name |
Sagem Sécurité Carte CC IDeal Citiz (sur composant SB23YR80B), version 1.4.5 Application ICAO EAC |
Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v3, masquée sur composants IFX M7820 A11 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
09.04.2010 |
06.07.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-17en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_2012-32fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-17en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible_2012-32en.pdf |
manufacturer |
Sagem Sécurité / STMicroelectronics |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://www.st.com/ |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
75426eeb4747d266 |
fc17f7c8b98d00fe |
heuristics/cert_id |
ANSSI-CC-2010/17 |
ANSSI-CC-2012/32 |
heuristics/cert_lab |
CEA |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COMP.1, ADV_ARC.1, ADV_COMP.1, AVA_COMP.1, ALC_COMP.1, ALC_DVS.2, ALC_FLR.1, ASE_COMP.1, AVA_VAN.5, ATE_DPT.2 |
ALC_DVS.2, AVA_VAN.5, ADV_ARC.1 |
heuristics/extracted_versions |
1.4.5 |
1.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2010/32 |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2009/61, ANSSI-CC-2010/02 |
BSI-DSZ-CC-0813-2012 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2010/32, ANSSI-CC-2011/62 |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2009/61, ANSSI-CC-2009/05, ANSSI-CC-2009/62, ANSSI-CC-2010/01, ANSSI-CC-2010/02, ANSSI-CC-2009/06, ANSSI-CC-2009/51, ANSSI-CC-2009/28, ANSSI-CC-2009/50, ANSSI-CC-2009/26 |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2010/17
- description: Le produit certifié est la ''Carte CC IDeal Citiz (sur composant SB23YR80B), IDEAL/ST23YR80/1.4.5, Version 1.4.5'' développée par SAGEM Sécurité et ST Microelectronics. Le produit évalué est de type carte à puce duale, avec et sans contact. Il est composé : de trois applications : l'application AIP qui permet de réaliser les opérations de pré-personnalisation et de personna
- developer: Sagem Sécurité, ST Microelectronics
- enhanced:
- level: EAL4+
- product: Carte CC IDeal Citiz (sur composant SB23YR80B), version 1.4.5 Application ICAO EAC
- sponsor: Sagem Sécurité
- url: https://cyber.gouv.fr/produits-certifies/carte-cc-ideal-citiz-sur-composant-sb23yr80b-version-145-application-icao-eac
|
- cert_id: ANSSI-CC-2012/32
- description: Le produit certifié est le passeport électronique intitulé « Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v3, masquée sur composants IFX M7820 A11 ». La version de l'application et de la plateforme est 023078 pour SLE78CLXxxxxP et 023079 pour SLE78CLXxxxxPM, la version de l'AMD (patch dans la terminologie Multos) est 113v3 quelle que soit la variante du composant, le
- developer: Gemalto et Infineon Technologies AG
- enhanced:
- level: EAL5+
- product: Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v3, masquée sur composants IFX M7820 A11
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-14-avec-aa-configuration-eac-avec-amd-113v3-masquee-sur
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2010/02 |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2010/02 |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC_2010-17en.pdf |
ANSSI_2012-32fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1
- cert_id: ANSSI-CC-2010/17
- cert_item: CC IDeal Citiz SmartCard (on SB23YR80B
- cert_item_version: version IDEAL/ST23YR80/1.4.5, Version 1.4.5
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 40 87, email : [email protected]
- developer: SAGEM Sécurité Etablissement d’Osny, 18 Chaussée Jules César, 95520 Osny, France ST Microelectronics 29 Boulevard Romain Rolland, 75669 Paris cedex 14, France Sponsor SAGEM Sécurité Etablissement d’Osny, 18 Chaussée Jules César, 95520 Osny, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: PP EAC] Machine Readable Travel Document with “ICAO Application”, Extented Access Control, version 1.10
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2012/32
- cert_item: Application eTravel EAC 1.4 avec AA, configuration EAC avec AMD 113v3, masquée sur composants IFX M7820 A11
- cert_item_version: Version de l’application et de la plateforme : 023078 / 023079 Version de l’AMD (patch) : 113v3 Version du composant IFX M7820 A11 : SLE78CLXxxxxP / SLE78CLXxxxxPM
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0056-2009, [PP EAC], version 1.10 Machine Readable Travel Document with “ICAO Application”, Extended Access Control
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-2010/02-M01: 2
- ANSSI-CC-2009/61: 2
- ANSSI-CC-2010/02: 3
- ANSSI-CC-2010/17: 19
