name |
IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2 |
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA (version du patch: 1.3) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
archived |
not_valid_after |
09.07.2025 |
31.08.2020 |
not_valid_before |
09.07.2020 |
31.08.2015 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_53fr.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_53fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_15.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_53en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_15_LITE.pdf |
manufacturer |
Idemia |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.idemia.com |
https://www.gemalto.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
9dcb287f90a20109 |
d89399d5b767d996 |
heuristics/cert_id |
ANSSI-CC-2020/53 |
ANSSI-CC-2015/15 |
heuristics/cert_lab |
CEA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ALC_DVS.2, AGD_OPE.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.5 |
ALC_CMS.5, ATE_FUN.1, ADV_IMP.1, ASE_TSS.2, ATE_DPT.3, ALC_FLR.1, AGD_PRE.1, ALC_DVS.2, AVA_VAN.5, ATE_COV.2, ALC_TAT.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
heuristics/extracted_versions |
8.2, 1.3 |
3.1, 1.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2016/03, ANSSI-CC-2015/41, ANSSI-CC-2015/37, ANSSI-CC-2015/39, ANSSI-CC-2016/04, ANSSI-CC-2015/38, ANSSI-CC-2015/40 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2020/26, ANSSI-CC-2019/36, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V3-2019 |
ANSSI-CC-2014/86, BSI-DSZ-CC-0845-V2-2013 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2016/03, ANSSI-CC-2015/41, ANSSI-CC-2015/37, ANSSI-CC-2015/39, ANSSI-CC-2016/04, ANSSI-CC-2015/38, ANSSI-CC-2015/40 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2019/28, BSI-DSZ-CC-0973-2016, ANSSI-CC-2017/49, ANSSI-CC-2019/36, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2020/26, BSI-DSZ-CC-1059-V3-2019 |
BSI-DSZ-CC-0666-2012, ANSSI-CC-2014/86, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2020/53
- description: Le produit évalué est l’application « : IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2, Identification F0 02 02 13 » développée par Idemia et masquée sur le composant NXP P60D145 développé par NXP Semiconductors GmbH. Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2 et d’un microcontrôleur sécurisés. Il est destiné à être ut
- developer: Idemia, NXP Semiconductors GmbH
- enhanced:
- expiration_date: 09.07.2025
- level: EAL5+
- product: IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2
- sponsor: Idemia, NXP Semiconductors GmbH
- url: https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-en-configuration-4-sur-la-plateforme-id-one-cosmo-v82-0
|
- cert_id: ANSSI-CC-2015/15
- description: La certificationporte sur la plateforme ouverte Java Card du produit « MultiApp v3.1 » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS. La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui sero
- developer: Gemalto / NXP Semiconductors
- enhanced:
- level: EAL5+
- product: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/plateforme-java-card-en-configuration-ouverte-de-la-carte-puce-multiapp-v31-0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2020/26 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2020/26 |
BSI-DSZ-CC-0845-V2-2013 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-2020_53fr.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0075-2012: 1
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20200713154252+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20200713154252+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 495727
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
anssi-cc-2020_53fr.pdf |
ANSSI-CC-2015_15.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2020/53
- cert_item: IAS ECC v2, version 1.3 in configuration #4 on ID-One Cosmo v8.2 open platform
- cert_item_version: Identification de l’applet : F0 02 02 13 Identification du matériel de la plateforme : 09 11 21 Identification du patch : 09 42 22
- cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France NXP Semiconductors GmbH Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/15
- cert_item: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
- cert_item_version: Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1059-2018: 1
- BSI-DSZ-CC-1059-V3-2019: 1
- FR:
- ANSSI-CC-2019/36: 2
- ANSSI-CC-2020/26: 2
- ANSSI-CC-2020/53: 19
|
- DE:
- BSI-DSZ-CC-0845-V2-2013: 3
- FR:
- ANSSI-CC-2014/86: 2
- ANSSI-CC-2015/15: 22
- ANSSI-CC-PP-2010/03-M01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP- 0071-2012: 1
- BSI-CC-PP- 0075-2012: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-: 3
- PP-SSCD-Part2: 1
- PP-SSCD-Part4: 1
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 2
- BSI:
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_OPE: 1
- ADV_PRE: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- AGD_OPE: 3
- AGD_PALP: 1
- AGD_PDEV: 1
- AGD_POPE: 1
- AGD_PPRE: 1
- AGD_PRE: 5
- AGD_QUA: 2
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Idemia:
- NXP:
- NXP: 6
- NXP Semiconductors: 3
|
- Gemalto:
- NXP:
- NXP: 4
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
- CEA-LETI:
- CEA - LETI: 1
- CEA-LETI: 1
- CESTI:
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20200713153731+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20200713153731+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 151240
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Beatrice Duquesnoy
- /CreationDate: D:20150908144903+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.016
- /ModDate: D:20150908144903+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D144PVA
- /Title: ANSSI-CC-2015/15
- pdf_file_size_bytes: 731454
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
anssi-cible-cc-2020_53en.pdf |
anssi_cible_2015_15_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0845-V2-2013: 2
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0005: 1
- BSI-PP-0006: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD-KG: 2
- PP-SSCD-KI: 2
- PP-SSCD-T2: 2
- PP-SSCD-T3: 2
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 6
- EAL5 augmented: 2
|
- EAL:
- EAL 6+: 1
- EAL5: 6
- EAL5 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 10
- AGD_OPE.1: 2
- AGD_PRE: 14
- AGD_PRE_PLT: 2
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 7
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 10
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 6
- ADV_IMP: 1
- ADV_IMP.1: 9
- ADV_INT.2: 3
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 3
- ALC_CMS.5: 2
- ALC_DEL.1: 3
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 5
- ALC_TAT.1: 2
- ALC_TAT.2: 5
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 2
- ATE_DPT.3: 3
- ATE_FUN.1: 9
- ATE_IND.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 36
- FCS_CKM.1: 41
- FCS_CKM.2: 8
- FCS_CKM.3: 9
- FCS_CKM.4: 60
- FCS_CKM.4.1: 1
- FCS_COP: 113
- FCS_COP.1: 38
- FCS_COP.1.1: 3
- FCS_RNG: 4
- FCS_RNG.1: 22
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 85
- FDP_ACC.1: 49
- FDP_ACF: 59
- FDP_ACF.1: 42
- FDP_CKM: 4
- FDP_CKM.1: 1
- FDP_DAU: 6
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_ETC: 12
- FDP_ETC.1: 4
- FDP_IFC.1: 28
- FDP_ITC: 23
- FDP_ITC.1: 43
- FDP_ITC.2: 35
- FDP_RIP: 11
- FDP_RIP.1: 10
- FDP_RIP.1.1: 3
- FDP_ROL: 1
- FDP_SDI: 15
- FDP_SDI.1: 2
- FDP_SDI.2: 6
- FDP_UCT: 13
- FDP_UCT.1: 2
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 24
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_API: 5
- FIA_API.1: 9
- FIA_API.1.1: 1
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 36
- FMT_MSA.1: 8
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 35
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 44
- FMT_MTD.1: 7
- FMT_SMF: 2
- FMT_SMF.1: 50
- FMT_SMF.1.1: 1
- FMT_SMR.1: 48
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 7
- FPT_EMS.1: 9
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 2
- FPT_FLS: 5
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_TST: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 28
- FTP_ITC.1: 14
- FTP_TRP.1: 6
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 40
- FDP_ACC.1: 13
- FDP_ACC.2: 6
- FDP_ACF: 33
- FDP_ACF.1: 16
- FDP_IFC: 24
- FDP_IFC.1: 12
- FDP_IFC.2: 2
- FDP_IFF: 17
- FDP_IFF.1: 12
- FDP_ITC: 12
- FDP_ITC.1: 4
- FDP_ITC.2: 9
- FDP_RIP: 85
- FDP_RIP.1: 10
- FDP_ROL: 14
- FDP_ROL.1: 2
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 7
- FIA_UAU.1: 1
- FIA_UID: 14
- FIA_UID.1: 10
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 91
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 18
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 33
- FMT_SMF.1: 9
- FMT_SMR: 47
- FMT_SMR.1: 22
- FPR:
- FPR_UNO: 7
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 46
- FPT_FLS.1: 5
- FPT_ITT: 7
- FPT_ITT.1: 1
- FPT_PHP: 7
- FPT_PHP.3: 2
- FPT_RCV: 16
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 7
- FPT_TST.1: 3
- FTP:
- FTP_ITC: 9
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 1
- A.CGA: 4
- A.CSP: 4
- A.PLT: 2
- A.SCA: 3
- A.VERIFICATION: 1
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.CODE_EVIDENCE: 2
- OE.HID_VAD: 4
- OE.PLT: 2
- OE.VERIFICATION: 4
- OSP:
- OSP.PLT: 1
- OSP.VERIFICATION: 1
- T:
- T.CONFID_APPLI_DATA: 3
- T.INTEG_APPLI_DATA: 8
- T.OBJ_DELETION: 3
- T.PHYSICAL: 3
- T.RESSOURCES: 3
|
- A:
- A.APPLET: 5
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 15
- O.APPLET: 28
- O.CARD-MANAGEMENT: 3
- O.CARD_MANAGEMENT: 18
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 8
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INT: 3
- O.GLOBAL_ARRAYS_INTEG: 5
- O.HW_AES: 2
- O.INSTALL: 11
- O.JAVAOBJECT: 56
- O.KEY-: 1
- O.KEY-MNGT: 5
- O.KEY_MNGT: 4
- O.LOAD: 6
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 13
- O.SCP: 36
- O.SID: 13
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 10
- OE.CODE_EVIDENCE: 1
- OE.SCP: 6
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP: 1
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
pdf_data/st_keywords/vendor |
- Idemia:
- Morpho:
- NXP:
- Oberthur:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 9
- Triple-DES: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 5
- SHA-384: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA-384: 4
- SHA-512: 3
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 2
- fault injection: 2
- physical tampering: 5
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-3: 1
- FIPS PUB 180-3: 1
- FIPS180-3: 1
- ISO:
- PKCS:
- PKCS #1: 1
- PKCS#1: 3
- PKCS#15: 2
- PKCS#3: 3
- SCP:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- ICAO:
- NIST:
- PKCS:
- PKCS#1: 8
- PKCS#3: 1
- PKCS#5: 5
- SCP:
- SCP01: 3
- SCP02: 3
- SCP03: 3
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- JC2.2.2: 1
- Java Card 2.2.2: 7
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: IDEMIA
- /CreationDate: D:20200421131854+05'30'
- /Creator: Microsoft® Word 2016
- /Keywords: Quality
- /ModDate: D:20200421211621+05'30'
- /Producer: Microsoft® Word 2016
- /Subject: FQR standard
- pdf_file_size_bytes: 2953836
- pdf_hyperlinks: ftp://ftp.itc.1/SCD, ftp://ftp.itc.1/SVD
- pdf_is_encrypted: False
- pdf_number_of_pages: 97
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20150414141904+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC
- /ModDate: D:20150414141904+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1611194
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |