name |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2016-05-23
|
2017-03-08
|
not_valid_after |
2021-05-23
|
2027-09-06
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_07en.pdf
|
status |
archived
|
active
|
manufacturer |
Gemalto
|
Gemalto
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.gemalto.com/
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_07.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017-07_s01.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': frozenset({'PDCP_V1.3'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 9, 6), 'maintenance_title': 'Reassessment report : ANSSI-CC-2017/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017-07_s01.pdf', 'maintenance_st_link': None}) |
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
d0d1f65fff8123089904e38f5c802b96b487794fb4d4e2ee61a21b38cef972dd
|
state/cert/txt_hash |
None
|
b6a2fc8686088f10baa69c336e8b98426cb19e1ddf303eb66f10d7e401f3bd17
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d
|
f58a58932e6add5b5793f5a1c63ad80d3fdec8ed23181195dfae0ae67bef69fb
|
state/report/txt_hash |
1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7
|
cbba95096e8927d92cbfe376e03853c4e27bf94435b7d3e98b19884890eaa44f
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d
|
e9b8ce4d3b8a8f30a7a28dd663bd183b4cdec5212721f223472b0e6e4f2092ed
|
state/st/txt_hash |
3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07
|
78bd6f838b207b90bc705403cae3ad4578c426042ea63c54c169467b5aeff062
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2017/07
|
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.0 |
4.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2017/19, ANSSI-CC-2017/22, ANSSI-CC-2017/20, ANSSI-CC-2017/21, ANSSI-CC-2017/54 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2018/58v2, BSI-DSZ-CC-1003-2018, ANSSI-CC-2018/57, ANSSI-CC-2020/42, ANSSI-CC-2018/32, ANSSI-CC-2017/76, ANSSI-CC-2020/43, ANSSI-CC-2018/58, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2017/21, ANSSI-CC-2020/44, ANSSI-CC-2020/33, ANSSI-CC-2018/21, ANSSI-CC-2017/82, ANSSI-CC-2018/56, ANSSI-CC-2017/19, ANSSI-CC-2017/20, ANSSI-CC-2018/56v2, ANSSI-CC-2017/83, ANSSI-CC-2018/57v2, ANSSI-CC-2020/45, ANSSI-CC-2019/07, ANSSI-CC-2017/81, ANSSI-CC-2017/22, ANSSI-CC-2020/49, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0814-2012, ANSSI-CC-2016/06, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-2015, BSI-DSZ-CC-0907-2013 |
BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
- product:
Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
- url:
https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0
- description:
Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON.
Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr
- sponsor:
Gemalto
- developer:
Gemalto / Infineon
- cert_id:
2016/24
- level:
EAL5+
- enhanced:
- cert_id:
2016/24
- certification_date:
23/05/2016
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Gemalto / Infineon
- sponsor:
Gemalto
- evaluation_facility:
Serma Safety & Security
- level:
EAL5+
- protection_profile:
PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
|
None
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
certificat-anssi-cc-2017-07_s01.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- cc_protection_profile_id:
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
1
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
147308
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
DUCLOS Charlene
- /Category:
-S01
- /Comments:
ANSSI-CC-CER-F-14_v14.7
- /Company:
SGDSN
- /CreationDate:
D:20220916174040+02'00'
- /Creator:
Acrobat PDFMaker 21 pour Word
- /Keywords:
version x.x, révision x
- /ModDate:
D:20220916174040+02'00'
- /Producer:
Adobe PDF Library 21.11.71
- /SourceModified:
D:20220916154029
- /Title:
ANSSI-CC-2017/07
- pdf_hyperlinks:
|
pdf_data/report_filename |
ANSSI-CC-2016-24.pdf
|
ANSSI-CC-2017_07.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1 révision 4
|
Critères Communs version 3.1 révision 4
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2017/07
|
pdf_data/report_frontpage/FR/cert_item |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12
|
pdf_data/report_frontpage/FR/cert_item_version |
Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0
|
JavaCard version 3.0.4, GP version 2.2.1
|
pdf_data/report_frontpage/FR/cert_lab |
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
pdf_data/report_frontpage/FR/developer |
Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
|
Gemalto 6 rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie CS20001, 92197 Meudon Cedex, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
pdf_data/report_frontpage/FR/ref_protection_profiles |
PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application
|
PP JCS-O] SUN Java Card System Protection Profile Open Configuration, version 3.0
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
|
- BSI-DSZ-CC-0891-V2-2016:
2
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2016/24:
19
- ANSSI-CC-2016/06:
1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0059-2009-MA-01:
2
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-PP-0035-2007:
1
- other:
- PP-SSCD part:
10
- PP-SSCD-:
5
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP- 0059-2009-MA-01:
2
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-PP-0035-2007:
1
|
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
1
|
3
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
1
|
3
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_DVS.2:
2
- ALC_FLR.1: 1
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL2:
2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
- EAL 5:
3
- EAL2:
2
- EAL6: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/Serma |
- Serma Safety & Security:
1
- SERMA: 1
|
- Serma Safety & Security:
1
|
pdf_data/report_keywords/eval_facility/Serma/Serma Safety & Security |
1
|
1
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- javacardx:
- com:
- com.gemalto.javacardx.pace:
1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon:
2
- Infineon Technologies:
1
- Gemalto:
|
- Infineon:
- Infineon Technologies AG:
2
- Infineon:
2
- Gemalto:
- Gemplus:
- Microsoft:
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
3
|
17
|
pdf_data/report_keywords/vendor/Infineon |
- Infineon:
2
- Infineon Technologies: 1
|
- Infineon Technologies AG: 2
- Infineon:
2
|
pdf_data/report_keywords/vendor/Infineon/Infineon |
2
|
2
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
|
|
pdf_data/report_metadata//CreationDate |
|
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
PDFCreator Version 1.2.1
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
|
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
GPL Ghostscript 9.02
|
pdf_data/report_metadata//Subject |
|
|
pdf_data/report_metadata//Title |
ANSSI-CC-2016-24
|
ANSSI-CC-2017_07fr
|
pdf_data/report_metadata/pdf_file_size_bytes |
276790
|
1690566
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
18
|
19
|
pdf_data/st_filename |
cible_2016-24.pdf
|
ANSSI_cible2017_07en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
1
|
10
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
2
|
4
|
pdf_data/st_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0926-2014:
1
- BSI-DSZ-CC-0917-2014:
1
|
- BSI-DSZ-CC-0891-V2-2016:
1
|
pdf_data/st_keywords/cc_cert_id/NL |
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
- OE:
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
- D:
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- O:
- O.SID:
1
- O.FIREWALL:
1
- O.GLOBAL_ARRAYS_CONFID:
1
- O.GLOBAL_ARRAYS_INTEG:
1
- O.NATIVE:
1
- O.OPERATE:
1
- O.REALLOCATION:
1
- O.RESOURCES:
1
- O.ALARM:
1
- O.CIPHER:
2
- O.KEY-MNGT:
2
- O.PIN-MNGT:
2
- O.TRANSACTION:
2
- O.OBJ-DELETION:
1
- O.DELETION:
1
- O.LOAD:
1
- O.INSTALL:
1
- O.SCP:
3
- O.CARD-MANAGEMENT:
1
- O.RND:
1
- O.APPLET:
28
- O.CODE_PKG:
7
- O.JAVAOBJECT:
56
- O.CODE_PCKG:
16
- T:
- T.CONFID-APPLI-DATA:
2
- T.CONFID-JCS-CODE:
2
- T.CONFID-JCS-DATA:
2
- T.INTEG-APPLI-CODE:
3
- T.INTEG-APPLI-DATA:
4
- T.INTEG-JCS-CODE:
1
- T.INTEG-JCS-DATA:
2
- T.SID:
4
- T.EXE-CODE:
4
- T.NATIVE:
2
- T.RESOURCES:
1
- T.DELETION:
1
- T.INSTALL:
2
- T.OBJ-DELETION:
2
- T.PHYSICAL:
2
- A:
- A.APPLET:
2
- A.DELETION:
2
- A.VERIFICATION:
2
- R:
- OP:
- OP.ARRAY_ACCESS:
6
- OP.CREATE:
10
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
7
- OE:
- OE.VERIFICATION:
4
- OE.APPLET:
1
- OE.CODE-EVIDENCE:
1
- OSP:
- OSP.VERIFICATION:
2
- OSP.RND:
2
|
pdf_data/st_keywords/cc_claims/A |
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
|
- A.APPLET:
2
- A.DELETION:
2
- A.VERIFICATION:
2
|
pdf_data/st_keywords/cc_claims/OE |
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
- OE.VERIFICATION:
4
- OE.APPLET:
1
- OE.CODE-EVIDENCE:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
- other:
- PP-SSCD-KG:
36
- PP-SSCD-KI:
28
- PP-SSCD:
4
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- ALC:
- AVA:
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 5+: 1
- EAL5:
2
- EAL5 augmented:
1
|
- EAL6: 1
- EAL6+: 1
- EAL5+: 1
- EAL5:
2
- EAL 6+: 1
- EAL6 augmented: 1
- EAL5 augmented:
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
2
|
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
1
|
2
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FDP:
- FDP_DAU:
4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1:
4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1:
1
- FDP_DAU.2.1:
1
- FDP_DAU.2.2:
1
- FDP_ITC:
2
- FDP_IFC.1:
9
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI:
4
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT:
2
- FDP_RIP:
1
- FIA:
- FIA_API:
5
- FIA_AFL:
6
- FIA_API.1:
8
- FIA_API.1.1:
2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.3:
5
- FMT_MOF.1:
2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1:
1
- FMT_MSA:
14
- FMT_MSA.1.1:
3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC:
13
- FTP_ITC.1:
2
- FTP_TRP.1:
2
- FTP_ITC.1.1:
4
- FTP_ITC.1.2:
4
- FTP_ITC.1.3:
4
|
- FAU:
- FAU_ARP.1:
5
- FAU_ARP.1.1:
1
- FCO:
- FCS:
- FCS_RND:
7
- FCS_RND.1:
7
- FCS_CKM.1:
9
- FCS_RND.1.1:
2
- FCS_CKM.1.1:
1
- FCS_CKM.2:
2
- FCS_CKM.2.1:
1
- FCS_CKM.3:
2
- FCS_CKM.3.1:
1
- FCS_CKM.4:
2
- FCS_CKM.4.1:
1
- FCS_COP.1:
14
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC:
14
- FDP_ACC.2:
6
- FDP_ACF:
16
- FDP_ACF.1:
13
- FDP_IFC:
4
- FDP_IFC.1:
1
- FDP_IFF:
4
- FDP_IFF.1:
10
- FDP_RIP:
17
- FDP_RIP.1:
8
- FDP_ROL:
6
- FDP_ROL.1:
2
- FDP_SDI.2:
2
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
4
- FDP_ITC.2:
5
- FDP_IFC.2:
2
- FDP_UIT:
2
- FDP_UIT.1:
2
- FDP_ACC.1:
1
- FIA:
- FIA_SOS.2:
1
- FIA_ATD:
3
- FIA_ATD.1:
1
- FIA_UID:
4
- FIA_UID.2:
1
- FIA_USB:
2
- FIA_USB.1:
3
- FIA_UAU:
2
- FIA_UAI.1:
1
- FIA_UAU.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA:
21
- FMT_MSA.1:
5
- FMT_MSA.2:
1
- FMT_MSA.3:
10
- FMT_SMR:
9
- FMT_SMR.1:
8
- FMT_SMF:
6
- FMT_SMF.1:
3
- FMT_MTD:
4
- FMT_MTD.1:
2
- FMT_MTD.3:
1
- FPR:
- FPR_UNO.1:
3
- FPR_UNO.1.1:
1
- FPR_UNO:
2
- FPT:
- FPT_FLS:
10
- FPT_FLS.1:
5
- FPT_TDC.1:
2
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
4
- FPT_RCV.3:
4
- FPT_TST:
2
- FPT_TST.1:
3
- FPT_PHP:
2
- FPT_PHP.3:
1
- FPT_RCV.4:
1
- FPT_ITT:
2
- FPT_ITT.1:
1
- FTP:
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM: 14
- FCS_CKM.4:
8
- FCS_COP: 8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
|
- FCS_RND: 7
- FCS_RND.1: 7
- FCS_CKM.1:
9
- FCS_RND.1.1: 2
- FCS_CKM.1.1:
1
- FCS_CKM.2:
2
- FCS_CKM.2.1: 1
- FCS_CKM.3: 2
- FCS_CKM.3.1: 1
- FCS_CKM.4:
2
- FCS_CKM.4.1:
1
- FCS_COP.1:
14
- FCS_COP.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
5
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
8
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
2
|
14
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_DAU: 4
- FDP_UIT:
3
- FDP_ITC.1: 4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1: 4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ITC:
2
- FDP_IFC.1:
9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP.1:
1
- FDP_RIP.1.1: 1
- FDP_SDI: 4
- FDP_SDI.1: 2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_UCT: 2
- FDP_RIP:
1
|
- FDP_ACC:
14
- FDP_ACC.2: 6
- FDP_ACF:
16
- FDP_ACF.1:
13
- FDP_IFC: 4
- FDP_IFC.1:
1
- FDP_IFF: 4
- FDP_IFF.1: 10
- FDP_RIP:
17
- FDP_RIP.1:
8
- FDP_ROL: 6
- FDP_ROL.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
4
- FDP_ITC.2:
5
- FDP_IFC.2: 2
- FDP_UIT:
2
- FDP_UIT.1: 2
- FDP_ACC.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
4
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
14
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
4
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
6
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
9
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
4
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
1
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
1
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API: 5
- FIA_AFL: 6
- FIA_API.1: 8
- FIA_API.1.1: 2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UAU:
5
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID:
4
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
|
- FIA_SOS.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 1
- FIA_UID:
4
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FIA_UAU:
2
- FIA_UAI.1: 1
- FIA_UAU.1:
1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
5
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
6
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.3:
5
- FMT_MOF.1: 2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1: 1
- FMT_MSA:
14
- FMT_MSA.1.1: 3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD:
4
- FMT_MTD.1.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FMT_MSA:
21
- FMT_MSA.1:
5
- FMT_MSA.2:
1
- FMT_MSA.3:
10
- FMT_SMR: 9
- FMT_SMR.1:
8
- FMT_SMF: 6
- FMT_SMF.1:
3
- FMT_MTD:
4
- FMT_MTD.1: 2
- FMT_MTD.3: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
14
|
21
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
3
|
5
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
5
|
10
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
8
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
11
|
8
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS: 5
- FPT_EMS.1: 7
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1: 1
- FPT_TST:
2
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3:
2
- FPT_PHP.3.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FPT_FLS: 10
- FPT_FLS.1:
5
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_RCV: 4
- FPT_RCV.3: 4
- FPT_TST:
2
- FPT_TST.1:
3
- FPT_PHP: 2
- FPT_PHP.3:
1
- FPT_RCV.4: 1
- FPT_ITT: 2
- FPT_ITT.1: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC:
13
- FTP_ITC.1:
2
- FTP_TRP.1: 2
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
13
|
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
2
|
3
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
2
|
10
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
- SHA1:
- SHA2:
- SHA-224:
3
- SHA-256:
3
- SHA-512:
3
- SHA224:
1
- SHA-384:
2
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
- SHA-224:
3
- SHA-256: 3
- SHA-512: 3
- SHA224: 1
- SHA-384: 2
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
1
|
3
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2:
3
- Java Card 3.0.4:
8
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
1
|
3
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
4
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
4
- Malfunction:
1
|
- physical tampering:
1
- malfunction: 2
- Malfunction:
2
- fault induction: 2
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
1
|
2
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
4
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent:
1
- SPA: 1
- DPA:
1
- timing attacks: 1
|
- Leak-Inherent:
2
- physical probing: 2
- DPA:
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
1
|
2
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- PKCS:
- SCP:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- PKCS:
- PKCS#3:
1
- PKCS#1:
7
- PKCS#5:
5
- BSI:
- SCP:
- SCP03:
3
- SCP01:
3
- SCP02:
3
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2009-07-004:
1
|
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-004 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS180-2:
1
- FIPS46-3: 1
- FIPS PUB 46-3: 1
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/PKCS |
|
- PKCS#3:
1
- PKCS#1:
7
- PKCS#5: 5
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 |
2
|
7
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 |
2
|
1
|
pdf_data/st_keywords/standard_id/SCP |
|
- SCP03:
3
- SCP01: 3
- SCP02: 3
|
pdf_data/st_keywords/standard_id/SCP/SCP03 |
1
|
3
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
1
|
19
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
4
|
9
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
2
|
20
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
339
|
489
|
pdf_data/st_keywords/vendor/Infineon/Infineon |
4
|
8
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Antoine de Lavernette
|
Antoine de Lavernette
|
pdf_data/st_metadata//CreationDate |
D:20160504105208+02'00'
|
D:20170224103913+01'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2013
|
Microsoft® Word 2013
|
pdf_data/st_metadata//Keywords |
Security Target, CC, eTravel
|
Security Target, CC
|
pdf_data/st_metadata//ModDate |
D:20160504105208+02'00'
|
D:20170224103935+01'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2013
|
Microsoft® Word 2013
|
pdf_data/st_metadata//Subject |
MRTD
|
Security Target
|
pdf_data/st_metadata//Title |
eTravel v1.0 Security Target MAÏA3
|
eTravel v1.0 Security Target MAÏA3
|
pdf_data/st_metadata/pdf_file_size_bytes |
1225698
|
1989234
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
52
|
79
|
dgst |
89df7836e74b174e
|
5b7b6a9b33f1dab4
|