Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11
ANSSI-CC-2014/13
Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
ANSSI-CC-2016/06
name Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
not_valid_before 2014-02-27 2016-02-26
not_valid_after 2019-09-01 2021-02-26
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_13en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2016-06.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_13fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-06.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': frozenset({'PDCP_V1.3'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 23), 'maintenance_title': 'ANSSI-CC-2014/13-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_13-M01.pdf', 'maintenance_st_link': None})
state/report/pdf_hash 9f0b2e7df2fb5cc4d48a6139ae60eea502adb3fc93be125daf28c52d5e2b4b5f 0eed897bdc5c775a356e599a5aa6e9c81f9d70f2e7ce4176880cbe49b269d6bb
state/report/txt_hash 992419096b27bf313f44729971280d2b26e047893e289800aeec5537a6beeef4 4be834269926fef09a361f5f41ea1d9972062561c19f3fc2c153b54fad1c574c
state/st/pdf_hash 3e1160ae72a4cad9cb1f6ee1f19c427ac802dd9e57ff4462a6b435a6bf458496 adbcdf7bf5a2fcabad411debc00363a02c1d8c5244a1dda3a774f85907795956
state/st/txt_hash de1c0e57dbe43c62d0214fa34fd3c0220083e7d37c306b8f29c4eb04bdb9cb82 5e1c491b19945118bc765368575e8df8eba5820c556f36460f49710655060a95
heuristics/cert_id ANSSI-CC-2014/13 ANSSI-CC-2016/06
heuristics/extracted_versions 2.0 1.0
heuristics/report_references/directly_referenced_by None ANSSI-CC-2016/24
heuristics/report_references/directly_referencing BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06 ANSSI-CC-2015/73
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2016/24
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011 ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013
heuristics/scheme_data/cert_id 2014/48 2016/06
heuristics/scheme_data/description Le produit certifié est la carte à puce ouverte « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civ Le produit certifié est la « Plateforme Java Card MultiApp Essential v1.0, en configurationouverte, sur le composant Infineon M7794 A12 ou G12 » développé par GEMALTO etINFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 et fonctionnant enmode contact (standard ISO 7816-3) ; la plateforme ouverte Java Card est destinée à fournirdes services de sécurité aux a
heuristics/scheme_data/developer Gemalto / Infineon Technologies AG Gemalto / Infineon
heuristics/scheme_data/enhanced/cert_id 2014/48 2016/06
heuristics/scheme_data/enhanced/certification_date 11/07/2014 26/02/2016
heuristics/scheme_data/enhanced/developer Gemalto / Infineon Technologies AG Gemalto / Infineon
heuristics/scheme_data/enhanced/evaluation_facility Serma Technologies Serma Safety & Security
heuristics/scheme_data/enhanced/protection_profile BSI-CC-PP-0056-2009, [PP EACv1], version 1.10 PP-JCS Open Configuration
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-48fr.pdf https://cyber.gouv.fr/sites/default/files/2016/03/ANSSI-CC-2016-06.pdf
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-48en.pdf https://cyber.gouv.fr/sites/default/files/2016/03/cible2016-06.pdf
heuristics/scheme_data/product Application eTravel EAC v2.0, en configuration ''EAC on BAC'', sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-eac-bac-sur-la-plateforme-ouverte https://cyber.gouv.fr/produits-certifies/plateforme-java-card-multiapp-essential-v10-en-configuration-ouverte-sur-le-0
heuristics/st_references/directly_referencing BSI-DSZ-CC-0829-2012 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 None
pdf_data/report_filename Rapport ANSSI-CC-2014_13fr.pdf ANSSI-CC-2016-06.pdf
pdf_data/report_frontpage/FR/cc_security_level EAL 4 augmenté ALC_DVS.2 EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2014/13 ANSSI-CC-2016/06
pdf_data/report_frontpage/FR/cert_item Application eTravel EAC v2.0, en configuration BAC, sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
pdf_data/report_frontpage/FR/cert_item_version Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5 Version 1.0
pdf_data/report_frontpage/FR/cert_lab Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
pdf_data/report_frontpage/FR/developer Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
pdf_data/report_frontpage/FR/ref_protection_profiles BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control Java Card System Protection Profile – Open Configuration [PP-JCS Open Configuration], version 3.0
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0829-2012: 3
  • FR:
    • ANSSI-CC-2014/13: 22
    • ANSSI-CC-2014/06: 3
  • FR:
    • ANSSI-CC-2016/06: 22
    • ANSSI-CC-2015/73: 1
  • NL:
    • CC-0964-2015: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2014/13: 22
  • ANSSI-CC-2014/06: 3
  • ANSSI-CC-2016/06: 22
  • ANSSI-CC-2015/73: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0055: 1
  • BSI-PP-0035-2007: 2
  • BSI-CC-PP-0055-2009: 1
  • BSI-PP-0035-: 1
  • BSI-PP-0035-: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 1 2
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 1 2
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN: 2
  • AVA_VAN.5: 1
  • AVA_VAN.3: 1
  • AVA_VAN.5: 5
  • AVA_VAN: 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 1 5
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 4: 2
  • EAL4: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 5: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL2: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 1 3
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/eval_facility/Serma
  • Serma Technologies: 2
  • Serma Safety & Security: 1
  • SERMA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/vendor/Gemalto/Gemalto 39 3
pdf_data/report_keywords/vendor/Infineon
  • Infineon Technologies AG: 1
  • Infineon Technologies: 23
  • Infineon: 2
  • Infineon: 27
  • Infineon Technologies: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 2 27
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 23 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 203706
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: Duquesnoy
  • /CreationDate: D:20140310110008+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20140310110008+01'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - Rapport ANSSI-CC-2014_13fr.doc
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 796998
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Title: ANSSI-CC-2016/06
  • /Author: Jonathan Gimenez
  • /Subject: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
  • /Keywords: ANSSI-CC-CER-F-07.017
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20160226154150+01'00'
  • /ModDate: D:20160226154150+01'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/report_metadata//Author Duquesnoy Jonathan Gimenez
pdf_data/report_metadata//CreationDate D:20140310110008+01'00' D:20160226154150+01'00'
pdf_data/report_metadata//Creator PScript5.dll Version 5.2.2 Microsoft® Word 2010
pdf_data/report_metadata//ModDate D:20140310110008+01'00' D:20160226154150+01'00'
pdf_data/report_metadata//Producer Acrobat Distiller 9.0.0 (Windows) Microsoft® Word 2010
pdf_data/report_metadata//Title Microsoft Word - Rapport ANSSI-CC-2014_13fr.doc ANSSI-CC-2016/06
pdf_data/report_metadata/pdf_file_size_bytes 203706 796998
pdf_data/report_metadata/pdf_hyperlinks mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/st_filename Cible ANSSI-CC-2014_13en.pdf cible2016-06.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 1
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 10
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 1
  • ECC:
    • ECC: 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 1 10
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0829-2012: 1
  • BSI-DSZ-CC-0917-: 1
pdf_data/st_keywords/cc_cert_id/NL/CC-2 5 3
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.MRTD_: 1
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 4
    • D.API_DATA: 3
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
  • O:
    • O.SID: 9
    • O.FIREWALL: 11
    • O.GLOBAL_ARRAYS_CONFID: 5
    • O.GLOBAL_ARRAYS_INTEG: 4
    • O.NATIVE: 7
    • O.OPERATE: 14
    • O.REALLOCATION: 4
    • O.RESOURCES: 5
    • O.ALARM: 11
    • O.CIPHER: 5
    • O.KEY-MNGT: 4
    • O.PIN-MNGT: 4
    • O.TRANSACTION: 5
    • O.OBJ-DELETION: 3
    • O.DELETION: 4
    • O.LOAD: 5
    • O.INSTALL: 7
    • O.SCP: 21
    • O.CARD-MANAGEMENT: 2
    • O.RND: 7
    • O.KEY_MNGT: 1
    • O.CARD_MANAGEMENT: 14
    • O.KEY-: 1
    • O.PIN-: 1
    • O.APPLET: 28
    • O.CODE_PKG: 7
    • O.JAVAOBJECT: 56
    • O.CODE_PCKG: 16
  • T:
    • T.CONFID-APPLI-DATA: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.INTEG-APPLI-CODE: 7
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 4
    • T.SID: 8
    • T.EXE-CODE: 8
    • T.NATIVE: 4
    • T.RESOURCES: 3
    • T.DELETION: 3
    • T.INSTALL: 4
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
  • A:
    • A.APPLET: 4
    • A.DELETION: 5
    • A.VERIFICATION: 4
  • R:
    • R.JAVA: 9
  • OP:
    • OP.ARRAY_ACCESS: 6
    • OP.CREATE: 10
    • OP.DELETE_APPLET: 6
    • OP.DELETE_PCKG: 4
    • OP.DELETE_PCKG_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_VIRTUAL: 8
    • OP.INVK_INTERFACE: 10
    • OP.JAVA: 8
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
    • OP.PUT: 7
  • OE:
    • OE.VERIFICATION: 25
    • OE.APPLET: 3
    • OE.CODE-EVIDENCE: 10
    • OE.APPS-VALIDATION: 1
  • OSP:
    • OSP.VERIFICATION: 4
    • OSP.RNG: 1
    • OSP.RND: 3
pdf_data/st_keywords/cc_claims/OE
  • OE.MRTD_: 1
  • OE.VERIFICATION: 25
  • OE.APPLET: 3
  • OE.CODE-EVIDENCE: 10
  • OE.APPS-VALIDATION: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
  • BSI:
    • BSI-PP-0035: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0072: 1
    • BSI-CC-PP-0076: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
  • other:
    • PP-SSCD-P2: 1
    • PP-SSCD-P3: 1
    • PP-SSCD-P4: 1
    • PP-SSCD-P5: 1
    • PP-SSCD-P6: 1
    • PP-SSCD-T2: 1
    • PP-SSCD-T3: 1
    • PP-SSCD-: 1
    • PP-SSCD-T5: 1
    • PP-SSCD-T6: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP-0055: 1
  • BSI-PP-0056: 1
  • BSI-PP-0035: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075: 1
  • BSI-CC-PP-0071: 1
  • BSI-CC-PP-0072: 1
  • BSI-CC-PP-0076: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
  • ALC:
    • ALC_DVS.2: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_TDS: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_TDS: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL4: 2
  • EAL 5+: 1
  • EAL4 augmented: 1
  • EAL5+: 1
  • EAL5: 2
  • EAL 5+: 1
  • EAL5 augmented: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 6
    • FAU_GEN: 1
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 7
    • FCS_CKM: 4
    • FCS_COP: 18
    • FCS_CKM.1: 11
    • FCS_RND.1: 6
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 2
    • FCS_COP.1: 7
    • FCS_CKM.4: 11
    • FCS_CKM.1.1: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_ACC.1: 6
    • FDP_ACF.1: 4
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_UCT.1: 3
    • FDP_IFC.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 3
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 9
    • FIA_AFL.1: 6
    • FIA_UAU: 5
    • FIA_SOS.2: 1
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_UAU.5.2: 3
    • FIA_UAU.4: 6
    • FIA_UAU.6: 4
    • FIA_UID.1: 5
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.6.1: 1
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 15
    • FMT_LIM.2: 14
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 2
    • FMT_MSA.3: 1
    • FMT_SMF.1: 9
    • FMT_SMR.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD: 10
    • FMT_SRM.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 8
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 4
    • FPT_TST.1: 5
    • FPT_PHP.3: 5
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
  • FAU:
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
  • FCO:
    • FCO_NRO: 2
    • FCO_NRO.2: 3
  • FCS:
    • FCS_RND: 7
    • FCS_RND.1: 7
    • FCS_CKM.1: 7
    • FCS_RND.1.1: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 2
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 14
    • FDP_ACC.2: 6
    • FDP_ACF: 16
    • FDP_ACF.1: 13
    • FDP_IFC: 4
    • FDP_IFC.1: 1
    • FDP_IFF: 4
    • FDP_IFF.1: 10
    • FDP_RIP: 17
    • FDP_RIP.1: 8
    • FDP_ROL: 6
    • FDP_ROL.1: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC: 4
    • FDP_ITC.2: 5
    • FDP_IFC.2: 2
    • FDP_UIT: 2
    • FDP_UIT.1: 2
    • FDP_ACC.1: 1
  • FIA:
    • FIA_SOS.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 1
    • FIA_UID: 4
    • FIA_UID.2: 1
    • FIA_USB: 2
    • FIA_USB.1: 3
    • FIA_UAU: 2
    • FIA_UAI.1: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 1
    • FMT_MSA.3: 10
    • FMT_SMR: 9
    • FMT_SMR.1: 8
    • FMT_SMF: 6
    • FMT_SMF.1: 3
    • FMT_MTD: 4
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
  • FPR:
    • FPR_UNO.1: 3
    • FPR_UNO.1.1: 1
    • FPR_UNO: 2
  • FPT:
    • FPT_FLS: 10
    • FPT_FLS.1: 5
    • FPT_TDC.1: 2
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV: 4
    • FPT_RCV.3: 4
    • FPT_TST: 2
    • FPT_TST.1: 3
    • FPT_PHP: 2
    • FPT_PHP.3: 1
    • FPT_RCV.4: 1
    • FPT_ITT: 2
    • FPT_ITT.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 2
  • FAU_ARP.1: 5
  • FAU_ARP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 7
  • FCS_CKM: 4
  • FCS_COP: 18
  • FCS_CKM.1: 11
  • FCS_RND.1: 6
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 2
  • FCS_COP.1: 7
  • FCS_CKM.4: 11
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_RND: 7
  • FCS_RND.1: 7
  • FCS_CKM.1: 7
  • FCS_RND.1.1: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 2
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 11
  • FCS_COP.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 11 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 2 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 11 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 7 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 6 7
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF: 1
  • FDP_ITC.1: 6
  • FDP_ITC.2: 6
  • FDP_ACC.1: 6
  • FDP_ACF.1: 4
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_UCT.1: 3
  • FDP_IFC.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 3
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ACC: 14
  • FDP_ACC.2: 6
  • FDP_ACF: 16
  • FDP_ACF.1: 13
  • FDP_IFC: 4
  • FDP_IFC.1: 1
  • FDP_IFF: 4
  • FDP_IFF.1: 10
  • FDP_RIP: 17
  • FDP_RIP.1: 8
  • FDP_ROL: 6
  • FDP_ROL.1: 2
  • FDP_SDI.2: 2
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC: 4
  • FDP_ITC.2: 5
  • FDP_IFC.2: 2
  • FDP_UIT: 2
  • FDP_UIT.1: 2
  • FDP_ACC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 1 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 4 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 6 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 3 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 9
  • FIA_AFL.1: 6
  • FIA_UAU: 5
  • FIA_SOS.2: 1
  • FIA_API.1: 5
  • FIA_API.1.1: 1
  • FIA_UAU.5.2: 3
  • FIA_UAU.4: 6
  • FIA_UAU.6: 4
  • FIA_UID.1: 5
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.1: 4
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.4.1: 1
  • FIA_UAU.5: 3
  • FIA_UAU.5.1: 1
  • FIA_UAU.6.1: 1
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_SOS.2: 1
  • FIA_ATD: 3
  • FIA_ATD.1: 1
  • FIA_UID: 4
  • FIA_UID.2: 1
  • FIA_USB: 2
  • FIA_USB.1: 3
  • FIA_UAU: 2
  • FIA_UAI.1: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 5 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 4 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 5 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 7
  • FMT_LIM.1: 15
  • FMT_LIM.2: 14
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MSA.3: 1
  • FMT_SMF.1: 9
  • FMT_SMR.1: 8
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 6
  • FMT_MTD: 10
  • FMT_SRM.1: 1
