name |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
eTravel Essential 1.0, avec SAC, AA et EAC activés sur composant M7794 A12/G12
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2016-05-23
|
2015-09-10
|
not_valid_after |
2021-05-23
|
2020-09-10
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible_2015_32_LITE.pdf
|
status |
archived
|
archived
|
manufacturer |
Gemalto
|
Gemalto
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.gemalto.com/
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_32.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': frozenset({'EPASS_PACE_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0'})}) |
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d
|
09c7383c808b59dc35a301d9dcc7214c74acba342fe938db47dd2444f055e793
|
state/report/txt_hash |
1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7
|
6e1bff74c05d2ab161def310e1907692170e61d091ec52143898dee14a88b41b
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d
|
540cd7895cda415724df211bc42ed6a84a0b2f3c1d0f7aaf392b3ccabc9eab39
|
state/st/txt_hash |
3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07
|
642a11513dddb21c4384a544a916c98bd979867c4eb6719887935f17eeec2cf1
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2015/32
|
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.0 |
1.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2020/83 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 |
ANSSI-CC-2014/77, BSI-DSZ-CC-0917-2014 |
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2020/83 |
heuristics/scheme_data/cert_id |
2016/24
|
2015/32
|
heuristics/scheme_data/description |
Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON.
Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr
|
Le produit certifiéest la carte à puce fermée « eTravel Essential 1.0, avec SAC, AA et EACactivés, sur composant M7794 A12/G12 ». Le produit est développé par la société GEMALTOet embarqué sur le microcontrôleur M7794 A12/G12 de la société INFINEON.
Le produit certifiéest de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conforméme
|
heuristics/scheme_data/developer |
Gemalto / Infineon
|
Gemalto / Infineon Technologies AG
|
heuristics/scheme_data/enhanced |
- cert_id:
2016/24
- certification_date:
23/05/2016
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Gemalto / Infineon
- sponsor:
Gemalto
- evaluation_facility:
Serma Safety & Security
- level:
EAL5+
- protection_profile:
PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
|
- cert_id:
2015/32
- certification_date:
10/09/2015
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Gemalto / Infineon Technologies AG
- sponsor:
Gemalto
- evaluation_facility:
Serma technologies
- level:
EAL5+
- protection_profile:
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/2015/09/ANSSI-CC-2015_32.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2015/09/ANSSI_cible_2015_32_LITE.pdf
- cert_link: https://cyber.gouv.fr/sites/default/files/2015/09/Certificat-2015_32.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r4
|
Critères Communs version 3.1r4
|
heuristics/scheme_data/enhanced/cert_id |
2016/24
|
2015/32
|
heuristics/scheme_data/enhanced/certification_date |
23/05/2016
|
10/09/2015
|
heuristics/scheme_data/enhanced/developer |
Gemalto / Infineon
|
Gemalto / Infineon Technologies AG
|
heuristics/scheme_data/enhanced/evaluation_facility |
Serma Safety & Security
|
Serma technologies
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6
|
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf
|
https://cyber.gouv.fr/sites/default/files/2015/09/ANSSI-CC-2015_32.pdf
|
heuristics/scheme_data/enhanced/sponsor |
Gemalto
|
Gemalto
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf
|
https://cyber.gouv.fr/sites/default/files/2015/09/ANSSI_cible_2015_32_LITE.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
eTravel Essential 1.0, avec SAC, AA et EAC activés, sur composant M7794 A12/G12
|
heuristics/scheme_data/sponsor |
Gemalto
|
Gemalto
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0
|
https://cyber.gouv.fr/produits-certifies/etravel-essential-10-avec-sac-aa-et-eac-actives-sur-composant-m7794-a12g12
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 |
None
|
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 |
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
ANSSI-CC-2016-24.pdf
|
ANSSI-CC-2015_32.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1 révision 4
|
Critères Communs version 3.1 révision 4
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2016/24
|
ANSSI-CC-2015/32
|
pdf_data/report_frontpage/FR/cert_item |
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12
|
eTravel Essential 1.0, avec SAC, AA et EAC activés, sur composant M7794 A12/G12
|
pdf_data/report_frontpage/FR/cert_item_version |
Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0
|
Version 1.0
|
pdf_data/report_frontpage/FR/cert_lab |
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
Serma technologies 14 rue Galilée, CS – 10055, 33615 PESSAC Cedex, France
|
pdf_data/report_frontpage/FR/developer |
Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
|
Gemalto 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la verrerie, 92197 Meudon, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
pdf_data/report_frontpage/FR/ref_protection_profiles |
PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application
|
Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE (EAC PP) Version 1.3.2, BSI-CC-PP-0056-V2-2012-MA-02 Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE PP) Version 1.0, BSI-CC-PP-0068-V2-2011
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
|
- BSI-DSZ-CC-0917-2014:
1
- BSI-DSZ-CC-0917-2014-MA-01:
1
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2016/24:
19
- ANSSI-CC-2016/06:
1
|
- ANSSI-CC-2015/32:
19
- ANSSI-CC-2014/77:
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0059-2009-MA-01:
2
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- BSI-CC-PP- 0072-2012:
1
- BSI-PP-0035-2007:
1
- other:
- PP-SSCD part:
10
- PP-SSCD-:
5
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02:
1
- BSI-CC-PP-0068-V2-2011:
2
- BSI-PP-0035-2007:
1
- BSI-CC-PP-0056-V2-:
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP- 0059-2009-MA-01: 2
- BSI-CC-PP- 0075-2012: 1
- BSI-CC-PP- 0071-2012: 1
- BSI-CC-PP- 0072-2012: 1
- BSI-PP-0035-2007:
1
|
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011: 2
- BSI-PP-0035-2007:
1
- BSI-CC-PP-0056-V2-: 1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0035-2007 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
1
|
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
1
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
4
|
5
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL2: 2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
- EAL 5:
3
- EAL4: 2
- EAL5: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- Serma:
- Serma Safety & Security:
1
- SERMA:
1
|
|
pdf_data/report_keywords/eval_facility/Serma |
- Serma Safety & Security:
1
- SERMA:
1
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- RFC:
- ICAO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES |
1
|
2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
3
|
8
|
pdf_data/report_keywords/vendor/Infineon |
- Infineon: 2
- Infineon Technologies:
1
|
- Infineon Technologies AG: 1
- Infineon Technologies:
1
|
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies |
1
|
1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
|
moyal
|
pdf_data/report_metadata//CreationDate |
|
D:20150921163135+02'00'
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
PDFCreator Version 1.2.1
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
|
D:20150921163135+02'00'
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
GPL Ghostscript 9.02
|
pdf_data/report_metadata//Subject |
|
|
pdf_data/report_metadata//Title |
ANSSI-CC-2016-24
|
ANSSI-CC-2015_32
|
pdf_data/report_metadata/pdf_file_size_bytes |
276790
|
143765
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
18
|
18
|
pdf_data/st_filename |
cible_2016-24.pdf
|
ANSSI_cible_2015_32_LITE.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
1
|
9
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
2
|
9
|
pdf_data/st_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0926-2014:
1
- BSI-DSZ-CC-0917-2014:
1
|
|
pdf_data/st_keywords/cc_cert_id/NL/CC-1 |
2
|
6
|
pdf_data/st_keywords/cc_cert_id/NL/CC-2 |
3
|
6
|
pdf_data/st_keywords/cc_cert_id/NL/CC-3 |
3
|
3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA:
4
- A.SCA:
4
- A.CSP:
5
- OE:
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
|
pdf_data/st_keywords/cc_claims/OE |
- OE.HI_VAD:
2
- OE.HID_VAD:
2
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP-0072-2012:
1
- BSI-CC-PP-0076-2013:
1
- other:
- PP-SSCD-KG:
36
- PP-SSCD-KI:
28
- PP-SSCD:
4
|
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0056-V2-2012:
1
- BSI-CC-PP-0068-V2-2011:
1
- BSI-PP-0055:
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0035:
1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0076-2013: 1
|
- BSI-PP-0035:
1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 |
1
|
1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1:
2
- ADV_FSP.4:
1
- ADV_TDS.3:
1
- ADV_IMP.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ATE:
- AVA:
- AVA_VAN.3:
1
- AVA_VAN.5:
4
- ASE:
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
4
|
pdf_data/st_keywords/cc_sar/AVA |
|
- AVA_VAN.3: 1
- AVA_VAN.5:
4
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
2
|
4
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5+ |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
2
|
5
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
1
|
1
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
- FDP:
- FDP_DAU:
4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1:
4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1:
1
- FDP_DAU.2.1:
1
- FDP_DAU.2.2:
1
- FDP_ITC:
2
- FDP_IFC.1:
9
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI:
4
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT:
2
- FDP_RIP:
1
- FIA:
- FIA_API:
5
- FIA_AFL:
6
- FIA_API.1:
8
- FIA_API.1.1:
2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.3:
5
- FMT_MOF.1:
2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1:
1
- FMT_MSA:
14
- FMT_MSA.1.1:
3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC:
13
- FTP_ITC.1:
2
- FTP_TRP.1:
2
- FTP_ITC.1.1:
4
- FTP_ITC.1.2:
4
- FTP_ITC.1.3:
4
|
- FAU:
- FAU_SAS:
6
- FAU_GEN:
1
- FAU_SAS.1:
14
- FAU_SAS.1.1:
2
- FCS:
- FCS_RND:
7
- FCS_CKM:
53
- FCS_COP:
77
- FCS_CKM.1:
20
- FCS_RND.1:
16
- FCS_RND.1.1:
2
- FCS_CKM.2:
8
- FCS_COP.1:
11
- FCS_CKM.4:
55
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
7
- FDP:
- FDP_ACF:
13
- FDP_ITC.1:
16
- FDP_ITC.2:
16
- FDP_ACC.1:
7
- FDP_ACC:
16
- FDP_ACF.1:
10
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1:
9
- FDP_RIP.1.1:
1
- FDP_UCT.1:
3
- FDP_UCT:
7
- FDP_IFC.1:
4
- FDP_UCT.1.1:
1
- FDP_UIT.1:
3
- FDP_UIT:
7
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FIA:
- FIA_API:
17
- FIA_AFL:
21
- FIA_SOS.2:
1
- FIA_API.1:
7
- FIA_API.1.1:
1
- FIA_UAU.4:
3
- FIA_UAU:
75
- FIA_UAU.1:
5
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID:
26
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UID.1:
7
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.5:
4
- FIA_UAU.6.1:
2
- FIA_UAU.6:
1
- FMT:
- FMT_LIM:
7
- FMT_LIM.1:
22
- FMT_LIM.2:
20
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MTD:
75
- FMT_MSA.3:
3
- FMT_SMF.1:
50
- FMT_SMR.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR:
33
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
1
- FMT_MTD.1:
14
- FMT_MTD.1.1:
1
- FMT_MTD.3:
8
- FMT_MTD.3.1:
1
- FMT_MSA.1:
1
- FPT:
- FPT_EMS:
4
- FPT_TST:
2
- FPT_EMS.1:
14
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
11
- FPT_TST.1:
11
- FPT_PHP.3:
13
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FTP:
- FTP_ITC.1:
4
- FTP_TRP.1:
4
- FTP_ITC:
14
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM:
14
- FCS_CKM.4:
8
- FCS_COP:
8
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
2
|
- FCS_RND: 7
- FCS_CKM:
53
- FCS_COP:
77
- FCS_CKM.1:
20
- FCS_RND.1: 16
- FCS_RND.1.1: 2
- FCS_CKM.2:
8
- FCS_COP.1:
11
- FCS_CKM.4:
55
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
14
|
53
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
5
|
20
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
8
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
8
|
55
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
8
|
77
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
2
|
11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
2
|
7
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_DAU: 4
- FDP_UIT:
3
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC:
4
- FDP_ACF.1:
6
- FDP_ACC.1.1:
4
- FDP_ACF:
4
- FDP_ACC.1:
14
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_ITC: 2
- FDP_IFC.1:
9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI: 4
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_UCT:
2
- FDP_RIP: 1
|
- FDP_ACF:
13
- FDP_ITC.1:
16
- FDP_ITC.2:
16
- FDP_ACC.1:
7
- FDP_ACC:
16
- FDP_ACF.1:
10
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1:
9
- FDP_RIP.1.1:
1
- FDP_UCT.1:
3
- FDP_UCT:
7
- FDP_IFC.1:
4
- FDP_UCT.1.1:
1
- FDP_UIT.1: 3
- FDP_UIT:
7
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
4
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
14
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
4
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
6
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
9
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
4
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
4
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
1
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT |
2
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API:
5
- FIA_AFL:
6
- FIA_API.1:
8
- FIA_API.1.1:
2
- FIA_UAU.1:
4
- FIA_UID.1:
6
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UAU:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
|
- FIA_API:
17
- FIA_AFL:
21
- FIA_SOS.2: 1
- FIA_API.1:
7
- FIA_API.1.1:
1
- FIA_UAU.4: 3
- FIA_UAU:
75
- FIA_UAU.1:
5
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID:
26
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UID.1:
7
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.5: 4
- FIA_UAU.6.1: 2
- FIA_UAU.6: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL |
6
|
21
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API |
5
|
17
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
5
|
75
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
5
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
4
|
26
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.3:
5
- FMT_MOF.1: 2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1.1: 3
- FMT_MSA.2: 2
- FMT_MSA.1:
3
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_LIM: 7
- FMT_LIM.1: 22
- FMT_LIM.2: 20
- FMT_LIM.1.1: 3
- FMT_LIM.2.1: 3
- FMT_MTD:
75
- FMT_MSA.3:
3
- FMT_SMF.1:
50
- FMT_SMR.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR: 33
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
1
- FMT_MTD.1: 14
- FMT_MTD.1.1:
1
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_MSA.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
5
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
4
|
75
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
8
|
50
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
11
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS:
5
- FPT_EMS.1:
7
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
- FPT_EMS:
4
- FPT_TST:
2
- FPT_EMS.1:
14
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
11
- FPT_TST.1:
11
- FPT_PHP.3:
13
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
5
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
7
|
14
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
2
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
2
|
13
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
3
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
13
|
14
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
4
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
4
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
2
|
6
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility/Serma |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1:
11
- EF.DG2:
5
- EF.DG3:
11
- EF.DG4:
11
- EF.DG5:
3
- EF.DG16:
9
- EF.DG14:
5
- EF.DG15:
2
- EF.COM:
3
- EF.SOD:
4
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
- FI:
- physical tampering:
4
- Malfunction:
1
|
- SCA:
- Leak-Inherent:
2
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- Physical Tampering:
3
- Physical tampering:
2
- Malfunction:
5
- malfunction:
6
- fault injection:
1
- other:
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering: 4
- Malfunction:
1
|
- Physical Tampering: 3
- Physical tampering: 2
- Malfunction:
5
- malfunction: 6
- fault injection: 1
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
1
|
5
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
|
- Leak-Inherent:
2
- physical probing: 3
- DPA:
2
- SPA:
1
- timing attacks:
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
1
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
1
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks |
1
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- PKCS:
- SCP:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS 186-3:
1
- FIPS 46-3:
1
- FIPS 197:
1
- NIST:
- SP 800-90:
2
- SP 800-67:
1
- PKCS:
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2009-07-004: 1
|
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004: 1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-001 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-002 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-003 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
|
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS 186-3: 1
- FIPS 46-3: 1
- FIPS 197: 1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS46-3 |
1
|
1
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 |
2
|
2
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 |
2
|
5
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- Triple-DES:
6
- TDES:
7
- 3DES:
2
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
1
|
12
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
- Triple-DES: 6
- TDES:
7
- 3DES: 2
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
4
|
7
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
2
|
1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
339
|
107
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Antoine de Lavernette
|
Antoine de Lavernette
|
pdf_data/st_metadata//CreationDate |
D:20160504105208+02'00'
|
D:20150226163908+01'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2013
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Keywords |
Security Target, CC, eTravel
|
Security Target, CC, eTravel
|
pdf_data/st_metadata//ModDate |
D:20160504105208+02'00'
|
D:20150226163908+01'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2013
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Subject |
MRTD
|
MRTD
|
pdf_data/st_metadata//Title |
eTravel v1.0 Security Target MAÏA3
|
eTravel EAC v2 Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
1225698
|
1650674
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
52
|
89
|
dgst |
89df7836e74b174e
|
c1e055aa6fc7a187
|