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-2009: 1
- BSI-PP-0035-2007: 1
|
- BSI:
- BSI-CC-PP-0056-2009: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-2007: 2
- BSI-PP-0056-2009: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL6: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- STMicroelectronics:
- Sagem:
|
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- ICAO:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ICAO:
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20100430151153+02'00'
- /Keywords:
- /ModDate: D:20100430151153+02'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- pdf_file_size_bytes: 111774
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /CreationDate: D:20120706162658+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120711194515+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title:
- pdf_file_size_bytes: 473281
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
ANSSI-CC-cible_2010-17en.pdf |
ANSSI-cible_2012-32en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0640-2010: 1
- BSI-DSZ-CC-0813-2012: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 2
- BSI-PP-0056: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ALC:
- ALC_COMP.1: 1
- ALC_DVS.2: 3
- APE:
- ASE:
- ATE:
- AVA:
- AVA_COMP.1: 1
- AVA_VAN: 1
- AVA_VAN.3: 1
- AVA_VAN.5: 4
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- ALC:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 7
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 2
- FCS_CKM.1.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP: 10
- FCS_COP.1: 1
- FCS_COP.1.1: 5
- FCS_RND: 8
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 2
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 3
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_UCT: 1
- FDP_UCT.1: 4
- FDP_UCT.1.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 4
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 11
- FIA_API.1: 5
- FIA_API.1.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 2
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UID: 2
- FIA_UID.1: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 15
- FMT_LIM.1.1: 3
- FMT_LIM.2: 14
- FMT_LIM.2.1: 4
- FMT_MTD: 17
- FMT_MTD.1: 2
- FMT_MTD.1.1: 9
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 3
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.2.1: 1
- FPT_TST.3.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 6
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_COP: 7
- FCS_COP.1: 9
- FCS_RND: 6
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 5
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_UCT.1: 3
- FDP_UCT.1.1: 1
- FDP_UIT.1: 3
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 5
- FIA_API.1: 10
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 2
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 5
- FIA_UAU.4.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 15
- FMT_LIM.1.1: 3
- FMT_LIM.2: 14
- FMT_LIM.2.1: 3
- FMT_MSA.3: 1
- FMT_MTD: 11
- FMT_MTD.1: 12
- FMT_MTD.3: 2
- FMT_MTD.3.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- OE:
- OE.BAC-PP: 4
- OE.BAC_PP: 1
- OE.MRTD_: 4
- T:
|
- OE:
- OE.BAC-PP: 1
- OE.BAC_PP: 1
- OE.MRTD_: 1
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA224: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Fault injection: 1
- Malfunction: 4
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 2
- malfunction: 4
- physical tampering: 3
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- side channel: 1
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 1
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
- BSI:
- BSI 2006: 1
- BSI TR-03110: 1
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 10
- EF.DG1: 14
- EF.DG13: 1
- EF.DG14: 9
- EF.DG15: 5
- EF.DG16: 14
- EF.DG2: 7
- EF.DG3: 18
- EF.DG4: 16
- EF.DG5: 6
- EF.DG6: 1
- EF.SOD: 11
|
- EF:
- EF.COM: 8
- EF.DG1: 18
- EF.DG14: 7
- EF.DG15: 3
- EF.DG16: 17
- EF.DG2: 10
- EF.DG3: 22
- EF.DG4: 21
- EF.DG5: 8
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 1
- FIPS PUB 46-3: 2
- ICAO:
- ISO:
- ISO/IEC 15946: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 180-2: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20100427185324+02'00'
- /Keywords:
- /ModDate: D:20100427185324+02'00'
- /Producer: GPL Ghostscript 8.54
- pdf_file_size_bytes: 915483
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
- /CreationDate: D:20120625115210+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120711194526+02'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title:
- pdf_file_size_bytes: 369982
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |