Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
ANSSI-CC-2016/24
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Release Date 28/09/2018)
ANSSI-CC-2018/32v2
name Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Release Date 28/09/2018)
not_valid_before 2016-05-23 2021-10-08
not_valid_after 2021-05-23 2023-08-03
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_32v2.pdf
manufacturer Gemalto THALES DIS FRANCE SA
manufacturer_web https://www.gemalto.com/ https://www.thalesgroup.com/en/europe/france
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32v2.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_32v2.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 605eb7113ff6196513efd65f2bbf1f8c43192f09a8f553ae7adc4c65c42fbe45
state/cert/txt_hash None d25bf16cadaad78be4067fec750f06ce8f4a0202354bfefbd4c611d9e38890aa
state/report/pdf_hash 30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d a8fcfd189038376f97211edeeb51e06d6a31e244debf57e497f6276106ac329c
state/report/txt_hash 1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7 1764d99186c570fcee57ceb38195dfb16d321f0fbbfe0dad2a798de9b0b31987
state/st/pdf_hash 7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d be5cf61a98059d8f60ef5de14e4d4d7b5597f3f2bd5f72793b4bd8dd75d9a520
state/st/txt_hash 3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07 9450358e495a2ec33028d4a18a474c029e3986015e59acaff519368699b14a89
heuristics/cert_id ANSSI-CC-2016/24 ANSSI-CC-2018/32v2
heuristics/cert_lab SERMA None
heuristics/extracted_versions 1.0 4.1
heuristics/report_references/directly_referenced_by None ANSSI-CC-2018/58v2, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56v2
heuristics/report_references/directly_referencing ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 ANSSI-CC-2017/24, ANSSI-CC-2018/32
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2018/58v2, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56v2
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0814-2012, ANSSI-CC-2016/06, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-2015, BSI-DSZ-CC-0907-2013 ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2017/07, ANSSI-CC-2018/32, ANSSI-CC-2017/54, ANSSI-CC-2017/24, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016
heuristics/scheme_data/cert_id 2016/24 ANSSI-CC-2023/30
heuristics/scheme_data/description Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr Le produit évalué est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Version 4.1.0.2 » développé par THALES DIS FRANCE SAS et par SAMSUNG ELECTRONICS CO.
heuristics/scheme_data/developer Gemalto / Infineon THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
heuristics/scheme_data/enhanced
  • cert_id: 2016/24
  • certification_date: 23/05/2016
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r4
  • developer: Gemalto / Infineon
  • sponsor: Gemalto
  • evaluation_facility: Serma Safety & Security
  • level: EAL5+
  • protection_profile: PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • report_link: https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
  • cert_id: ANSSI-CC-2023/30
  • certification_date: 14/12/2023
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
  • sponsor: THALES DIS France SAS
  • evaluation_facility: SERMA SAFETY & SECURITY
  • level: EAL5+
  • protection_profile: Java Card System Protection Profile – Open Configuration, version 3, certifié ANSSI-PP-2010-03 en mai 2012
  • mutual_recognition: CCRA SOG-IS
  • augmented: ALC_DVS.2, AVA_VAN.5
  • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_30fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-2023_30en.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_30fr.pdf
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r4 Critères Communs version 3.1r5
heuristics/scheme_data/enhanced/cert_id 2016/24 ANSSI-CC-2023/30
heuristics/scheme_data/enhanced/certification_date 23/05/2016 14/12/2023
heuristics/scheme_data/enhanced/developer Gemalto / Infineon THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
heuristics/scheme_data/enhanced/evaluation_facility Serma Safety & Security SERMA SAFETY & SECURITY
heuristics/scheme_data/enhanced/mutual_recognition SOG-IS CCRA CCRA SOG-IS
heuristics/scheme_data/enhanced/protection_profile PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6 Java Card System Protection Profile – Open Configuration, version 3, certifié ANSSI-PP-2010-03 en mai 2012
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_30fr.pdf
heuristics/scheme_data/enhanced/sponsor Gemalto THALES DIS France SAS
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-2023_30en.pdf
heuristics/scheme_data/product Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Version 4.1.0.2)
heuristics/scheme_data/sponsor Gemalto THALES DIS France SAS
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0 https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur-1
heuristics/st_references/directly_referencing BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 ANSSI-CC-2017/24
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 ANSSI-CC-2017/24
pdf_data/cert_filename None certificat-anssi-cc-2018_32v2.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2018/32v2: 2
  • cc_protection_profile_id:
    • ANSSI:
      • ANSSI-CC-PP-2010/03-M01: 1
  • cc_security_level:
    • EAL:
      • EAL5: 1
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • Serma:
      • SERMA: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 294035
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20211012172651+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211012172651+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_filename ANSSI-CC-2016-24.pdf anssi-cc-2018_32v2.pdf
pdf_data/report_frontpage/FR
  • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
  • cert_id: ANSSI-CC-2016/24
  • cert_item: Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
  • cert_item_version: Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0
  • ref_protection_profiles: PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application
  • cc_version: Critères Communs version 3.1 révision 4
  • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
  • developer: Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
  • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0964-2015: 1
  • FR:
    • ANSSI-CC-2016/24: 19
    • ANSSI-CC-2016/06: 1
  • FR:
    • ANSSI-CC-2018/32v2: 2
    • ANSSI-CC-2018/32: 4
    • ANSSI-CC-2018/32-M01: 1
    • ANSSI-CC-2017/24: 2
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2016/24: 19
  • ANSSI-CC-2016/06: 1
  • ANSSI-CC-2018/32v2: 2
  • ANSSI-CC-2018/32: 4
  • ANSSI-CC-2018/32-M01: 1
  • ANSSI-CC-2017/24: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 2
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-PP-0035-2007: 1
  • other:
    • PP-SSCD part: 10
    • PP-SSCD-: 5
  • BSI:
    • BSI-PP-0084-2014: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP- 0059-2009-MA-01: 2
  • BSI-CC-PP- 0075-2012: 1
  • BSI-CC-PP- 0071-2012: 1
  • BSI-CC-PP- 0072-2012: 1
  • BSI-PP-0035-2007: 1
  • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 4
    • AVA_VAN: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 3
    • AVA_VAN: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 1 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 1
  • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 2 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 2 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 4 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 1
  • EAL2: 2
  • EAL7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 3 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Safety & Security: 1
    • SERMA: 1
  • Serma:
    • SERMA: 1
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/eval_facility/Serma
  • Serma Safety & Security: 1
  • SERMA: 1
  • SERMA: 1
pdf_data/report_keywords/javacard_packages
  • javacard:
    • javacard.eid: 1
    • javacard.esign: 1
    • javacard.mspnp: 1
    • javacard.iasclassic: 1
  • com:
    • com.gemalto.puredi: 1
    • com.gemalto.javacard.eid: 1
    • com.gemalto.mchipadv: 1
    • com.gemalto.mpcos: 1
    • com.gemalto.javacard.esign: 1
    • com.gemalto.moc.server: 1
    • com.gemalto: 1
    • com.gemalto.javacard.mspnp: 1
    • com.gemalto.pure: 1
    • com.visa.vsdc: 1
    • com.gemalto.javacard.iasclassic: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 4
pdf_data/report_keywords/randomness
  • RNG:
    • RND: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS31: 2
  • SCP:
    • SCP01: 2
    • SCP02: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 1
  • Gemalto:
    • Gemalto: 3
  • Samsung:
    • Samsung: 1
  • Gemalto:
    • Gemalto: 9
pdf_data/report_keywords/vendor/Gemalto/Gemalto 3 9
pdf_data/report_metadata
  • pdf_file_size_bytes: 276790
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Producer: GPL Ghostscript 9.02
  • /CreationDate:
  • /ModDate:
  • /Title: ANSSI-CC-2016-24
  • /Creator: PDFCreator Version 1.2.1
  • /Author:
  • /Keywords:
  • /Subject:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 615939
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author:
  • /CreationDate: D:20211012172552+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211012172552+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20211012172552+02'00'
pdf_data/report_metadata//Creator PDFCreator Version 1.2.1 PScript5.dll Version 5.2.2
pdf_data/report_metadata//ModDate D:20211012172552+02'00'
pdf_data/report_metadata//Producer GPL Ghostscript 9.02 Acrobat Distiller 11.0 (Windows)
pdf_data/report_metadata//Title ANSSI-CC-2016-24
pdf_data/report_metadata/pdf_file_size_bytes 276790 615939
pdf_data/report_metadata/pdf_number_of_pages 18 20
pdf_data/st_filename cible_2016-24.pdf anssi-cible-cc-2018_32v2.pdf
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 1
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
    • ECC:
      • ECC: 14
  • FF:
    • DH:
      • DH: 11
      • Diffie-Hellman: 4
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 1 11
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 2 4
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0926-2014: 1
    • BSI-DSZ-CC-0917-2014: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
  • FR:
    • ANSSI-CC-2017/24: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 4
    • A.SCA: 4
    • A.CSP: 5
  • OE:
    • OE.HI_VAD: 2
    • OE.HID_VAD: 2
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 4
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 13
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 6
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.NATIVE: 12
    • O.OPERATE: 15
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.ALARM: 15
    • O.CIPHER: 10
    • O.KEY-MNGT: 6
    • O.PIN-MNGT: 5
    • O.TRANSACTION: 6
    • O.OBJ-DELETION: 4
    • O.DELETION: 8
    • O.LOAD: 6
    • O.INSTALL: 11
    • O.SCP: 35
    • O.CARD-MANAGEMENT: 3
    • O.RND: 14
    • O.KEY_MNGT: 4
    • O.CARD_MANAGEMENT: 17
    • O.PIN-: 1
    • O.TDES: 1
    • O.AES: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 56
    • O.CODE_PCKG: 16
    • O.GLOBAL_ARRAYS_CO: 3
    • O.GLOBAL_ARRAYS_INT: 3
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.SID: 8
    • T.EXE-CODE: 8
    • T.NATIVE: 4
    • T.RESOURCES: 3
    • T.DELETION: 3
    • T.INSTALL: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
  • A:
    • A.APPLET: 5
    • A.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • OT:
    • OT.X: 1
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 7
  • OE:
    • OE.VERIFICATION: 25
    • OE.APPLET: 4
    • OE.CODE-EVIDENCE: 10
    • OE.CARD-MANAGEMENT: 1
    • OE.SCP: 6
    • OE.NATIVE: 1
  • OSP:
    • OSP.VERIFICATION: 4
    • OSP.RNG: 1
    • OSP.RND: 3
pdf_data/st_keywords/cc_claims/A
  • A.CGA: 4
  • A.SCA: 4
  • A.CSP: 5
  • A.APPLET: 5
  • A.VERIFICATION: 4
pdf_data/st_keywords/cc_claims/OE
  • OE.HI_VAD: 2
  • OE.HID_VAD: 2
  • OE.VERIFICATION: 25
  • OE.APPLET: 4
  • OE.CODE-EVIDENCE: 10
  • OE.CARD-MANAGEMENT: 1
  • OE.SCP: 6
  • OE.NATIVE: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0076-2013: 1
  • other:
    • PP-SSCD-KG: 36
    • PP-SSCD-KI: 28
    • PP-SSCD: 4
  • BSI:
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-PP-0056-V2-MA-2012: 1
    • BSI-PP- 0055-2009: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0071-2012: 1
  • BSI-CC-PP-0072-2012: 1
  • BSI-CC-PP-0076-2013: 1
  • BSI-CC-PP-0084-: 1
  • BSI-CC-PP- 0068-V2-2011-MA-01: 1
  • BSI-PP-0056-V2-MA-2012: 1
  • BSI-PP- 0055-2009: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
  • ADV:
    • ADV_ARC.1: 11
    • ADV_TDS.1: 2
    • ADV_TDS.4: 9
    • ADV_IMP.1: 9
    • ADV_TDS.3: 4
    • ADV_INT.2: 3
    • ADV_FSP.5: 6
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 9
    • AGD_PRE.1: 7
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 9
    • ALC_TAT.1: 2
    • ALC_TAT.2: 5
    • ALC_CMC.4: 3
    • ALC_DVS.1: 2
    • ALC_LCD.1: 5
    • ALC_DEL.1: 3
    • ALC_CMS.5: 2
  • ATE:
    • ATE_COV.2: 4
    • ATE_FUN.1: 9
    • ATE_COV.1: 2
    • ATE_IND.2: 4
    • ATE_DPT.1: 2
    • ATE_DPT.3: 3
  • AVA:
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_DVS.2: 9
  • ALC_TAT.1: 2
  • ALC_TAT.2: 5
  • ALC_CMC.4: 3
  • ALC_DVS.1: 2
  • ALC_LCD.1: 5
  • ALC_DEL.1: 3
  • ALC_CMS.5: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 2 9
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 2 9
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 5+: 1
  • EAL5: 2
  • EAL5 augmented: 1
  • EAL5: 7
  • EAL5+: 1
  • EAL 6+: 1
  • EAL5 augmented: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 2 7
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.4: 8
    • FCS_COP: 8
    • FCS_CKM.2: 2
    • FCS_COP.1: 2
    • FCS_CKM.1.1: 2
    • FCS_CKM.1: 5
    • FCS_CKM.4.1: 2
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_DAU: 4
    • FDP_UIT: 3
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_ACC: 4
    • FDP_ACF.1: 6
    • FDP_ACC.1.1: 4
    • FDP_ACF: 4
    • FDP_ACC.1: 14
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_ITC: 2
    • FDP_IFC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.1: 1
    • FDP_RIP.1.1: 1
    • FDP_SDI: 4
    • FDP_SDI.1: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_UCT: 2
    • FDP_RIP: 1
  • FIA:
    • FIA_API: 5
    • FIA_AFL: 6
    • FIA_API.1: 8
    • FIA_API.1.1: 2
    • FIA_UAU.1: 4
    • FIA_UID.1: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 5
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 4
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MSA.3: 5
    • FMT_MOF.1: 2
    • FMT_SMR.1: 11
    • FMT_SMF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 2
    • FMT_MSA.1: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4.1: 2
    • FMT_MTD: 4
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_TST.1: 3
    • FPT_FLS.1: 2
    • FPT_FLS.1.1: 1
    • FPT_TST: 2
    • FPT_PHP.1: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 13
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
    • FTP_ITC.1.1: 4
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RND: 21
    • FCS_CKM: 54
    • FCS_COP: 46
    • FCS_CKM.1: 32
    • FCS_RND.1: 9
    • FCS_RND.1.1: 3
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 11
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 25
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 31
    • FCS_COP.1.1: 5
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACF: 34
    • FDP_ACC: 40
    • FDP_ACC.2: 6
    • FDP_ACF.1: 16
    • FDP_IFC: 24
    • FDP_IFC.1: 13
    • FDP_IFF: 17
    • FDP_IFF.1: 12
    • FDP_RIP: 95
    • FDP_RIP.1: 10
    • FDP_ROL: 14
    • FDP_ROL.1: 2
    • FDP_SDI.2: 9
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC: 12
    • FDP_ITC.2: 17
    • FDP_IFC.2: 2
    • FDP_UIT: 7
    • FDP_UIT.1: 2
    • FDP_ACC.1: 14
    • FDP_ITC.1: 12
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_ITT.1: 1
  • FIA:
    • FIA_AFL: 25
    • FIA_SOS.2: 1
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UID: 41
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
    • FIA_UAU: 65
    • FIA_UAU.1: 6
    • FIA_UID.1: 18
    • FIA_UAU.4: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
  • FMT:
    • FMT_LIM: 24
    • FMT_LIM.1: 16
    • FMT_LIM.2: 15
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MSA: 91
    • FMT_MSA.1: 11
    • FMT_MSA.2: 1
    • FMT_MSA.3: 15
    • FMT_SMR: 75
    • FMT_SMR.1: 27
    • FMT_SMF: 61
    • FMT_SMF.1: 17
    • FMT_MTD: 41
    • FMT_MTD.1: 9
    • FMT_MTD.3: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO.1: 10
    • FPR_UNO.1.1: 1
    • FPR_UNO: 7
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 9
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 47
    • FPT_FLS.1: 16
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 16
    • FPT_RCV.3: 4
    • FPT_TST.1: 15
    • FPT_PHP: 7
    • FPT_PHP.3: 17
    • FPT_RCV.4: 2
    • FPT_ITT: 7
    • FPT_ITT.1: 2
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
    • FPT_TST.2: 1
  • FTP:
    • FTP_ITC: 18
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM: 14
  • FCS_CKM.4: 8
  • FCS_COP: 8
  • FCS_CKM.2: 2
  • FCS_COP.1: 2
  • FCS_CKM.1.1: 2
  • FCS_CKM.1: 5
  • FCS_CKM.4.1: 2
  • FCS_COP.1.1: 2
  • FCS_RND: 21
  • FCS_CKM: 54
  • FCS_COP: 46
  • FCS_CKM.1: 32
  • FCS_RND.1: 9
  • FCS_RND.1.1: 3
  • FCS_CKM.1.1: 3
  • FCS_CKM.2: 11
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 7
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 25
  • FCS_CKM.4.1: 2
  • FCS_COP.1: 31
  • FCS_COP.1.1: 5
  • FCS_RNG.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 14 54
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 5 32
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 8 25
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 8 46
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 2 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 2 5
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU: 4
  • FDP_UIT: 3
  • FDP_ITC.1: 4
  • FDP_ITC.2: 4
  • FDP_ACC: 4
  • FDP_ACF.1: 6
  • FDP_ACC.1.1: 4
  • FDP_ACF: 4
  • FDP_ACC.1: 14
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_DAU.1: 1
  • FDP_DAU.2.1: 1
  • FDP_DAU.2.2: 1
  • FDP_ITC: 2
  • FDP_IFC.1: 9
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_RIP.1: 1
  • FDP_RIP.1.1: 1
  • FDP_SDI: 4
  • FDP_SDI.1: 2
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_UCT.1: 1
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_UCT: 2
  • FDP_RIP: 1
  • FDP_ACF: 34
  • FDP_ACC: 40
  • FDP_ACC.2: 6
  • FDP_ACF.1: 16
  • FDP_IFC: 24
  • FDP_IFC.1: 13
  • FDP_IFF: 17
  • FDP_IFF.1: 12
  • FDP_RIP: 95
  • FDP_RIP.1: 10
  • FDP_ROL: 14
  • FDP_ROL.1: 2
  • FDP_SDI.2: 9
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC: 12
  • FDP_ITC.2: 17
  • FDP_IFC.2: 2
  • FDP_UIT: 7
  • FDP_UIT.1: 2
  • FDP_ACC.1: 14
  • FDP_ITC.1: 12
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 1
  • FDP_ITT.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 4 40
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 4 34
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 6 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 9 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 2 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 4 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 4 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 1 95
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 1 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 3 7
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 5
  • FIA_AFL: 6
  • FIA_API.1: 8
  • FIA_API.1.1: 2
  • FIA_UAU.1: 4
  • FIA_UID.1: 6
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UAU: 5
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UID: 4
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_AFL: 25
  • FIA_SOS.2: 1
  • FIA_ATD: 9
  • FIA_ATD.1: 2
  • FIA_UID: 41
  • FIA_UID.2: 1
  • FIA_USB: 8
  • FIA_USB.1: 3
  • FIA_UAU: 65
  • FIA_UAU.1: 6
  • FIA_UID.1: 18
  • FIA_UAU.4: 1
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 6 25
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 5 65
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 4 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 4 41
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 6 18
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.3: 5
  • FMT_MOF.1: 2
  • FMT_SMR.1: 11
  • FMT_SMF.1: 8
  • FMT_MOF.1.1: 1
  • FMT_MSA: 14
  • FMT_MSA.1.1: 3
  • FMT_MSA.2: 2
  • FMT_MSA.1: 3
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.4.1: 2
  • FMT_MTD: 4
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_LIM: 24
  • FMT_LIM.1: 16
  • FMT_LIM.2: 15
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MSA: 91
  • FMT_MSA.1: 11
  • FMT_MSA.2: 1
  • FMT_MSA.3: 15
  • FMT_SMR: 75
  • FMT_SMR.1: 27
  • FMT_SMF: 61
  • FMT_SMF.1: 17
  • FMT_MTD: 41
  • FMT_MTD.1: 9
  • FMT_MTD.3: 1
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 14 91
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 3 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 5 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 4 41
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 8 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 11 27
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 5
  • FPT_EMS.1: 7
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_TST.1: 3
  • FPT_FLS.1: 2
  • FPT_FLS.1.1: 1
  • FPT_TST: 2
  • FPT_PHP.1: 2
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 2
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_EMS: 4
  • FPT_TST: 9
  • FPT_EMS.1: 15
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS: 47
  • FPT_FLS.1: 16
  • FPT_TDC.1: 9
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 16
  • FPT_RCV.3: 4
  • FPT_TST.1: 15
  • FPT_PHP: 7
  • FPT_PHP.3: 17
  • FPT_RCV.4: 2
  • FPT_ITT: 7
  • FPT_ITT.1: 2
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_TST.2: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS 5 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 7 15
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 2 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 2 17
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 2 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 3 15
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 13 18
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 2 5
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 4 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 4 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 4 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 3
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 183
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 14
  • KA:
    • Key Agreement: 3
    • Key agreement: 2
pdf_data/st_keywords/crypto_scheme/MAC/MAC 2 14
pdf_data/st_keywords/eval_facility/Serma
  • Serma Technologies: 1
  • Serma Safety & Security: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-224: 1
  • SHA1:
    • SHA1: 2
    • SHA-1: 4
  • SHA2:
    • SHA-224: 4
    • SHA-256: 4
    • SHA-512: 4
    • SHA224: 1
    • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 1
  • SHA-224: 4
  • SHA-256: 4
  • SHA-512: 4
  • SHA224: 1
  • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 1 4
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
    • EF.DG3: 1
    • EF.DG4: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
    • RND: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 14
    • RND: 22
pdf_data/st_keywords/randomness/RNG/RND 1 22
pdf_data/st_keywords/randomness/RNG/RNG 2 14
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 4
  • Malfunction: 1
  • physical tampering: 1
  • Physical Tampering: 3
  • malfunction: 8
  • Malfunction: 9
  • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 1 9
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 4 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 1
  • SPA: 1
  • DPA: 1
  • timing attacks: 1
  • Leak-Inherent: 5
  • physical probing: 6
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 1 2
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 1 5
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#3: 2
    • PKCS#1: 2
  • SCP:
    • SCP03: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 5
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 5
  • BSI:
    • AIS31: 4
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2009-07-004: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS46-3: 1
  • FIPS PUB 46-3: 1
  • FIPS180-2: 1
  • FIPS197: 5
  • FIPS 46-3: 1
  • FIPS 197: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 2
  • PKCS#1: 2
  • PKCS#1: 7
  • PKCS#5: 5
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 2 7
pdf_data/st_keywords/standard_id/SCP
  • SCP03: 1
  • SCP01: 4
  • SCP02: 4
  • SCP03: 5
pdf_data/st_keywords/standard_id/SCP/SCP03 1 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • TDES: 4
  • AES_competition:
    • AES:
      • AES: 28
  • DES:
    • DES:
      • DES: 20
    • 3DES:
      • TDEA: 1
      • 3DES: 2
      • TDES: 15
      • Triple-DES: 3
  • constructions:
    • MAC:
      • HMAC: 3
      • KMAC: 2
      • CMAC: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 1 28
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDES: 4
  • TDEA: 1
  • 3DES: 2
  • TDES: 15
  • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 4 15
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 2 20
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 4
  • Gemalto:
    • Gemalto: 339
  • Samsung:
    • Samsung: 14
  • Gemalto:
    • Gemalto: 719
  • Thales:
    • Thales: 1
pdf_data/st_keywords/vendor/Gemalto/Gemalto 339 719
pdf_data/st_metadata//Author Antoine de Lavernette D1417544
pdf_data/st_metadata//CreationDate D:20160504105208+02'00' D:20210709115842+02'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 Microsoft® Word 2016
pdf_data/st_metadata//Keywords Security Target, CC, eTravel 28-03-2018
pdf_data/st_metadata//ModDate D:20160504105208+02'00' D:20210709115842+02'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 Microsoft® Word 2016
pdf_data/st_metadata//Subject MRTD 1.12
pdf_data/st_metadata//Title eTravel v1.0 Security Target MAÏA3 MultiApp V4.1: JCS Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1225698 3422640
pdf_data/st_metadata/pdf_number_of_pages 52 141
dgst 89df7836e74b174e 61c0a87926d6d972