Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
ANSSI-CC-2016/24
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
ANSSI-CC-2017/07
name Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
not_valid_before 2016-05-23 2017-03-08
not_valid_after 2021-05-23 2027-09-06
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_07en.pdf
status archived active
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_07.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017-07_s01.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': frozenset({'PDCP_V1.3'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 9, 6), 'maintenance_title': 'Reassessment report : ANSSI-CC-2017/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017-07_s01.pdf', 'maintenance_st_link': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None d0d1f65fff8123089904e38f5c802b96b487794fb4d4e2ee61a21b38cef972dd
state/cert/txt_hash None b6a2fc8686088f10baa69c336e8b98426cb19e1ddf303eb66f10d7e401f3bd17
state/report/pdf_hash 30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d f58a58932e6add5b5793f5a1c63ad80d3fdec8ed23181195dfae0ae67bef69fb
state/report/txt_hash 1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7 cbba95096e8927d92cbfe376e03853c4e27bf94435b7d3e98b19884890eaa44f
state/st/pdf_hash 7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d e9b8ce4d3b8a8f30a7a28dd663bd183b4cdec5212721f223472b0e6e4f2092ed
state/st/txt_hash 3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07 78bd6f838b207b90bc705403cae3ad4578c426042ea63c54c169467b5aeff062
heuristics/cert_id ANSSI-CC-2016/24 ANSSI-CC-2017/07
heuristics/extracted_versions 1.0 4.0
heuristics/report_references/directly_referenced_by None ANSSI-CC-2017/19, ANSSI-CC-2017/22, ANSSI-CC-2017/20, ANSSI-CC-2017/21, ANSSI-CC-2017/54
heuristics/report_references/directly_referencing ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 BSI-DSZ-CC-0891-V2-2016
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2018/58v2, BSI-DSZ-CC-1003-2018, ANSSI-CC-2018/57, ANSSI-CC-2020/42, ANSSI-CC-2018/32, ANSSI-CC-2017/76, ANSSI-CC-2020/43, ANSSI-CC-2018/58, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2017/21, ANSSI-CC-2020/44, ANSSI-CC-2020/33, ANSSI-CC-2018/21, ANSSI-CC-2017/82, ANSSI-CC-2018/56, ANSSI-CC-2017/19, ANSSI-CC-2017/20, ANSSI-CC-2018/56v2, ANSSI-CC-2017/83, ANSSI-CC-2018/57v2, ANSSI-CC-2020/45, ANSSI-CC-2019/07, ANSSI-CC-2017/81, ANSSI-CC-2017/22, ANSSI-CC-2020/49, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0814-2012, ANSSI-CC-2016/06, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-2015, BSI-DSZ-CC-0907-2013 BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V2-2016
heuristics/scheme_data
  • product: Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
  • url: https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0
  • description: Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr
  • sponsor: Gemalto
  • developer: Gemalto / Infineon
  • cert_id: 2016/24
  • level: EAL5+
  • enhanced:
    • cert_id: 2016/24
    • certification_date: 23/05/2016
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r4
    • developer: Gemalto / Infineon
    • sponsor: Gemalto
    • evaluation_facility: Serma Safety & Security
    • level: EAL5+
    • protection_profile: PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • report_link: https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
None
heuristics/st_references/directly_referencing BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 BSI-DSZ-CC-0891-V2-2016
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 BSI-DSZ-CC-0891-V2-2016
pdf_data/cert_filename None certificat-anssi-cc-2017-07_s01.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2017/07-S01: 2
  • cc_protection_profile_id:
    • ANSSI:
      • ANSSI-CC-PP-2010/03-M01: 1
  • cc_security_level:
    • EAL:
      • EAL5: 1
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • Serma:
