Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0)
ANSSI-CC-2022/55
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
ANSSI-CC-2018/58v2
name eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
status active archived
not_valid_after 12.12.2027 12.12.2023
not_valid_before 12.12.2022 17.12.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_55.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_58v2.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_55fr-eac-on-bac.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_58v2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_55en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_58v2en.pdf
dgst 8c9b9f5e9dda90e8 d3410ad9c75334cf
heuristics/cert_id ANSSI-CC-2022/55 ANSSI-CC-2018/58v2
heuristics/extracted_versions 0.0, 2.5, 5.0 2.3, 4.1
heuristics/report_references/directly_referencing BSI-DSZ-CC-1107-V2-2021, ANSSI-CC-2022/12, ANSSI-CC-2022/52 ANSSI-CC-2018/58, ANSSI-CC-2017/24, ANSSI-CC-2018/32v2
heuristics/report_references/indirectly_referencing ANSSI-CC-2022/10, ANSSI-CC-2022/12, ANSSI-CC-2022/52, ANSSI-CC-2021/42, BSI-DSZ-CC-1107-V2-2021, BSI-DSZ-CC-1107-2020 ANSSI-CC-2016/59, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2017/76, BSI-DSZ-CC-0891-2015, ANSSI-CC-2017/54, ANSSI-CC-2018/32, ANSSI-CC-2017/24, ANSSI-CC-2017/07, BSI-DSZ-CC-0782-2012, ANSSI-CC-2018/58, ANSSI-CC-2015/66, ANSSI-CC-2018/32v2
heuristics/st_references/directly_referencing BSI-DSZ-CC-1107-V2-2021 ANSSI-CC-2017/24
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-1107-V2-2021 ANSSI-CC-2017/24
heuristics/protection_profiles 78bcc246f0f43034 f826c2b289ac76dc
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026b.pdf
pdf_data/cert_filename certificat-cc-2022_55.pdf certificat-2018_58v2.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2022/55: 2
  • FR:
    • ANSSI-CC-2018/58v2: 2
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 2
  • Serma:
    • SERMA: 2
pdf_data/cert_metadata
  • /Author: GA
  • /Category:
  • /Comments: ANSSI-CC-CER-F-14_v14.5
  • /Company: SGDSN
  • /CreationDate: D:20221216142324+01'00'
  • /Creator: Acrobat PDFMaker 22 pour Word
  • /Keywords: version 3.1, révision 5
  • /ModDate: D:20221216142325+01'00'
  • /Producer: Adobe PDF Library 22.3.39
  • /SourceModified: D:20221216132313
  • /Title: ANSSI-CC-2022/55
  • pdf_file_size_bytes: 153981
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: sharbus
  • /CreationDate: D:20211222165349+01'00'
  • /ModDate: D:20211222165349+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - certificat-2018_58v2
  • pdf_file_size_bytes: 1306910
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename anssi-cc-2022_55fr-eac-on-bac.pdf anssi-cc-2018_58v2.pdf
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • FR:
    • ANSSI-CC-2022/12: 2
    • ANSSI-CC-2022/52: 1
    • ANSSI-CC-2022/55: 2
  • FR:
    • ANSSI-CC-2017/24: 2
    • ANSSI-CC-2018/32v2: 2
    • ANSSI-CC-2018/58: 4
    • ANSSI-CC-2018/58v2: 17
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0056-2009: 2
    • BSI-PP-0084-2014: 1
  • BSI:
    • BSI-CC-PP-0056-2009: 1
    • BSI-PP-0056-2009: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_PRE: 6
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 3
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon Technologies AG: 1
  • Gemalto:
    • Gemalto: 11
  • Samsung:
    • Samsung: 1
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_metadata
  • /Author: qualite@intranet.fr
  • /Category: version 2.5.A.0.0
  • /Comments: ANSSI-CC-CER-F-07_v31.3
  • /Company: THALES DIS FRANCE SAS
  • /CreationDate: D:20221216142250+01'00'
  • /Creator: Acrobat PDFMaker 22 pour Word
  • /Keywords: [ANSSI Crypto]
  • /ModDate: D:20221216142254+01'00'
  • /Producer: Adobe PDF Library 22.3.39
  • /SourceModified: D:20221216132238
  • /Subject: eTravel 2.5.A EAC on BAC on MultiApp V5.0.A
  • /Title: ANSSI-CC-2022/55
  • pdf_file_size_bytes: 571306
  • pdf_hyperlinks: http://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.ssi.gouv.fr/, mailto:certification@ssi.gouv.fr
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Author: sharbus
  • /CreationDate: D:20211222164829+01'00'
  • /ModDate: D:20211222164829+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - ANSSI-CC-2018_58v2
  • pdf_file_size_bytes: 4218025
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename anssi-cible-cc-2022_55en.pdf anssi-cible-cc-2018_58v2en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V2-2021: 1
  • NL:
    • CC-1: 4
    • CC-2: 5
    • CC-3: 3
  • FR:
    • ANSSI-CC-2017/24: 1
  • NL:
    • CC-1: 4
    • CC-2: 6
    • CC-3: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL5: 5
    • EAL5 augmented: 1
    • EAL5+: 1
  • EAL:
    • EAL 6+: 1
    • EAL5: 5
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 4
  • ASE:
    • ASE_ECD: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 2
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 4
  • ASE:
    • ASE_ECD: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 2
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 13
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 53
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 6
    • FCS_CKM.4: 48
    • FCS_CKM.4.1: 1
    • FCS_COP: 85
    • FCS_COP.1: 8
    • FCS_COP.1.1: 4
    • FCS_RND: 7
    • FCS_RND.1: 17
    • FCS_RND.1.1: 2
    • FCS_RNG: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 22
    • FDP_ACF: 2
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 6
    • FDP_ITC: 1
    • FDP_ITC.1: 14
    • FDP_ITC.2: 14
    • FDP_ITT.1: 1
    • FDP_SDC.1: 1
    • FDP_SDI.2: 1
    • FDP_UCT.1: 12
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 12
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 21
    • FIA_API.1: 7
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 21
    • FIA_UAU.1: 5
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 14
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 15
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UID: 25
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 9
    • FMT_LIM.1: 25
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 23
    • FMT_LIM.2.1: 3
    • FMT_MSA.1: 2
    • FMT_MSA.3: 4
    • FMT_MTD: 73
    • FMT_MTD.1: 5
    • FMT_MTD.3: 8
    • FMT_MTD.3.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 47
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 12
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_TRP.1: 5
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 31
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 6
    • FCS_CKM.4: 42
    • FCS_CKM.4.1: 1
    • FCS_COP: 65
    • FCS_COP.1: 8
    • FCS_COP.1.1: 5
    • FCS_RND: 7
    • FCS_RND.1: 12
    • FCS_RND.1.1: 2
    • FCS_RNG: 1
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC: 1
    • FDP_ITC.1: 14
    • FDP_ITC.2: 14
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 16
    • FIA_API.1: 7
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 17
    • FIA_UAU.1: 5
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 12
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 13
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UID: 20
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 22
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 20
    • FMT_LIM.2.1: 3
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 53
    • FMT_MTD.1: 7
    • FMT_MTD.3: 6
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 44
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 31
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.MRTD_: 1
  • O:
    • O.RND: 4
  • OE:
    • OE.BAC-PP: 4
    • OE.BAC_PP: 1
    • OE.MRTD_: 2
  • A:
    • A.MRTD_: 1
  • O:
    • O.RND: 4
  • OE:
    • OE.BAC-PP: 3
    • OE.BAC_PP: 1
    • OE.MRTD_: 3
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon: 15
  • Thales:
    • Thales: 14
  • Gemalto:
    • Gemalto: 307
  • Samsung:
    • Samsung: 12
  • Thales:
    • Thales: 1
pdf_data/st_keywords/eval_facility
  • CESTI:
    • CESTI: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 9
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 9
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 16
  • PACE:
    • PACE: 15
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 4
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
  • FI:
    • Malfunction: 6
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 1
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 7
    • EF.DG1: 17
    • EF.DG14: 7
    • EF.DG15: 2
    • EF.DG16: 16
    • EF.DG2: 8
    • EF.DG3: 19
    • EF.DG4: 18
    • EF.DG5: 6
    • EF.SOD: 8
  • EF:
    • EF.COM: 7
    • EF.DG1: 17
    • EF.DG14: 7
    • EF.DG15: 3
    • EF.DG16: 16
    • EF.DG2: 8
    • EF.DG3: 19
    • EF.DG4: 18
    • EF.DG5: 6
    • EF.SOD: 8
pdf_data/st_metadata
  • /Author: D1417546
  • /CreationDate: D:20210921161242+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: 05-07-2018
  • /ModDate: D:20210921161242+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 1.5
  • /Title: MultiApp V4.1: eTravel 2.3 EAC on BAC Security Target
  • pdf_file_size_bytes: 1888188
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage False True
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different