name |
Carte VITALE 2 - Application ADELE: Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.4 avec correctif version 4
|
Application IAS V4.2.0.D sur la plateforme Javacard ouverte MultiApp V3.1S masquée sur le composant P60D144JVA (version du patch: 1.4)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2015-10-23
|
2015-09-28
|
not_valid_after |
2020-10-23
|
2020-09-28
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2015_35_LITE.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015-38_LITE.pdf
|
status |
archived
|
archived
|
manufacturer |
MORPHO / ST Microelectronics
|
Gemalto / NXP Semiconductors
|
manufacturer_web |
https://www.morpho.com
|
https://www.gemalto.com/
|
security_level |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_35.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_38.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': frozenset({'SSCD_TYPE3_V1.05'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PP Embedded Software for Smart Secure Devices Basic and Extended Configurations, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/anssi-cc_PP-2009-02en.pdf', 'pp_ids': frozenset({'PP_EMBEDDED_SOFTWARE_V1.0'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': frozenset({'SSCD_TYPE2_V1.04'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 20), 'maintenance_title': 'ANSSI-CC-2016/04-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_04-M01.pdf', 'maintenance_st_link': None}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
f0b1fc12e774f9359b2c70784f930575f225ea8420cec1b6ced798b8c2529de8
|
9f896b77a2b7e72d9314b5370f8fa77ae2d980d4d082a7f9416bee006b859985
|
state/report/txt_hash |
f83e3859612f0bf66a50689f9feb426e3b04b660435548ab34ab18d6f172164e
|
d9c515080418af75b4f5de6340c9cac0a65b8de874f149bc98935aac5019001d
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
4f20879385f4b270b6ffc95e39c202631f020dd0c4eb61821627f797290c9bf0
|
9b3c322b983cf9057fcde75323a4ec071ca77d5ed7db33bfa14f5185524261ca
|
state/st/txt_hash |
9ec2944d8180ebb871a79c951072f4833a002cfcde70d6aec5d8c6608e408984
|
263617a9e639be0664ea71238d750079211725ac1511640c42ebd3445fe0bc16
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2015/35
|
ANSSI-CC-2015/38
|
heuristics/cert_lab |
None
|
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.0.4 |
4.2.0, 3.1, 1.4 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2010/08, ANSSI-CC-2011/68 |
ANSSI-CC-2015/08, ANSSI-CC-2015/15, BSI-DSZ-CC-0870-2014, ANSSI-CC-2015/30 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2010/08, ANSSI-CC-2011/68 |
BSI-DSZ-CC-0837-2013, ANSSI-CC-2015/15, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0829-2012, ANSSI-CC-2015/08, BSI-DSZ-CC-0837-V2-2014, BSI-DSZ-CC-0870-2014, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0845-2012, ANSSI-CC-2014/06, ANSSI-CC-2014/86, ANSSI-CC-2014/14, BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2015/30 |
heuristics/scheme_data/cert_id |
2015/35
|
2015/38
|
heuristics/scheme_data/description |
Le produit certifiéest la « Carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.4 avec correctif version 4, référence VITALE2/SB23ZL48/1.0.40 » développée par MORPHO et STMICROELECTRONICS.
La cible d’évaluation (TOE – Target Of Evaluation) est l’application ADELE (ADministration ELEctronique) masquée. Elle fournit les services de signature électroni
|
Le produit certifié est la carte à puce ouverte « MultiApp V3.1S » pouvant être en mode contact ou sans-contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144JVA fabriqué par la société NXP SEMICONDUCTOR.
