name |
Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
|
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Release Date 28/09/2018)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2014-02-27
|
2021-10-08
|
not_valid_after |
2019-09-01
|
2023-08-03
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_13en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_32v2.pdf
|
status |
archived
|
archived
|
manufacturer |
Gemalto - Infineon Technologies AG
|
THALES DIS FRANCE SA
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.thalesgroup.com/en/europe/france
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_13fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32v2.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_32v2.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card Protection Profile - Open Configuration', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 23), 'maintenance_title': 'ANSSI-CC-2014/13-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_13-M01.pdf', 'maintenance_st_link': None}) |
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
605eb7113ff6196513efd65f2bbf1f8c43192f09a8f553ae7adc4c65c42fbe45
|
state/cert/txt_hash |
None
|
d25bf16cadaad78be4067fec750f06ce8f4a0202354bfefbd4c611d9e38890aa
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
9f0b2e7df2fb5cc4d48a6139ae60eea502adb3fc93be125daf28c52d5e2b4b5f
|
a8fcfd189038376f97211edeeb51e06d6a31e244debf57e497f6276106ac329c
|
state/report/txt_hash |
992419096b27bf313f44729971280d2b26e047893e289800aeec5537a6beeef4
|
1764d99186c570fcee57ceb38195dfb16d321f0fbbfe0dad2a798de9b0b31987
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
3e1160ae72a4cad9cb1f6ee1f19c427ac802dd9e57ff4462a6b435a6bf458496
|
be5cf61a98059d8f60ef5de14e4d4d7b5597f3f2bd5f72793b4bd8dd75d9a520
|
state/st/txt_hash |
de1c0e57dbe43c62d0214fa34fd3c0220083e7d37c306b8f29c4eb04bdb9cb82
|
9450358e495a2ec33028d4a18a474c029e3986015e59acaff519368699b14a89
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2014/13
|
ANSSI-CC-2018/32v2
|
heuristics/cert_lab |
SERMA |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2.0 |
4.1 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2018/58v2, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56v2 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 |
ANSSI-CC-2017/24, ANSSI-CC-2018/32 |
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2018/58v2, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56v2 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011 |
ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2017/07, ANSSI-CC-2018/32, ANSSI-CC-2017/54, ANSSI-CC-2017/24, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data/cert_id |
2014/48
|
ANSSI-CC-2023/30
|
heuristics/scheme_data/description |
Le produit certifié est la carte à puce ouverte « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civ
|
Le produit évalué est la « Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH, Version 4.1.0.2 » développé par THALES DIS FRANCE SAS et par SAMSUNG ELECTRONICS CO.
|
heuristics/scheme_data/developer |
Gemalto / Infineon Technologies AG
|
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
|
heuristics/scheme_data/enhanced |
- cert_id:
2014/48
- certification_date:
11/07/2014
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Gemalto / Infineon Technologies AG
- sponsor:
Gemalto
- evaluation_facility:
Serma Technologies
- level:
EAL5+
- protection_profile:
BSI-CC-PP-0056-2009, [PP EACv1], version 1.10
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-48en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-48fr.pdf
|
- cert_id:
ANSSI-CC-2023/30
- certification_date:
14/12/2023
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
- sponsor:
THALES DIS France SAS
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Java Card System Protection Profile – Open Configuration, version 3, certifié ANSSI-PP-2010-03 en mai 2012
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_30fr.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-2023_30en.pdf
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_30fr.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r4
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
2014/48
|
ANSSI-CC-2023/30
|
heuristics/scheme_data/enhanced/certification_date |
11/07/2014
|
14/12/2023
|
heuristics/scheme_data/enhanced/developer |
Gemalto / Infineon Technologies AG
|
THALES DIS FRANCE SAS / SAMSUNG ELECTRONICS CO.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Serma Technologies
|
SERMA SAFETY & SECURITY
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
CCRA
SOG-IS
|
heuristics/scheme_data/enhanced/protection_profile |
BSI-CC-PP-0056-2009, [PP EACv1], version 1.10
|
Java Card System Protection Profile – Open Configuration, version 3, certifié ANSSI-PP-2010-03 en mai 2012
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-48fr.pdf
|
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_30fr.pdf
|
heuristics/scheme_data/enhanced/sponsor |
Gemalto
|
THALES DIS France SAS
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-48en.pdf
|
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-2023_30en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
Application eTravel EAC v2.0, en configuration ''EAC on BAC'', sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
|
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH (Version 4.1.0.2)
|
heuristics/scheme_data/sponsor |
Gemalto
|
THALES DIS France SAS
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-eac-bac-sur-la-plateforme-ouverte
|
https://cyber.gouv.fr/produits-certifies/plateforme-ouverte-java-card-multiapp-v41-en-configuration-ouverte-masquee-sur-1
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0829-2012 |
ANSSI-CC-2017/24 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
ANSSI-CC-2017/24 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
certificat-anssi-cc-2018_32v2.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- cc_protection_profile_id:
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
1
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
294035
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
- /CreationDate:
D:20211012172651+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20211012172651+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_filename |
Rapport ANSSI-CC-2014_13fr.pdf
|
anssi-cc-2018_32v2.pdf
|
pdf_data/report_frontpage/FR |
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2014/13
- cert_item:
Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version:
Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
- ref_protection_profiles:
BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
- cc_version:
Critères Communs version 3.1 révision 4
- cc_security_level:
EAL 4 augmenté ALC_DVS.2
- developer:
Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- cert_lab:
Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- FR:
- ANSSI-CC-2014/13:
22
- ANSSI-CC-2014/06:
3
|
- FR:
- ANSSI-CC-2018/32v2:
2
- ANSSI-CC-2018/32:
4
- ANSSI-CC-2018/32-M01:
1
- ANSSI-CC-2017/24:
2
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2014/13:
22
- ANSSI-CC-2014/06:
3
|
- ANSSI-CC-2018/32v2:
2
- ANSSI-CC-2018/32:
4
- ANSSI-CC-2018/32-M01:
1
- ANSSI-CC-2017/24:
2
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055:
1
- BSI-PP-0035-2007:
2
- BSI-CC-PP-0055-2009:
1
- BSI-PP-0035-:
1
|
- BSI:
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0055:
1
- BSI-PP-0035-2007:
2
- BSI-CC-PP-0055-2009:
1
- BSI-PP-0035-:
1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN:
2
- AVA_VAN.5:
1
- AVA_VAN.3:
1
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
1
|
2
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
3
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
- AVA_VAN:
2
- AVA_VAN.5:
1
- AVA_VAN.3: 1
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
1
|
3
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 4: 2
- EAL4: 2
- EAL5: 1
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 5:
1
- EAL 7: 1
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/eval_facility/Serma |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- javacard:
- javacard.eid:
1
- javacard.esign:
1
- javacard.mspnp:
1
- javacard.iasclassic:
1
- com:
- com.gemalto.puredi:
1
- com.gemalto.javacard.eid:
1
- com.gemalto.mchipadv:
1
- com.gemalto.mpcos:
1
- com.gemalto.javacard.esign:
1
- com.gemalto.moc.server:
1
- com.gemalto:
1
- com.gemalto.javacard.mspnp:
1
- com.gemalto.pure:
1
- com.visa.vsdc:
1
- com.gemalto.javacard.iasclassic:
1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- ICAO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- BSI:
- SCP:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG:
1
- Infineon Technologies:
23
- Infineon:
2
- Gemalto:
|
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
39
|
9
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
Duquesnoy
|
|
pdf_data/report_metadata//CreationDate |
D:20140310110008+01'00'
|
D:20211012172552+02'00'
|
pdf_data/report_metadata//Creator |
PScript5.dll Version 5.2.2
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
D:20140310110008+01'00'
|
D:20211012172552+02'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 9.0.0 (Windows)
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/report_metadata//Title |
Microsoft Word - Rapport ANSSI-CC-2014_13fr.doc
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
203706
|
615939
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
21
|
20
|
pdf_data/st_filename |
Cible ANSSI-CC-2014_13en.pdf
|
anssi-cible-cc-2018_32v2.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
1
|
14
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
2
|
4
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
1
|
11
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
2
|
4
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_cert_id/NL/CC-1 |
2
|
2
|
pdf_data/st_keywords/cc_cert_id/NL/CC-2 |
5
|
3
|
pdf_data/st_keywords/cc_cert_id/NL/CC-3 |
3
|
3
|
pdf_data/st_keywords/cc_claims |
|
- D:
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- O:
- O.SID:
13
- O.FIREWALL:
12
- O.GLOBAL_ARRAYS_CONFID:
6
- O.GLOBAL_ARRAYS_INTEG:
5
- O.NATIVE:
12
- O.OPERATE:
15
- O.REALLOCATION:
5
- O.RESOURCES:
9
- O.ALARM:
15
- O.CIPHER:
10
- O.KEY-MNGT:
6
- O.PIN-MNGT:
5
- O.TRANSACTION:
6
- O.OBJ-DELETION:
4
- O.DELETION:
8
- O.LOAD:
6
- O.INSTALL:
11
- O.SCP:
35
- O.CARD-MANAGEMENT:
3
- O.RND:
14
- O.KEY_MNGT:
4
- O.CARD_MANAGEMENT:
17
- O.PIN-:
1
- O.TDES:
1
- O.AES:
1
- O.APPLET:
28
- O.CODE_PKG:
7
- O.JAVAOBJECT:
56
- O.CODE_PCKG:
16
- O.GLOBAL_ARRAYS_CO:
3
- O.GLOBAL_ARRAYS_INT:
3
- T:
- T.CONFID-APPLI-DATA:
4
- T.CONFID-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
7
- T.INTEG-APPLI-DATA:
8
- T.INTEG-JCS-CODE:
3
- T.INTEG-JCS-DATA:
4
- T.SID:
8
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.RESOURCES:
3
- T.DELETION:
3
- T.INSTALL:
4
- T.OBJ-DELETION:
4
- T.PHYSICAL:
4
- A:
- A.APPLET:
5
- A.VERIFICATION:
4
- R:
- OT:
- OP:
- OP.ARRAY_ACCESS:
6
- OP.CREATE:
10
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
7
- OE:
- OE.VERIFICATION:
25
- OE.APPLET:
4
- OE.CODE-EVIDENCE:
10
- OE.CARD-MANAGEMENT:
1
- OE.SCP:
6
- OE.NATIVE:
1
- OSP:
- OSP.VERIFICATION:
4
- OSP.RNG:
1
- OSP.RND:
3
|
pdf_data/st_keywords/cc_claims/OE |
|
- OE.VERIFICATION:
25
- OE.APPLET:
4
- OE.CODE-EVIDENCE:
10
- OE.CARD-MANAGEMENT:
1
- OE.SCP:
6
- OE.NATIVE:
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0035:
1
- BSI-CC-PP-0056-V2-2012:
1
- BSI-CC-PP-0068-V2-2011:
1
- BSI-PP-0055:
1
- BSI-PP-0056:
1
|
- BSI-CC-PP-0084-:
1
- BSI-CC-PP- 0068-V2-2011-MA-01:
1
- BSI-PP-0056-V2-MA-2012:
1
- BSI-PP- 0055-2009:
1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1:
11
- ADV_TDS.1:
2
- ADV_TDS.4:
9
- ADV_IMP.1:
9
- ADV_TDS.3:
4
- ADV_INT.2:
3
- ADV_FSP.5:
6
- ADV_FSP.1:
1
- ADV_FSP.2:
2
- ADV_FSP.4:
2
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
9
- AGD_PRE.1:
7
- AGD_PRE:
1
- ALC:
- ALC_DVS.2:
9
- ALC_TAT.1:
2
- ALC_TAT.2:
5
- ALC_CMC.4:
3
- ALC_DVS.1:
2
- ALC_LCD.1:
5
- ALC_DEL.1:
3
- ALC_CMS.5:
2
- ATE:
- ATE_COV.2:
4
- ATE_FUN.1:
9
- ATE_COV.1:
2
- ATE_IND.2:
4
- ATE_DPT.1:
2
- ATE_DPT.3:
3
- AVA:
|
pdf_data/st_keywords/cc_sar/ADV |
|
- ADV_ARC.1:
11
- ADV_TDS.1: 2
- ADV_TDS.4: 9
- ADV_IMP.1: 9
- ADV_TDS.3: 4
- ADV_INT.2: 3
- ADV_FSP.5: 6
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
11
|
pdf_data/st_keywords/cc_sar/ALC |
|
- ALC_DVS.2:
9
- ALC_TAT.1: 2
- ALC_TAT.2: 5
- ALC_CMC.4: 3
- ALC_DVS.1: 2
- ALC_LCD.1: 5
- ALC_DEL.1: 3
- ALC_CMS.5: 2
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
9
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4:
2
- EAL 5+:
1
- EAL4 augmented:
1
|
- EAL5:
7
- EAL5+:
1
- EAL 6+:
1
- EAL5 augmented:
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS:
6
- FAU_GEN:
1
- FAU_SAS.1:
7
- FAU_SAS.1.1:
2
