Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01)
ANSSI-CC-2023/12-R01
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 )
ANSSI-CC-2023/35
name ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 )
not_valid_before 2024-02-09 2023-09-22
not_valid_after 2029-02-09 2028-09-22
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2023_12-R01en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_35en.pdf
manufacturer NXP Semiconductors Germany GmbH THALES DIS FRANCE SA
manufacturer_web https://www.nxp.com https://www.thalesgroup.com/en/europe/france
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_12-R01fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_35fr.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2023_12-R01fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_35fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Machine Readable Travel Document with 'ICAO Application', Extended Access Control, Version ...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026b.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2024, 4, 4), 'maintenance_title': 'ANSSI-CC-2023/35-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_35-M01fr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_35-M01en.pdf'})
state/cert/pdf_hash e1a5b14333977f216acee5c152581a8b6c68dbd70c79d5c9005d37476fff802b cd5f9cdb363e8175f8f7ce46a3a8c943d973794ccede1c15d8eeead715808433
state/cert/txt_hash b46f9034d06fb5042568f73747b09852ad03853225f89aee30b44bbdbea3f989 4fadcbe50f32269e46f2c0f042c598a9f03c452509dc1f773fc1c9b406b74ed8
state/report/pdf_hash 7e83de7a07b1ea03b15145ca89813e3dafa99f1495bc150c0d497588ca79d8d8 38a9cf6a8d3f7cb91014b60449d5a1e5d08e48a583d28b0a6f1251dad717d79b
state/report/txt_hash 19df9d87294cdcb11e2d661e94e828b628ae263d66295dd8bc0e7fd314742803 4590317c3b5a21b0133101ecbd5b87bdeb50a5756f66e6de592fb04217d3f2c8
state/st/pdf_hash 82ff3172087d63ac4361d82fd2080c79f90305beb35b27697e8b3b0c4421b905 dd29b0b3ba8efb5291a9003a7d0bb9dc6f00b402c8905e82b42e8a4037f039a3
state/st/txt_hash 8b713c212821d937cd8aeaf4168b02b9daeb76f923f87e24a7de03c2a7966edd 4bffb04b0286872776719bc9c1a9a7115a05cab4b9c50dbdbedca0096db0bb72
heuristics/cert_id ANSSI-CC-2023/12-R01 ANSSI-CC-2023/35
heuristics/extracted_versions 4.5, 4.0.1.52 5.1, 3.1, 3.1.0.0
heuristics/report_references/directly_referencing NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-V2-2023 ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/report_references/indirectly_referencing NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023 ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/scheme_data/cert_id ANSSI-CC-2023/12-R01 ANSSI-CC-2023/35
heuristics/scheme_data/description Le produit évalué est « ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration, Version 4.0.1.52 » développé par NXP SEMICONDUCTORS. Ce produit offre des services d’authentification et de signature électronique (SSCD). Le produit évalué est « eTravel 3.1 EAC on BAC on MultiApp V5.1, Version 3.1.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur notam
heuristics/scheme_data/developer NXP SEMICONDUCTORS THALES DIS FRANCE SAS
heuristics/scheme_data/enhanced
  • cert_id: ANSSI-CC-2023/12-R01
  • certification_date: 09/02/2024
  • expiration_date: 09/02/2029
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: NXP SEMICONDUCTORS
  • sponsor: NXP SEMICONDUCTORS
  • evaluation_facility: THALES / CNES
  • level: EAL5+
  • protection_profile: Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
  • mutual_recognition: CCRA SOG-IS
  • augmented: ALC_DVS.2, AVA_VAN.5
  • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_12-R01fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2023_12-R01en.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-2023_12-R01fr.pdf
  • cert_id: ANSSI-CC-2023/35
  • certification_date: 22/09/2023
  • expiration_date: 22/09/2028
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: THALES DIS FRANCE SAS
  • sponsor: THALES DIS FRANCE SAS
  • evaluation_facility: CEA - LETI
  • level: EAL5+
  • protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10 certifié BSI-PP-0056 le 25 mars 2009
  • mutual_recognition: CCRA SOG-IS
  • augmented: ALC_DVS.2, AVA_VAN.5
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_35fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_35-M01en_0.pdf
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2023/12-R01 ANSSI-CC-2023/35
heuristics/scheme_data/enhanced/cert_link https://cyber.gouv.fr/sites/default/files/document_type/certificat-2023_12-R01fr.pdf https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_35fr.pdf
heuristics/scheme_data/enhanced/certification_date 09/02/2024 22/09/2023
heuristics/scheme_data/enhanced/developer NXP SEMICONDUCTORS THALES DIS FRANCE SAS
heuristics/scheme_data/enhanced/evaluation_facility THALES / CNES CEA - LETI
heuristics/scheme_data/enhanced/expiration_date 09/02/2029 22/09/2028
heuristics/scheme_data/enhanced/protection_profile Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01 Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10 certifié BSI-PP-0056 le 25 mars 2009
heuristics/scheme_data/enhanced/sponsor NXP SEMICONDUCTORS THALES DIS FRANCE SAS
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2023_12-R01en.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_35-M01en_0.pdf
heuristics/scheme_data/expiration_date 9 Février 2029 22 Septembre 2028
heuristics/scheme_data/product ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) eTravel 3.1 EAC on BAC on MultiApp V5.1 (Version 3.1.0.0)
heuristics/scheme_data/sponsor NXP SEMICONDUCTORS THALES DIS FRANCE SAS
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/chipdoc-v4-jcop-45-p71-sscd-configuration-version-40152 https://cyber.gouv.fr/produits-certifies/etravel-31-eac-bac-multiapp-v51-version-3100
heuristics/st_references/directly_referencing BSI-DSZ-CC-1149-V2-2023 ANSSI-CC-2023/01
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-1149-V2-2023 ANSSI-CC-2023/01
pdf_data/cert_filename certificat-2023_12-R01fr.pdf Certificat-CC-2023_35fr.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/12-R01: 2
  • ANSSI-CC-2023/35: 2
pdf_data/cert_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0059-2009-MA-02: 1
  • BSI-CC-PP-0075-2012-MA01: 1
  • BSI-CC-PP-0071-2012-MA-01: 1
  • BSI-CC-PP-0072-2012-MA-01: 1
  • BSI-CC-PP-0076-2013-MA-01: 1
  • BSI-PP-0056: 1
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP 4: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 2
pdf_data/cert_metadata//CreationDate D:20240214225528+01'00' D:20230929174932+02'00'
pdf_data/cert_metadata//ModDate D:20240214231041+01'00' D:20230929175423+02'00'
pdf_data/cert_metadata/pdf_file_size_bytes 165401 157976
pdf_data/report_filename ANSSI-CC-2023_12-R01fr.pdf ANSSI-CC-2023_35fr.pdf
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1149-V2-2023: 1
  • FR:
    • ANSSI-CC-2023/12-R01: 2
  • NL:
    • NSCIB-CC-0313985-CR: 1
    • NSCIB-CC-0313985-1MA2: 1
  • FR:
    • ANSSI-CC-2023/35: 2
    • ANSSI-CC-2023/31: 1
    • ANSSI-CC-2023/01: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/12-R01: 2
  • ANSSI-CC-2023/35: 2
  • ANSSI-CC-2023/31: 1
  • ANSSI-CC-2023/01: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
  • other:
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 2
  • BSI:
    • BSI-PP-0056: 1
    • BSI-PP-0084-2014: 1
    • BSI-CC-PP-0056-2009: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0059-2009-MA-02: 2
  • BSI-CC-PP-0075-2012-MA-01: 2
  • BSI-CC-PP-0071-2012-MA-01: 2
  • BSI-CC-PP-0072-2012-MA-01: 2
  • BSI-CC-PP-0076-2013-MA-01: 2
  • BSI-PP-0056: 1
  • BSI-PP-0084-2014: 1
  • BSI-CC-PP-0056-2009: 1
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • CESTI:
    • CESTI: 3
  • CEA-LETI:
    • CEA - LETI: 1
pdf_data/report_keywords/eval_facility/CESTI/CESTI 1 3
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 7
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 5
    • NXP Semiconductors: 1
pdf_data/report_metadata//CreationDate D:20240214225643+01'00' D:20230929175042+02'00'
pdf_data/report_metadata//ModDate D:20240214231040+01'00' D:20230929175423+02'00'
pdf_data/report_metadata/pdf_file_size_bytes 362917 475249
pdf_data/report_metadata/pdf_number_of_pages 14 15
pdf_data/st_filename ANSSI-Cible-CC-2023_12-R01en.pdf ANSSI-cible-2023_35en.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 1 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 2 5
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 3 2
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 7 5
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 3 9
pdf_data/st_keywords/asymmetric_crypto/RSA
  • RSA-PSS: 1
  • RSA 1024: 1
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1149-V2-2023: 2
  • FR:
    • ANSSI-CC-2023/01: 1
  • NL:
    • CC-1: 4
    • CC-2: 6
    • CC-3: 3
pdf_data/st_keywords/cc_claims
  • D:
    • D.JCS_CODE: 5
    • D.JCS_DATA: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.APP_KEYS: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
    • D.OS-UPDATE_ADDITIONALCODE: 6
    • D.OS-UPDATE-CODE-ID: 2
    • D.OS-UPDATE-CODE-: 1
    • D.ACODE_: 1
    • D.OS-: 1
  • O:
    • O.SECURE_LOAD_ACODE: 9
    • O.SECURE_AC_ACTIVATION: 5
    • O.TOE_IDENTIFICATION: 7
    • O.CONFID-OS-UPDATE: 4
    • O.CONFID-OS-: 1
    • O.RND: 1
    • O.CONFID-: 1
  • T:
    • T.UNAUTHORISED-TOE-CODE-UPDATE: 3
    • T.FAKE-SGNVER-KEY: 3
    • T.WRONG-UPDATE-STATE: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.CONFID-OS-UPDATE_LOAD: 4
  • A:
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
    • A.MRTD_: 1
  • OE:
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.MRTD_: 2
    • OE.BAC_PP: 2
    • OE.OS-UPDATE-EVIDENCE: 4
    • OE.SECURE_ACODE_MANAGEMENT: 3
    • OE.BAC-PP: 3
    • OE.SECURE_ACODE_MANAG: 1
  • OSP:
    • OSP: 2
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.TOE_IDENTIFICATION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0059-2009-MA-02: 1
  • BSI-CC-PP-0075-2012-MA-01: 1
  • BSI-CC-PP-0071-2012-MA-01: 1
  • BSI-CC-PP-0072-2012-MA-01: 1
  • BSI-CC-PP-0076-2013-MA-01: 1
  • BSI-CC-PP-0056-V2-2012-MA-02: 1
  • BSI-CC-PP-0086: 1
  • BSI-CC-PP-0068-: 1
  • BSI-CC-PP-0055: 1
  • BSI-CC-PP-0087-V2-MA-01: 1
  • BSI-CC-PP-0084-2014: 2
  • BSI-PP-0056-2009: 1
  • BSI-CC-PP-0068-V2-2011-MA-01: 1
  • BSI-PP-0055-2009: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 5
  • ADV_FSP.5: 6
  • ADV_IMP.1: 5
  • ADV_INT.2: 2
  • ADV_TDS.4: 8
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
  • ADV_ARC.1: 2
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
  • ADV_IMP.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 5 2
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 5 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 4 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 5 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 6
  • ALC_CMC.4: 2
  • ALC_CMS.5: 1
  • ALC_DEL.1: 2
  • ALC_LCD.1: 3
  • ALC_TAT.2: 3
  • ALC_DVS.1: 1
  • ALC_TAT.1: 1
  • ALC_FLR.2: 1
  • ALC_DVS.2: 4
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 6 4
pdf_data/st_keywords/cc_sar/ASE
  • ASE_INT.1: 4
  • ASE_CCL.1: 2
  • ASE_SPD.1: 1
  • ASE_OBJ.2: 3
  • ASE_ECD.1: 1
  • ASE_REQ.2: 4
  • ASE_TSS.1: 2
  • ASE_TSS.2: 1
  • ASE_ECD: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 4
  • ATE_DPT.3: 1
  • ATE_FUN.1: 3
  • ATE_IND.2: 1
  • ATE_DPT.1: 1
  • ATE_DPT.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 4
  • AVA_VAN.3: 2
  • AVA_VAN.5: 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 8
  • EAL5 augmented: 4
  • EAL5+: 1
  • EAL6: 1
  • EAL5: 5
  • EAL 6+: 1
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 8 5
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 4 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS 5 6
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 11 9
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 5
  • FCS_RND.1: 17
  • FCS_CKM.1: 3
  • FCS_RND.1.1: 2
  • FCS_CKM: 52
  • FCS_CKM.4: 2
  • FCS_COP: 58
  • FCS_COP.1: 2
  • FCS_RND: 7
  • FCS_CKM: 32
  • FCS_COP: 63
  • FCS_CKM.1: 20
  • FCS_RND.1: 10
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 6
  • FCS_COP.1: 10
  • FCS_CKM.4: 45
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 52 32
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 3 20
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 45
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 58 63
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 2 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND 5 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 17 10
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC: 10
  • FDP_SDC.1: 6
  • FDP_SDI: 5
  • FDP_SDC.1.1: 1
  • FDP_ACF: 22
  • FDP_RIP: 28
  • FDP_ACC: 22
  • FDP_ACC.1: 5
  • FDP_ACF.1: 22
  • FDP_DAU: 3
  • FDP_DAU.2: 2
  • FDP_ITC: 2
  • FDP_ITC.1: 3
  • FDP_UCT: 11
  • FDP_UCT.1: 2
  • FDP_UIT: 9
  • FDP_UIT.1: 4
  • FDP_RIP.1: 4
  • FDP_SDI.2: 4
  • FDP_ACF: 9
  • FDP_ITC.1: 17
  • FDP_ITC.2: 17
  • FDP_ACC.1: 18
  • FDP_ACF.1: 17
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 2
  • FDP_UCT.1: 7
  • FDP_IFC.1: 5
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 7
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ACC: 8
  • FDP_ITC: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 22 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 5 18
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 22 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 22 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 3 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 2 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 4 7
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 24
  • FIA_SOS.2: 1
  • FIA_UAU.4: 2
  • FIA_UAU: 96
  • FIA_AFL: 34
  • FIA_AFL.1: 5
  • FIA_API.1: 3
  • FIA_UID: 39
  • FIA_UID.1: 6
  • FIA_UAU.1: 14
  • FIA_UAU.1.1: 1
  • FIA_UAU.5: 2
  • FIA_UAU.6: 1
  • FIA_API: 13
  • FIA_AFL: 9
  • FIA_SOS.2: 1
  • FIA_API.1: 6
  • FIA_API.1.1: 1
  • FIA_UAU.4: 10
  • FIA_UAU: 13
  • FIA_UAU.5: 11
  • FIA_UID: 17
  • FIA_UAU.1: 5
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UID.1: 9
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 7
  • FIA_UAU.6.1: 1
  • FIA_ATD: 4
  • FIA_ATD.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 34 9
pdf_data/st_keywords/cc_sfr/FIA/FIA_API 24 13
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 3 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 96 13
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 14 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 2 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 2 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 1 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 39 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 6 9
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 4
  • FMT_LIM.1: 12
  • FMT_LIM.2: 11
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MTD: 98
  • FMT_MOF: 7
  • FMT_MOF.1: 3
  • FMT_MTD.1: 6
  • FMT_MSA: 18
  • FMT_MSA.1: 4
  • FMT_MSA.2: 1
  • FMT_MSA.3: 9
  • FMT_MSA.4: 2
  • FMT_MTD.3: 9
  • FMT_MTD.3.1: 1
  • FMT_SMF: 22
  • FMT_SMF.1: 3
  • FMT_SMR: 20
  • FMT_SMR.1: 4
  • FMT_LIM: 7
  • FMT_LIM.1: 20
  • FMT_LIM.2: 18
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 39
  • FMT_MSA.3: 6
  • FMT_SMF.1: 43
  • FMT_SMR.1: 29
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 4
  • FMT_MTD.3: 4
  • FMT_MTD.3.1: 1
  • FMT_SMR: 8
  • FMT_SMF: 7
  • FMT_MSA: 9
  • FMT_MSA.1: 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 4 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 12 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 2 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 11 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 2 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 18 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 4 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 9 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 98 39
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 6 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.3 9 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF 22 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 3 43
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 20 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 4 29
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 12
  • FPT_LIM: 1
  • FPT_LIM.1: 1
  • FPT_LIM.2: 1
  • FPT_TST.1: 7
  • FPT_EMS.1: 5
  • FPT_FLS.1: 4
  • FPT_FLS.1.1: 1
  • FPT_TST: 8
  • FPT_FLS: 11
  • FPT_PHP.1: 2
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 3
  • FPT_PHP.3.1: 1
  • FPT_PHP: 7
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_EMS: 4
  • FPT_EMS.1: 11
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 8
  • FPT_TST.1: 8
  • FPT_PHP.3: 8
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_FLS: 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS 12 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 5 11
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 11 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 4 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 3 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 7 8
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 30
  • FTP_ITC.1: 6
  • FTP_ITC.1: 6
  • FTP_TRP.1: 10
  • FTP_TRP: 4
pdf_data/st_keywords/cipher_mode/CBC/CBC 3 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/crypto_protocol/PACE/PACE 190 15
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 5
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 5
pdf_data/st_keywords/crypto_scheme/MAC/MAC 5 4
pdf_data/st_keywords/eval_facility
  • CESTI:
    • CESTI: 1
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 3 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 4 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 5 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 4 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 5 1
pdf_data/st_keywords/ic_data_group/EF
  • EF.DG3: 6
  • EF.DG4: 6
  • EF.DG1: 3
  • EF.DG16: 3
  • EF.DG14: 2
  • EF.SOD: 1
  • EF.ChipSecurity: 1
  • EF.DG1: 17
  • EF.DG2: 8
  • EF.DG3: 19
  • EF.DG4: 18
  • EF.DG5: 6
  • EF.DG16: 16
  • EF.DG14: 7
  • EF.DG15: 2
  • EF.COM: 7
  • EF.SOD: 8
pdf_data/st_keywords/ic_data_group/EF/EF.DG1 3 17
pdf_data/st_keywords/ic_data_group/EF/EF.DG14 2 7
pdf_data/st_keywords/ic_data_group/EF/EF.DG16 3 16
pdf_data/st_keywords/ic_data_group/EF/EF.DG3 6 19
pdf_data/st_keywords/ic_data_group/EF/EF.DG4 6 18
pdf_data/st_keywords/ic_data_group/EF/EF.SOD 1 8
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 117
pdf_data/st_keywords/randomness/RNG
  • RNG: 1
  • RND: 1
  • RNG: 2
pdf_data/st_keywords/randomness/RNG/RNG 1 2
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 4
  • FI:
    • physical tampering: 5
    • Physical Tampering: 3
    • malfunction: 9
    • Malfunction: 4
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 5
    • Physical Probing: 1
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 5
    • physical tampering: 1
    • Physical tampering: 1
    • Malfunction: 5
    • malfunction: 7
    • fault injection: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 5
  • Physical Tampering: 3
  • malfunction: 9
  • Malfunction: 4
  • Physical Tampering: 5
  • physical tampering: 1
  • Physical tampering: 1
  • Malfunction: 5
  • malfunction: 7
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 4 5
pdf_data/st_keywords/side_channel_analysis/FI/Physical Tampering 3 5
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 9 7
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 5 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • physical probing: 4
  • Leak-Inherent: 1
  • physical probing: 5
  • Physical Probing: 1
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 4 5
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-4: 2
    • FIPS 46-3: 4
    • FIPS 197: 5
    • FIPS180-4: 1
    • FIPS 180-4: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#3: 1
    • PKCS#1: 3
  • BSI:
    • AIS31: 1
  • ISO:
    • ISO/IEC 14888-3: 1
  • ICAO:
    • ICAO: 32
    • ICAO-SAC: 1
  • SCP:
    • SCP03: 10
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 186-3: 1
    • FIPS 180-2: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-90: 2
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 5
    • PKCS#1: 2
  • BSI:
    • BSI-AIS31: 1
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 11
  • SCP:
    • SCP03: 2
    • SCP01: 1
    • SCP02: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 1
  • BSI-AIS31: 1
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-003 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-004 2 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 186-4: 2
  • FIPS 46-3: 4
  • FIPS 197: 5
  • FIPS180-4: 1
  • FIPS 180-4: 1
  • FIPS PUB 46-3: 1
  • FIPS 186-3: 1
  • FIPS 180-2: 1
  • FIPS 197: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 5 1
pdf_data/st_keywords/standard_id/ICAO
  • ICAO: 32
  • ICAO-SAC: 1
  • ICAO: 11
pdf_data/st_keywords/standard_id/ICAO/ICAO 32 11
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 14888-3: 1
  • ISO/IEC 14443: 4
  • ISO/IEC 7816: 2
  • ISO/IEC 7816-4: 1
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 3 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 1 5
pdf_data/st_keywords/standard_id/SCP
  • SCP03: 10
  • SCP03: 2
  • SCP01: 1
  • SCP02: 1
pdf_data/st_keywords/standard_id/SCP/SCP03 10 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES: 25
  • AES: 6
  • AES-256: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 25 6
pdf_data/st_keywords/symmetric_crypto/DES
  • DES:
    • DES: 5
  • 3DES:
    • TDES: 8
  • 3DES:
    • Triple-DES: 5
    • TDES: 5
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDES: 8
  • Triple-DES: 5
  • TDES: 5
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 8 5
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • KMAC: 2
  • CMAC: 6
  • CMAC: 2
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC 6 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP Semiconductors: 38
    • NXP: 122
  • Thales:
    • Thales: 36
pdf_data/st_metadata
  • pdf_file_size_bytes: 929958
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 103
  • /Title: Security Target Lite
  • /Author: NXP B.V.
  • /Subject: ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration
  • /Keywords: Common Criteria, Security Target Lite, ChipDoc v4, SSCD
  • /Creator: DITA Open Toolkit 3.3.1
  • /Producer: Apache FOP Version 2.3
  • /CreationDate: D:20231010235706+02'00'
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 2212367
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
  • /Title: MultiApp V5.1: eTravel 3.1 EAC on BAC Security Target
  • /Author: THALES
  • /Keywords: Security Target LITE
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20230517105401+02'00'
  • /ModDate: D:20230517105401+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
pdf_data/st_metadata//Author NXP B.V. THALES
pdf_data/st_metadata//CreationDate D:20231010235706+02'00' D:20230517105401+02'00'
pdf_data/st_metadata//Creator DITA Open Toolkit 3.3.1 Microsoft® Word 2016
pdf_data/st_metadata//Keywords Common Criteria, Security Target Lite, ChipDoc v4, SSCD Security Target LITE
pdf_data/st_metadata//Producer Apache FOP Version 2.3 Microsoft® Word 2016
pdf_data/st_metadata//Title Security Target Lite MultiApp V5.1: eTravel 3.1 EAC on BAC Security Target
pdf_data/st_metadata/pdf_file_size_bytes 929958 2212367
pdf_data/st_metadata/pdf_hyperlinks https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
pdf_data/st_metadata/pdf_number_of_pages 103 78
dgst 6ee673a8fd9cbf07 57f8d990050b2ead