La cible d’évaluation est composée :
- de l’applet IAS Classic V4.2.0.D, qui permet à l’utilisateur de signer électroniquement
des données ;
- d
|
heuristics/scheme_data/developer |
MORPHO / STMICROELECTRONICS
|
Gemalto / NXP Semiconductors
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r3
|
Critères Communs version 3.1r4
|
heuristics/scheme_data/enhanced/cert_id |
2015/35
|
2015/38
|
heuristics/scheme_data/enhanced/certification_date |
23/10/2015
|
28/09/2015
|
heuristics/scheme_data/enhanced/developer |
MORPHO / STMICROELECTRONICS
|
Gemalto / NXP Semiconductors
|
heuristics/scheme_data/enhanced/evaluation_facility |
CEA - LETI
|
Serma Technologies
|
heuristics/scheme_data/enhanced/level |
EAL4+
|
EAL4+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
PP-ESforSSD, PP-SSCD2, PP-SSCD3
|
PP-SSCD-Part2, PP-SSCD-Part3
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2015/10/ANSSI-CC-2015_35.pdf
|
https://cyber.gouv.fr/sites/default/files/2015/10/ANSSI-CC-2015_38.pdf
|
heuristics/scheme_data/enhanced/sponsor |
MORPHO
|
Gemalto
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/2015/10/ANSSI_cible2015_35_LITE.pdf
|
https://cyber.gouv.fr/sites/default/files/2015/10/anssi_cible_2015-38_LITE.pdf
|
heuristics/scheme_data/level |
EAL4+
|
EAL4+
|
heuristics/scheme_data/product |
Carte VITALE 2 - Application ADELE : Composant SB23ZL48 masqué par le logiciel SESAM VITALE v1.0.4 avec correctif version 4
|
Application IAS V4.2.0.D sur la plateforme JavaCard ouverte MultiApp V3.1S masquée sur le composant P60D144JVA
|
heuristics/scheme_data/sponsor |
MORPHO
|
Gemalto
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/carte-vitale-2-application-adele-composant-sb23zl48-masque-par-le-logiciel-sesam
|
https://cyber.gouv.fr/produits-certifies/application-ias-v420d-sur-la-plateforme-javacard-ouverte-multiapp-v31s-masquee
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
ANSSI-CC-2010/08 |
BSI-DSZ-CC-0845-2012 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2010/08 |
BSI-DSZ-CC-0845-2012 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
ANSSI-CC-2015_35.pdf
|
ANSSI-CC-2015_38.pdf
|
pdf_data/report_frontpage/FR |
|
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2015/38
- cert_item:
Application IAS V4.2.0.D sur la plateforme JavaCard ouverte MultiApp V3.1S masquée sur le composant P60D144JVA
- cert_item_version:
Version de l’application IAS : 4.2.0.D Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.1S. Version du patch : 1.4
- ref_protection_profiles:
Protection Profile for Secure Signature Creation Device – Part 2 : Device with key generation, version 2.0.1, certifié sous la référence [PP-SSCD-Part2]. Protection Profile for Secure Signature Creation Device – Part 3 : Device with key import, version 1.0.2, certifié sous la référence [PP-SSCD-Part3
- cc_version:
Critères Communs version 3.1 révision 4
- cc_security_level:
EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- developer:
Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- cert_lab:
Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2015/35:
19
- ANSSI-CC-2010/08:
1
- ANSSI-CC-2011/68:
2
- ANSSI-CC-2010/08-M01:
1
- ANSSI-CC-2010/08-M02:
1
|
- DE:
- FR:
- ANSSI-CC-2015/38:
20
- ANSSI-CC-2015/30:
2
- ANSSI-CC-2015/15:
1
- ANSSI-CC-2015/08:
1
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2015/35:
19
- ANSSI-CC-2010/08:
1
- ANSSI-CC-2011/68:
2
- ANSSI-CC-2010/08-M01:
1
- ANSSI-CC-2010/08-M02:
1
|
- ANSSI-CC-2015/38:
20
- ANSSI-CC-2015/30:
2
- ANSSI-CC-2015/15:
1
- ANSSI-CC-2015/08:
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0005-2002T:
1
- BSI-PP-0006-2002T:
1
- BSI-PP-0035-2007:
1
- ANSSI:
- other:
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
1
- other:
- PP-SSCD-Part2:
2
- PP-SSCD-Part3:
2
- PP-SSCD-:
2
|
pdf_data/report_keywords/cc_protection_profile_id/ANSSI |
|
- ANSSI-CC-PP-2010/03-M01:
1
|
pdf_data/report_keywords/cc_protection_profile_id/other |
|
- PP-SSCD-Part2:
2
- PP-SSCD-Part3:
2
- PP-SSCD-:
2
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
4
|
5
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 4:
2
- EAL2: 2
- EAL5: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
|
- EAL 4:
1
- EAL4: 4
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
2
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- javacardx:
- com:
- com.gemalto.javacardx.pace:
