name |
eTravel Essential 1.2 – PACE, EAC and AA activated(release ‘0300’)
|
eTravel Essential 1.2 – PACE, EAC and AA activated (release ‘0300’)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2021-06-15
|
2022-12-12
|
not_valid_after |
2026-06-15
|
2027-12-12
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_28en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_62en.pdf
|
status |
active
|
active
|
manufacturer |
THALES DIS FRANCE SA
|
THALES DIS FRANCE SA
|
manufacturer_web |
https://www.thalesgroup.com/en/europe/france
|
https://www.thalesgroup.com/en/europe/france
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_28fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_62.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_28.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat%20ANSSI-CC-2022-62.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': frozenset({'EPASS_PACE_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': frozenset({'EPASS_PACE_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 1, 14), 'maintenance_title': 'Maintenance report: ANSSI-CC-2021/28-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_28-m01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_28-m01en.pdf'}) |
|
state/cert/convert_garbage |
False
|
True
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
ece7bf195a2c9f13c9278c94d565d79be4a7a962c024e19ec86923b1e6098a07
|
3a161f441bd115a8d2f79028e7b4538f5669615b8177468f083f9f7b8ce2f583
|
state/cert/txt_hash |
6ec17571ac007a1c72edb6df2dda161cd6181c7d3c1ea4dde75f08fdf39192ec
|
b93eced91d768218314ec00b52acb9539f5b3c276129b7bc6cb39d124ad53eac
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
100e206757d807797e1006b1d6a9bdb7aaeda38c1af2cbe5a0543a51fd473668
|
ae5a70b4794ff2147e4126c8daa6c50fab0b5ceb4e864834a91702bb6eaeaefe
|
state/report/txt_hash |
f5c0345af1b710a9cc90a1bf78f25a48e3a4fa4dadd97100cd87f59d1080d4bd
|
d42ac587f860bf8d060913b4be7ff4cf1d2478559b195fc65c19c05243f1f17b
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
9cb2b334bafbfe7ec6d77c2462beae5d53356d04205e0b61fe78c554103005c9
|
33b56c3489b00807532511635d4236b8df2035ad93ebf4db6596fed632c3f41d
|
state/st/txt_hash |
6cfd7fc814306936c9d1ec51577db45f416763f6b2479cca83c1406cee584e8a
|
46e4386309a4713fa0f3e88f419620aefc7a1f16d6436221fdf06361222c1791
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2021/28
|
ANSSI-CC-2022/62
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ATE_DPT.1, AGD_OPE.1, ADV_ARC.1, AGD_PRE.1, ADV_TDS.3, AVA_VAN.5, ADV_IMP.1, ASE_TSS.2, ALC_DVS.2, ADV_FSP.4 |
ATE_DPT.1, AGD_OPE.1, ADV_ARC.1, AGD_PRE.1, ADV_TDS.3, AVA_VAN.5, ADV_IMP.1, ASE_TSS.2, ALC_DVS.2, ADV_FSP.4 |
heuristics/extracted_versions |
1.2 |
1.2 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2022/62 |
None
|
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2022/62 |
None
|
heuristics/scheme_data/cert_id |
2021/28
|
ANSSI-CC-2022/62
|
heuristics/scheme_data/description |
Le produit évalué est « eTravel Essential 1.2 – PACE, EAC and AA activated, release '0300' » développé par THALES DIS.
Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à
|
Le produit évalué est « eTravel Essential 1.2 – PACE, EAC and AA activated, release '0300' » développé par THALES DIS.
Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à
|
heuristics/scheme_data/developer |
THALES DIS
|
THALES DIS et THALES DIS DESIGN SERVICES
|
heuristics/scheme_data/enhanced |
- cert_id:
2021/28
- certification_date:
15/06/2021
- expiration_date:
15/06/2026
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS
- sponsor:
THALES DIS DESIGN SERVICES
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Machine Readable Travel Document with « ICAO Application », Extended Access Control
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link: https://cyber.gouv.fr/sites/default/files/2021/07/anssi-cible-cc-2021_28-m01en.pdf
- cert_link: https://cyber.gouv.fr/sites/default/files/2021/07/certificat-2021_28.pdf
- report_link: https://cyber.gouv.fr/sites/default/files/2021/07/anssi-cc-2021_28fr.pdf
|
- cert_id:
ANSSI-CC-2022/62
- certification_date:
12/12/2022
- expiration_date:
11/12/2027
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS et THALES DIS DESIGN SERVICES
- sponsor:
THALES DIS
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Machine Readable Travel Document with « ICAO Application », Extended Access Control, version 1.3.2, certifié BSI-CC-PP-0056-V2-2012-MA-02 ;
Machine Readable Travel Document using Standard Inspection Procedure with PACE,version 1.0.1, certifié BSI-CC-PP-0068-V2-2011-MA-01
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
2021/28
|
ANSSI-CC-2022/62
|
heuristics/scheme_data/enhanced/certification_date |
15/06/2021
|
12/12/2022
|
heuristics/scheme_data/enhanced/developer |
THALES DIS
|
THALES DIS et THALES DIS DESIGN SERVICES
|
heuristics/scheme_data/enhanced/evaluation_facility |
SERMA SAFETY & SECURITY
|
SERMA SAFETY & SECURITY
|
heuristics/scheme_data/enhanced/expiration_date |
15/06/2026
|
11/12/2027
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
CCRA
SOG-IS
|
heuristics/scheme_data/enhanced/protection_profile |
Machine Readable Travel Document with « ICAO Application », Extended Access Control
|
Machine Readable Travel Document with « ICAO Application », Extended Access Control, version 1.3.2, certifié BSI-CC-PP-0056-V2-2012-MA-02 ;
Machine Readable Travel Document using Standard Inspection Procedure with PACE,version 1.0.1, certifié BSI-CC-PP-0068-V2-2011-MA-01
|
heuristics/scheme_data/enhanced/sponsor |
THALES DIS DESIGN SERVICES
|
THALES DIS
|
heuristics/scheme_data/expiration_date |
15 Juin 2026
|
11 Décembre 2027
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
eTravel Essential 1.2 – PACE, EAC and AA activated(release '0300')
|
eTravel Essential 1.2 – PACE, EAC and AA activated (release '0300')
|
heuristics/scheme_data/sponsor |
THALES DIS DESIGN SERVICES
|
THALES DIS
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/etravel-essential-12-pace-eac-and-aa-activatedrelease-0300
|
https://cyber.gouv.fr/produits-certifies/etravel-essential-12-pace-eac-and-aa-activated-release-0300-0
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-2021_28.pdf
|
Certificat ANSSI-CC-2022-62.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02:
1
- BSI-CC-PP-0068-V2-2011-MA-01:
1
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02:
1
- BSI-CC-PP-0068-V2-2011-MA-01:
1
|
pdf_data/cert_keywords/cc_sar/ALC |
|
|
pdf_data/cert_keywords/cc_sar/AVA |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 |
