name |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Application eTravel EAC v2.0, en configuration SAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2016-05-23
|
2014-02-27
|
not_valid_after |
2021-05-23
|
2019-09-01
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_12en.pdf
|
status |
archived
|
archived
|
manufacturer |
Gemalto
|
Gemalto - Infineon Technologies AG
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.gemalto.com/
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_12fr.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) |
|
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 23), 'maintenance_title': 'ANSSI-CC-2014/12-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_12-M01.pdf', 'maintenance_st_link': None}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d
|
81ad579dd93a4988b96905dfc6a9bdce14065b0f0201a2c1cdfa1f05d19e12ce
|
state/report/txt_hash |
1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7
|
aba05e98ed85a1b1a16e036d5c2ac7ad91c5cca3a2acf7f925a93492349a0b33
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d
|
13b7ef56f4f89228423ecf39543b50ac766af537facbd6945aa60418cc0e609c
|
state/st/txt_hash |
3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07
|
7b8344df5b99e7c281ff92b808e622ec34e42b866b51c63b8a0b487eb03d8041
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2014/12
|
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.0 |
2.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0814-2012, ANSSI-CC-2016/06, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-2015, BSI-DSZ-CC-0907-2013 |
BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011 |
heuristics/scheme_data/cert_id |
2016/24
|
2014/12
|
heuristics/scheme_data/description |
Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON.
Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr
|
Le produit certifié est la carte à puce ouverte « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civ
|
heuristics/scheme_data/developer |
Gemalto / Infineon
|
Gemalto / Infineon Technologies AG
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r4
|
Critères Communs version 3.1r4
|
heuristics/scheme_data/enhanced/cert_id |
2016/24
|
2014/12
|
heuristics/scheme_data/enhanced/certification_date |
23/05/2016
|
27/02/2014
|
heuristics/scheme_data/enhanced/developer |
Gemalto / Infineon
|
Gemalto / Infineon Technologies AG
|
heuristics/scheme_data/enhanced/evaluation_facility |
Serma Safety & Security
|
Serma Technologies
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
|
BSI-CC-PP-0068-V2, PP SAC
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-12fr.pdf
|
heuristics/scheme_data/enhanced/sponsor |
Gemalto
|
Gemalto
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-12en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Application eTravel EAC v2.0, en configuration SAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
|
heuristics/scheme_data/sponsor |
Gemalto
|
Gemalto
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0
|
https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-sac-sur-la-plateforme-ouverte
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 |
BSI-DSZ-CC-0829-2012 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
ANSSI-CC-2016-24.pdf
|
Rapport ANSSI-CC-2014_12fr.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1 révision 4
|
Critères Communs version 3.1 révision 4
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2014/12
|
pdf_data/report_frontpage/FR/cert_item |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
Application eTravel EAC v2.0, en configuration SAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
|
pdf_data/report_frontpage/FR/cert_item_version |
Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0
|
Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
|
pdf_data/report_frontpage/FR/cert_lab |
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
pdf_data/report_frontpage/FR/developer |
Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
|
Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
pdf_data/report_frontpage/FR/ref_protection_profiles |
PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application
|
BSI-CC-PP-0068-V2, [PP SAC], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2016/24:
19
- ANSSI-CC-2016/06:
1
|
- ANSSI-CC-2014/12:
23
- ANSSI-CC-2014/06:
4
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0059-2009-MA-01:
2
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-PP-0035-2007:
1
- other:
- PP-SSCD part:
10
- PP-SSCD-:
5
|
- BSI:
- BSI-CC-PP-0068-V2:
1
- BSI-PP-0035-2007:
2
- BSI-CC-PP-0068-V2-2011:
1
- BSI-PP- 0035-2007:
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP- 0059-2009-MA-01: 2
- BSI-CC-PP- 0075-2012: 1
- BSI-CC-PP- 0071-2012: 1
- BSI-CC-PP- 0072-2012: 1
- BSI-PP-0035-2007:
1
|
- BSI-CC-PP-0068-V2: 1
- BSI-PP-0035-2007:
2
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP- 0035-2007: 1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0035-2007 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
4
|
6
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL2: 2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
- EAL 5:
3
- EAL4: 2
- EAL5: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- Serma:
- Serma Safety & Security:
1
- SERMA:
1
|
|
pdf_data/report_keywords/eval_facility/Serma |
- Serma Safety & Security:
1
- SERMA:
1
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- ICAO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
3
|
39
|
pdf_data/report_keywords/vendor/Infineon |
- Infineon:
2
- Infineon Technologies:
1
|
- Infineon Technologies AG: 1
- Infineon Technologies:
23
- Infineon:
2
|
pdf_data/report_keywords/vendor/Infineon/Infineon |
2
|
2
|
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies |
1
|
23
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
276790
- pdf_is_encrypted:
False
- pdf_number_of_pages:
18
- /Producer:
GPL Ghostscript 9.02
- /CreationDate:
- /ModDate:
- /Title:
ANSSI-CC-2016-24
- /Creator:
PDFCreator Version 1.2.1
- /Author:
- /Keywords:
- /Subject:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
267477
- pdf_is_encrypted:
False
- pdf_number_of_pages:
22
- /Author:
Duquesnoy
- /CreationDate:
D:20140310105703+01'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20140310105703+01'00'
- /Producer:
Acrobat Distiller 9.0.0 (Windows)
- /Title:
Microsoft Word - Rapport ANSSI-CC-2014_12fr.doc
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
|
Duquesnoy
|
pdf_data/report_metadata//CreationDate |
|
D:20140310105703+01'00'
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
|
D:20140310105703+01'00'
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
Acrobat Distiller 9.0.0 (Windows)
|
pdf_data/report_metadata//Title |
ANSSI-CC-2016-24
|
Microsoft Word - Rapport ANSSI-CC-2014_12fr.doc
|
pdf_data/report_metadata/pdf_file_size_bytes |
276790
|
267477
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
18
|
22
|
pdf_data/st_filename |
cible_2016-24.pdf
|
Cible ANSSI-CC-2014_12en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
1
|
3
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
2
|
5
|
pdf_data/st_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0926-2014:
1
- BSI-DSZ-CC-0917-2014:
1
|
|
pdf_data/st_keywords/cc_cert_id/NL/CC-1 |
2
|
6
|
pdf_data/st_keywords/cc_cert_id/NL/CC-2 |
3
|
4
|
pdf_data/st_keywords/cc_cert_id/NL/CC-3 |
3
|
2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
- OE:
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
- other:
- PP-SSCD-KG:
36
- PP-SSCD-KI:
28
- PP-SSCD:
4
|
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0056-V2-2012:
1
- BSI-CC-PP-0068-V2-2011:
1
- BSI-PP-0055:
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0076-2013: 1
|
- BSI-PP-0035:
1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 |
1
|
1
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5+ |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
2
|
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
1
|
2
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FDP:
- FDP_DAU:
4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1:
4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1:
1
- FDP_DAU.2.1:
1
- FDP_DAU.2.2:
1
- FDP_ITC:
2
- FDP_IFC.1:
9
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI:
4
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT:
2
- FDP_RIP:
1
- FIA:
- FIA_API:
5
- FIA_AFL:
6
- FIA_API.1:
8
- FIA_API.1.1:
2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.3:
5
- FMT_MOF.1:
2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1:
1
- FMT_MSA:
14
- FMT_MSA.1.1:
3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC:
13
- FTP_ITC.1:
2
- FTP_TRP.1:
2
- FTP_ITC.1.1:
4
- FTP_ITC.1.2:
4
- FTP_ITC.1.3:
4
|
- FAU:
- FAU_SAS:
8
- FAU_GEN:
1
- FAU_SAS.1:
5
- FAU_SAS.1.1:
2
- FCS:
- FCS_RND:
8
- FCS_CKM.1:
8
- FCS_COP.1:
5
- FCS_RND.1:
8
- FCS_CKM:
23
- FCS_COP:
24
- FCS_RND.1.1:
2
- FCS_CKM.2:
3
- FCS_CKM.4:
16
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
4
- FDP:
- FDP_ACF:
7
- FDP_RIP:
2
- FDP_ITC.1:
5
- FDP_ITC.2:
5
- FDP_ACC:
5
- FDP_ACF.1:
1
- FDP_ACC.1.1:
1
- FDP_ACC.1:
3
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1.1:
1
- FDP_UCT:
2
- FDP_IFC.1:
2
- FDP_UCT.1.1:
1
- FDP_UIT:
2
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_RIP.1:
1
- FIA:
- FIA_API:
7
- FIA_AFL:
12
- FIA_SOS.2:
1
- FIA_API.1:
4
- FIA_API.1.1:
1
- FIA_UAU:
25
- FIA_UID:
11
- FIA_UAU.4:
1
- FIA_UAU.1:
2
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UID.1:
3
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6.1:
1
- FMT:
- FMT_LIM:
6
- FMT_LIM.1:
15
- FMT_LIM.2:
14
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
3
- FMT_SMR:
10
- FMT_MTD:
15
- FMT_MSA.3:
2
- FMT_MSA.1:
1
- FMT_SMF.1:
13
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1.1:
4
- FMT_MTD.1:
1
- FPT:
- FPT_EMS:
6
- FPT_TST:
3
- FPT_EMS.1:
6
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
2
- FPT_TST.1:
3
- FPT_PHP.3:
4
- FPT_FLS:
1
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FTP:
- FTP_ITC:
5
- FTP_ITC.1:
2
- FTP_TRP.1:
2
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
|
- FCS_RND: 8
- FCS_CKM.1:
8
- FCS_COP.1:
5
- FCS_RND.1: 8
- FCS_CKM:
23
- FCS_COP:
24
- FCS_RND.1.1: 2
- FCS_CKM.2:
3
- FCS_CKM.4:
16
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
4
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
14
|
23
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
5
|
8
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
8
|
16
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
8
|
24
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_DAU: 4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1:
4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ITC: 2
- FDP_IFC.1:
9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI: 4
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT.1: 1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT:
2
- FDP_RIP:
1
|
- FDP_ACF:
7
- FDP_RIP:
2
- FDP_ITC.1:
5
- FDP_ITC.2:
5
- FDP_ACC:
5
- FDP_ACF.1:
1
- FDP_ACC.1.1:
1
- FDP_ACC.1:
3
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1.1:
1
- FDP_UCT:
2
- FDP_IFC.1:
2
- FDP_UCT.1.1:
1
- FDP_UIT:
2
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_RIP.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
4
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
14
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
4
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
6
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
9
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
4
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
4
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API:
5
- FIA_AFL:
6
- FIA_API.1:
8
- FIA_API.1.1:
2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
|
- FIA_API:
7
- FIA_AFL:
12
- FIA_SOS.2: 1
- FIA_API.1:
4
- FIA_API.1.1:
1
- FIA_UAU:
25
- FIA_UID:
11
- FIA_UAU.4: 1
- FIA_UAU.1:
2
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UID.1:
3
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL |
6
|
12
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API |
5
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 |
8
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
5
|
25
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
4
|
11
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
6
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.3:
5
- FMT_MOF.1: 2
- FMT_SMR.1: 11
- FMT_SMF.1:
8
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1.1: 3
- FMT_MSA.2: 2
- FMT_MSA.1:
3
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_LIM: 6
- FMT_LIM.1: 15
- FMT_LIM.2: 14
- FMT_LIM.1.1: 2
- FMT_LIM.2.1: 3
- FMT_SMR: 10
- FMT_MTD:
15
- FMT_MSA.3:
2
- FMT_MSA.1:
1
- FMT_SMF.1:
13
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1.1:
4
- FMT_MTD.1: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
5
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
4
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
8
|
13
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
- FPT_EMS:
6
- FPT_TST:
3
- FPT_EMS.1:
6
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
2
- FPT_TST.1:
3
- FPT_PHP.3:
4
- FPT_FLS: 1
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
5
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
7
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
13
|
5
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
2
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- to the plastic travel document is achieved by physical and organisational security measures being out of scope of the current ST. The TOE comprises: i) the circuitry of the contactless/contact chip incl. all IC:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
2
|
6
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1:
7
- EF.DG2:
5
- EF.DG16:
5
- EF.DG15:
2
- EF.DG5:
1
- EF.DG3:
1
- EF.DG4:
1
- EF.DG6:
2
- EF.COM:
3
- EF.SOD:
4
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
- FI:
- physical tampering:
4
- Malfunction:
1
|
- SCA:
- Leak-Inherent:
1
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- Physical Tampering:
2
- Physical tampering:
2
- Malfunction:
3
- malfunction:
4
- fault injection:
1
- other:
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering: 4
- Malfunction:
1
|
- Physical Tampering: 2
- Physical tampering: 2
- Malfunction:
3
- malfunction: 4
- fault injection: 1
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
1
|
3
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
|
- Leak-Inherent:
1
- physical probing: 3
- DPA:
2
- SPA:
1
- timing attacks:
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
1
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks |
1
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- PKCS:
- SCP:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS 186-3:
1
- FIPS 197:
1
- NIST:
- PKCS:
- RFC:
- ISO:
- ISO/IEC 14443:
4
- ISO/IEC 7816-4:
1
- ICAO:
- SCP:
- SCP03:
2
- SCP01:
1
- SCP02:
1
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004: 1
|
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004: 1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-001 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-002 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-003 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
|
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS 186-3: 1
- FIPS 197: 1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS46-3 |
1
|
1
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 |
2
|
2
|
pdf_data/st_keywords/standard_id/SCP |
|
- SCP03:
2
- SCP01: 1
- SCP02: 1
|
pdf_data/st_keywords/standard_id/SCP/SCP03 |
1
|
2
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- 3DES:
2
- TDES:
5
- Triple-DES:
3
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
1
|
8
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
- 3DES: 2
- TDES:
5
- Triple-DES: 3
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
4
|
5
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
2
|
1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
339
|
404
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Antoine de Lavernette
|
Antoine de Lavernette
|
pdf_data/st_metadata//CreationDate |
D:20160504105208+02'00'
|
D:20140127151135+01'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2013
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Keywords |
Security Target, CC, eTravel
|
Security Target, CC, eTravel
|
pdf_data/st_metadata//ModDate |
D:20160504105208+02'00'
|
D:20140127151135+01'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2013
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Subject |
MRTD
|
MRTD
|
pdf_data/st_metadata//Title |
eTravel v1.0 Security Target MAÏA3
|
eTravel EAC v2 Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
1225698
|
899993
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
52
|
64
|
dgst |
89df7836e74b174e
|
91a2b0923fc990f1
|