Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
ANSSI-CC-2018/57v2
Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB
ANSSI-CC-2009/56
name eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB
not_valid_after 12.12.2023 01.09.2019
not_valid_before 17.12.2021 17.02.2010
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_57v2.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_57v2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2009-56en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_57v2en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-56en.pdf
manufacturer THALES DIS FRANCE SA Gemalto / NXP Semiconductors
manufacturer_web https://www.thalesgroup.com/en/europe/france https://www.gemalto.com/
security_level {} AVA_VAN.5, ALC_DVS.2, EAL4+
dgst a4088c520eb30448 03de79a10467e320
heuristics/cert_id ANSSI-CC-2018/57v2 ANSSI-CC-2009/56
heuristics/cert_lab [] SERMA
heuristics/indirect_transitive_cves {} CVE-2011-4022, CVE-2014-3402, CVE-2013-1218, CVE-2014-2103, CVE-2013-1243, CVE-2014-3406
heuristics/extracted_sars AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ALC_DVS.2, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, ATE_DPT.1, AVA_VAN.5 ADV_IMP.2, AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ALC_TAT.1, ATE_FUN.1, ATE_COV.2, AVA_MSU.3, ALC_DEL.1, ALC_DVS.2, ADV_TDS.3, ALC_LCD.1, AVA_VLA.4, AGD_OPE.1, ATE_DPT.1, ATE_IND.2, AVA_VAN.5, ALC_CMC.4
heuristics/extracted_versions 4.1, 2.3 1.2, 4.2.7, 1.0
heuristics/prev_certificates ANSSI-CC-2018/57 {}
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2010/52, ANSSI-CC-2010/59, ANSSI-CC-2012/81
heuristics/report_references/directly_referencing ANSSI-CC-2018/57, ANSSI-CC-2018/32v2, ANSSI-CC-2017/24 {}
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2010/52, ANSSI-CC-2010/59, Certificate Number: 2012/81, ANSSI-CC-2012/81
heuristics/report_references/indirectly_referencing ANSSI-CC-2017/54, ANSSI-CC-2018/32, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/59, ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2018/57, ANSSI-CC-2017/07, ANSSI-CC-2015/66 {}
heuristics/scheme_data
  • cert_id: ANSSI-CC-2018/57v2
  • description: Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile inter
  • developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
  • enhanced:
  • level: EAL5+
  • product: eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
  • sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
  • url: https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-pace-eac-and-aa-activated-version-de
  • cert_id: ANSSI-CC-2009/56
  • description: Le produit certifié est la carte à puce Multiapp ID IAS ECC, applet de signature v4.2.7.A chargée sur plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB, développée par Gemalto. La TOE (Target Of Evaluation - cible d'évaluation) est une carte à puce destinée à être utilisée dans le cadre de l'administration électronique. Elle répond aux c
  • developer: Gemalto SA et NXP Semiconductors GmbH
  • enhanced:
  • level: EAL4+
  • product: Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB
  • sponsor: Gemalto SA
  • url: https://cyber.gouv.fr/produits-certifies/carte-puce-multiapp-id-ias-ecc-applet-de-signature-v427a-chargee-sur-la-plate
heuristics/st_references/directly_referencing ANSSI-CC-2017/24 {}
heuristics/st_references/indirectly_referencing ANSSI-CC-2017/24 {}
protection_profiles
pdf_data/cert_filename certificat-2018_57v2.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/57v2: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: sharbus
  • /CreationDate: D:20211222165238+01'00'
  • /ModDate: D:20211222165238+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - certificat-2018_57v2
  • pdf_file_size_bytes: 1321443
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename anssi-cc-2018_57v2.pdf ANSSI-CC_2009-56en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
    • cc_version: Common Criteria version 3.1
    • cert_id: ANSSI-CC-2009/56
    • cert_item: Multiapp ID IAS ECC smart card : electronic signature application v4.2.7.A loaded on Multiapp v1.0 Java Card platform with v1.2 soft mask embedded on NXP P5CD144 VOB
    • cert_item_version: Applet version: v4.2.7.A Multiapp Java Card platform version : v1.0 soft mask version: v1.2 Microcontroller version : V0B
    • cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]
    • developer: Gemalto SA1 6 rue de la Verrerie 92197 Meudon, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2017/24: 2
    • ANSSI-CC-2018/32v2: 2
    • ANSSI-CC-2018/57: 4
    • ANSSI-CC-2018/57v2: 16
  • DE:
    • BSI-DSZ-CC-0411-2007-MA-04: 1
  • FR:
    • ANSSI-CC-2009/56: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0056-V2-2012-MAO2: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
    • BSI-PP-0084-2014: 1
  • BSI:
    • BSI-PP- 0002-2001: 1
    • BSI-PP- 0005-2002: 1
    • BSI-PP- 0006-2002: 1
    • BSI-PP-0002-2001: 2
    • BSI-PP-0005-: 1
    • BSI-PP-0005-2002: 3
    • BSI-PP-0006-2002: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 3
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 and: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 1
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_MSU.3: 1
    • AVA_VAN: 1
    • AVA_VAN.5: 2
    • AVA_VLA.4: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 11
  • Samsung:
    • Samsung: 1
  • Gemalto:
    • Gemalto: 26
  • NXP:
    • NXP: 9
    • NXP Semiconductors: 2
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
  • Serma:
    • Serma Technologies: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • ECC:
    • ECC:
      • ECC: 34
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 28
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ICAO:
    • ICAO: 2
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
pdf_data/report_metadata
  • /Author: sharbus
  • /CreationDate: D:20211222164602+01'00'
  • /ModDate: D:20211222164602+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - ANSSI-CC-2018_57v2
  • pdf_file_size_bytes: 4382162
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /CreationDate: D:20100827152755+02'00'
  • /Keywords:
  • /ModDate: D:20100827152755+02'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • pdf_file_size_bytes: 147571
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename anssi-cible-cc-2018_57v2en.pdf anssi-cc-cible_2009-56en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2017/24: 1
  • NL:
    • CC-1: 5
    • CC-2: 5
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0055-2009: 1
    • BSI-PP-0056-V2-: 1
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0004-2002T-: 1
    • BSI-PP-0005-2002T-03-04-2002: 1
    • BSI-PP-0006-2002T-03-04-2002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL5: 5
    • EAL5 augmented: 1
  • EAL:
    • EAL4: 8
    • EAL4 augmented: 6
    • EAL4+: 4
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 4
  • ASE:
    • ASE_ECD: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 4
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 1
    • ADV_LLD: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 3
    • AGD_PRE.1: 3
    • AGD_USR: 1
  • ALC:
    • ALC_CMC: 2
    • ALC_CMC.4: 1
    • ALC_CMS: 2
    • ALC_DEL: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 3
    • ALC_DVS.2: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 1
    • AVA_VAN: 2
    • AVA_VAN.5: 2
    • AVA_VLA: 1
    • AVA_VLA.4: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 13
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 55
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 8
    • FCS_CKM.4: 57
    • FCS_CKM.4.1: 1
    • FCS_COP: 90
    • FCS_COP.1: 9
    • FCS_COP.1.1: 8
    • FCS_RND: 7
    • FCS_RND.1: 15
    • FCS_RND.1.1: 2
    • FCS_RNG: 1
  • FDP:
    • FDP_ACC: 15
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF: 12
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
    • FDP_ITC.1: 16
    • FDP_ITC.2: 16
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_UCT: 6
    • FDP_UCT.1: 3
    • FDP_UCT.1.1: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 3
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 22
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 17
    • FIA_API.1: 6
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 75
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 2
    • FIA_UID: 26
    • FIA_UID.1: 6
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 3
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 66
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 7
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 49
    • FMT_SMF.1.1: 1
    • FMT_SMR: 32
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 13
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 5
    • FCS_CKM.4: 4
    • FCS_COP: 9
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 9
    • FDP_ACF: 9
    • FDP_ACF.1: 24
    • FDP_ETC: 6
    • FDP_ETC.1: 4
    • FDP_ITC: 6
    • FDP_ITC.1: 8
    • FDP_RIP: 4
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 1
    • FDP_SDI: 5
    • FDP_SDI.2: 7
    • FDP_UCT: 3
    • FDP_UCT.1: 5
    • FDP_UIT: 6
    • FDP_UIT.1: 6
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 4
    • FIA_ATD.1: 2
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID: 4
    • FIA_UID.1: 4
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 3
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA: 9
    • FMT_MSA.1: 5
    • FMT_MSA.2: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 7
    • FMT_MTD: 3
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 2
    • FMT_SMR: 3
    • FMT_SMR.1: 3
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT: 1
    • FPT_AMT.1: 1
    • FPT_FLS: 3
    • FPT_FLS.1: 3
    • FPT_FLS.1.1: 1
    • FPT_PHP: 4
    • FPT_PHP.1: 3
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_TST: 5
    • FPT_TST.1: 3
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 10
    • FTP_ITC.1: 14
    • FTP_TRP: 7
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 4
  • OE:
    • OE.BAC-PP: 1
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • D:
    • D.DTBS: 6
    • D.RAD: 5
    • D.SCD: 10
    • D.SIG: 3
    • D.SSCD: 1
    • D.SVD: 7
    • D.VAD: 1
  • OE:
    • OE.HI_VAD: 3
    • OE.SVD_AUTH_CGA: 1
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 359
  • Samsung:
    • Samsung: 12
  • Thales:
    • Thales: 1
  • Gemalto:
    • Gemalto: 357
  • NXP:
    • NXP: 10
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
  • DES:
    • 3DES:
      • 3DES: 2
      • TDES: 7
      • Triple-DES: 5
  • constructions:
    • MAC:
      • CMAC: 3
      • KMAC: 3
  • DES:
    • 3DES:
      • TDES: 9
      • Triple-DES: 1
    • DES:
      • DES: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 10
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECC:
      • ECC: 28
  • FF:
    • DH:
      • DH: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-256: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 8
  • MAC:
    • MAC: 8
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 112
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 4
    • RNG: 2
  • RNG:
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 6
    • Physical Tampering: 3
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 6
  • SCA:
    • DPA: 2
    • Leak-Inherent: 1
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
  • FI:
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • Side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 3
    • EF.DG1: 11
    • EF.DG14: 5
    • EF.DG15: 2
    • EF.DG16: 9
    • EF.DG2: 5
    • EF.DG3: 10
    • EF.DG4: 10
    • EF.DG5: 3
    • EF.SOD: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 186-3: 1
    • FIPS 197: 1
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • NIST:
    • SP 800-67: 1
    • SP 800-90: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 5
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 2
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 46-3: 1
  • PKCS:
    • PKCS #1: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • JC2.2: 1
    • JC2.2.1: 1
    • Java Card 2.2.1: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Multiapp platform. Beside the TOE, the product also contains the following Java Card applications (out of scope of the TOE) Figure 1 represents the product. The TOE is bordered with bold and un-continuous line: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: D1417547
  • /CreationDate: D:20210921162304+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: 05-07-2018
  • /ModDate: D:20210921162304+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 1.5
  • /Title: MultiApp V4.1: eTravel 2.3 EAC on SAC Security Target
  • pdf_file_size_bytes: 2147397
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
  • /CreationDate: D:20100301110216+01'00'
  • /Keywords:
  • /ModDate: D:20100301110216+01'00'
  • /Producer: GPL Ghostscript 8.54
  • pdf_file_size_bytes: 791366
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/cert/convert_garbage True False
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different