1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP Semiconductors:
1
- NXP:
4
- Gemalto:
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
|
|
pdf_data/report_metadata//CreationDate |
|
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
PDFCreator Version 1.2.1
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
|
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
GPL Ghostscript 9.02
|
pdf_data/report_metadata//Subject |
|
|
pdf_data/report_metadata//Title |
ANSSI-CC-2015_35
|
ANSSI-CC-2015_38
|
pdf_data/report_metadata/pdf_file_size_bytes |
312687
|
758031
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
18
|
19
|
pdf_data/st_filename |
ANSSI_cible2015_35_LITE.pdf
|
anssi_cible_2015-38_LITE.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
3
|
2
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- T:
- A:
- OE:
- OE.HI_VAD:
10
- OE.RND:
11
- OE.SVD_AUTH_CGA:
2
- OSP:
- OSP.MANAGEMENT_OF_SECRETS:
1
|
- A:
- A.CGA:
3
- A.SCA:
5
- A.CSP:
4
- A.SCP:
1
- OE:
- OE.SVD_AUTH:
1
- OE.HID_VAD:
4
|
pdf_data/st_keywords/cc_claims/A |
|
- A.CGA:
3
- A.SCA:
5
- A.CSP: 4
- A.SCP: 1
|
pdf_data/st_keywords/cc_claims/A/A.CGA |
8
|
3
|
pdf_data/st_keywords/cc_claims/A/A.SCA |
7
|
5
|
pdf_data/st_keywords/cc_claims/OE |
- OE.HI_VAD:
10
- OE.RND:
11
- OE.SVD_AUTH_CGA:
2
|
- OE.SVD_AUTH:
1
- OE.HID_VAD:
4
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- ANSSI:
- ANSSI-CC-PP-ESforSSD_Basic:
1
- ANSSI-CC-PP-ESforSSD_Extended:
1
|
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- other:
- PP-SSCD-KG:
27
- PP-SSCD-KI:
20
- PP-SSCD:
2
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 |
1
|
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_IMP.1:
1
- ADV_TDS.3:
1
- AGD:
- AGD_PRE:
1
- AGD_OPE:
1
- AGD_PRE.1:
1
- AGD_OPE.1:
1
- ALC:
- ALC_DVS.2:
8
- ALC_DVS.1:
1
- AVA:
|
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.2:
8
- ALC_DVS.1: 1
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
8
|
3
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
9
|
3
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 4: 1
- EAL5: 1
- EAL4+: 3
- EAL4:
3
- EAL 5+: 1
- EAL 4 augmented: 1
- EAL5 augmented: 1
- EAL4 augmented:
1
|
- EAL 4+: 1
- EAL4:
3
- EAL4 augmented:
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4 |
3
|
3
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4 augmented |
1
|
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP:
4
- FAU_SAA:
4
- FAU_GEN:
1
- FAU_ARP.1:
2
- FAU_SAA.1:
3
- FCS:
- FCS_CKM.1:
3
- FCS_CKM:
9
- FCS_CKM.4:
5
- FCS_COP.1:
9
- FCS_COP:
10
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.1.1:
1
- FCS_CKM.2:
1
- FCS_CKM.3:
1
- FDP:
- FDP_ACC:
31
- FDP_ACF:
31
- FDP_ETC:
4
- FDP_ITC:
6
- FDP_RIP.1:
5
- FDP_RIP:
3
- FDP_ROL:
3
- FDP_SDI:
9
- FDP_UCT:
9
- FDP_UIT:
15
- FDP_ACC.1:
14
- FDP_ACF.1:
41
- FDP_ETC.1:
2
- FDP_ITC.1:
8
- FDP_RIP.1.1:
1
- FDP_SDI.2:
7
- FDP_UCT.1:
4
- FDP_UIT.1:
11
- FDP_ROL.1:
3
- FDP_UNO.1:
1
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FIA:
- FIA_AFL.1:
3
- FIA_ATD.1:
3
- FIA_SOS:
3
- FIA_UAU.1:
4
- FIA_UID.1:
8
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.2:
3
- FIA_UID:
2
- FMT:
- FMT_MOF.1:
6
- FMT_MOF:
3
- FMT_MSA:
23
- FMT_MSA.2:
3
- FMT_MSA.3:
16
- FMT_MTD:
3
- FMT_SMR.1:
5
- FMT_MOF.1.1:
1
- FMT_MSA.1:
9
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
5
- FMT_MTD.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMR:
2
- FPR:
- FPT:
- FPT_EMS:
2
- FPT_AMT.1:
2
- FPT_EMS.1:
5
- FPT_FLS.1:
5
- FPT_FLS:
3
- FPT_ITC:
3
- FPT_ITI:
3
- FPT_PHP.1:
3
- FPT_PHP.3:
3
- FPT_TST:
3
- FPT_TST.1:
9
- FPT_EMS.1.1:
2
- FPT_EMS.1.2:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_ITC.1:
2
- FPT_ITI.1:
3
- FTP:
- FTP_ITC:
22
- FTP_TRP:
10
- FTP_ITC.1:
20
- FTP_TRP.1:
6
|
- FCS:
- FCS_CKM:
41
- FCS_CKM.4:
12
- FCS_COP:
17
- FCS_CKM.2:
4
- FCS_COP.1:
6
- FCS_CKM.1.1:
2
- FCS_CKM.1:
10
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FDP:
- FDP_ITC.1:
9
- FDP_ITC.2:
8
- FDP_ACC:
39
- FDP_ACF.1:
10
- FDP_ACC.1.1:
4
- FDP_ACF:
27
- FDP_ACC.1:
27
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_ITC:
9
- FDP_IFC.1:
17
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
7
- FDP_RIP.1.1:
1
- FDP_SDI:
15
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
2
- FDP_UCT.1.1:
1
- FDP_UCT:
7
- FDP_SDI.2:
2
- FDP_UIT.1:
1
- FDP_RIP:
1
- FIA:
- FIA_AFL:
12
- FIA_UAU.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
14
- FIA_UID.1:
11
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
14
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_AFL.1:
2
- FMT:
- FMT_MSA.3:
12
- FMT_MOF.1:
8
- FMT_SMR.1:
35
- FMT_SMF.1:
26
- FMT_MOF.1.1:
1
- FMT_MSA:
62
- FMT_MSA.1.1:
3
- FMT_MSA.2:
8
- FMT_MSA.1:
7
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
14
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.4:
1
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
14
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
9
- FPT_FLS.1:
9
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
8
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
9
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC.1:
3
- FTP_TRP.1:
2
- FTP_ITC:
7
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_ICT:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
3
- FCS_CKM:
9
- FCS_CKM.4:
5
- FCS_COP.1:
9
- FCS_COP:
10
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.1.1:
1
- FCS_CKM.2:
1
- FCS_CKM.3: 1
|
- FCS_CKM:
41
- FCS_CKM.4:
12
- FCS_COP:
17
- FCS_CKM.2:
4
- FCS_COP.1:
6
- FCS_CKM.1.1:
2
- FCS_CKM.1:
10
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
9
|
41
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
3
|
10
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
1
|
4
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
5
|
12
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
10
|
17
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
6
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC:
31
- FDP_ACF:
31
- FDP_ETC: 4
- FDP_ITC:
6
- FDP_RIP.1:
5
- FDP_RIP:
3
- FDP_ROL: 3
- FDP_SDI:
9
- FDP_UCT:
9
- FDP_UIT: 15
- FDP_ACC.1:
14
- FDP_ACF.1:
41
- FDP_ETC.1: 2
- FDP_ITC.1:
8
- FDP_RIP.1.1:
1
- FDP_SDI.2:
7
- FDP_UCT.1:
4
- FDP_UIT.1:
11
- FDP_ROL.1: 3
- FDP_UNO.1: 1
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
|
- FDP_ITC.1:
9
- FDP_ITC.2: 8
- FDP_ACC:
39
- FDP_ACF.1:
10
- FDP_ACC.1.1: 4
- FDP_ACF:
27
- FDP_ACC.1:
27
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_ITC:
9
- FDP_IFC.1: 17
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
7
- FDP_RIP.1.1:
1
- FDP_SDI:
15
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT.1:
2
- FDP_UCT.1.1: 1
- FDP_UCT:
7
- FDP_SDI.2:
2
- FDP_UIT.1:
1
- FDP_RIP:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
31
|
39
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
14
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
31
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
41
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
6
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
8
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
5
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI |
9
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
7
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT |
9
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
11
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1:
3
- FIA_ATD.1: 3
- FIA_SOS: 3
- FIA_UAU.1:
4
- FIA_UID.1:
8
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1: 1
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.2: 3
- FIA_UID:
2
|
- FIA_AFL: 12
- FIA_UAU.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU: 14
- FIA_UID.1:
11
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
14
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_AFL.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
2
|
14
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
8
|
11
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MOF.1:
6
- FMT_MOF: 3
- FMT_MSA:
23
- FMT_MSA.2:
3
- FMT_MSA.3:
16
- FMT_MTD:
3
- FMT_SMR.1:
5
- FMT_MOF.1.1:
1
- FMT_MSA.1:
9
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1: 5
- FMT_MTD.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMR: 2
|
- FMT_MSA.3:
12
- FMT_MOF.1:
8
- FMT_SMR.1:
35
- FMT_SMF.1: 26
- FMT_MOF.1.1:
1
- FMT_MSA:
62
- FMT_MSA.1.1: 3
- FMT_MSA.2:
8
- FMT_MSA.1:
7
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1: 2
- FMT_MTD:
14
- FMT_MTD.1.1:
2
- FMT_SMF.1.1: 1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.4: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 |
6
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
23
|
62
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
9
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