      • SERMA: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 147308
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: DUCLOS Charlene
  • /Category: -S01
  • /Comments: ANSSI-CC-CER-F-14_v14.7
  • /Company: SGDSN
  • /CreationDate: D:20220916174040+02'00'
  • /Creator: Acrobat PDFMaker 21 pour Word
  • /Keywords: version x.x, révision x
  • /ModDate: D:20220916174040+02'00'
  • /Producer: Adobe PDF Library 21.11.71
  • /SourceModified: D:20220916154029
  • /Title: ANSSI-CC-2017/07
  • pdf_hyperlinks:
pdf_data/report_filename ANSSI-CC-2016-24.pdf ANSSI-CC-2017_07.pdf
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2016/24 ANSSI-CC-2017/07
pdf_data/report_frontpage/FR/cert_item Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12
pdf_data/report_frontpage/FR/cert_item_version Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0 JavaCard version 3.0.4, GP version 2.2.1
pdf_data/report_frontpage/FR/developer Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie CS20001, 92197 Meudon Cedex, France
pdf_data/report_frontpage/FR/match_rules Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
pdf_data/report_frontpage/FR/ref_protection_profiles PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application PP JCS-O] SUN Java Card System Protection Profile Open Configuration, version 3.0
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0964-2015: 1
  • BSI-DSZ-CC-0891-V2-2016: 2
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2016/24: 19
  • ANSSI-CC-2016/06: 1
  • ANSSI-CC-2017/07: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 2
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-PP-0035-2007: 1
  • other:
    • PP-SSCD part: 10
    • PP-SSCD-: 5
  • BSI:
    • BSI-PP-0084-: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP- 0059-2009-MA-01: 2
  • BSI-CC-PP- 0075-2012: 1
  • BSI-CC-PP- 0071-2012: 1
  • BSI-CC-PP- 0072-2012: 1
  • BSI-PP-0035-2007: 1
  • BSI-PP-0084-: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 1 3
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 1 3
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 2
  • ALC_FLR.1: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL2: 2
  • EAL6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/eval_facility/Serma
  • Serma Safety & Security: 1
  • SERMA: 1
  • Serma Safety & Security: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 2
pdf_data/report_keywords/javacard_packages
  • javacardx:
    • javacardx.pace: 1
  • com:
    • com.gemalto.javacardx.pace: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RND: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 1
  • Gemalto:
    • Gemalto: 3
  • Infineon:
    • Infineon Technologies AG: 2
    • Infineon: 2
  • Gemalto:
    • Gemalto: 17
  • Gemplus:
    • Gemplus: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/vendor/Gemalto/Gemalto 3 17
pdf_data/report_keywords/vendor/Infineon
  • Infineon: 2
  • Infineon Technologies: 1
  • Infineon Technologies AG: 2
  • Infineon: 2
pdf_data/report_metadata//Title ANSSI-CC-2016-24 ANSSI-CC-2017_07fr
pdf_data/report_metadata/pdf_file_size_bytes 276790 1690566
pdf_data/report_metadata/pdf_number_of_pages 18 19
pdf_data/st_filename cible_2016-24.pdf ANSSI_cible2017_07en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 1
  • ECC:
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 4
    • ECC:
      • ECC: 11
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 4
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 1 10
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 2 4
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0926-2014: 1
  • BSI-DSZ-CC-0917-2014: 1
  • BSI-DSZ-CC-0891-V2-2016: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 4
    • A.SCA: 4
    • A.CSP: 5
  • OE:
    • OE.HI_VAD: 2
    • OE.HID_VAD: 2
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 4
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.NATIVE: 1
