Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
ANSSI-CC-2016/24
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
ANSSI-CC-2020/65
name Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
not_valid_before 2016-05-23 2020-06-26
not_valid_after 2021-05-23 2021-09-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_cc_2020-65en.pdf
manufacturer Gemalto Thales
manufacturer_web https://www.gemalto.com/ None
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_65.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None})
state/report/pdf_hash 30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d 1851f32764fbc7ae6fcc0a8a1371100314db571756c0ac1410ad36c56ee80e03
state/report/txt_hash 1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7 be2d099bd50586eddcae54e317df4f95e7cee55e8a65d848e17ec0104297ca17
state/st/pdf_hash 7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d 345b033e4ecef010912441340c7faf726817c4f9752819acc64b866caec57235
state/st/txt_hash 3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07 b950b4810f9ff5e378e2adc642cf8bdfa879371a5345bba0b0691c29a861681e
heuristics/cert_id ANSSI-CC-2016/24 ANSSI-CC-2020/65
heuristics/extracted_versions 1.0 4.2
heuristics/report_references/directly_referenced_by None ANSSI-CC-2021/39, ANSSI-CC-2020/65v2, ANSSI-CC-2020/70, ANSSI-CC-2021/38, ANSSI-CC-2021/41
heuristics/report_references/directly_referencing ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 None
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2021/39, ANSSI-CC-2020/65v2, ANSSI-CC-2020/70, ANSSI-CC-2021/38, ANSSI-CC-2021/41
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0814-2012, ANSSI-CC-2016/06, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-2015, BSI-DSZ-CC-0907-2013 None
heuristics/scheme_data/cert_id 2016/24 2020/65
heuristics/scheme_data/description Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr Le produit évalué est la « Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h, version 4.2.0 », développé par THALES et INFINEON TECHNOLOGIES AG. Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soie
heuristics/scheme_data/developer Gemalto / Infineon THALES et INFINEON TECHNOOGIES AG
heuristics/scheme_data/enhanced/augmented ALC_DVS.2, AVA_VAN.5 ALC_DVS.2 et AVA_VAN.5
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r4 Critères Communs version 3.1r5
heuristics/scheme_data/enhanced/cert_id 2016/24 2020/65
heuristics/scheme_data/enhanced/certification_date 23/05/2016 26/06/2020
heuristics/scheme_data/enhanced/developer Gemalto / Infineon THALES et INFINEON TECHNOOGIES AG
heuristics/scheme_data/enhanced/protection_profile PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6 Java Card System Protection Profile Open Configuration, version 3.0.5, certifié BSI-CC-PP-0099-2017 décembre 2017
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cc-2020_65.pdf
heuristics/scheme_data/enhanced/sponsor Gemalto THALES
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf https://cyber.gouv.fr/sites/default/files/2020/07/anssi_cible_cc_2020-65en.pdf
heuristics/scheme_data/product Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
heuristics/scheme_data/sponsor Gemalto THALES
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0 https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-v42-en-configuration-ouverte-sur-le-composant
heuristics/st_references/directly_referencing BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 BSI-DSZ-CC-1079-2018
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 BSI-DSZ-CC-1079-2018
pdf_data/report_filename ANSSI-CC-2016-24.pdf anssi-cc-2020_65.pdf
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 4 Critères Communs version 3.1 révision 5
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2016/24 ANSSI-CC-2020/65
pdf_data/report_frontpage/FR/cert_item Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
pdf_data/report_frontpage/FR/cert_item_version Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0 Version 4.2.0 Java Card version 3.0.5 GP version 2.3
pdf_data/report_frontpage/FR/cert_lab Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
pdf_data/report_frontpage/FR/developer Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France THALES 6 rue de la Verrerie, 92190 Meudon, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire THALES 6 rue de la Verrerie, 92190 Meudon, France
pdf_data/report_frontpage/FR/match_rules Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
pdf_data/report_frontpage/FR/ref_protection_profiles PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application Java Card System Protection Profile Open Configuration, version 3.0.5 certifié BSI-CC-PP-0099-2017 décembre 2017
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0964-2015: 1
  • BSI-DSZ-CC-1079-2018-MA-01: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2016/24: 19
  • ANSSI-CC-2016/06: 1
  • ANSSI-CC-2020/65: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 2
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-PP-0035-2007: 1
  • other:
    • PP-SSCD part: 10
    • PP-SSCD-: 5
  • BSI:
    • BSI-CC-PP-0099-2017: 1
    • BSI-PP-0099-2017: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP- 0059-2009-MA-01: 2
  • BSI-CC-PP- 0075-2012: 1
  • BSI-CC-PP- 0071-2012: 1
  • BSI-CC-PP- 0072-2012: 1
  • BSI-PP-0035-2007: 1
  • BSI-CC-PP-0099-2017: 1
  • BSI-PP-0099-2017: 1
  • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 1 3
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 1 3
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 2
  • ALC_FLR.1: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL2: 2
  • EAL 6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 2
pdf_data/report_keywords/eval_facility/Serma
  • Serma Safety & Security: 1
  • SERMA: 1
  • Serma Safety & Security: 1
pdf_data/report_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.io: 1
  • javacard:
    • javacard.framework: 1
    • javacard.filesystem: 1
    • javacard.util: 1
    • javacard.open: 1
    • javacard.internal: 1
    • javacard.ism: 1
    • javacard.securemessaging: 1
    • javacard.securemessaging.builder: 1
    • javacard.securemessaging.internal: 1
    • javacard.security: 1
    • javacard.tlv: 1
    • javacard.iasclassic: 1
    • javacard.icao: 1
    • javacard.mspnp: 1
    • javacard.conformance: 1
    • javacard.gpimage: 1
  • javacardx:
    • javacardx.apdu: 1
    • javacardx.crypto: 2
    • javacardx.gap: 1
    • javacardx.gapplet: 1
    • javacardx.biometry: 2
    • javacardx.crypto.asymmetric.ecc: 1
    • javacardx.crypto.asymmetric.rsa: 1
    • javacardx.apdu.util: 1
    • javacardx.biometry.biocfg: 1
    • javacardx.gdp: 1
  • org:
    • org.globalplatform: 1
  • com:
    • com.gemalto.javacard.filesystem: 1
    • com.gemalto.javacard.util: 1
    • com.gemalto.javacardx.crypto: 1
    • com.gemalto.javacard.open: 1
    • com.gemalto.javacardx.gapplet: 1
    • com.gemalto.javacard.ism: 1
    • com.gemalto.javacard.securemessaging.builder: 1
    • com.gemalto.javacard.security: 1
    • com.gemalto.javacardx: 1
    • com.gemalto.javacardx.biometry: 1
    • com.gemalto.javacardx.crypto.asymmetric.rsa: 1
    • com.gemalto.javacard.iasclassic: 1
    • com.gemalto.moc.server: 1
    • com.gemalto.javacard.mspnp: 1
    • com.gemalto.javacardx.biometry.biocfg: 1
    • com.gemalto.emvapi: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RND: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS31: 1
    • AIS 31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 1
  • Gemalto:
    • Gemalto: 3
  • Infineon:
    • Infineon Technologies AG: 2
  • Gemalto:
    • Gemalto: 5
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/vendor/Gemalto/Gemalto 3 5
pdf_data/report_keywords/vendor/Infineon
  • Infineon: 2
  • Infineon Technologies: 1
  • Infineon Technologies AG: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 276790
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Producer: GPL Ghostscript 9.02
  • /CreationDate:
  • /ModDate:
  • /Title: ANSSI-CC-2016-24
  • /Creator: PDFCreator Version 1.2.1
  • /Author:
  • /Keywords:
  • /Subject:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 299041
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Author:
  • /CreationDate: D:20200707161142+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200707161142+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20200707161142+02'00'
pdf_data/report_metadata//Creator PDFCreator Version 1.2.1 PScript5.dll Version 5.2.2
pdf_data/report_metadata//ModDate D:20200707161142+02'00'
pdf_data/report_metadata//Producer GPL Ghostscript 9.02 Acrobat Distiller 11.0 (Windows)
pdf_data/report_metadata//Title ANSSI-CC-2016-24
pdf_data/report_metadata/pdf_file_size_bytes 276790 299041
pdf_data/report_metadata/pdf_number_of_pages 18 17
pdf_data/st_filename cible_2016-24.pdf anssi_cible_cc_2020-65en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 1
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 6
    • ECC:
      • ECC: 11
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 4
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 1 10
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 2 4
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0926-2014: 1
  • BSI-DSZ-CC-0917-2014: 1
  • BSI-DSZ-CC-1079-2018: 1
  • BSI-DSZ-CC-1079-2018-MA-01: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 4
    • A.SCA: 4
    • A.CSP: 5
  • OE:
    • OE.HI_VAD: 2
    • OE.HID_VAD: 2
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.PIN: 4
    • D.BIO: 1
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 12
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 8
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.NATIVE: 10
    • O.OPERATE: 15
    • O.REALLOCATION: 5
    • O.RESOURCES: 8
    • O.ALARM: 14
    • O.CIPHER: 10
    • O.RNG: 8
    • O.KEY-MNGT: 7
    • O.PIN-MNGT: 6
    • O.TRANSACTION: 7
    • O.BIO-MNGT: 6
    • O.OBJ-DELETION: 4
    • O.DELETION: 5
    • O.LOAD: 9
    • O.INSTALL: 8
    • O.SCP: 29
    • O.CARD-MANAGEMENT: 2
    • O.PIN_MNGT: 1
    • O.KEY_MNGT: 1
    • O.CARD_MANAGEMENT: 16
    • O.PIN-: 1
    • O.RND: 3
    • O.TDES: 1
    • O.AES: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 66
    • O.CODE_PCKG: 16
    • O.OBJ_DELETION: 2
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.SID: 8
    • T.EXE-CODE: 8
    • T.NATIVE: 4
    • T.RESOURCES: 3
    • T.DELETION: 3
    • T.INSTALL: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
  • A:
    • A.APPLET: 5
    • A.DELETION: 4
    • A.VERIFICATION: 4
  • R:
    • R.JAVA: 10
  • OT:
    • OT.X: 1
  • OP:
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_AASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
  • OE:
    • OE.APPLET: 4
    • OE.VERIFICATION: 25
    • OE.CODE-EVIDENCE: 10
    • OE.CODE_EVIDENCE: 1
    • OE.CARD-MANAGEMENT: 1
  • OSP:
    • OSP.VERIFICATION: 4
    • OSP.RNG: 1
    • OSP.RND: 3
pdf_data/st_keywords/cc_claims/A
  • A.CGA: 4
  • A.SCA: 4
  • A.CSP: 5
  • A.APPLET: 5
  • A.DELETION: 4
  • A.VERIFICATION: 4
pdf_data/st_keywords/cc_claims/OE
  • OE.HI_VAD: 2
  • OE.HID_VAD: 2
  • OE.APPLET: 4
  • OE.VERIFICATION: 25
  • OE.CODE-EVIDENCE: 10
  • OE.CODE_EVIDENCE: 1
  • OE.CARD-MANAGEMENT: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0076-2013: 1
  • other:
    • PP-SSCD-KG: 36
    • PP-SSCD-KI: 28
    • PP-SSCD: 4
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-2017: 1
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-PP- 0055-2009: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0071-2012: 1
  • BSI-CC-PP-0072-2012: 1
  • BSI-CC-PP-0076-2013: 1
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0099-2017: 1
  • BSI-CC-PP- 0068-V2-2011-MA-01: 1
  • BSI-PP- 0055-2009: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
  • ADV:
    • ADV_ARC.1: 7
    • ADV_TDS.1: 2
    • ADV_TDS.4: 7
    • ADV_IMP.1: 7
    • ADV_TDS.3: 4
    • ADV_INT.2: 1
    • ADV_FSP.5: 4
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_PRE: 2
    • AGD_OPE: 2
    • AGD_OPE.1: 7
    • AGD_PRE.1: 6
  • ALC:
    • ALC_DVS.2: 7
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_CMC.4: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 3
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_FUN.1: 6
    • ATE_COV.1: 2
    • ATE_IND.2: 1
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_DVS.2: 7
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 2 7
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 2 7
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 5+: 1
  • EAL5: 2
  • EAL5 augmented: 1
  • EAL 5+: 1
  • EAL6: 1
  • EAL6+: 1
  • EAL5+: 1
  • EAL5: 6
  • EAL 6+: 1
  • EAL6 augmented: 1
  • EAL5 augmented: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 2 6
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.4: 8
    • FCS_COP: 8
    • FCS_CKM.2: 2
    • FCS_COP.1: 2
    • FCS_CKM.1.1: 2
    • FCS_CKM.1: 5
    • FCS_CKM.4.1: 2
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_DAU: 4
    • FDP_UIT: 3
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_ACC: 4
    • FDP_ACF.1: 6
    • FDP_ACC.1.1: 4
    • FDP_ACF: 4
    • FDP_ACC.1: 14
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_ITC: 2
    • FDP_IFC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_SDI: 4
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_UCT: 2
    • FDP_RIP: 1
  • FIA:
    • FIA_API: 5
    • FIA_AFL: 6
    • FIA_API.1: 8
    • FIA_API.1.1: 2
    • FIA_UAU.1: 4
    • FIA_UID.1: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 5
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 4
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MSA.3: 5
    • FMT_MOF.1: 2
    • FMT_SMR.1: 11
    • FMT_SMF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 2
    • FMT_MSA.1: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4.1: 2
    • FMT_MTD: 4
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_TST.1: 3
    • FPT_FLS.1: 2
    • FPT_FLS.1.1: 1
    • FPT_TST: 2
    • FPT_PHP.1: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 13
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_ARP.1: 16
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RNG: 17
    • FCS_CKM: 46
    • FCS_COP: 35
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1: 27
    • FCS_CKM.1.1: 3
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 24
    • FCS_COP.1.1: 5
  • FDP:
    • FDP_ACF: 30
    • FDP_ACC: 35
    • FDP_ACC.2: 6
    • FDP_ACF.1: 16
    • FDP_IFC: 20
    • FDP_IFC.1: 12
    • FDP_IFF: 13
    • FDP_IFF.1: 17
    • FDP_RIP: 98
    • FDP_RIP.1: 11
    • FDP_ROL.1: 5
    • FDP_ROL: 14
    • FDP_SDI: 6
    • FDP_SDI.2: 3
    • FDP_ITC: 10
    • FDP_ITC.2: 15
    • FDP_IFC.2: 2
    • FDP_UIT: 5
    • FDP_UIT.1: 2
    • FDP_ACC.1: 14
    • FDP_ITC.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL: 21
    • FIA_ATD: 7
    • FIA_ATD.1: 2
    • FIA_UID: 33
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
    • FIA_UAU: 50
    • FIA_UAU.1: 6
    • FIA_UID.1: 18
    • FIA_UAU.4: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
  • FMT:
    • FMT_LIM: 18
    • FMT_LIM.1: 15
    • FMT_LIM.2: 14
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MSA: 73
    • FMT_MSA.1: 11
    • FMT_MSA.2: 2
    • FMT_MSA.3: 17
    • FMT_SMR: 62
    • FMT_SMR.1: 29
    • FMT_SMF: 50
    • FMT_SMF.1: 19
    • FMT_MTD: 31
    • FMT_MTD.1: 9
    • FMT_MTD.3: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
    • FPR_UNO: 5
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 7
    • FPT_EMS.1: 12
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 34
    • FPT_FLS.1: 14
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 7
    • FPT_FLS.1.1: 2
    • FPT_TST.1: 13
    • FPT_PHP: 5
    • FPT_PHP.3: 12
    • FPT_RCV.4: 2
    • FPT_ITT: 5
    • FPT_ITT.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM: 14
  • FCS_CKM.4: 8
  • FCS_COP: 8
  • FCS_CKM.2: 2
  • FCS_COP.1: 2
  • FCS_CKM.1.1: 2
  • FCS_CKM.1: 5
  • FCS_CKM.4.1: 2
  • FCS_COP.1.1: 2
  • FCS_RNG: 17
  • FCS_CKM: 46
  • FCS_COP: 35
  • FCS_RNG.1: 8
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1: 27
  • FCS_CKM.1.1: 3
  • FCS_CKM.4: 21
  • FCS_CKM.4.1: 2
  • FCS_COP.1: 24
  • FCS_COP.1.1: 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 14 46
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 5 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 8 21
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 8 35
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 2 24
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 2 5
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU: 4
  • FDP_UIT: 3
  • FDP_ITC.1: 4
  • FDP_ITC.2: 4
  • FDP_ACC: 4
  • FDP_ACF.1: 6
  • FDP_ACC.1.1: 4
  • FDP_ACF: 4
  • FDP_ACC.1: 14
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_DAU.1: 1
  • FDP_DAU.2.1: 1
  • FDP_DAU.2.2: 1
  • FDP_ITC: 2
  • FDP_IFC.1: 9
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_RIP.1: 1
  • FDP_RIP.1.1: 1
  • FDP_SDI: 4
  • FDP_SDI.1: 2
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_UCT.1: 1
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_UCT: 2
  • FDP_RIP: 1
  • FDP_ACF: 30
  • FDP_ACC: 35
  • FDP_ACC.2: 6
  • FDP_ACF.1: 16
  • FDP_IFC: 20
  • FDP_IFC.1: 12
  • FDP_IFF: 13
  • FDP_IFF.1: 17
  • FDP_RIP: 98
  • FDP_RIP.1: 11
  • FDP_ROL.1: 5
  • FDP_ROL: 14
  • FDP_SDI: 6
  • FDP_SDI.2: 3
  • FDP_ITC: 10
  • FDP_ITC.2: 15
  • FDP_IFC.2: 2
  • FDP_UIT: 5
  • FDP_UIT.1: 2
  • FDP_ACC.1: 14
  • FDP_ITC.1: 10
  • FDP_RIP.1.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 4 35
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 4 30
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 6 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 9 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 2 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 4 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 4 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 1 98
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 1 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI 4 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 3 5
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 5
  • FIA_AFL: 6
  • FIA_API.1: 8
  • FIA_API.1.1: 2
  • FIA_UAU.1: 4
  • FIA_UID.1: 6
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UAU: 5
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UID: 4
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_AFL: 21
  • FIA_ATD: 7
  • FIA_ATD.1: 2
  • FIA_UID: 33
  • FIA_UID.2: 1
  • FIA_USB: 6
  • FIA_USB.1: 3
  • FIA_UAU: 50
  • FIA_UAU.1: 6
  • FIA_UID.1: 18
  • FIA_UAU.4: 1
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 6 21
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 5 50
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 4 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 4 33
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 6 18
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.3: 5
  • FMT_MOF.1: 2
  • FMT_SMR.1: 11
  • FMT_SMF.1: 8
  • FMT_MOF.1.1: 1
  • FMT_MSA: 14
  • FMT_MSA.1.1: 3
  • FMT_MSA.2: 2
  • FMT_MSA.1: 3
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.4.1: 2
  • FMT_MTD: 4
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_LIM: 18
  • FMT_LIM.1: 15
  • FMT_LIM.2: 14
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MSA: 73
  • FMT_MSA.1: 11
  • FMT_MSA.2: 2
  • FMT_MSA.3: 17
  • FMT_SMR: 62
  • FMT_SMR.1: 29
  • FMT_SMF: 50
  • FMT_SMF.1: 19
  • FMT_MTD: 31
  • FMT_MTD.1: 9
  • FMT_MTD.3: 1
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 14 73
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 3 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 5 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 4 31
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 8 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 11 29
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 5
  • FPT_EMS.1: 7
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_TST.1: 3
  • FPT_FLS.1: 2
  • FPT_FLS.1.1: 1
  • FPT_TST: 2
  • FPT_PHP.1: 2
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 2
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_EMS: 4
  • FPT_TST: 7
  • FPT_EMS.1: 12
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS: 34
  • FPT_FLS.1: 14
  • FPT_TDC.1: 7
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 12
  • FPT_RCV.3: 7
  • FPT_FLS.1.1: 2
  • FPT_TST.1: 13
  • FPT_PHP: 5
  • FPT_PHP.3: 12
  • FPT_RCV.4: 2
  • FPT_ITT: 5
  • FPT_ITT.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS 5 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 7 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 2 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 1 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 2 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 2 7
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 3 13
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 13 14
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 2 5