- FCS:
- FCS_RND:
7
- FCS_CKM:
4
- FCS_COP:
18
- FCS_CKM.1:
11
- FCS_RND.1:
6
- FCS_RND.1.1:
2
- FCS_CKM.2:
2
- FCS_COP.1:
7
- FCS_CKM.4:
11
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FDP:
- FDP_ACF:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
- FDP_ACC.1:
6
- FDP_ACF.1:
4
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_UCT.1:
3
- FDP_IFC.1:
2
- FDP_UCT.1.1:
1
- FDP_UIT.1:
3
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FIA:
- FIA_API:
9
- FIA_AFL.1:
6
- FIA_UAU:
5
- FIA_SOS.2:
1
- FIA_API.1:
5
- FIA_API.1.1:
1
- FIA_UAU.5.2:
3
- FIA_UAU.4:
6
- FIA_UAU.6:
4
- FIA_UID.1:
5
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UAU.1:
4
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4.1:
1
- FIA_UAU.5:
3
- FIA_UAU.5.1:
1
- FIA_UAU.6.1:
1
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FMT:
- FMT_LIM:
7
- FMT_LIM.1:
15
- FMT_LIM.2:
14
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
2
- FMT_MSA.3:
1
- FMT_SMF.1:
9
- FMT_SMR.1:
8
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
6
- FMT_MTD:
10
- FMT_SRM.1:
1
- FPT:
- FPT_EMS:
4
- FPT_EMS.1:
8
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
4
- FPT_TST.1:
5
- FPT_PHP.3:
5
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FTP:
- FTP_ITC.1:
2
- FTP_TRP.1:
2
|
- FAU:
- FAU_ARP.1:
15
- FAU_ARP.1.1:
1
- FAU_SAA.1:
2
- FCO:
- FCS:
- FCS_RND:
21
- FCS_CKM:
54
- FCS_COP:
46
- FCS_CKM.1:
32
- FCS_RND.1:
9
- FCS_RND.1.1:
3
- FCS_CKM.1.1:
3
- FCS_CKM.2:
11
- FCS_CKM.2.1:
1
- FCS_CKM.3:
7
- FCS_CKM.3.1:
1
- FCS_CKM.4:
25
- FCS_CKM.4.1:
2
- FCS_COP.1:
31
- FCS_COP.1.1:
5
- FCS_RNG.1:
1
- FDP:
- FDP_ACF:
34
- FDP_ACC:
40
- FDP_ACC.2:
6
- FDP_ACF.1:
16
- FDP_IFC:
24
- FDP_IFC.1:
13
- FDP_IFF:
17
- FDP_IFF.1:
12
- FDP_RIP:
95
- FDP_RIP.1:
10
- FDP_ROL:
14
- FDP_ROL.1:
2
- FDP_SDI.2:
9
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
12
- FDP_ITC.2:
17
- FDP_IFC.2:
2
- FDP_UIT:
7
- FDP_UIT.1:
2
- FDP_ACC.1:
14
- FDP_ITC.1:
12
- FDP_RIP.1.1:
1
- FDP_SDI.1:
1
- FDP_ITT.1:
1
- FIA:
- FIA_AFL:
25
- FIA_SOS.2:
1
- FIA_ATD:
9
- FIA_ATD.1:
2
- FIA_UID:
41
- FIA_UID.2:
1
- FIA_USB:
8
- FIA_USB.1:
3
- FIA_UAU:
65
- FIA_UAU.1:
6
- FIA_UID.1:
18
- FIA_UAU.4:
1
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6.1:
1
- FMT:
- FMT_LIM:
24
- FMT_LIM.1:
16
- FMT_LIM.2:
15
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MSA:
91
- FMT_MSA.1:
11
- FMT_MSA.2:
1
- FMT_MSA.3:
15
- FMT_SMR:
75
- FMT_SMR.1:
27
- FMT_SMF:
61
- FMT_SMF.1:
17
- FMT_MTD:
41
- FMT_MTD.1:
9
- FMT_MTD.3:
1
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
- FPR:
- FPR_UNO.1:
10
- FPR_UNO.1.1:
1
- FPR_UNO:
7
- FPT:
- FPT_EMS:
4
- FPT_TST:
9
- FPT_EMS.1:
15
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS:
47
- FPT_FLS.1:
16
- FPT_TDC.1:
9
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
16
- FPT_RCV.3:
4
- FPT_TST.1:
15
- FPT_PHP:
7
- FPT_PHP.3:
17
- FPT_RCV.4:
2
- FPT_ITT:
7
- FPT_ITT.1:
2
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FPT_TST.2:
1
- FTP:
- FTP_ITC:
18
- FTP_ITC.1:
5
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
2
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS:
6
- FAU_GEN:
1
- FAU_SAS.1:
7
- FAU_SAS.1.1:
2
|
- FAU_ARP.1:
15
- FAU_ARP.1.1:
1
- FAU_SAA.1:
2
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND:
7
- FCS_CKM:
4
- FCS_COP:
18
- FCS_CKM.1:
11
- FCS_RND.1:
6
- FCS_RND.1.1:
2
- FCS_CKM.2:
2
- FCS_COP.1:
7
- FCS_CKM.4:
11
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
|
- FCS_RND:
21
- FCS_CKM:
54
- FCS_COP:
46
- FCS_CKM.1:
32
- FCS_RND.1:
9
- FCS_RND.1.1:
3
- FCS_CKM.1.1:
3
- FCS_CKM.2:
11
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4:
25
- FCS_CKM.4.1:
2
- FCS_COP.1:
31
- FCS_COP.1.1:
5
- FCS_RNG.1: 1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
4
|
54
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
11
|
32
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
11
|
25
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
18
|
46
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
7
|
31
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND |
7
|
21
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 |
6
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACF:
1
- FDP_ITC.1:
6
- FDP_ITC.2:
6
- FDP_ACC.1:
6
- FDP_ACF.1:
4
