name |
Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
|
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2014-02-27
|
2014-02-07
|
not_valid_after |
2019-09-01
|
2019-09-01
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_13en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_14en.pdf
|
status |
archived
|
archived
|
manufacturer |
Gemalto - Infineon Technologies AG
|
Gemalto - Infineon Technologies AG
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.gemalto.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_13fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_14fr.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': frozenset({'SSCD_TYPE3_V1.05'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': frozenset({'SSCD_TYPE2_V1.04'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 23), 'maintenance_title': 'ANSSI-CC-2014/13-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_13-M01.pdf', 'maintenance_st_link': None}) |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 23), 'maintenance_title': 'ANSSI-CC-2014/14-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_14-M01.pdf', 'maintenance_st_link': None}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
9f0b2e7df2fb5cc4d48a6139ae60eea502adb3fc93be125daf28c52d5e2b4b5f
|
0dddf8ce40a6d6a357e7cccbe34ba471504480350be7128302792b28cbe2a73c
|
state/report/txt_hash |
992419096b27bf313f44729971280d2b26e047893e289800aeec5537a6beeef4
|
4b0de8f690a51a8c19b9f11561ff338a4d830bd192640dd00eb096ad67c95752
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
3e1160ae72a4cad9cb1f6ee1f19c427ac802dd9e57ff4462a6b435a6bf458496
|
4c103beef98d1ffbc34f657914f89279585f7bd485a61a289b149ed4f99b72fe
|
state/st/txt_hash |
de1c0e57dbe43c62d0214fa34fd3c0220083e7d37c306b8f29c4eb04bdb9cb82
|
0c263929e05319fa6321f3cf2ede1d966de187089ced63f9a4e1a54cf90acb4d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2014/13
|
ANSSI-CC-2014/14
|
heuristics/cert_lab |
SERMA |
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2.0 |
- |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2015/08, ANSSI-CC-2014/50, ANSSI-CC-2014/49 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2015/38, ANSSI-CC-2015/37, ANSSI-CC-2014/50, ANSSI-CC-2014/49, ANSSI-CC-2015/08, ANSSI-CC-2016/03, ANSSI-CC-2016/04 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011 |
BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011 |
heuristics/scheme_data/cert_id |
2014/48
|
2014/14
|
heuristics/scheme_data/description |
Le produit certifié est la carte à puce ouverte « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civ
|
Le produit qualifié est l'« application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3masquée sur le composant M7820 A11 », pouvant être en mode contact ou sans-contact. Leproduit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11fabriqué par la société Infineon Technologies.
Ce produit est également proposé sous les noms IDPrime MD 840 (mode contact uni
|
heuristics/scheme_data/developer |
Gemalto / Infineon Technologies AG
|
Gemalto / Infineon Technologies AG
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r4
|
Critères Communs version 3.1r4
|
heuristics/scheme_data/enhanced/cert_id |
2014/48
|
2014/14
|
heuristics/scheme_data/enhanced/certification_date |
11/07/2014
|
07/02/2014
|
heuristics/scheme_data/enhanced/developer |
Gemalto / Infineon Technologies AG
|
Gemalto / Infineon Technologies AG
|
heuristics/scheme_data/enhanced/evaluation_facility |
Serma Technologies
|
Serma Technologies
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
BSI-CC-PP-0056-2009, [PP EACv1], version 1.10
|
BSI-PP-0005-2002, BSI-PP-0006-2002
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-48fr.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-14fr.pdf
|
heuristics/scheme_data/enhanced/sponsor |
Gemalto
|
Gemalto
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-48en.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-14en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
Application eTravel EAC v2.0, en configuration ''EAC on BAC'', sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
|
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
|
heuristics/scheme_data/sponsor |
Gemalto
|
Gemalto
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-eac-bac-sur-la-plateforme-ouverte
|
https://cyber.gouv.fr/produits-certifies/application-ias-v4-sur-la-plateforme-javacard-ouverte-multiapp-v3-masquee-sur-le
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
Rapport ANSSI-CC-2014_13fr.pdf
|
Rapport ANSSI-CC-2014_14fr.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 4 augmenté ALC_DVS.2
|
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1 révision 4
|
Critères Communs version 3.1 révision 4
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2014/13
|
ANSSI-CC-2014/14
|
pdf_data/report_frontpage/FR/cert_item |
Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
|
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
|
pdf_data/report_frontpage/FR/cert_item_version |
Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
|
Version de l’application IAS : 4.0.2.K Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
|
pdf_data/report_frontpage/FR/cert_lab |
Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
pdf_data/report_frontpage/FR/developer |
Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
|
Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
pdf_data/report_frontpage/FR/ref_protection_profiles |
BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
|
Protection Profile – Secure Signature-Creation Device Type 2, version 1.04, certifié sous la référence [BSI-PP-0005-2002]. Protection Profile – Secure Signature-Creation Device Type 3, version 1.05, certifié sous la référence [BSI-PP-0006-2002
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2014/13: 22
- ANSSI-CC-2014/06:
3
|
- ANSSI-CC-2014/14: 23
- ANSSI-CC-2014/06:
4
|
pdf_data/report_keywords/cc_cert_id/FR/ANSSI-CC-2014/06 |
3
|
4
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0055: 1
- BSI-PP-0035-2007:
2
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0035-: 1
|
- BSI-PP-0005-2002: 3
- BSI-PP-0006-2002: 3
- BSI-PP-0035-2007:
2
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 1
- BSI-PP- 0035-2007: 1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0035-2007 |
2
|
2
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA |
- AVA_VAN:
2
- AVA_VAN.5:
1
- AVA_VAN.3: 1
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
1
|
6
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 4: 2
- EAL4:
2
- EAL5:
1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
|
- EAL 5:
3
- EAL4:
2
- EAL5:
1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
1
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL4 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL5 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/eval_facility/Serma/Serma Technologies |
2
|
3
|
pdf_data/report_keywords/hash_function/SHA |
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- javacardx:
- com:
- com.gemalto.javacardx.pace:
1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- ICAO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
39
|
33
|
pdf_data/report_keywords/vendor/Infineon/Infineon |
2
|
3
|
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies |
23
|
5
|
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG |
1
|
1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
Duquesnoy
|
Duquesnoy
|
pdf_data/report_metadata//CreationDate |
D:20140310110008+01'00'
|
D:20140310110235+01'00'
|
pdf_data/report_metadata//Creator |
PScript5.dll Version 5.2.2
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
D:20140310110008+01'00'
|
D:20140310110235+01'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 9.0.0 (Windows)
|
Acrobat Distiller 9.0.0 (Windows)
|
pdf_data/report_metadata//Title |
Microsoft Word - Rapport ANSSI-CC-2014_13fr.doc
|
Microsoft Word - Rapport ANSSI-CC-2014_14fr.doc
|
pdf_data/report_metadata/pdf_file_size_bytes |
203706
|
230125
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
21
|
22
|
pdf_data/st_filename |
Cible ANSSI-CC-2014_13en.pdf
|
Cible ANSSI-CC-2014_14en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
1
|
3
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
2
|
1
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
1
|
2
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
2
|
2
|
pdf_data/st_keywords/cc_cert_id/DE |
|
- BSI-DSZ-CC-0695-2011: 1
- BSI-DSZ-CC-0829-2012:
1
- BSI-DSZ-CC-0727-2011: 1
|
pdf_data/st_keywords/cc_cert_id/DE/BSI-DSZ-CC-0829-2012 |
1
|
1
|
pdf_data/st_keywords/cc_cert_id/NL/CC-1 |
2
|
2
|
pdf_data/st_keywords/cc_cert_id/NL/CC-2 |
5
|
3
|
pdf_data/st_keywords/cc_cert_id/NL/CC-3 |
3
|
3
|
pdf_data/st_keywords/cc_claims |
|
- D:
- D.SCD:
1
- D.SVD:
1
- D.DTBS:
1
- D.VAD:
1
- D.SSCD:
1
- D.RAD:
1
- D.SIG:
1
- A:
- OE:
- OE.SVD_AUTH_CGA:
1
- OE.HI_VAD:
1
|
pdf_data/st_keywords/cc_claims/OE |
|
- OE.SVD_AUTH_CGA:
1
- OE.HI_VAD:
1
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0056-V2-2012:
1
- BSI-CC-PP-0068-V2-2011:
1
- BSI-PP-0055:
1
- BSI-PP-0056:
1
|
- BSI:
- BSI-PP-0035:
1
- BSI-PP-0005:
1
- BSI-PP-0006:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- other:
- PP-SSCD-KG:
16
- PP-SSCD-KI:
14
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0035:
1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
- BSI-PP-0035:
1
- BSI-PP-0005: 1
- BSI-PP-0006: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 |
1
|
1
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4: 2
- EAL 5+:
1
- EAL4 augmented: 1
|
- EAL 5+:
1
- EAL5: 2
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5+ |
1
|
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS:
6
- FAU_GEN:
1
- FAU_SAS.1:
7
- FAU_SAS.1.1:
2
- FCS:
- FCS_RND:
7
- FCS_CKM:
4
- FCS_COP:
18
- FCS_CKM.1:
11
- FCS_RND.1:
6
- FCS_RND.1.1:
2
- FCS_CKM.2:
2
- FCS_COP.1:
7
- FCS_CKM.4:
11
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FDP:
- FDP_ACF:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
- FDP_ACC.1:
6
- FDP_ACF.1:
4
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_UCT.1:
3
- FDP_IFC.1:
2
- FDP_UCT.1.1:
1
- FDP_UIT.1:
3
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FIA:
- FIA_API:
9
- FIA_AFL.1:
6
- FIA_UAU:
5
- FIA_SOS.2:
1
- FIA_API.1:
5
- FIA_API.1.1:
1
- FIA_UAU.5.2:
3
- FIA_UAU.4:
6
- FIA_UAU.6:
4
- FIA_UID.1:
5
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UAU.1:
4
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4.1:
1
- FIA_UAU.5:
3
- FIA_UAU.5.1:
1
- FIA_UAU.6.1:
1
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FMT:
- FMT_LIM:
7
- FMT_LIM.1:
15
- FMT_LIM.2:
14
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
2
- FMT_MSA.3:
1
- FMT_SMF.1:
9
- FMT_SMR.1:
8
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
6
- FMT_MTD:
10
- FMT_SRM.1:
1
- FPT:
- FPT_EMS:
4
- FPT_EMS.1:
8
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
4
- FPT_TST.1:
5
- FPT_PHP.3:
5
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FTP:
- FTP_ITC.1:
2
- FTP_TRP.1:
2
|
- FCS:
- FCS_CKM:
16
- FCS_CKM.4:
10
- FCS_COP:
14
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
6
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
3
- FDP:
- FDP_ITC.1:
5
- FDP_ITC.2:
5
- FDP_ACC.1:
14
- FDP_ACF.1:
3
- FDP_ACC.1.1:
5
- FDP_ACC:
2
- FDP_ACF.1.1:
5
- FDP_ACF.1.2:
5
- FDP_ACF.1.3:
5
- FDP_ACF.1.4:
5
- FDP_ETC.1:
2
- FDP_IFC.1:
11
- FDP_ETC.1.1:
1
- FDP_ETC.1.2:
1
- FDP_ETC:
1
- FDP_ITC:
4
- FDP_ITC.1.1:
2
- FDP_ITC.1.2:
2
- FDP_ITC.1.3:
2
- FDP_RIP.1:
1
- FDP_RIP.1.1:
1
- FDP_SDI:
4
- FDP_SDI.1:
2
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1:
1
- FDP_UIT.1.1:
2
- FDP_UIT.1.2:
2
- FDP_UCT:
2
- FDP_UIT:
2
- FDP_RIP:
1
- FIA:
- FIA_AFL:
5
- FIA_UAU.1:
2
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_ATD.1:
2
- FIA_ATD.1.1:
1
- FIA_UAU:
4
- FIA_UID.1:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID:
4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FMT:
- FMT_MSA.3:
3
- FMT_MOF.1:
2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1:
1
- FMT_MSA:
16
- FMT_MSA.1.1:
3
- FMT_MSA.2:
2
- FMT_MSA.1:
3
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.4.1:
2
- FMT_MTD:
4
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_EMS.1:
7
- FPT_EMS:
3
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST:
2
- FPT_PHP.1:
2
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC.1:
3
- FTP_TRP.1:
2
- FTP_ITC:
13
- FTP_TRP:
4
- FTP_ITC.1.1:
3
- FTP_ITC.1.2:
3
- FTP_ITC.1.3:
3
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND: 7
- FCS_CKM:
4
- FCS_COP:
18
- FCS_CKM.1:
11
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FCS_CKM.2:
2
- FCS_COP.1:
7
- FCS_CKM.4:
11
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
|
- FCS_CKM:
16
- FCS_CKM.4:
10
- FCS_COP:
14
- FCS_CKM.2:
2
- FCS_COP.1:
2
- FCS_CKM.1.1:
2
- FCS_CKM.1:
6
- FCS_CKM.4.1:
2
- FCS_COP.1.1:
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
4
|
16
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
11
|
6
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
11
|
10
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
18
|
14
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
7
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACF: 1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
- FDP_ACC.1:
6
- FDP_ACF.1:
4
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_UCT.1:
3
- FDP_IFC.1:
2
- FDP_UCT.1.1:
1
- FDP_UIT.1:
3
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
|
- FDP_ITC.1:
5
- FDP_ITC.2:
5
- FDP_ACC.1:
14
- FDP_ACF.1:
3
- FDP_ACC.1.1:
5
- FDP_ACC: 2
- FDP_ACF.1.1:
5
- FDP_ACF.1.2:
5
- FDP_ACF.1.3:
5
- FDP_ACF.1.4:
5
- FDP_ETC.1: 2
- FDP_IFC.1:
11
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC: 1
- FDP_ITC: 4
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_SDI: 4
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1:
1
- FDP_UIT.1.1:
2
- FDP_UIT.1.2:
2
- FDP_UCT: 2
- FDP_UIT: 2
- FDP_RIP: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
6
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
2
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API: 9
- FIA_AFL.1: 6
- FIA_UAU:
5
- FIA_SOS.2: 1
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.4: 6
- FIA_UAU.6: 4
- FIA_UID.1:
5
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UAU.1:
4
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.6.1: 1
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
|
- FIA_AFL: 5
- FIA_UAU.1:
2
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_ATD.1: 2
- FIA_ATD.1.1: 1
- FIA_UAU:
4
- FIA_UID.1:
5
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UID: 4
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
5
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM: 7
- FMT_LIM.1: 15
- FMT_LIM.2: 14
- FMT_LIM.1.1: 2
- FMT_LIM.2.1: 2
- FMT_MSA.3:
1
- FMT_SMF.1:
9
- FMT_SMR.1:
8
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1: 6
- FMT_MTD:
10
- FMT_SRM.1: 1
|
- FMT_MSA.3:
3
- FMT_MOF.1: 2
- FMT_SMR.1:
11
- FMT_SMF.1:
8
- FMT_MOF.1.1: 1
- FMT_MSA: 16
- FMT_MSA.1.1: 3
- FMT_MSA.2: 2
- FMT_MSA.1: 3
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD:
4
- FMT_MTD.1.1: 2
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
10
|
4
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
9
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
8
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS:
4
- FPT_EMS.1:
8
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
4
- FPT_TST.1:
5
- FPT_PHP.3:
5
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
|
- FPT_EMS.1:
7
- FPT_EMS:
3
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_TST.1:
3
- FPT_FLS.1:
2
- FPT_FLS.1.1:
1
- FPT_TST: 2
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3:
2
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
5
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
5
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
2
- FTP_TRP.1:
2
|
- FTP_ITC.1:
3
- FTP_TRP.1:
2
- FTP_ITC: 13
- FTP_TRP: 4
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
2
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
4
|
3
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA-224:
1
- SHA-256:
1
- SHA-512:
1
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-224:
1
- SHA-256: 1
- SHA-512: 1
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
1
|
1
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1:
24
- EF.DG2:
11
- EF.DG3:
8
- EF.DG4:
8
- EF.DG5:
7
- EF.DG16:
22
- EF.DG14:
3
- EF.DG13:
3
- EF.DG15:
3
- EF.DG6:
2
- EF.COM:
9
- EF.SOD:
9
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
1
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- Physical Tampering:
2
- physical tampering:
1
- Physical tampering:
1
- Malfunction:
3
- malfunction:
3
- fault injection:
1
- other:
|
- SCA:
- SPA:
1
- DPA:
1
- timing attacks:
1
- FI:
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Physical Tampering: 2
- physical tampering:
1
- Physical tampering: 1
- Malfunction: 3
- malfunction: 3
- fault injection: 1
|
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
4
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent: 1
- physical probing: 3
- DPA:
2
- SPA:
1
- timing attacks:
1
|
- SPA:
1
- DPA:
1
- timing attacks:
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
2
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks |
1
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
3
- FIPS PUB 46-3:
1
- FIPS 180-2:
1
- FIPS 46-3:
2
- PKCS:
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS197:
2
- PKCS:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-004:
1
|
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS180-2:
1
- FIPS46-3:
3
- FIPS PUB 46-3:
1
- FIPS 180-2: 1
- FIPS 46-3: 2
|
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS197: 2
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS46-3 |
3
|
1
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 |
1
|
3
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
1
|
4
|
pdf_data/st_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
327
|
306
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Antoine de Lavernette
|
Antoine de Lavernette
|
pdf_data/st_metadata//CreationDate |
D:20140127114357+01'00'
|
D:20140123111642+01'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Office Word 2007
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Keywords |
Security Target, CC, eTravel
|
Security Target, CC, eTravel
|
pdf_data/st_metadata//ModDate |
D:20140127114357+01'00'
|
D:20140123111642+01'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Office Word 2007
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Subject |
MRTD
|
MRTD
|
pdf_data/st_metadata//Title |
eTravel EAC v2 Security Target
|
eTravel v1.0 Security Target MAÏA3
|
pdf_data/st_metadata/pdf_file_size_bytes |
718988
|
653030
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
51
|
46
|
dgst |
aa9c6870d885ee7a
|
5f544899f54919a6
|