1
|
1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility/Serma/SERMA |
2
|
1
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
314713
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
- /CreationDate: D:20210621171827+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate: D:20210621171827+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
192060
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Producer:
Lexmark MX522adhe
- /Title:
Scanned Document
- /Creator:
HardCopy
- pdf_hyperlinks:
|
pdf_data/cert_metadata//Creator |
PScript5.dll Version 5.2.2
|
HardCopy
|
pdf_data/cert_metadata//Producer |
Acrobat Distiller 11.0 (Windows)
|
Lexmark MX522adhe
|
pdf_data/cert_metadata//Title |
|
Scanned Document
|
pdf_data/cert_metadata/pdf_file_size_bytes |
314713
|
192060
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
1
|
pdf_data/report_filename |
anssi-cc-2021_28fr.pdf
|
anssi-cc-2022_62.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2021/28:
2
- ANSSI-CC-2020/34:
1
- ANSSI-CC-2020/34-M01:
1
|
- ANSSI-CC-2022/62: 2
- ANSSI-CC-2021/28:
1
- ANSSI-CC-2021/27: 1
- ANSSI-CC-2020/34:
1
- ANSSI-CC-2020/34-M01:
1
- ANSSI-CC-2020/34-S02: 1
|
pdf_data/report_keywords/cc_cert_id/FR/ANSSI-CC-2020/34 |
1
|
1
|
pdf_data/report_keywords/cc_cert_id/FR/ANSSI-CC-2020/34-M01 |
1
|
1
|
pdf_data/report_keywords/cc_cert_id/FR/ANSSI-CC-2021/28 |
2
|
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0056-V2-2012-MA-02:
2
- BSI-CC-PP-0068-V2-2011-MA-01:
1
- BSI-PP-0084-2014:
1
|
- BSI-CC-PP-0056-V2-2012-MA-02:
2
- BSI-CC-PP-0068-V2-2011-MA-01:
1
- BSI-CC-PP-0068-V2-: 1
- BSI-PP-0084-2014:
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0056-V2-2012-MA-02 |
2
|
2
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0068-V2-2011-MA-01 |
1
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0084-2014 |
1
|
1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_TSS.2:
1
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL2:
2
- EAL6:
1
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 7: 1
|
- EAL 5:
2
- EAL2:
2
- EAL6:
1
- EAL7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol/PACE/PACE |
12
|
15
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/CESTI |
|
|
pdf_data/report_keywords/eval_facility/Serma/SERMA |
2
|
1
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004: 1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-001 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-002 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-003 |
1
|
1
|
pdf_data/report_keywords/standard_id/ICAO |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
143746
- pdf_is_encrypted:
False
- pdf_number_of_pages:
14
- /Author:
- /CreationDate:
D:20210621171133+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20210621171133+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
403782
- pdf_is_encrypted:
False
- pdf_number_of_pages:
15
- /Author:
[email protected]
- /Category: release '0300'
- /Comments: ANSSI-CC-CER-F-07_v31.3
- /Company: THALES DIS
- /CreationDate:
D:20221216141647+01'00'
- /Creator:
Acrobat PDFMaker 22 pour Word
- /Keywords: [ANSSI Crypto] <ou [SOG-IS Crypto]>
- /ModDate:
D:20221216141650+01'00'
- /Producer:
Adobe PDF Library 22.3.39
- /SourceModified: D:20221216131636
