name |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2016-05-23
|
2020-06-26
|
not_valid_after |
2021-05-23
|
2021-09-28
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_cc_2020-65en.pdf
|
status |
archived
|
archived
|
manufacturer |
Gemalto
|
Thales
|
manufacturer_web |
https://www.gemalto.com/
|
None
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_65.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d
|
1851f32764fbc7ae6fcc0a8a1371100314db571756c0ac1410ad36c56ee80e03
|
state/report/txt_hash |
1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7
|
be2d099bd50586eddcae54e317df4f95e7cee55e8a65d848e17ec0104297ca17
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d
|
345b033e4ecef010912441340c7faf726817c4f9752819acc64b866caec57235
|
state/st/txt_hash |
3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07
|
b950b4810f9ff5e378e2adc642cf8bdfa879371a5345bba0b0691c29a861681e
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2020/65
|
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.0 |
4.2 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2021/39, ANSSI-CC-2020/65v2, ANSSI-CC-2020/70, ANSSI-CC-2021/38, ANSSI-CC-2021/41 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 |
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2021/39, ANSSI-CC-2020/65v2, ANSSI-CC-2020/70, ANSSI-CC-2021/38, ANSSI-CC-2021/41 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0814-2012, ANSSI-CC-2016/06, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-2015, BSI-DSZ-CC-0907-2013 |
None
|
heuristics/scheme_data/cert_id |
2016/24
|
2020/65
|
heuristics/scheme_data/description |
Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON.
Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr
|
Le produit évalué est la « Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h, version 4.2.0 », développé par THALES et INFINEON TECHNOLOGIES AG.
Ce produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie Java Card. Ces applications peuvent revêtir un caractère sécuritaire différent (selon qu’elles soie
|
heuristics/scheme_data/developer |
Gemalto / Infineon
|
THALES et INFINEON TECHNOOGIES AG
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2 et AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r4
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
2016/24
|
2020/65
|
heuristics/scheme_data/enhanced/certification_date |
23/05/2016
|
26/06/2020
|
heuristics/scheme_data/enhanced/developer |
Gemalto / Infineon
|
THALES et INFINEON TECHNOOGIES AG
|
heuristics/scheme_data/enhanced/evaluation_facility |
Serma Safety & Security
|
Serma Safety & Security
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
|
Java Card System Protection Profile Open Configuration, version 3.0.5, certifié BSI-CC-PP-0099-2017 décembre 2017
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
|
https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cc-2020_65.pdf
|
heuristics/scheme_data/enhanced/sponsor |
Gemalto
|
THALES
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
|
https://cyber.gouv.fr/sites/default/files/2020/07/anssi_cible_cc_2020-65en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
|
heuristics/scheme_data/sponsor |
Gemalto
|
THALES
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0
|
https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-v42-en-configuration-ouverte-sur-le-composant
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 |
BSI-DSZ-CC-1079-2018 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 |
BSI-DSZ-CC-1079-2018 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
ANSSI-CC-2016-24.pdf
|
anssi-cc-2020_65.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1 révision 4
|
Critères Communs version 3.1 révision 5
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2020/65
|
pdf_data/report_frontpage/FR/cert_item |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Plateforme Java Card MultiApp V4.2 en configuration ouverte sur le composant IFX_CCI_000010h
|
pdf_data/report_frontpage/FR/cert_item_version |
Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0
|
Version 4.2.0 Java Card version 3.0.5 GP version 2.3
|
pdf_data/report_frontpage/FR/cert_lab |
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
|
pdf_data/report_frontpage/FR/developer |
Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
|
THALES 6 rue de la Verrerie, 92190 Meudon, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire THALES 6 rue de la Verrerie, 92190 Meudon, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
pdf_data/report_frontpage/FR/ref_protection_profiles |
PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application
|
Java Card System Protection Profile Open Configuration, version 3.0.5 certifié BSI-CC-PP-0099-2017 décembre 2017
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
|
- BSI-DSZ-CC-1079-2018-MA-01:
1
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2016/24:
19
- ANSSI-CC-2016/06:
1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0059-2009-MA-01:
2
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-PP-0035-2007:
1
- other:
- PP-SSCD part:
10
- PP-SSCD-:
5
|
- BSI:
- BSI-CC-PP-0099-2017:
1
- BSI-PP-0099-2017:
1
- BSI-PP-0084-2014:
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP- 0059-2009-MA-01:
2
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-PP-0035-2007:
1
|
- BSI-CC-PP-0099-2017:
1
- BSI-PP-0099-2017:
1
- BSI-PP-0084-2014:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
1
|
3
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
1
|
3
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_DVS.2:
2
- ALC_FLR.1: 1
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL2:
2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
- EAL 5:
3
- EAL2:
2
- EAL 6: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/Serma |
- Serma Safety & Security:
1
- SERMA: 1
|
- Serma Safety & Security:
1
|
pdf_data/report_keywords/eval_facility/Serma/Serma Safety & Security |
1
|
1
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework:
1
- javacard.filesystem:
1
- javacard.util:
1
- javacard.open:
1
- javacard.internal:
1
- javacard.ism:
1
- javacard.securemessaging:
1
- javacard.securemessaging.builder:
1
- javacard.securemessaging.internal:
1
- javacard.security:
1
- javacard.tlv:
1
- javacard.iasclassic:
1
- javacard.icao:
1
- javacard.mspnp:
1
- javacard.conformance:
1
- javacard.gpimage:
1
- javacardx:
- javacardx.apdu:
1
- javacardx.crypto:
2
- javacardx.gap:
1
- javacardx.gapplet:
1
- javacardx.biometry:
2
- javacardx.crypto.asymmetric.ecc:
1
- javacardx.crypto.asymmetric.rsa:
1
- javacardx.apdu.util:
1
- javacardx.biometry.biocfg:
1
- javacardx.gdp:
1
- org:
- com:
- com.gemalto.javacard.filesystem:
1
- com.gemalto.javacard.util:
1
- com.gemalto.javacardx.crypto:
1
- com.gemalto.javacard.open:
1
- com.gemalto.javacardx.gapplet:
1
- com.gemalto.javacard.ism:
1
- com.gemalto.javacard.securemessaging.builder:
1
- com.gemalto.javacard.security:
1
- com.gemalto.javacardx:
1
- com.gemalto.javacardx.biometry:
1
- com.gemalto.javacardx.crypto.asymmetric.rsa:
1
- com.gemalto.javacard.iasclassic:
1
- com.gemalto.moc.server:
1
- com.gemalto.javacard.mspnp:
1
- com.gemalto.javacardx.biometry.biocfg:
1
- com.gemalto.emvapi:
1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon:
2
- Infineon Technologies:
1
- Gemalto:
|
- Infineon:
- Infineon Technologies AG:
2
- Gemalto:
- Microsoft:
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
3
|
5
|
pdf_data/report_keywords/vendor/Infineon |
- Infineon:
2
- Infineon Technologies:
1
|
- Infineon Technologies AG:
2
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
276790
- pdf_is_encrypted:
False
- pdf_number_of_pages:
18
- /Producer:
GPL Ghostscript 9.02
- /CreationDate:
- /ModDate:
- /Title:
ANSSI-CC-2016-24
- /Creator:
PDFCreator Version 1.2.1
- /Author:
- /Keywords:
- /Subject:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
299041
- pdf_is_encrypted:
False
- pdf_number_of_pages:
17
- /Author:
- /CreationDate:
D:20200707161142+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20200707161142+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
|
|
pdf_data/report_metadata//CreationDate |
|
D:20200707161142+02'00'
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
|
D:20200707161142+02'00'
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/report_metadata//Title |
ANSSI-CC-2016-24
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
276790
|
299041
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
18
|
17
|
pdf_data/st_filename |
cible_2016-24.pdf
|
anssi_cible_cc_2020-65en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
1
|
10
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
2
|
4
|
pdf_data/st_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0926-2014:
1
- BSI-DSZ-CC-0917-2014:
1
|
- BSI-DSZ-CC-1079-2018:
1
- BSI-DSZ-CC-1079-2018-MA-01:
1
|
pdf_data/st_keywords/cc_cert_id/NL |
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
- OE:
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
- D:
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
5
- D.PIN:
4
- D.BIO:
1
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- O:
- O.SID:
12
- O.FIREWALL:
12
- O.GLOBAL_ARRAYS_CONFID:
8
- O.GLOBAL_ARRAYS_INTEG:
5
- O.NATIVE:
10
- O.OPERATE:
15
- O.REALLOCATION:
5
- O.RESOURCES:
8
- O.ALARM:
14
- O.CIPHER:
10
- O.RNG:
8
- O.KEY-MNGT:
7
- O.PIN-MNGT:
6
- O.TRANSACTION:
7
- O.BIO-MNGT:
6
- O.OBJ-DELETION:
4
- O.DELETION:
5
- O.LOAD:
9
- O.INSTALL:
8
- O.SCP:
29
- O.CARD-MANAGEMENT:
2
- O.PIN_MNGT:
1
- O.KEY_MNGT:
1
- O.CARD_MANAGEMENT:
16
- O.PIN-:
1
- O.RND:
3
- O.TDES:
1
- O.AES:
1
- O.APPLET:
28
- O.CODE_PKG:
7
- O.JAVAOBJECT:
66
- O.CODE_PCKG:
16
- O.OBJ_DELETION:
2
- T:
- T.CONFID-APPLI-DATA:
4
- T.CONFID-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
7
- T.INTEG-APPLI-DATA:
8
- T.INTEG-JCS-CODE:
3
- T.INTEG-JCS-DATA:
4
- T.SID:
8
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.RESOURCES:
3
- T.DELETION:
3
- T.INSTALL:
4
- T.OBJ-DELETION:
4
- T.PHYSICAL:
4
- A:
- A.APPLET:
5
- A.DELETION:
4
- A.VERIFICATION:
4
- R:
- OT:
- OP:
- OP.ARRAY_ACCESS:
7
- OP.ARRAY_LENGTH:
3
- OP.ARRAY_AASTORE:
3
- OP.CREATE:
11
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
8
- OP.PUTFIELD:
1
- OP.PUTSTATIC:
1
- OE:
- OE.APPLET:
4
- OE.VERIFICATION:
25
- OE.CODE-EVIDENCE:
10
- OE.CODE_EVIDENCE:
1
- OE.CARD-MANAGEMENT:
1
- OSP:
- OSP.VERIFICATION:
4
- OSP.RNG:
1
- OSP.RND:
3
|
pdf_data/st_keywords/cc_claims/A |
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
|
- A.APPLET:
5
- A.DELETION:
4
- A.VERIFICATION:
4
|
pdf_data/st_keywords/cc_claims/OE |
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
- OE.APPLET:
4
- OE.VERIFICATION:
25
- OE.CODE-EVIDENCE:
10
- OE.CODE_EVIDENCE:
1
- OE.CARD-MANAGEMENT:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
- other:
- PP-SSCD-KG:
36
- PP-SSCD-KI:
28
- PP-SSCD:
4
|
- BSI:
- BSI-CC-PP-0084-2014:
1
- BSI-CC-PP-0099-2017:
1
- BSI-CC-PP- 0068-V2-2011-MA-01:
1
- BSI-PP- 0055-2009:
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
|
- BSI-CC-PP-0084-2014:
1
- BSI-CC-PP-0099-2017:
1
- BSI-CC-PP- 0068-V2-2011-MA-01:
1
- BSI-PP- 0055-2009:
1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1:
7
- ADV_TDS.1:
2
- ADV_TDS.4:
7
- ADV_IMP.1:
7
- ADV_TDS.3:
4
- ADV_INT.2:
1
- ADV_FSP.5:
4
- ADV_FSP.1:
1
- ADV_FSP.2:
2
- ADV_FSP.4:
2
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- AGD_PRE:
2
- AGD_OPE:
2
- AGD_OPE.1:
7
- AGD_PRE.1:
6
- ALC:
- ALC_DVS.2:
7
- ALC_TAT.1:
2
- ALC_TAT.2:
3
- ALC_CMC.4:
1
- ALC_DVS.1:
2
- ALC_LCD.1:
3
- ALC_DEL.1:
1
- ATE:
- ATE_COV.2:
2
- ATE_FUN.1:
6
- ATE_COV.1:
2
- ATE_IND.2:
1
- ATE_DPT.1:
2
- ATE_DPT.3:
1
- AVA:
|
pdf_data/st_keywords/cc_sar/ALC |
|
- ALC_DVS.2:
7
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ALC_CMC.4: 1
- ALC_DVS.1: 2
- ALC_LCD.1: 3
- ALC_DEL.1: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
7
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
2
|
7
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 5+:
1
- EAL5:
2
- EAL5 augmented:
1
|
- EAL 5+:
1
- EAL6: 1
- EAL6+: 1
- EAL5+: 1
- EAL5:
6
- EAL 6+: 1
- EAL6 augmented: 1
- EAL5 augmented:
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5+ |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
2
|
6
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
1
|
2
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FDP:
- FDP_DAU:
4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1:
4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1:
1
- FDP_DAU.2.1:
1
- FDP_DAU.2.2:
1
- FDP_ITC:
2
- FDP_IFC.1:
9
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI:
4
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT:
2
- FDP_RIP:
1
- FIA:
- FIA_API:
5
- FIA_AFL:
6
- FIA_API.1:
8
- FIA_API.1.1:
2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.3:
5
- FMT_MOF.1:
2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1:
1
- FMT_MSA:
14
- FMT_MSA.1.1:
3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC:
13
- FTP_ITC.1:
2
- FTP_TRP.1:
2
- FTP_ITC.1.1:
4
- FTP_ITC.1.2:
4
- FTP_ITC.1.3:
4
|
- FAU:
- FAU_ARP.1:
16
- FAU_ARP.1.1:
1
- FAU_SAA.1:
2
- FCO:
- FCS:
- FCS_RNG:
17
- FCS_CKM:
46
- FCS_COP:
35
- FCS_RNG.1:
8
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1:
27
- FCS_CKM.1.1:
3
- FCS_CKM.4:
21
- FCS_CKM.4.1:
2
- FCS_COP.1:
24
- FCS_COP.1.1:
5
- FDP:
- FDP_ACF:
30
- FDP_ACC:
35
- FDP_ACC.2:
6
- FDP_ACF.1:
16
- FDP_IFC:
20
- FDP_IFC.1:
12
- FDP_IFF:
13
- FDP_IFF.1:
17
- FDP_RIP:
98
- FDP_RIP.1:
11
- FDP_ROL.1:
5
- FDP_ROL:
14
- FDP_SDI:
6
- FDP_SDI.2:
3
- FDP_ITC:
10
- FDP_ITC.2:
15
- FDP_IFC.2:
2
- FDP_UIT:
5
- FDP_UIT.1:
2
- FDP_ACC.1:
14
- FDP_ITC.1:
10
- FDP_RIP.1.1:
1
- FIA:
- FIA_AFL:
21
- FIA_ATD:
7
- FIA_ATD.1:
2
- FIA_UID:
33
- FIA_UID.2:
1
- FIA_USB:
6
- FIA_USB.1:
3
- FIA_UAU:
50
- FIA_UAU.1:
6
- FIA_UID.1:
18
- FIA_UAU.4:
1
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6.1:
1
- FMT:
- FMT_LIM:
18
- FMT_LIM.1:
15
- FMT_LIM.2:
14
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MSA:
73
- FMT_MSA.1:
11
- FMT_MSA.2:
2
- FMT_MSA.3:
17
- FMT_SMR:
62
- FMT_SMR.1:
29
- FMT_SMF:
50
- FMT_SMF.1:
19
- FMT_MTD:
31
- FMT_MTD.1:
9
- FMT_MTD.3:
1
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
- FPR:
- FPR_UNO.1:
10
- FPR_UNO.1.1:
1
- FPR_UNO:
5
- FPT:
- FPT_EMS:
4
- FPT_TST:
7
- FPT_EMS.1:
12
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS:
34
- FPT_FLS.1:
14
- FPT_TDC.1:
7
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
12
- FPT_RCV.3:
7
- FPT_FLS.1.1:
2
- FPT_TST.1:
13
- FPT_PHP:
5
- FPT_PHP.3:
12
- FPT_RCV.4:
2
- FPT_ITT:
5
- FPT_ITT.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FTP:
- FTP_ITC:
14
- FTP_ITC.1:
5
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
2
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2: 2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
|
- FCS_RNG: 17
- FCS_CKM:
46
- FCS_COP:
35
- FCS_RNG.1: 8
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FCS_CKM.1:
27
- FCS_CKM.1.1:
3
- FCS_CKM.4:
21
- FCS_CKM.4.1:
2
- FCS_COP.1:
24
- FCS_COP.1.1:
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
14
|
46
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
5
|
27
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
8
|
21
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
8
|
35
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
2
|
24
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_DAU: 4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1: 4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ITC:
2
- FDP_IFC.1:
9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI:
4
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_UCT: 2
- FDP_RIP:
1
|
- FDP_ACF:
30
- FDP_ACC:
35
- FDP_ACC.2: 6
- FDP_ACF.1:
16
- FDP_IFC: 20
- FDP_IFC.1:
12
- FDP_IFF: 13
- FDP_IFF.1: 17
- FDP_RIP:
98
- FDP_RIP.1:
11
- FDP_ROL.1: 5
- FDP_ROL: 14
- FDP_SDI:
6
- FDP_SDI.2: 3
- FDP_ITC:
10
- FDP_ITC.2:
15
- FDP_IFC.2: 2
- FDP_UIT:
5
- FDP_UIT.1: 2
- FDP_ACC.1:
14
- FDP_ITC.1:
10
- FDP_RIP.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
4
|
35
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
4
|
30
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
6
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
9
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
2
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
4
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
4
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
1
|
98
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
1
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI |
4
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
3
|
5
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API: 5
- FIA_AFL:
6
- FIA_API.1: 8
- FIA_API.1.1: 2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
|
- FIA_AFL:
21
- FIA_ATD: 7
- FIA_ATD.1: 2
- FIA_UID:
33
- FIA_UID.2: 1
- FIA_USB: 6
- FIA_USB.1: 3
- FIA_UAU:
50
- FIA_UAU.1:
6
- FIA_UID.1:
18
- FIA_UAU.4: 1
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL |
6
|
21
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
5
|
50
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
4
|
33
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
6
|
18
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.3:
5
- FMT_MOF.1: 2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1: 1
- FMT_MSA:
14
- FMT_MSA.1.1: 3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD:
4
- FMT_MTD.1.1: 2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_LIM: 18
- FMT_LIM.1: 15
- FMT_LIM.2: 14
- FMT_LIM.1.1: 3
- FMT_LIM.2.1: 3
- FMT_MSA:
73
- FMT_MSA.1:
11
- FMT_MSA.2:
2
- FMT_MSA.3:
17
- FMT_SMR: 62
- FMT_SMR.1:
29
- FMT_SMF: 50
- FMT_SMF.1:
19
- FMT_MTD:
31
- FMT_MTD.1: 9
- FMT_MTD.3: 1
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
14
|
73
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
3
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
5
|
17
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
4
|
31
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
8
|
19
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
11
|
29
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
- FPT_EMS:
4
- FPT_TST:
7
- FPT_EMS.1:
12
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS: 34
- FPT_FLS.1:
14
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_RCV: 12
- FPT_RCV.3: 7
- FPT_FLS.1.1:
2
- FPT_TST.1:
13
- FPT_PHP: 5
- FPT_PHP.3:
12
- FPT_RCV.4: 2
- FPT_ITT: 5
- FPT_ITT.1: 1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
5
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
7
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
2
|
14
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
2
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
2
|
7
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
3
|
13
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
13
|
14
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
2
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- MAC:
- KA:
- Key Agreement:
3
- Key agreement:
2
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
2
|
16
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility/Serma |
|
- Serma Safety & Security:
1
|
pdf_data/st_keywords/hash_function/SHA |
|
- SHA1:
- SHA2:
- SHA-224:
4
- SHA224:
2
- SHA256:
1
- SHA384:
1
- SHA512:
1
- SHA-256:
4
- SHA-512:
4
- SHA-384:
2
- SHA2:
1
- SHA3:
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
- SHA-224:
4
- SHA224: 2
- SHA256: 1
- SHA384: 1
- SHA512: 1
- SHA-256: 4
- SHA-512: 4
- SHA-384: 2
- SHA2: 1
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
1
|
4
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.security:
3
- javacard.framework:
3
- javacardx:
- javacardx.biometry:
1
- javacardx.crypto:
2
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2:
3
- Java Card 3.0.5:
5
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
1
|
6
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
31
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
4
- Malfunction:
1
|
- physical tampering:
1
- Physical Tampering: 3
- malfunction: 8
- Malfunction:
9
- fault induction: 2
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
1
|
9
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
4
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
|
- Leak-Inherent:
5
- physical probing: 6
- DPA:
2
- SPA:
1
- timing attacks:
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
1
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
1
|
5
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks |
1
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- PKCS:
- SCP:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS197:
5
- FIPS 140-2:
3
- FIPS 46-3:
1
- FIPS 197:
1
- NIST:
- PKCS:
- BSI:
- ISO:
- ICAO:
- SCP:
- SCP01:
6
- SCP02:
6
- SCP03:
5
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS180-2:
1
- FIPS46-3: 1
- FIPS PUB 46-3: 1
|
- FIPS180-2:
1
- FIPS197: 5
- FIPS 140-2: 3
- FIPS 46-3: 1
- FIPS 197: 1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 |
2
|
8
|
pdf_data/st_keywords/standard_id/SCP |
|
- SCP01: 6
- SCP02: 6
- SCP03:
5
|
pdf_data/st_keywords/standard_id/SCP/SCP03 |
1
|
5
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- TDEA:
1
- 3DES:
2
- TDES:
15
- Triple-DES:
3
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
1
|
28
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
- TDEA: 1
- 3DES: 2
- TDES:
15
- Triple-DES: 3
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
4
|
15
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
2
|
20
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon:
15
- Infineon Technologies AG:
2
- Gemalto:
- Microsoft:
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
339
|
31
|
pdf_data/st_keywords/vendor/Infineon |
|
- Infineon:
15
- Infineon Technologies AG: 2
|
pdf_data/st_keywords/vendor/Infineon/Infineon |
4
|
15
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Antoine de Lavernette
|
D1487827
|
pdf_data/st_metadata//CreationDate |
D:20160504105208+02'00'
|
D:20200219174719+01'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2013
|
Microsoft® Word 2013
|
pdf_data/st_metadata//Keywords |
Security Target, CC, eTravel
|
19-02-2020
|
pdf_data/st_metadata//ModDate |
D:20160504105208+02'00'
|
D:20200219174719+01'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2013
|
Microsoft® Word 2013
|
pdf_data/st_metadata//Subject |
MRTD
|
1.11
|
pdf_data/st_metadata//Title |
eTravel v1.0 Security Target MAÏA3
|
MultiApp V4.2: JCS Security Target Lite
|
pdf_data/st_metadata/pdf_file_size_bytes |
1225698
|
2463243
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
52
|
145
|
dgst |
89df7836e74b174e
|
3bd742412c869eb9
|