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_UCT.1: 3
- FDP_IFC.1:
2
- FDP_UCT.1.1: 1
- FDP_UIT.1:
3
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
|
- FDP_ACF:
34
- FDP_ACC: 40
- FDP_ACC.2: 6
- FDP_ACF.1:
16
- FDP_IFC: 24
- FDP_IFC.1:
13
- FDP_IFF: 17
- FDP_IFF.1: 12
- FDP_RIP: 95
- FDP_RIP.1: 10
- FDP_ROL: 14
- FDP_ROL.1: 2
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_ITC: 12
- FDP_ITC.2:
17
- FDP_IFC.2: 2
- FDP_UIT: 7
- FDP_UIT.1:
2
- FDP_ACC.1:
14
- FDP_ITC.1:
12
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_ITT.1: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
6
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
1
|
34
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
4
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
2
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
6
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
6
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API: 9
- FIA_AFL.1: 6
- FIA_UAU:
5
- FIA_SOS.2:
1
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_UAU.5.2:
3
- FIA_UAU.4:
6
- FIA_UAU.6: 4
- FIA_UID.1:
5
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UAU.1:
4
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4.1:
1
- FIA_UAU.5: 3
- FIA_UAU.5.1:
1
- FIA_UAU.6.1:
1
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
|
- FIA_AFL: 25
- FIA_SOS.2:
1
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UID: 41
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FIA_UAU:
65
- FIA_UAU.1:
6
- FIA_UID.1:
18
- FIA_UAU.4:
1
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6.1:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
5
|
65
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 |
6
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.2 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
5
|
18
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM:
7
- FMT_LIM.1:
15
- FMT_LIM.2:
14
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
2
- FMT_MSA.3:
1
- FMT_SMF.1:
9
- FMT_SMR.1:
8
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
6
- FMT_MTD:
10
- FMT_SRM.1: 1
|
- FMT_LIM:
24
- FMT_LIM.1:
16
- FMT_LIM.2:
15
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MSA: 91
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3:
15
- FMT_SMR: 75
- FMT_SMR.1:
27
- FMT_SMF: 61
- FMT_SMF.1:
17
- FMT_MTD:
41
- FMT_MTD.1:
9
- FMT_MTD.3: 1
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
7
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
15
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
14
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
1
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
10
|
41
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
6
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
9
|
17
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
8
|
27
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS:
4
- FPT_EMS.1:
8
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
4
- FPT_TST.1:
5
- FPT_PHP.3:
5
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
|
- FPT_EMS:
4
- FPT_TST: 9
- FPT_EMS.1:
15
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS: 47
- FPT_FLS.1:
16
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_RCV: 16
- FPT_RCV.3: 4
- FPT_TST.1:
15
- FPT_PHP: 7
- FPT_PHP.3:
17
- FPT_RCV.4: 2
- FPT_ITT: 7
- FPT_ITT.1: 2
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FPT_TST.2: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
8
|
15
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
4
|
16
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
5
|
17
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
5
|
15
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
2
- FTP_TRP.1:
2
|
- FTP_ITC: 18
- FTP_ITC.1:
5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1:
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
2
|
5
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
2
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
1
|
3
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol/PACE/PACE |
3
|
183
|
pdf_data/st_keywords/crypto_scheme/KA |
|
- Key Agreement:
3
- Key agreement: 2
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement |
2
|
3
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
4
|
14
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility/Serma |
|
- Serma Safety & Security:
1
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 |
1
|
4
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-224:
1
- SHA-256:
1
- SHA-512:
1
|
- SHA-224:
4
- SHA-256:
4
- SHA-512:
4
- SHA224: 1
- SHA-384: 2
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
1
|
4
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
1
|
4
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 |
1
|
4
|
pdf_data/st_keywords/ic_data_group/EF |
- EF.DG1:
24
- EF.DG2: 11
- EF.DG3:
8
- EF.DG4:
8
- EF.DG5: 7
- EF.DG16:
22
- EF.DG14: 3
- EF.DG13: 3
- EF.DG15: 3
- EF.DG6: 2
- EF.COM: 9
- EF.SOD: 9
|
- EF.DG1:
6
- EF.DG16:
6
- EF.DG3:
1
- EF.DG4:
1
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG1 |
24
|
6
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG16 |
22
|
6
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG3 |
8
|
1
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG4 |
8
|
1
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2:
3
- Java Card 3.0.4:
8
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
14
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
1
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- Physical Tampering:
2
- physical tampering:
1
- Physical tampering:
1
- Malfunction:
3
- malfunction:
3
- fault injection:
1
- other:
|
- SCA:
- Leak-Inherent:
5
- physical probing:
6
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- physical tampering:
1
- Physical Tampering:
3
- malfunction:
8
- Malfunction:
9
- fault induction:
2
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Physical Tampering:
2
- physical tampering:
1
- Physical tampering: 1
- Malfunction:
3
- malfunction:
3
- fault injection: 1
|
- physical tampering:
1
- Physical Tampering:
3
- malfunction:
8
- Malfunction:
9
- fault induction: 2
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
3
|
9
|
pdf_data/st_keywords/side_channel_analysis/FI/Physical Tampering |
2
|
3
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
3
|
8
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
1
|
5
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
3
|
6
|
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks |
1
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
3
- FIPS PUB 46-3:
1
- FIPS 180-2:
1
- FIPS 46-3:
2
- PKCS:
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS197:
5
- FIPS 46-3:
1
- FIPS 197:
1
- NIST:
- PKCS:
- BSI:
- ICAO:
- SCP:
- SCP01:
4
- SCP02:
4
- SCP03:
5
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-004:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS180-2:
1
- FIPS46-3: 3
- FIPS PUB 46-3: 1
- FIPS 180-2: 1
- FIPS 46-3:
2
|
- FIPS180-2:
1
- FIPS197: 5
- FIPS 46-3:
1
- FIPS 197: 1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 46-3 |
2
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/ICAO/ICAO |
17
|
1
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- TDEA:
1
- 3DES:
2
- TDES:
15
- Triple-DES:
3
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
- TDEA: 1
- 3DES: 2
- TDES:
15
- Triple-DES:
3
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
1
|
15
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
7
|
3
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
2
|
20
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/KMAC |
1
|
2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- Samsung:
- Gemalto:
- Thales:
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
327
|
719
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Antoine de Lavernette
|
D1417544
|
pdf_data/st_metadata//CreationDate |
D:20140127114357+01'00'
|
D:20210709115842+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Office Word 2007
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Keywords |
Security Target, CC, eTravel
|
28-03-2018
|
pdf_data/st_metadata//ModDate |
D:20140127114357+01'00'
|
D:20210709115842+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Office Word 2007
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Subject |
MRTD
|
1.12
|
pdf_data/st_metadata//Title |
eTravel EAC v2 Security Target
|
MultiApp V4.1: JCS Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
718988
|
3422640
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
51
|
141
|
dgst |
aa9c6870d885ee7a
|
61c0a87926d6d972
|