name |
eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) |
eTravel 2.5.A BAC on MultiApp V5.0.A (version 2.5.A.0) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
12.12.2027 |
12.12.2027 |
not_valid_before |
12.12.2022 |
12.12.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_55.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_54.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_55fr-eac-on-bac.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_54fr-bac.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_55en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_54en.pdf |
manufacturer |
THALES DIS FRANCE SA |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.thalesgroup.com/en/europe/france |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ADV_TDS.4, ATE_DPT.3, ADV_INT.2, EAL4+, ADV_FSP.5 |
dgst |
8c9b9f5e9dda90e8 |
72163bed7a6e6d6b |
heuristics/cert_id |
ANSSI-CC-2022/55 |
ANSSI-CC-2022/54 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ALC_DVS.2, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, ATE_DPT.1, AVA_VAN.5 |
ADV_FSP.5, ALC_CMS.5, ADV_ARC.1, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3, ADV_TDS.4, ADV_INT.2 |
heuristics/extracted_versions |
5.0, 0.0, 2.5 |
5.0, 2.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1107-V2-2021, ANSSI-CC-2022/12, ANSSI-CC-2022/52 |
BSI-DSZ-CC-1107-V2-2021, ANSSI-CC-2022/52, ANSSI-CC-2022/11 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021, ANSSI-CC-2022/52, ANSSI-CC-2021/42, BSI-DSZ-CC-1107-2020, ANSSI-CC-2022/12 |
ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021, ANSSI-CC-2022/52, ANSSI-CC-2022/11, ANSSI-CC-2021/42, BSI-DSZ-CC-1107-2020 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2022/55
- description: Le produit évalué est « eTravel 2.5.A EAC on BAC on MultiApp V5.0.A, version 2.5.A.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur
- developer: THALES DIS FRANCE SAS, INFINEON TECHNOLOGIES AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2022/55
- certification_date: 12.12.2022
- developer: THALES DIS FRANCE SAS, INFINEON TECHNOLOGIES AG
- evaluation_facility: CEA-LETI
- expiration_date: 12.12.2027
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10 certifié BSI-PP-0056-2009 le 25 mars 2009.
- sponsor: THALES DIS FRANCE SAS
- expiration_date: 12.12.2027
- level: EAL5+
- product: eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0)
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-25a-eac-bac-multiapp-v50a-version-25a00-0
|
- cert_id: ANSSI-CC-2022/54
- description: Le produit évalué est « eTravel 2.5.A BAC on MultiApp V5.0.A, version 2.5.A.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur notam
- developer: THALES DIS FRANCE SAS, INFINEON TECHNOLOGIES AG
- enhanced:
- augmented: ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2022/54
- certification_date: 12.12.2022
- developer: THALES DIS FRANCE SAS, INFINEON TECHNOLOGIES AG
- evaluation_facility: CEA - LETI
- expiration_date: 11.12.2027
- level: EAL4+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Basic Access Control, version 1.10certifié BSI-PP-0055-2009 le 25 mars 2009
- sponsor: THALES DIS FRANCE SAS
- expiration_date: 11.12.2027
- level: EAL4+
- product: eTravel 2.5.A BAC on MultiApp V5.0.A(version 2.5.A.0)
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-25a-bac-multiapp-v50aversion-25a0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1107-V2-2021 |
BSI-DSZ-CC-1107-V2-2021 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1107-V2-2021 |
BSI-DSZ-CC-1107-V2-2021 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-cc-2022_55.pdf |
certificat-cc-2022_54.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: GA
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.5
- /Company: SGDSN
- /CreationDate: D:20221216142324+01'00'
- /Creator: Acrobat PDFMaker 22 pour Word
- /Keywords: version 3.1, révision 5
- /ModDate: D:20221216142325+01'00'
- /Producer: Adobe PDF Library 22.3.39
- /SourceModified: D:20221216132313
- /Title: ANSSI-CC-2022/55
- pdf_file_size_bytes: 153981
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
anssi-cc-2022_55fr-eac-on-bac.pdf |
anssi-cc-2022_54fr-bac.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- FR:
- ANSSI-CC-2022/12: 2
- ANSSI-CC-2022/52: 1
- ANSSI-CC-2022/55: 2
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- FR:
- ANSSI-CC-2022/11: 2
- ANSSI-CC-2022/52: 1
- ANSSI-CC-2022/54: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0056-2009: 2
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon Technologies AG: 1
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: [email protected]
- /Category: version 2.5.A.0.0
- /Comments: ANSSI-CC-CER-F-07_v31.3
- /Company: THALES DIS FRANCE SAS
- /CreationDate: D:20221216142250+01'00'
- /Creator: Acrobat PDFMaker 22 pour Word
- /Keywords: [ANSSI Crypto]
- /ModDate: D:20221216142254+01'00'
- /Producer: Adobe PDF Library 22.3.39
- /SourceModified: D:20221216132238
- /Subject: eTravel 2.5.A EAC on BAC on MultiApp V5.0.A
- /Title: ANSSI-CC-2022/55
- pdf_file_size_bytes: 571306
- pdf_hyperlinks: http://www.sogis.eu/, mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
|
pdf_data/st_filename |
anssi-cible-cc-2022_55en.pdf |
anssi-cible-cc-2022_54en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- NL:
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-2009: 1
|
- BSI:
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0084-: 1
- BSI-PP- 0056-V2-MA-2012: 1
- BSI-PP-0055-2009: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
|
- EAL:
- EAL 6+: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 4
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP.5: 3
- ADV_INT.2: 3
- ADV_TDS.4: 3
- ALC:
- ALC_CMS.5: 3
- ALC_DVS.2: 3
- ALC_TAT.2: 3
- ASE:
- ATE:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 53
- FCS_CKM.1: 17
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.4: 48
- FCS_CKM.4.1: 1
- FCS_COP: 85
- FCS_COP.1: 8
- FCS_COP.1.1: 4
- FCS_RND: 7
- FCS_RND.1: 17
- FCS_RND.1.1: 2
- FCS_RNG: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 22
- FDP_ACF: 2
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 12
- FDP_UCT.1.1: 1
- FDP_UIT.1: 12
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 21
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 21
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 14
- FIA_UAU.4.1: 1
- FIA_UAU.5: 15
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UID: 25
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 25
- FMT_LIM.1.1: 3
- FMT_LIM.2: 23
- FMT_LIM.2.1: 3
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 73
- FMT_MTD.1: 5
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 47
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 34
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 15
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC.1: 7
- FTP_TRP.1: 5
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 29
- FCS_CKM.1: 16
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 32
- FCS_CKM.4.1: 1
- FCS_COP: 66
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 17
- FCS_RND.1.1: 2
- FCS_RNG: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 21
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 14
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 5
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 13
- FDP_UCT.1.1: 1
- FDP_UIT.1: 12
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 14
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 15
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 13
- FIA_UAU.4.1: 1
- FIA_UAU.5: 12
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 13
- FIA_UAU.6.1: 1
- FIA_UID: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 23
- FMT_LIM.1.1: 2
- FMT_LIM.2: 21
- FMT_LIM.2.1: 2
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 48
- FMT_MTD.1: 6
- FMT_SMF: 1
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SRM.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 15
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC.1: 6
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- OE:
- OE.BAC-PP: 4
- OE.BAC_PP: 1
- OE.MRTD_: 2
|
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Infineon:
- Thales:
|
- Gemalto:
- Infineon:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 4
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 4
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 7
- EF.DG1: 17
- EF.DG14: 7
- EF.DG15: 2
- EF.DG16: 16
- EF.DG2: 8
- EF.DG3: 19
- EF.DG4: 18
- EF.DG5: 6
- EF.SOD: 8
|
- EF:
- EF.COM: 8
- EF.DG1: 28
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 5
- EF.DG16: 26
- EF.DG2: 10
- EF.DG3: 6
- EF.DG4: 6
- EF.DG5: 7
- EF.DG6: 1
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
False |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |