND: 5
- FCS_RND.1: 17
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 22
- FDP_ACC.1: 5
- FDP_ACF: 22
- FDP_ACF.1: 22
- FDP_DAU: 3
- FDP_DAU.2: 2
- FDP_ITC: 2
- FDP_ITC.1: 3
- FDP_RIP: 28
- FDP_RIP.1: 4
- FDP_SDC: 10
- FDP_SDC.1: 6
- FDP_SDC.1.1: 1
- FDP_SDI: 5
- FDP_SDI.2: 4
- FDP_UCT: 11
- FDP_UCT.1: 2
- FDP_UIT: 9
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 34
- FIA_AFL.1: 5
- FIA_API: 24
- FIA_API.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 96
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.4: 2
- FIA_UAU.5: 2
- FIA_UAU.6: 1
- FIA_UID: 39
- FIA_UID.1: 6
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 12
- FMT_LIM.1.1: 2
- FMT_LIM.2: 11
- FMT_LIM.2.1: 2
- FMT_MOF: 7
- FMT_MOF.1: 3
- FMT_MSA: 18
- FMT_MSA.1: 4
- FMT_MSA.2: 1
- FMT_MSA.3: 9
- FMT_MSA.4: 2
- FMT_MTD: 98
- FMT_MTD.1: 6
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 22
- FMT_SMF.1: 3
- FMT_SMR: 20
- FMT_SMR.1: 4
- FPT:
- FPT_EMS: 12
- FPT_EMS.1: 5
- FPT_FLS: 11
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_LIM: 1
- FPT_LIM.1: 1
- FPT_LIM.2: 1
- FPT_PHP: 7
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_TST: 8
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 9
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 32
- FCS_CKM.1: 20
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.4: 45
- FCS_CKM.4.1: 1
- FCS_COP: 63
- FCS_COP.1: 10
- FCS_COP.1.1: 4
- FCS_RND: 7
- FCS_RND.1: 10
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 8
- FDP_ACC.1: 18
- FDP_ACF: 9
- FDP_ACF.1: 17
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 17
- FDP_ITC.2: 17
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 13
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_ATD: 4
- FIA_ATD.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 13
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 10
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UID: 17
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 20
- FMT_LIM.1.1: 3
- FMT_LIM.2: 18
- FMT_LIM.2.1: 3
- FMT_MSA: 9
- FMT_MSA.1: 3
- FMT_MSA.3: 6
- FMT_MTD: 39
- FMT_MTD.1: 4
- FMT_MTD.3: 4
- FMT_MTD.3.1: 1
- FMT_SMF: 7
- FMT_SMF.1: 43
- FMT_SMF.1.1: 1
- FMT_SMR: 8
- FMT_SMR.1: 29
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 11
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 6
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 6
- FTP_TRP: 4
- FTP_TRP.1: 10
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.MRTD_: 1
- A.OS-UPDATE-EVIDENCE: 3
- A.SECURE_ACODE_MANAGEMENT: 3
- D:
- D.ACODE_: 1
- D.APP_KEYS: 2
- D.JCS_CODE: 5
- D.JCS_DATA: 5
- D.OS-: 1
- D.OS-UPDATE-CODE-: 1
- D.OS-UPDATE-CODE-ID: 2
- D.OS-UPDATE_ADDITIONALCODE: 6
- D.OS-UPDATE_DEC-KEY: 2
- D.OS-UPDATE_SGNVER-KEY: 2
- O:
- O.CONFID-: 1
- O.CONFID-OS-: 1
- O.CONFID-OS-UPDATE: 4
- O.RND: 1
- O.SECURE_AC_ACTIVATION: 5
- O.SECURE_LOAD_ACODE: 9
- O.TOE_IDENTIFICATION: 7
- OE:
- OE.BAC-PP: 3
- OE.BAC_PP: 2
- OE.MRTD_: 2
- OE.OS-UPDATE-ENCRYPTION: 5
- OE.OS-UPDATE-EVIDENCE: 4
- OE.SECURE_ACODE_MANAG: 1
- OE.SECURE_ACODE_MANAGEMENT: 3
- OSP:
- OSP: 2
- OSP.ADDITIONAL_CODE_ENCRYPTION: 3
- OSP.ADDITIONAL_CODE_SIGNING: 3
- OSP.ATOMIC_ACTIVATION: 3
- OSP.TOE_IDENTIFICATION: 3
- T:
- T.CONFID-OS-UPDATE_LOAD: 4
- T.FAKE-SGNVER-KEY: 3
- T.INTEG-OS-UPDATE_LOAD: 3
- T.UNAUTHORISED-TOE-CODE-UPDATE: 3
- T.WRONG-UPDATE-STATE: 3
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 122
- NXP Semiconductors: 38
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 5
- SHA-384: 4
- SHA-512: 5
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 4
- Physical Tampering: 3
- malfunction: 9
- physical tampering: 5
- SCA:
|
- FI:
- Malfunction: 5
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 1
- Physical Probing: 1
- SPA: 1
- physical probing: 5
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.ChipSecurity: 1
- EF.DG1: 3
- EF.DG14: 2
- EF.DG16: 3
- EF.DG3: 6
- EF.DG4: 6
- EF.SOD: 1
|
- EF:
- EF.COM: 7
- EF.DG1: 17
- EF.DG14: 7
- EF.DG15: 2
- EF.DG16: 16
- EF.DG2: 8
- EF.DG3: 19
- EF.DG4: 18
- EF.DG5: 6
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 5
- FIPS 46-3: 4
- FIPS PUB 46-3: 1
- FIPS180-4: 1
- ICAO:
- ISO:
- PKCS:
- SCP:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: NXP B.V.
- /CreationDate: D:20231010235706+02'00'
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: Common Criteria, Security Target Lite, ChipDoc v4, SSCD
- /Producer: Apache FOP Version 2.3
- /Subject: ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration
- /Title: Security Target Lite
- pdf_file_size_bytes: 929958
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 103
|
- /Author: THALES
- /CreationDate: D:20230517105401+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Security Target LITE
- /ModDate: D:20230517105401+02'00'
- /Producer: Microsoft® Word 2016
- /Title: MultiApp V5.1: eTravel 3.1 EAC on BAC Security Target
- pdf_file_size_bytes: 2212367
- pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |