name |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Release Date 28/09/2018)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2016-05-23
|
2021-10-08
|
not_valid_after |
2021-05-23
|
2023-08-03
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_32v2.pdf
|
status |
archived
|
archived
|
manufacturer |
Gemalto
|
THALES DIS FRANCE SA
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.thalesgroup.com/en/europe/france
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32v2.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_32v2.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
605eb7113ff6196513efd65f2bbf1f8c43192f09a8f553ae7adc4c65c42fbe45
|
state/cert/txt_hash |
None
|
d25bf16cadaad78be4067fec750f06ce8f4a0202354bfefbd4c611d9e38890aa
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d
|
a8fcfd189038376f97211edeeb51e06d6a31e244debf57e497f6276106ac329c
|
state/report/txt_hash |
1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7
|
1764d99186c570fcee57ceb38195dfb16d321f0fbbfe0dad2a798de9b0b31987
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d
|
be5cf61a98059d8f60ef5de14e4d4d7b5597f3f2bd5f72793b4bd8dd75d9a520
|
state/st/txt_hash |
3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07
|
9450358e495a2ec33028d4a18a474c029e3986015e59acaff519368699b14a89
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2018/32v2
|
heuristics/cert_lab |
SERMA |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.0 |
4.1 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2018/58v2, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56v2 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 |
ANSSI-CC-2017/24, ANSSI-CC-2018/32 |
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2018/58v2, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56v2 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0814-2012, ANSSI-CC-2016/06, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-2015, BSI-DSZ-CC-0907-2013 |
ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2017/07, ANSSI-CC-2018/32, ANSSI-CC-2017/54, ANSSI-CC-2017/24, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data/cert_id |
2016/24
|
ANSSI-CC-2023/30
|
heuristics/scheme_data/description |
Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON.
Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr
|
Le produit évalué est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Version 4.1.0.2 » développé par THALES DIS FRANCE SAS et par SAMSUNG ELECTRONICS CO.
|
heuristics/scheme_data/developer |
Gemalto / Infineon
|
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
|
heuristics/scheme_data/enhanced |
- cert_id:
2016/24
- certification_date:
23/05/2016
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Gemalto / Infineon
- sponsor:
Gemalto
- evaluation_facility:
Serma Safety & Security
- level:
EAL5+
- protection_profile:
PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
|
- cert_id:
ANSSI-CC-2023/30
- certification_date:
14/12/2023
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
- sponsor:
THALES DIS France SAS
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Java Card System Protection Profile – Open Configuration, version 3, certifié ANSSI-PP-2010-03 en mai 2012
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_30fr.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-2023_30en.pdf
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_30fr.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r4
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
2016/24
|
ANSSI-CC-2023/30
|
heuristics/scheme_data/enhanced/certification_date |
23/05/2016
|
14/12/2023
|
heuristics/scheme_data/enhanced/developer |
Gemalto / Infineon
|
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Serma Safety & Security
|
SERMA SAFETY & SECURITY
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
CCRA
SOG-IS
|
heuristics/scheme_data/enhanced/protection_profile |
PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
|
Java Card System Protection Profile – Open Configuration, version 3, certifié ANSSI-PP-2010-03 en mai 2012
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
|
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_30fr.pdf
|
heuristics/scheme_data/enhanced/sponsor |
Gemalto
|
THALES DIS France SAS
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
|
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-2023_30en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Version 4.1.0.2)
|
heuristics/scheme_data/sponsor |
Gemalto
|
THALES DIS France SAS
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0
|
https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur-1
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 |
ANSSI-CC-2017/24 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 |
ANSSI-CC-2017/24 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
certificat-anssi-cc-2018_32v2.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- cc_protection_profile_id:
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
1
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
294035
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
- /CreationDate:
D:20211012172651+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20211012172651+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_filename |
ANSSI-CC-2016-24.pdf
|
anssi-cc-2018_32v2.pdf
|
pdf_data/report_frontpage/FR |
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2016/24
- cert_item:
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
- cert_item_version:
Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0
- ref_protection_profiles:
PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application
- cc_version:
Critères Communs version 3.1 révision 4
- cc_security_level:
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- developer:
Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
- cert_lab:
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- FR:
- ANSSI-CC-2016/24:
19
- ANSSI-CC-2016/06:
1
|
- FR:
- ANSSI-CC-2018/32v2:
2
- ANSSI-CC-2018/32:
4
- ANSSI-CC-2018/32-M01:
1
- ANSSI-CC-2017/24:
2
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2016/24:
19
- ANSSI-CC-2016/06:
1
|
- ANSSI-CC-2018/32v2:
2
- ANSSI-CC-2018/32:
4
- ANSSI-CC-2018/32-M01:
1
- ANSSI-CC-2017/24:
2
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0059-2009-MA-01:
2
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-PP-0035-2007:
1
- other:
- PP-SSCD part:
10
- PP-SSCD-:
5
|
- BSI:
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP- 0059-2009-MA-01:
2
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-PP-0035-2007:
1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
1
|
2
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
4
|
3
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL2:
2
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 7: 1
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- Serma:
- Serma Safety & Security:
1
- SERMA:
1
|
|
pdf_data/report_keywords/eval_facility/Serma |
- Serma Safety & Security: 1
- SERMA:
1
|
|
pdf_data/report_keywords/eval_facility/Serma/SERMA |
1
|
1
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- javacard:
- javacard.eid:
1
- javacard.esign:
1
- javacard.mspnp:
1
- javacard.iasclassic:
1
- com:
- com.gemalto.puredi:
1
- com.gemalto.javacard.eid:
1
- com.gemalto.mchipadv:
1
- com.gemalto.mpcos:
1
- com.gemalto.javacard.esign:
1
- com.gemalto.moc.server:
1
- com.gemalto:
1
- com.gemalto.javacard.mspnp:
1
- com.gemalto.pure:
1
- com.visa.vsdc:
1
- com.gemalto.javacard.iasclassic:
1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- SCP:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon:
2
- Infineon Technologies:
1
- Gemalto:
|
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
3
|
9
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
276790
- pdf_is_encrypted:
False
- pdf_number_of_pages:
18
- /Producer:
GPL Ghostscript 9.02
- /CreationDate:
- /ModDate:
- /Title:
ANSSI-CC-2016-24
- /Creator:
PDFCreator Version 1.2.1
- /Author:
- /Keywords:
- /Subject:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
615939
- pdf_is_encrypted:
False
- pdf_number_of_pages:
20
- /Author:
- /CreationDate:
D:20211012172552+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20211012172552+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
|
|
pdf_data/report_metadata//CreationDate |
|
D:20211012172552+02'00'
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
|
D:20211012172552+02'00'
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/report_metadata//Title |
ANSSI-CC-2016-24
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
276790
|
615939
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
18
|
20
|
pdf_data/st_filename |
cible_2016-24.pdf
|
anssi-cible-cc-2018_32v2.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
1
|
11
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
2
|
4
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0926-2014:
1
- BSI-DSZ-CC-0917-2014:
1
- NL:
|
|
pdf_data/st_keywords/cc_cert_id/NL |
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
- OE:
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
- D:
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- O:
- O.SID:
13
- O.FIREWALL:
12
- O.GLOBAL_ARRAYS_CONFID:
6
- O.GLOBAL_ARRAYS_INTEG:
5
- O.NATIVE:
12
- O.OPERATE:
15
- O.REALLOCATION:
5
- O.RESOURCES:
9
- O.ALARM:
15
- O.CIPHER:
10
- O.KEY-MNGT:
6
- O.PIN-MNGT:
5
- O.TRANSACTION:
6
- O.OBJ-DELETION:
4
- O.DELETION:
8
- O.LOAD:
6
- O.INSTALL:
11
- O.SCP:
35
- O.CARD-MANAGEMENT:
3
- O.RND:
14
- O.KEY_MNGT:
4
- O.CARD_MANAGEMENT:
17
- O.PIN-:
1
- O.TDES:
1
- O.AES:
1
- O.APPLET:
28
- O.CODE_PKG:
7
- O.JAVAOBJECT:
56
- O.CODE_PCKG:
16
- O.GLOBAL_ARRAYS_CO:
3
- O.GLOBAL_ARRAYS_INT:
3
- T:
- T.CONFID-APPLI-DATA:
4
- T.CONFID-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
7
- T.INTEG-APPLI-DATA:
8
- T.INTEG-JCS-CODE:
3
- T.INTEG-JCS-DATA:
4
- T.SID:
8
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.RESOURCES:
3
- T.DELETION:
3
- T.INSTALL:
4
- T.OBJ-DELETION:
4
- T.PHYSICAL:
4
- A:
- A.APPLET:
5
- A.VERIFICATION:
4
- R:
- OT:
- OP:
- OP.ARRAY_ACCESS:
6
- OP.CREATE:
10
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
7
- OE:
- OE.VERIFICATION:
25
- OE.APPLET:
4
- OE.CODE-EVIDENCE:
10
- OE.CARD-MANAGEMENT:
1
- OE.SCP:
6
- OE.NATIVE:
1
- OSP:
- OSP.VERIFICATION:
4
- OSP.RNG:
1
- OSP.RND:
3
|
pdf_data/st_keywords/cc_claims/A |
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
|
- A.APPLET:
5
- A.VERIFICATION:
4
|
pdf_data/st_keywords/cc_claims/OE |
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
- OE.VERIFICATION:
25
- OE.APPLET:
4
- OE.CODE-EVIDENCE:
10
- OE.CARD-MANAGEMENT:
1
- OE.SCP:
6
- OE.NATIVE:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
- other:
- PP-SSCD-KG:
36
- PP-SSCD-KI:
28
- PP-SSCD:
4
|
- BSI:
- BSI-CC-PP-0084-:
1
- BSI-CC-PP- 0068-V2-2011-MA-01:
1
- BSI-PP-0056-V2-MA-2012:
1
- BSI-PP- 0055-2009:
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
|
- BSI-CC-PP-0084-:
1
- BSI-CC-PP- 0068-V2-2011-MA-01:
1
- BSI-PP-0056-V2-MA-2012:
1
- BSI-PP- 0055-2009:
1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1:
11
- ADV_TDS.1:
2
- ADV_TDS.4:
9
- ADV_IMP.1:
9
- ADV_TDS.3:
4
- ADV_INT.2:
3
- ADV_FSP.5:
6
- ADV_FSP.1:
1
- ADV_FSP.2:
2
- ADV_FSP.4:
2
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
9
- AGD_PRE.1:
7
- AGD_PRE:
1
- ALC:
- ALC_DVS.2:
9
- ALC_TAT.1:
2
- ALC_TAT.2:
5
- ALC_CMC.4:
3
- ALC_DVS.1:
2
- ALC_LCD.1:
5
- ALC_DEL.1:
3
- ALC_CMS.5:
2
- ATE:
- ATE_COV.2:
4
- ATE_FUN.1:
9
- ATE_COV.1:
2
- ATE_IND.2:
4
- ATE_DPT.1:
2
- ATE_DPT.3:
3
- AVA:
|
pdf_data/st_keywords/cc_sar/ALC |
|
- ALC_DVS.2:
9
- ALC_TAT.1: 2
- ALC_TAT.2: 5
- ALC_CMC.4: 3
- ALC_DVS.1: 2
- ALC_LCD.1: 5
- ALC_DEL.1: 3
- ALC_CMS.5: 2
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
9
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
2
|
9
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 5+: 1
- EAL5:
2
- EAL5 augmented:
1
|
- EAL5:
7
- EAL5+: 1
- EAL 6+: 1
- EAL5 augmented:
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
2
|
7
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
1
|
2
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FDP:
- FDP_DAU:
4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1:
4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1:
1
- FDP_DAU.2.1:
1
- FDP_DAU.2.2:
1
- FDP_ITC:
2
- FDP_IFC.1:
9
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI:
4
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT:
2
- FDP_RIP:
1
- FIA:
- FIA_API:
5
- FIA_AFL:
6
- FIA_API.1:
8
- FIA_API.1.1:
2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.3:
5
- FMT_MOF.1:
2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1:
1
- FMT_MSA:
14
- FMT_MSA.1.1:
3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC:
13
- FTP_ITC.1:
2
- FTP_TRP.1:
2
- FTP_ITC.1.1:
4
- FTP_ITC.1.2:
4
- FTP_ITC.1.3:
4
|
- FAU:
- FAU_ARP.1:
15
- FAU_ARP.1.1:
1
- FAU_SAA.1:
2
- FCO:
- FCS:
- FCS_RND:
21
- FCS_CKM:
54
- FCS_COP:
46
- FCS_CKM.1:
32
- FCS_RND.1:
9
- FCS_RND.1.1:
3
- FCS_CKM.1.1:
3
- FCS_CKM.2:
11
- FCS_CKM.2.1:
1
- FCS_CKM.3:
7
- FCS_CKM.3.1:
1
- FCS_CKM.4:
25
- FCS_CKM.4.1:
2
- FCS_COP.1:
31
- FCS_COP.1.1:
5
- FCS_RNG.1:
1
- FDP:
- FDP_ACF:
34
- FDP_ACC:
40
- FDP_ACC.2:
6
- FDP_ACF.1:
16
- FDP_IFC:
24
- FDP_IFC.1:
13
- FDP_IFF:
17
- FDP_IFF.1:
12
- FDP_RIP:
95
- FDP_RIP.1:
10
- FDP_ROL:
14
- FDP_ROL.1:
2
- FDP_SDI.2:
9
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
12
- FDP_ITC.2:
17
- FDP_IFC.2:
2
- FDP_UIT:
7
- FDP_UIT.1:
2
- FDP_ACC.1:
14
- FDP_ITC.1:
12
- FDP_RIP.1.1:
1
- FDP_SDI.1:
1
- FDP_ITT.1:
1
- FIA:
- FIA_AFL:
25
- FIA_SOS.2:
1
- FIA_ATD:
9
- FIA_ATD.1:
2
- FIA_UID:
41
- FIA_UID.2:
1
- FIA_USB:
8
- FIA_USB.1:
3
- FIA_UAU:
65
- FIA_UAU.1:
6
- FIA_UID.1:
18
- FIA_UAU.4:
1
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6.1:
1
- FMT:
- FMT_LIM:
24
- FMT_LIM.1:
16
- FMT_LIM.2:
15
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MSA:
91
- FMT_MSA.1:
11
- FMT_MSA.2:
1
- FMT_MSA.3:
15
- FMT_SMR:
75
- FMT_SMR.1:
27
- FMT_SMF:
61
- FMT_SMF.1:
17
- FMT_MTD:
41
- FMT_MTD.1:
9
- FMT_MTD.3:
1
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
- FPR:
- FPR_UNO.1:
10
- FPR_UNO.1.1:
1
- FPR_UNO:
7
- FPT:
- FPT_EMS:
4
- FPT_TST:
9
- FPT_EMS.1:
15
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS:
47
- FPT_FLS.1:
16
- FPT_TDC.1:
9
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
16
- FPT_RCV.3:
4
- FPT_TST.1:
15
- FPT_PHP:
7
- FPT_PHP.3:
17
- FPT_RCV.4:
2
- FPT_ITT:
7
- FPT_ITT.1:
2
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FPT_TST.2:
1
- FTP:
- FTP_ITC:
18
- FTP_ITC.1:
5
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
2
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
|
- FCS_RND: 21
- FCS_CKM:
54
- FCS_COP:
46
- FCS_CKM.1:
32
- FCS_RND.1: 9
- FCS_RND.1.1: 3
- FCS_CKM.1.1:
3
- FCS_CKM.2:
11
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4:
25
- FCS_CKM.4.1:
2
- FCS_COP.1:
31
- FCS_COP.1.1:
5
- FCS_RNG.1: 1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
14
|
54
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
5
|
32
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
8
|
25
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
8
|
46
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
2
|
31
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_DAU: 4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1: 4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ITC:
2
- FDP_IFC.1:
9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI: 4
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_UCT: 2
- FDP_RIP:
1
|
- FDP_ACF:
34
- FDP_ACC:
40
- FDP_ACC.2: 6
- FDP_ACF.1:
16
- FDP_IFC: 24
- FDP_IFC.1:
13
- FDP_IFF: 17
- FDP_IFF.1: 12
- FDP_RIP:
95
- FDP_RIP.1:
10
- FDP_ROL: 14
- FDP_ROL.1: 2
- FDP_SDI.2: 9
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
12
- FDP_ITC.2:
17
- FDP_IFC.2: 2
- FDP_UIT:
7
- FDP_UIT.1: 2
- FDP_ACC.1:
14
- FDP_ITC.1:
12
- FDP_RIP.1.1:
1
- FDP_SDI.1:
1
- FDP_ITT.1: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
4
|
40
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
4
|
34
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
6
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
9
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
2
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
4
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
4
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
1
|
95
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
1
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API: 5
- FIA_AFL:
6
- FIA_API.1: 8
- FIA_API.1.1: 2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
|
- FIA_AFL:
25
- FIA_SOS.2: 1
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UID:
41
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FIA_UAU:
65
- FIA_UAU.1:
6
- FIA_UID.1:
18
- FIA_UAU.4: 1
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL |
6
|
25
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
5
|
65
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
4
|
41
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
6
|
18
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.3:
5
- FMT_MOF.1: 2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1: 1
- FMT_MSA:
14
- FMT_MSA.1.1: 3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD:
4
- FMT_MTD.1.1: 2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_LIM: 24
- FMT_LIM.1: 16
- FMT_LIM.2: 15
- FMT_LIM.1.1: 3
- FMT_LIM.2.1: 3
- FMT_MSA:
91
- FMT_MSA.1:
11
- FMT_MSA.2:
1
- FMT_MSA.3:
15
- FMT_SMR: 75
- FMT_SMR.1:
27
- FMT_SMF: 61
- FMT_SMF.1:
17
- FMT_MTD:
41
- FMT_MTD.1: 9
- FMT_MTD.3: 1
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
14
|
91
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
3
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
5
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
4
|
41
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
8
|
17
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
11
|
27
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
- FPT_EMS:
4
- FPT_TST:
9
- FPT_EMS.1:
15
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS: 47
- FPT_FLS.1:
16
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_RCV: 16
- FPT_RCV.3: 4
- FPT_TST.1:
15
- FPT_PHP: 7
- FPT_PHP.3:
17
- FPT_RCV.4: 2
- FPT_ITT: 7
- FPT_ITT.1: 2
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FPT_TST.2: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
5
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
7
|
15
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
2
|
16
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
2
|
17
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
2
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
3
|
15
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
13
|
18
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
2
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- MAC:
- KA:
- Key Agreement:
3
- Key agreement:
2
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
2
|
14
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility/Serma |
|
- Serma Safety & Security:
1
|
pdf_data/st_keywords/hash_function/SHA |
|
- SHA1:
- SHA2:
- SHA-224:
4
- SHA-256:
4
- SHA-512:
4
- SHA224:
1
- SHA-384:
2
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
- SHA-224:
4
- SHA-256: 4
- SHA-512: 4
- SHA224: 1
- SHA-384: 2
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
1
|
4
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1:
6
- EF.DG16:
6
- EF.DG3:
1
- EF.DG4:
1
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2:
3
- Java Card 3.0.4:
8
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
1
|
22
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
14
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
4
- Malfunction:
1
|
- physical tampering:
1
- Physical Tampering: 3
- malfunction: 8
- Malfunction:
9
- fault induction: 2
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
1
|
9
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
4
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
|
- Leak-Inherent:
5
- physical probing: 6
- DPA:
2
- SPA:
1
- timing attacks:
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
1
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
1
|
5
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks |
1
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- PKCS:
- SCP:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS197:
5
- FIPS 46-3:
1
- FIPS 197:
1
- NIST:
- PKCS:
- BSI:
- ICAO:
- SCP:
- SCP01:
4
- SCP02:
4
- SCP03:
5
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2009-07-004:
1
|
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-004 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS180-2:
1
- FIPS46-3: 1
- FIPS PUB 46-3: 1
|
- FIPS180-2:
1
- FIPS197: 5
- FIPS 46-3: 1
- FIPS 197: 1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 |
2
|
7
|
pdf_data/st_keywords/standard_id/SCP |
|
- SCP01: 4
- SCP02: 4
- SCP03:
5
|
pdf_data/st_keywords/standard_id/SCP/SCP03 |
1
|
5
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- TDEA:
1
- 3DES:
2
- TDES:
15
- Triple-DES:
3
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
1
|
28
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
- TDEA: 1
- 3DES: 2
- TDES:
15
- Triple-DES: 3
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
4
|
15
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
2
|
20
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- Samsung:
- Gemalto:
- Thales:
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
339
|
719
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Antoine de Lavernette
|
D1417544
|
pdf_data/st_metadata//CreationDate |
D:20160504105208+02'00'
|
D:20210709115842+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2013
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Keywords |
Security Target, CC, eTravel
|
28-03-2018
|
pdf_data/st_metadata//ModDate |
D:20160504105208+02'00'
|
D:20210709115842+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2013
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Subject |
MRTD
|
1.12
|
pdf_data/st_metadata//Title |
eTravel v1.0 Security Target MAÏA3
|
MultiApp V4.1: JCS Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
1225698
|
3422640
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
52
|
141
|
dgst |
89df7836e74b174e
|
61c0a87926d6d972
|