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 4 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 4 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 4 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 162
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 16
  • KA:
    • Key Agreement: 3
    • Key agreement: 2
pdf_data/st_keywords/crypto_scheme/MAC/MAC 2 16
pdf_data/st_keywords/eval_facility/Serma
  • Serma Technologies: 1
  • Serma Safety & Security: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-224: 1
  • SHA1:
    • SHA1: 2
    • SHA-1: 4
  • SHA2:
    • SHA-224: 4
    • SHA224: 2
    • SHA256: 1
    • SHA384: 1
    • SHA512: 1
    • SHA-256: 4
    • SHA-512: 4
    • SHA-384: 2
    • SHA2: 1
  • SHA3:
    • SHA3: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 1
  • SHA-224: 4
  • SHA224: 2
  • SHA256: 1
  • SHA384: 1
  • SHA512: 1
  • SHA-256: 4
  • SHA-512: 4
  • SHA-384: 2
  • SHA2: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 1 4
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.security: 3
    • javacard.framework: 3
  • javacardx:
    • javacardx.biometry: 1
    • javacardx.crypto: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.5: 5
pdf_data/st_keywords/randomness/RNG/RND 1 6
pdf_data/st_keywords/randomness/RNG/RNG 2 31
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 4
  • Malfunction: 1
  • physical tampering: 1
  • Physical Tampering: 3
  • malfunction: 8
  • Malfunction: 9
  • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 1 9
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 4 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 1
  • SPA: 1
  • DPA: 1
  • timing attacks: 1
  • Leak-Inherent: 5
  • physical probing: 6
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 1 2
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 1 5
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#3: 2
    • PKCS#1: 2
  • SCP:
    • SCP03: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 5
    • FIPS 140-2: 3
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS#5: 5
  • BSI:
    • AIS31: 4
    • AIS 31: 1
  • ISO:
    • ISO/IEC 7816-2: 1
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP01: 6
    • SCP02: 6
    • SCP03: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2009-07-004: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS46-3: 1
  • FIPS PUB 46-3: 1
  • FIPS180-2: 1
  • FIPS197: 5
  • FIPS 140-2: 3
  • FIPS 46-3: 1
  • FIPS 197: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 2
  • PKCS#1: 2
  • PKCS#1: 8
  • PKCS#5: 5
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 2 8
pdf_data/st_keywords/standard_id/SCP
  • SCP03: 1
  • SCP01: 6
  • SCP02: 6
  • SCP03: 5
pdf_data/st_keywords/standard_id/SCP/SCP03 1 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • TDES: 4
  • AES_competition:
    • AES:
      • AES: 28
  • DES:
    • DES:
      • DES: 20
    • 3DES:
      • TDEA: 1
      • 3DES: 2
      • TDES: 15
      • Triple-DES: 3
  • constructions:
    • MAC:
      • HMAC: 2
      • KMAC: 2
      • CMAC: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 1 28
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDES: 4
  • TDEA: 1
  • 3DES: 2
  • TDES: 15
  • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 4 15
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 2 20
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 4
  • Gemalto:
    • Gemalto: 339
  • Infineon:
    • Infineon: 15
    • Infineon Technologies AG: 2
  • Gemalto:
    • Gemalto: 31
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/vendor/Gemalto/Gemalto 339 31
pdf_data/st_keywords/vendor/Infineon
  • Infineon: 4
  • Infineon: 15
  • Infineon Technologies AG: 2
pdf_data/st_keywords/vendor/Infineon/Infineon 4 15
pdf_data/st_metadata//Author Antoine de Lavernette D1487827
pdf_data/st_metadata//CreationDate D:20160504105208+02'00' D:20200219174719+01'00'
pdf_data/st_metadata//Keywords Security Target, CC, eTravel 19-02-2020
pdf_data/st_metadata//ModDate D:20160504105208+02'00' D:20200219174719+01'00'
pdf_data/st_metadata//Subject MRTD 1.11
pdf_data/st_metadata//Title eTravel v1.0 Security Target MAÏA3 MultiApp V4.2: JCS Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 1225698 2463243
pdf_data/st_metadata/pdf_number_of_pages 52 145
dgst 89df7836e74b174e 3bd742412c869eb9