3
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
16
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
3
|
14
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
35
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS:
2
- FPT_AMT.1: 2
- FPT_EMS.1:
5
- FPT_FLS.1:
5
- FPT_FLS: 3
- FPT_ITC: 3
- FPT_ITI: 3
- FPT_PHP.1:
3
- FPT_PHP.3:
3
- FPT_TST:
3
- FPT_TST.1:
9
- FPT_EMS.1.1:
2
- FPT_EMS.1.2:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_ITC.1: 2
- FPT_ITI.1: 3
|
- FPT_EMS:
5
- FPT_EMS.1:
14
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
9
- FPT_FLS.1:
9
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
8
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
9
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
5
|
14
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
5
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 |
3
|
8
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
3
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC:
22
- FTP_TRP: 10
- FTP_ITC.1:
20
- FTP_TRP.1:
6
|
- FTP_ITC.1:
3
- FTP_TRP.1:
2
- FTP_ITC:
7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ICT: 1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
22
|
7
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
20
|
3
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
6
|
2
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
10
|
3
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
31
|
1
|
pdf_data/st_keywords/randomness/RNG/RNG |
3
|
2
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- physical probing:
2
- side channel:
1
- SPA:
3
- DPA:
3
- timing attacks:
1
- FI:
- physical tampering:
4
- malfunction:
2
- fault injection:
1
- other:
|
- SCA:
- Leak-Inherent:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
- FI:
- physical tampering:
4
- Malfunction:
1
- DFA:
1
- fault injection:
1
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
4
- malfunction: 2
- fault injection:
1
|
- physical tampering:
4
- Malfunction: 1
- DFA: 1
- fault injection:
1
|
pdf_data/st_keywords/side_channel_analysis/FI/fault injection |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
4
|
4
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- physical probing: 2
- side channel: 1
- SPA:
3
- DPA:
3
- timing attacks:
1
|
- Leak-Inherent: 1
- SPA:
1
- DPA:
1
- timing attacks:
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
3
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
3
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks |
1
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3:
1
- FIPS 180-1:
1
- FIPS180-2:
1
- PKCS:
- BSI:
|
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS197:
2
- PKCS:
- ICAO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS PUB 46-3:
1
- FIPS 180-1: 1
- FIPS180-2:
1
|
- FIPS180-2:
1
- FIPS46-3: 1
- FIPS PUB 46-3:
1
- FIPS197: 2
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 |
7
|
2
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
5
|
4
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
4
|
2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- STMicroelectronics:
- Morpho:
- Philips:
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1554303
- pdf_is_encrypted:
False
- pdf_number_of_pages:
105
- /Title:
Title
- /Author:
Morpho
- /Creator:
Microsoft® Word 2010
- /CreationDate:
D:20151002163527+02'00'
- /ModDate:
D:20151002163527+02'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1012955
- pdf_is_encrypted:
False
- pdf_number_of_pages:
56
- /Title:
eTravel v1.0 Security Target MAÏA3
- /Author:
Antoine de Lavernette
- /Subject: MRTD
- /Keywords: Security Target, CC, eTravel
- /Creator:
Microsoft® Office Word 2007
- /CreationDate:
D:20150429113345+02'00'
- /ModDate:
D:20150429113345+02'00'
- /Producer:
Microsoft® Office Word 2007
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
Morpho
|
Antoine de Lavernette
|
pdf_data/st_metadata//CreationDate |
D:20151002163527+02'00'
|
D:20150429113345+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//ModDate |
D:20151002163527+02'00'
|
D:20150429113345+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Title |
Title
|
eTravel v1.0 Security Target MAÏA3
|
pdf_data/st_metadata/pdf_file_size_bytes |
1554303
|
1012955
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
105
|
56
|
dgst |
855527c12b287461
|
43a6fefa88ec3a55
|