- /Subject: eTravel Essential 1.2 – PACE, EAC and AA activated
- /Title:
ANSSI-CC-2022/62
- pdf_hyperlinks:
mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
|
pdf_data/report_metadata//Author |
|
[email protected]
|
pdf_data/report_metadata//CreationDate |
D:20210621171133+02'00'
|
D:20221216141647+01'00'
|
pdf_data/report_metadata//Creator |
PScript5.dll Version 5.2.2
|
Acrobat PDFMaker 22 pour Word
|
pdf_data/report_metadata//ModDate |
D:20210621171133+02'00'
|
D:20221216141650+01'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 11.0 (Windows)
|
Adobe PDF Library 22.3.39
|
pdf_data/report_metadata//Title |
|
ANSSI-CC-2022/62
|
pdf_data/report_metadata/pdf_file_size_bytes |
143746
|
403782
|
pdf_data/report_metadata/pdf_hyperlinks |
|
mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
14
|
15
|
pdf_data/st_filename |
anssi-cible-cc-2021_28en.pdf
|
anssi-cible-cc-2022_62en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id/FR |
|
|
pdf_data/st_keywords/cc_cert_id/NL |
|
|
pdf_data/st_keywords/cc_claims |
- D:
- D.ACODE:
8
- D.ACODE_CIPHEREDSIGNED:
7
- D.ACODE-ID:
3
- D.ACODE_DEC-KEY:
4
- D.ACODE_ENC-KEY:
2
- D.ACODE_SGNVER-KEY:
4
- D.ACODE_SGNGEN-KEY:
2
- D.ACODE_:
1
- D.ACODE_SGNVER-:
1
- O:
- O.SECURE_LOAD_ACODE:
9
- O.SECURE_ACTIVATION_ACODE:
4
- O.TOE_IDENTIFICATION:
7
- O.CONFID-LOAD_ACODE:
4
- O.RND:
1
- O.SECURE_AC_ACTIVATION:
1
- O.CONFID-ES-UPDATE:
1
- T:
- T.UNAUTHORIZED_ES_UPDATE:
3
- T.FAKE-SGNVER-KEY:
3
- T.WRONG-UPDATE-STATE:
3
- T.INTEG-ACODE_LOAD:
2
- T.CONFID-ACODE_LOAD:
2
- T.INTEG-:
1
- T.CONFID-:
1
- A:
- A.ACODE-EVIDENCE:
3
- A.ACODE-KEY-MANAGEMENT:
3
- OE:
- OE.ENCRYPTION_ACODE:
1
- OE.ACODE_SECURE_LOAD:
4
- OE.ACODE-VERIFICATION:
4
- OE.ACODE-EVIDENCE:
5
- OE.CODE-VERIFICATION:
1
- OE.ACODE-TRUSTED-DEVELOPER:
5
- OE.ACODE-ENCRYPTION:
6
- OE.ACODE-KEY-MANAGEMENT:
6
- OE.ACODE-SECURE_LOAD:
1
- OE.ACODE-TRUSTED-:
1
- OE.ACODE-:
1
- OE.BAC-PP:
1
- OSP:
|
- D:
- D.ACODE:
8
- D.ACODE_CIPHEREDSIGNED:
7
- D.ACODE-ID:
3
- D.ACODE_DEC-KEY:
4
- D.ACODE_ENC-KEY:
2
- D.ACODE_SGNVER-KEY:
4
- D.ACODE_SGNGEN-KEY:
2
- D.ACODE_:
1
- D.ACODE_SGNVER-:
1
- O:
- O.SECURE_LOAD_ACODE:
9
- O.SECURE_ACTIVATION_ACODE:
4
- O.TOE_IDENTIFICATION:
7
- O.CONFID-LOAD_ACODE:
4
- O.RND:
1
- O.SECURE_AC_ACTIVATION:
1
- O.CONFID-ES-UPDATE:
1
- T:
- T.UNAUTHORIZED_ES_UPDATE:
3
- T.FAKE-SGNVER-KEY:
3
- T.WRONG-UPDATE-STATE:
3
- T.INTEG-ACODE_LOAD:
2
- T.CONFID-ACODE_LOAD:
2
- T.INTEG-:
1
- T.CONFID-:
1
- A:
- A.ACODE-EVIDENCE:
3
- A.ACODE-KEY-MANAGEMENT:
3
- OE:
- OE.ENCRYPTION_ACODE:
1
- OE.ACODE_SECURE_LOAD:
4
- OE.ACODE-VERIFICATION:
4
- OE.ACODE-EVIDENCE:
5
- OE.CODE-VERIFICATION:
1
- OE.ACODE-TRUSTED-DEVELOPER:
5
- OE.ACODE-ENCRYPTION:
6
- OE.ACODE-KEY-MANAGEMENT:
6
- OE.ACODE-SECURE_LOAD:
1
- OE.ACODE-TRUSTED-:
1
- OE.ACODE-:
1
- OE.BAC-PP:
1
- OSP:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-2014:
1
- BSI-CC-PP-0056:
1
- BSI-CC-PP-0056-V2-2012:
1
- BSI-CC-PP-0068-V2-2011-MA-01:
1
- BSI-CC-PP-0055:
1
|
- BSI:
- BSI-CC-PP-0084-2014:
1
- BSI-CC-PP-0056:
1
- BSI-CC-PP-0056-V2-2012:
1
- BSI-CC-PP-0068-V2-2011-MA-01:
1
- BSI-CC-PP-0055:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
2
- ADV_FSP.4:
1
- ADV_TDS.3:
1
- ADV_IMP.1:
1
- ADV_ARC:
1
|
- ADV_ARC.1:
2
- ADV_FSP.4:
1
- ADV_TDS.3:
1
- ADV_IMP.1:
1
- ADV_ARC:
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE |
2
|
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_VAN.3:
2
- AVA_VAN.5:
6
|
- AVA_VAN.3:
2
- AVA_VAN.5:
6
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+:
1
- EAL5:
7
- EAL6:
1
- EAL 6+:
1
- EAL5 augmented:
3
- EAL6 augmented:
1
|
- EAL:
- EAL 5+:
1
- EAL5:
7
- EAL6:
1
- EAL 6+:
1
- EAL5 augmented:
3
- EAL6 augmented:
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS:
6
- FAU_SAS.1:
19
- FAU_GEN:
1
- FAU_SAS.1.1:
2
- FCS:
- FCS_RND:
7
- FCS_CKM:
61
- FCS_COP:
122
- FCS_RND.1:
21
- FCS_RNG.1:
1
- FCS_CKM.1:
26
- FCS_RND.1.1:
2
- FCS_CKM.2:
8
- FCS_COP.1:
13
- FCS_CKM.4:
67
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
8
- FCS_RNG:
2
- FDP:
- FDP_SDC.1:
8
- FDP_ACF:
32
- FDP_ITC.1:
22
- FDP_ITC.2:
22
- FDP_ACC.1:
9
- FDP_ACC:
34
- FDP_ACF.1:
19
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1:
9
- FDP_RIP.1.1:
1
- FDP_UCT.1:
4
- FDP_UCT:
10
- FDP_IFC.1:
6
- FDP_UCT.1.1:
1
- FDP_UIT.1:
6
- FDP_UIT:
9
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ITT.1:
2
- FDP_SDI.2:
5
- FDP_SMR:
1
- FIA:
- FIA_API:
22
- FIA_AFL:
25
- FIA_API.1:
11
- FIA_SOS.2:
1
- FIA_API.1.1:
1
- FIA_UAU.4:
4
- FIA_UAU:
83
- FIA_UAU.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID:
37
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UID.1:
14
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.5:
5
- FIA_UAU.6.1:
2
- FIA_ATD:
9
- FIA_ATD.1:
1
- FIA_AFL.1:
1
- FIA_UAU.6:
1
- FMT:
- FMT_LIM:
9
- FMT_LIM.1:
28
- FMT_LIM.2:
26
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MTD:
97
- FMT_MSA.3:
6
- FMT_SMF.1:
57
- FMT_SMR.1:
8
- FMT_SMF.1.1:
1
- FMT_SMR:
44
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
1
- FMT_MTD.1:
15
- FMT_MTD.1.1:
1
- FMT_MTD.3:
8
- FMT_MTD.3.1:
1
- FMT_MSA:
11
- FMT_MSA.1:
6
- FMT_SMF:
10
- FPT:
- FPT_EMS:
13
- FPT_TST:
15
- FPT_EMS.1:
20
- FPT_EMS.1.1:
4
- FPT_EMS.1.2:
4
- FPT_FLS.1:
24
- FPT_TST.1:
13
- FPT_PHP.3:
18
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
2
- FPT_TST.1.2:
2
- FPT_TST.1.3:
2
- FPT_PHP.3.1:
1
- FPT_FLS:
14
- FPT_ITT.1:
3
- FRU:
- FTP:
- FTP_ITC.1:
6
- FTP_TRP.1:
4
- FTP_ITC:
16
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
- FAU:
- FAU_SAS:
6
- FAU_SAS.1:
19
- FAU_GEN:
1
- FAU_SAS.1.1:
2
- FCS:
- FCS_RND:
7
- FCS_CKM:
61
- FCS_COP:
122
- FCS_RND.1:
21
- FCS_RNG.1:
1
- FCS_CKM.1:
26
- FCS_RND.1.1:
2
- FCS_CKM.2:
8
- FCS_COP.1:
13
- FCS_CKM.4:
67
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
8
- FCS_RNG:
2
- FDP:
- FDP_SDC.1:
8
- FDP_ACF:
32
- FDP_ITC.1:
22
- FDP_ITC.2:
22
- FDP_ACC.1:
9
- FDP_ACC:
34
- FDP_ACF.1:
19
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1:
9
- FDP_RIP.1.1:
1
- FDP_UCT.1:
4
- FDP_UCT:
10
- FDP_IFC.1:
6
- FDP_UCT.1.1:
1
- FDP_UIT.1:
6
- FDP_UIT:
9
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ITT.1:
2
- FDP_SDI.2:
5
- FDP_SMR:
1
- FIA:
- FIA_API:
22
- FIA_AFL:
25
- FIA_API.1:
11
- FIA_SOS.2:
1
- FIA_API.1.1:
1
- FIA_UAU.4:
4
- FIA_UAU:
83
- FIA_UAU.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID:
37
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UID.1:
14
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.5:
5
- FIA_UAU.6.1:
2
- FIA_ATD:
9
- FIA_ATD.1:
1
- FIA_AFL.1:
1
- FIA_UAU.6:
1
- FMT:
- FMT_LIM:
9
- FMT_LIM.1:
28
- FMT_LIM.2:
26
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MTD:
97
- FMT_MSA.3:
6
- FMT_SMF.1:
57
- FMT_SMR.1:
8
- FMT_SMF.1.1:
1
- FMT_SMR:
44
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
1
- FMT_MTD.1:
15
- FMT_MTD.1.1:
1
- FMT_MTD.3:
8
- FMT_MTD.3.1:
1
- FMT_MSA:
11
- FMT_MSA.1:
6
- FMT_SMF:
10
- FPT:
- FPT_EMS:
13
- FPT_TST:
15
- FPT_EMS.1:
20
- FPT_EMS.1.1:
4
- FPT_EMS.1.2:
4
- FPT_FLS.1:
24
- FPT_TST.1:
13
- FPT_PHP.3:
18
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
2
- FPT_TST.1.2:
2
- FPT_TST.1.3:
2
- FPT_PHP.3.1:
1
- FPT_FLS:
14
- FPT_ITT.1:
3
- FRU:
- FTP:
- FTP_ITC.1:
6
- FTP_TRP.1:
4
- FTP_ITC:
16
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol/PACE/PACE |
239
|
238
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
- Serma:
- Serma Safety & Security:
1
|
- Serma:
- Serma Safety & Security:
1
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224:
2
- SHA-256:
1
- SHA-384:
1
- SHA-512:
1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224:
2
- SHA-256:
1
- SHA-384:
1
- SHA-512:
1
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1:
11
- EF.DG2:
5
- EF.DG3:
11
- EF.DG4:
11
- EF.DG5:
3
- EF.DG16:
9
- EF.DG14:
5
- EF.DG15:
2
- EF.COM:
3
- EF.SOD:
4
|
- EF:
- EF.DG1:
11
- EF.DG2:
5
- EF.DG3:
11
- EF.DG4:
11
- EF.DG5:
3
- EF.DG16:
9
- EF.DG14:
5
- EF.DG15:
2
- EF.COM:
3
- EF.SOD:
4
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
3
- physical probing:
4
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- Physical Tampering:
3
- Physical tampering:
2
- Malfunction:
6
- malfunction:
6
- fault injection:
1
- other:
|
- SCA:
- Leak-Inherent:
3
- physical probing:
4
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- Physical Tampering:
3
- Physical tampering:
2
- Malfunction:
6
- malfunction:
6
- fault injection:
1
- other:
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS 186-4:
3
- FIPS PUB 186-4:
1
- FIPS 197:
2
- FIPS PUB 197:
1
- FIPS 180-2:
1
- NIST:
- SP 800-90:
2
- SP 800-67:
1
- PKCS:
- RFC:
- ISO:
- ISO/IEC 14443:
4
- ISO/IEC 7816:
2
- ISO/IEC 7816-4:
1
- ICAO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS 186-4:
3
- FIPS PUB 186-4:
1
- FIPS 197:
2
- FIPS PUB 197:
1
- FIPS 180-2:
1
- NIST:
- SP 800-90:
2
- SP 800-67:
1
- PKCS:
- RFC:
- ISO:
- ISO/IEC 14443:
4
- ISO/IEC 7816:
2
- ISO/IEC 7816-4:
1
- ICAO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- DES:
- 3DES:
- Triple-DES:
6
- TDES:
7
- 3DES:
2
- constructions:
|
- AES_competition:
- DES:
- DES:
- 3DES:
- Triple-DES:
6
- TDES:
7
- 3DES:
2
- constructions:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Thales/Thales |
57
|
109
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
[email protected]
|
MORIN Sophie
|
pdf_data/st_metadata//CreationDate |
D:20210329115816+02'00'
|
D:20220920165050+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Keywords |
Security Target, CC, eTravel
|
Security Target, CC, eTravel
|
pdf_data/st_metadata//ModDate |
D:20210329115816+02'00'
|
D:20220920165050+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Title |
Security Target eTravel Essential 1.2 - BAC, EAC and AA activated
|
Security Target eTravel Essential 1.2 - BAC, EAC and AA activated
|
pdf_data/st_metadata/pdf_file_size_bytes |
2574254
|
2916500
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
119
|
119
|
dgst |
84680b8178f9a797
|
fa57114438a483e5
|