Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BAE Systems STOP™ 8.8.2
553-EWA
Plateforme ID Motion V2
ANSSI-CC-2018/35
name BAE Systems STOP™ 8.8.2 Plateforme ID Motion V2
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA FR
status active archived
not_valid_after 15.09.2028 30.08.2023
not_valid_before 15.09.2023 30.08.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20CT%20v1.0.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_35.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/553-EWA%20ST%20v0.24.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_35en.pdf
manufacturer BAE Systems gemalto
manufacturer_web https://www.baesystems.com
security_level {} ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 8a5ef8e5642a483d 957e5033a2f0d265
heuristics/cert_id 553-EWA ANSSI-CC-2018/35
heuristics/cert_lab CANADA THALES
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 AGD_PRE.1, ALC_FLR.1, AVA_VAN.5, ADV_FSP.4, ALC_DVS.2, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ADV_SPM.1, ADV_IMP.1
heuristics/extracted_versions 8.8.2 -
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2018/37v2, ANSSI-CC-2018/50, ANSSI-CC-2018/36v2
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0945-2017
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2018/37v2, ANSSI-CC-2018/50, ANSSI-CC-2018/36v2
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012
heuristics/scheme_data
  • certification_date: 15.09.2023
  • level: PP_OS_V4.2.1
  • product: BAE Systems STOP™ 8.8.2
  • vendor: BAE Systems
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0945-2017
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0945-2017
heuristics/protection_profiles e34797b67a3163c5 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf {}
pdf_data/cert_filename 553-EWA CT v1.0.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 553-EWA: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author:
  • /CreationDate: D:20230925152434-04'00'
  • /Creator:
  • /Keywords:
  • /ModDate: D:20230925152502-05'00'
  • /Producer: Foxit PDF Editor Printer Version 12.1.0.15345
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 364620
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 553-EWA CR v1.0.pdf anssi-cc-2018_35.pdf
pdf_data/report_frontpage
  • FR:
  • CA:
    • cert_id: 553-EWA
    • cert_lab: CANADA
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2018/35
    • cert_item: Plateforme ID Motion V2
    • cert_item_version: OS version Multos V4.5.2 AMD version 0151v001
    • cert_lab: THALES (TCS – CNES) 290 allée du Lac, 31670 Labège, France
    • developer: Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat Infineon Technologies AG Am Campeon 1-12 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Néant
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 553-EWA: 1
  • DE:
    • BSI-DSZ-CC-0945-2017: 2
  • FR:
    • ANSSI-CC-2018/35: 17
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 5
  • Infineon:
    • Infineon Technologies AG: 2
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • XTS:
    • XTS: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile and uses the software in: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Category: Référence, Version
  • /Comments: Gemalto
  • /Company: SGDSN/ANSSI
  • /CreationDate: D:20180905165231+02'00'
  • /Creator: Acrobat PDFMaker 11 pour Word
  • /Keywords: ANSSI-CC-CER-F-07.026
  • /ModDate: D:20180926135019+02'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20180905145227
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 700370
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename 553-EWA ST v0.24.pdf anssi-cible-cc-2018_35en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0945-2017: 1
  • NL:
    • CC-1: 1
    • CC-2: 1
    • CC-3: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 14
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT: 1
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 2
    • ADV_SPM.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.4: 2
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 40
    • FCS_COP.1.1: 4
    • FCS_DTLS_EXT.1: 1
    • FCS_RBG_EXT.1: 9
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 2
    • FCS_TLSC_EXT.1: 8
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 2
    • FCS_TLSC_EXT.1.3: 2
  • FDP:
    • FDP_ACF_EXT.1: 7
    • FDP_ACF_EXT.1.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 7
    • FMT_MOF_EXT.1.1: 2
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 4
  • FPT:
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 2
    • FPT_SBOP_EXT.1: 7
    • FPT_SBOP_EXT.1.1: 2
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 6
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTP:
    • FTP_ITC_EXT.1: 11
    • FTP_ITC_EXT.1.1: 2
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_ARP: 3
    • FAU_ARP.1: 10
    • FAU_ARP.1.1: 2
    • FAU_GEN.1: 4
    • FAU_SAA: 3
    • FAU_SAA.1: 11
    • FAU_SAA.1.1: 2
    • FAU_SAA.1.2: 2
  • FCS:
    • FCS_CKM: 5
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 1
    • FCS_CKM.3: 13
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 16
    • FCS_CKM.4.1: 1
    • FCS_COP: 5
    • FCS_COP.1: 25
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 4
    • FDP_ACC.2: 12
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 14
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_DAU: 3
    • FDP_DAU.1: 8
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ITC: 3
    • FDP_ITC.1: 13
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP: 3
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
    • FDP_ROL: 3
    • FDP_ROL.1: 3
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDI: 3
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 2
    • FIA_UAU: 4
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 8
    • FIA_UAU.4.1: 1
    • FIA_UID: 3
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 3
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 3
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 2
    • FMT_MSA: 5
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 13
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 4
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 4
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 4
    • FPR_UNO.1: 6
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_RCV: 2
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_TDC: 3
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 4
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_RSA: 3
    • FRU_RSA.1: 4
    • FRU_RSA.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 4
    • A.PROPER_: 2
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 2
  • O:
    • O.ACCOUNTABILITY: 9
    • O.INTEGRITY: 7
    • O.MANAGEMENT: 9
    • O.PROTECTED_: 2
    • O.PROTECTED_COMMS: 8
    • O.PROTECTED_STORAGE: 4
  • OE:
    • OE.PLATFORM: 4
    • OE.PROPER_ADMIN: 4
    • OE.PROPER_USER: 4
  • T:
    • T.LIMITED_: 1
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_: 1
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_: 2
    • T.NETWORK_ATTACK: 6
    • T.NETWORK_EAVESDROP: 3
  • A:
    • A.APPLI_CONT: 9
  • O:
    • O.APPLI_DE: 1
    • O.APPLI_DEV: 9
    • O.CIPHER: 3
    • O.DECIPHER: 3
    • O.DEV_DIS_ES: 7
    • O.DIS: 2
    • O.DIS_MECH: 1
    • O.DIS_MECHANIS: 1
    • O.DLV_: 6
    • O.DLV_DATA: 4
    • O.DLV_RESP: 1
    • O.EFFECT_L: 4
    • O.EFFECT_R: 3
    • O.INIT_ACS: 5
    • O.LOAD: 4
    • O.MOD_MEM: 1
    • O.MOD_MEMORY: 1
    • O.REMOVE: 4
    • O.RESOURCE: 2
    • O.RESOURCES: 1
    • O.ROLLBACK: 3
    • O.SAMPLES_ACS: 1
    • O.SAMPLE_ACS: 3
    • O.SECURITY: 4
    • O.SEGREGATE: 4
    • O.SIDE: 5
    • O.TAMPER_E: 1
    • O.TAMPER_ES: 11
    • O.TEST_OPE: 1
    • O.USE_DIAG: 1
  • OSP:
    • OSP.CIPHER: 3
    • OSP.CONF-ALU: 3
  • T:
    • T.APP_CORR: 5
    • T.APP_DISC: 9
    • T.APP_MOD: 5
    • T.APP_READ: 5
    • T.APP_REMOVE: 5
    • T.CLON: 2
    • T.DEL_REMOVE: 5
    • T.DIS: 1
    • T.DIS_DATA: 7
    • T.DIS_TEST_ES: 5
    • T.ERR_REMOVE: 5
    • T.LOAD_APP: 6
    • T.LOAD_MAN: 5
    • T.LOAD_MOD: 7
    • T.LOAD_OTHER: 5
    • T.MOD: 5
    • T.MOD_DATA: 4
    • T.MOD_EXE: 5
    • T.MOD_LOAD: 5
    • T.MOD_SHARE: 5
    • T.MOD_TSF: 5
    • T.RESOURCES: 5
    • T.T_CMD: 5
    • T.T_ES: 5
    • T.T_TOOLS: 5
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 35
  • Infineon:
    • Infineon: 6
    • Infineon Technologies: 3
  • Thales:
    • Thales: 1
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-128: 1
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • 3DES:
      • TDES: 7
    • DES:
      • DES: 26
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 2
      • DHE: 1
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 4096: 1
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 4
      • SHA-384: 5
      • SHA-512: 4
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 3
      • SHA224: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 2
  • TLS:
    • DTLS:
      • DTLS: 2
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 38
      • TLS 1.2: 2
      • TLSv1.2: 1
  • VPN:
    • VPN: 3
  • PACE:
    • PACE: 9
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 1
  • XTS:
    • XTS: 3
  • CBC:
    • CBC: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 10
    • P-384: 10
    • P-521: 8
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
    • physical tampering: 1
  • SCA:
    • side channel: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.CardAccess: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS 197: 1
    • FIPS PUB 186-4: 4
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-57: 2
    • NIST SP 800-90A: 1
  • RFC:
    • RFC 3526: 2
    • RFC 5246: 12
    • RFC 5280: 5
    • RFC 5288: 8
    • RFC 5289: 24
    • RFC 5759: 1
    • RFC 6066: 2
    • RFC 6125: 2
    • RFC 6960: 2
    • RFC 6961: 2
    • RFC 8603: 2
  • X509:
    • X.509: 10
    • x.509: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS197: 1
  • ICAO:
    • ICAO: 2
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. Objectives: OE.PLATFORM The OS relies on being installed on trusted hardware: 1
    • out of scope: 2
  • OutOfScope:
    • out of scope: 2
    • the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE) Mel applications and native modules: NATIVE/MEL Application: GMF v1.0 The GMF: 1
    • to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 8.1.1: 1
pdf_data/st_metadata
  • /CreationDate: D:20180627105258+02'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: Security Target, CC, MULTOS, IDMotion, Platform
  • /ModDate: D:20180926135044+02'00'
  • /Producer: Microsoft® Word 2013
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 2248731
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 82
state/cert/convert_garbage True False
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different