    • O.OPERATE: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.ALARM: 1
    • O.CIPHER: 2
    • O.KEY-MNGT: 2
    • O.PIN-MNGT: 2
    • O.TRANSACTION: 2
    • O.OBJ-DELETION: 1
    • O.DELETION: 1
    • O.LOAD: 1
    • O.INSTALL: 1
    • O.SCP: 3
    • O.CARD-MANAGEMENT: 1
    • O.RND: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 56
    • O.CODE_PCKG: 16
  • T:
    • T.CONFID-APPLI-DATA: 2
    • T.CONFID-JCS-CODE: 2
    • T.CONFID-JCS-DATA: 2
    • T.INTEG-APPLI-CODE: 3
    • T.INTEG-APPLI-DATA: 4
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 2
    • T.SID: 4
    • T.EXE-CODE: 4
    • T.NATIVE: 2
    • T.RESOURCES: 1
    • T.DELETION: 1
    • T.INSTALL: 2
    • T.OBJ-DELETION: 2
    • T.PHYSICAL: 2
  • A:
    • A.APPLET: 2
    • A.DELETION: 2
    • A.VERIFICATION: 2
  • R:
    • R.JAVA: 9
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 7
  • OE:
    • OE.VERIFICATION: 4
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
  • OSP:
    • OSP.VERIFICATION: 2
    • OSP.RND: 2
pdf_data/st_keywords/cc_claims/A
  • A.CGA: 4
  • A.SCA: 4
  • A.CSP: 5
  • A.APPLET: 2
  • A.DELETION: 2
  • A.VERIFICATION: 2
pdf_data/st_keywords/cc_claims/OE
  • OE.HI_VAD: 2
  • OE.HID_VAD: 2
  • OE.VERIFICATION: 4
  • OE.APPLET: 1
  • OE.CODE-EVIDENCE: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0076-2013: 1
  • other:
    • PP-SSCD-KG: 36
    • PP-SSCD-KI: 28
    • PP-SSCD: 4
  • BSI:
    • BSI-CC-PP-0084-: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0071-2012: 1
  • BSI-CC-PP-0072-2012: 1
  • BSI-CC-PP-0076-2013: 1
  • BSI-CC-PP-0084-: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 5+: 1
  • EAL5: 2
  • EAL5 augmented: 1
  • EAL6: 1
  • EAL6+: 1
  • EAL5+: 1
  • EAL5: 2
  • EAL 6+: 1
  • EAL6 augmented: 1
  • EAL5 augmented: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.4: 8
    • FCS_COP: 8
    • FCS_CKM.2: 2
    • FCS_COP.1: 2
    • FCS_CKM.1.1: 2
    • FCS_CKM.1: 5
    • FCS_CKM.4.1: 2
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_DAU: 4
    • FDP_UIT: 3
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_ACC: 4
    • FDP_ACF.1: 6
    • FDP_ACC.1.1: 4
    • FDP_ACF: 4
    • FDP_ACC.1: 14
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_ITC: 2
    • FDP_IFC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_SDI: 4
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_UCT: 2
    • FDP_RIP: 1
  • FIA:
    • FIA_API: 5
    • FIA_AFL: 6
    • FIA_API.1: 8
    • FIA_API.1.1: 2
    • FIA_UAU.1: 4
    • FIA_UID.1: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 5
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 4
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MSA.3: 5
    • FMT_MOF.1: 2
    • FMT_SMR.1: 11
    • FMT_SMF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 2
    • FMT_MSA.1: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4.1: 2
    • FMT_MTD: 4
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_TST.1: 3
    • FPT_FLS.1: 2
    • FPT_FLS.1.1: 1
    • FPT_TST: 2
    • FPT_PHP.1: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 13
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
  • FCO:
    • FCO_NRO: 2
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RND: 7
    • FCS_RND.1: 7
    • FCS_CKM.1: 9
    • FCS_RND.1.1: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 2
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 14
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 14
    • FDP_ACC.2: 6
    • FDP_ACF: 16
    • FDP_ACF.1: 13
    • FDP_IFC: 4
    • FDP_IFC.1: 1
    • FDP_IFF: 4
    • FDP_IFF.1: 10
    • FDP_RIP: 17
    • FDP_RIP.1: 8
    • FDP_ROL: 6
    • FDP_ROL.1: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC: 4
    • FDP_ITC.2: 5
    • FDP_IFC.2: 2
    • FDP_UIT: 2
    • FDP_UIT.1: 2
    • FDP_ACC.1: 1
  • FIA:
    • FIA_SOS.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 1
    • FIA_UID: 4
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
    • FIA_UAU: 2
    • FIA_UAI.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 1
    • FMT_MSA.3: 10
    • FMT_SMR: 9
    • FMT_SMR.1: 8
    • FMT_SMF: 6
    • FMT_SMF.1: 3
    • FMT_MTD: 4
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
  • FPR:
    • FPR_UNO.1: 3
    • FPR_UNO.1.1: 1
    • FPR_UNO: 2
  • FPT:
    • FPT_FLS: 10
    • FPT_FLS.1: 5
    • FPT_TDC.1: 2
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 4
    • FPT_RCV.3: 4
    • FPT_TST: 2
    • FPT_TST.1: 3
    • FPT_PHP: 2
    • FPT_PHP.3: 1
    • FPT_RCV.4: 1
    • FPT_ITT: 2
    • FPT_ITT.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM: 14
  • FCS_CKM.4: 8
  • FCS_COP: 8
  • FCS_CKM.2: 2
  • FCS_COP.1: 2
  • FCS_CKM.1.1: 2
  • FCS_CKM.1: 5
  • FCS_CKM.4.1: 2
  • FCS_COP.1.1: 2
  • FCS_RND: 7
  • FCS_RND.1: 7
  • FCS_CKM.1: 9
  • FCS_RND.1.1: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 2
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 14
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 5 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 8 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 2 14
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU: 4
  • FDP_UIT: 3
  • FDP_ITC.1: 4
  • FDP_ITC.2: 4
  • FDP_ACC: 4
  • FDP_ACF.1: 6
  • FDP_ACC.1.1: 4
  • FDP_ACF: 4
  • FDP_ACC.1: 14
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_DAU.1: 1
  • FDP_DAU.2.1: 1
  • FDP_DAU.2.2: 1
  • FDP_ITC: 2
  • FDP_IFC.1: 9
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_RIP.1: 1
  • FDP_RIP.1.1: 1
  • FDP_SDI: 4
  • FDP_SDI.1: 2
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_UCT.1: 1
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_UCT: 2
  • FDP_RIP: 1
  • FDP_ACC: 14
  • FDP_ACC.2: 6
  • FDP_ACF: 16
  • FDP_ACF.1: 13
  • FDP_IFC: 4
  • FDP_IFC.1: 1
  • FDP_IFF: 4
  • FDP_IFF.1: 10
  • FDP_RIP: 17
  • FDP_RIP.1: 8
  • FDP_ROL: 6
  • FDP_ROL.1: 2
  • FDP_SDI.2: 2
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC: 4
  • FDP_ITC.2: 5
  • FDP_IFC.2: 2
  • FDP_UIT: 2
  • FDP_UIT.1: 2
  • FDP_ACC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 4 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 14 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 4 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 6 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 9 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 2 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 4 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 1 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 1 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 3 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 5
  • FIA_AFL: 6
  • FIA_API.1: 8
  • FIA_API.1.1: 2
  • FIA_UAU.1: 4
  • FIA_UID.1: 6
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UAU: 5
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UID: 4
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_SOS.2: 1
  • FIA_ATD: 3
  • FIA_ATD.1: 1
  • FIA_UID: 4
  • FIA_UID.2: 1
  • FIA_USB: 2
  • FIA_USB.1: 3
  • FIA_UAU: 2
  • FIA_UAI.1: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 5 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 4 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 6 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.3: 5
  • FMT_MOF.1: 2
  • FMT_SMR.1: 11
  • FMT_SMF.1: 8
  • FMT_MOF.1.1: 1
  • FMT_MSA: 14
  • FMT_MSA.1.1: 3
  • FMT_MSA.2: 2
  • FMT_MSA.1: 3
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.4.1: 2
  • FMT_MTD: 4
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 21
  • FMT_MSA.1: 5
  • FMT_MSA.2: 1
  • FMT_MSA.3: 10
  • FMT_SMR: 9
  • FMT_SMR.1: 8
  • FMT_SMF: 6
  • FMT_SMF.1: 3
  • FMT_MTD: 4
  • FMT_MTD.1: 2
  • FMT_MTD.3: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 14 21
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 3 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 5 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 8 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 11 8
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 5
  • FPT_EMS.1: 7
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_TST.1: 3
  • FPT_FLS.1: 2
  • FPT_FLS.1.1: 1
  • FPT_TST: 2
  • FPT_PHP.1: 2
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 2
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FLS: 10
  • FPT_FLS.1: 5
  • FPT_TDC.1: 2
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 4
  • FPT_RCV.3: 4
  • FPT_TST: 2
  • FPT_TST.1: 3
  • FPT_PHP: 2
  • FPT_PHP.3: 1
  • FPT_RCV.4: 1
  • FPT_ITT: 2
  • FPT_ITT.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 2 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 2 1
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 13
  • FTP_ITC.1: 2
  • FTP_TRP.1: 2
  • FTP_ITC.1.1: 4
  • FTP_ITC.1.2: 4
  • FTP_ITC.1.3: 4
  • FTP_ITC: 2
  • FTP_ITC.1: 3
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 13 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 2 3
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 10
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 10
  • KA:
    • Key agreement: 2
pdf_data/st_keywords/crypto_scheme/MAC/MAC 2 10
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-224: 1
  • SHA1:
    • SHA1: 1
    • SHA-1: 3
  • SHA2:
    • SHA-224: 3
    • SHA-256: 3
    • SHA-512: 3
    • SHA224: 1
    • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 1
  • SHA-224: 3
  • SHA-256: 3
  • SHA-512: 3
  • SHA224: 1
  • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 1 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
    • RND: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 4
    • RND: 3
pdf_data/st_keywords/randomness/RNG/RND 1 3
pdf_data/st_keywords/randomness/RNG/RNG 2 4
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 4
  • Malfunction: 1
  • physical tampering: 1
  • malfunction: 2
  • Malfunction: 2
  • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 1 2
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 4 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 1
  • SPA: 1
  • DPA: 1
  • timing attacks: 1
  • Leak-Inherent: 2
  • physical probing: 2
  • DPA: 1
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 1 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#3: 2
    • PKCS#1: 2
  • SCP:
    • SCP03: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 5
  • PKCS:
    • PKCS#3: 1
    • PKCS#1: 7
    • PKCS#5: 5
  • BSI:
    • AIS31: 2
  • SCP:
    • SCP03: 3
    • SCP01: 3
    • SCP02: 3
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2009-07-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS46-3: 1
  • FIPS PUB 46-3: 1
  • FIPS180-2: 1
  • FIPS197: 5
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 2
  • PKCS#1: 2
  • PKCS#3: 1
  • PKCS#1: 7
  • PKCS#5: 5
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 2 7
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 2 1
pdf_data/st_keywords/standard_id/SCP
  • SCP03: 1
  • SCP03: 3
  • SCP01: 3
  • SCP02: 3
pdf_data/st_keywords/standard_id/SCP/SCP03 1 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 1 19
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDES: 4
  • TDEA: 1
  • 3DES: 1
  • TDES: 9
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 4 9
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 2 20
pdf_data/st_keywords/vendor/Gemalto/Gemalto 339 489
pdf_data/st_keywords/vendor/Infineon/Infineon 4 8
pdf_data/st_metadata//CreationDate D:20160504105208+02'00' D:20170224103913+01'00'
pdf_data/st_metadata//Keywords Security Target, CC, eTravel Security Target, CC
pdf_data/st_metadata//ModDate D:20160504105208+02'00' D:20170224103935+01'00'
pdf_data/st_metadata//Subject MRTD Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1225698 1989234
pdf_data/st_metadata/pdf_number_of_pages 52 79
dgst 89df7836e74b174e 5b7b6a9b33f1dab4