  • FMT_MSA: 21
  • FMT_MSA.1: 5
  • FMT_MSA.2: 1
  • FMT_MSA.3: 10
  • FMT_SMR: 9
  • FMT_SMR.1: 8
  • FMT_SMF: 6
  • FMT_SMF.1: 3
  • FMT_MTD: 4
  • FMT_MTD.1: 2
  • FMT_MTD.3: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 1 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 10 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 6 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 9 3
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 4
  • FPT_EMS.1: 8
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 4
  • FPT_TST.1: 5
  • FPT_PHP.3: 5
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_FLS: 10
  • FPT_FLS.1: 5
  • FPT_TDC.1: 2
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV: 4
  • FPT_RCV.3: 4
  • FPT_TST: 2
  • FPT_TST.1: 3
  • FPT_PHP: 2
  • FPT_PHP.3: 1
  • FPT_RCV.4: 1
  • FPT_ITT: 2
  • FPT_ITT.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 4 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 5 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 5 3
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 2
  • FTP_TRP.1: 2
  • FTP_ITC: 2
  • FTP_ITC.1: 3
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 2 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/crypto_protocol/PACE/PACE 3 11
pdf_data/st_keywords/crypto_scheme/KA
  • Key Agreement: 2
  • Key agreement: 1
pdf_data/st_keywords/crypto_scheme/MAC/MAC 4 7
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 1
  • SHA1: 1
  • SHA-1: 3
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 1 3
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 1
  • SHA-256: 1
  • SHA-512: 1
  • SHA-224: 3
  • SHA224: 2
  • SHA256: 1
  • SHA-256: 3
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 1 3
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 1 3
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 24
    • EF.DG2: 11
    • EF.DG3: 8
    • EF.DG4: 8
    • EF.DG5: 7
    • EF.DG16: 22
    • EF.DG14: 3
    • EF.DG13: 3
    • EF.DG15: 3
    • EF.DG6: 2
    • EF.COM: 9
    • EF.SOD: 9
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 3
    • Java Card 3.0.4: 7
    • JavaCard 3.0: 1
pdf_data/st_keywords/randomness/RNG
  • RNG: 2
  • RNG: 5
  • RND: 10
pdf_data/st_keywords/randomness/RNG/RNG 2 5
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 3
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 2
    • physical tampering: 1
    • Physical tampering: 1
    • Malfunction: 3
    • malfunction: 3
    • fault injection: 1
  • other:
    • reverse engineering: 1
  • SCA:
    • Leak-Inherent: 3
    • physical probing: 2
    • DPA: 1
  • FI:
    • physical tampering: 1
    • malfunction: 2
    • Malfunction: 3
    • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical Tampering: 2
  • physical tampering: 1
  • Physical tampering: 1
  • Malfunction: 3
  • malfunction: 3
  • fault injection: 1
  • physical tampering: 1
  • malfunction: 2
  • Malfunction: 3
  • fault induction: 2
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 3 2
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 1
  • physical probing: 3
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
  • Leak-Inherent: 3
  • physical probing: 2
  • DPA: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 2 1
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 1 3
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 3 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 3
    • FIPS PUB 46-3: 1
    • FIPS 180-2: 1
    • FIPS 46-3: 2
  • PKCS:
    • PKCS#3: 1
  • RFC:
    • RFC3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 17
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS197: 3
  • PKCS:
    • PKCS#3: 1
    • PKCS#1: 8
    • PKCS#5: 3
  • BSI:
    • AIS31: 1
  • SCP:
    • SCP03: 3
    • SCP01: 3
    • SCP02: 3
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2006-09-001: 1
  • CCMB-2007-09-002: 1
  • CCMB-2007-09-003: 1
  • CCMB-2007-09-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS46-3: 3
  • FIPS PUB 46-3: 1
  • FIPS 180-2: 1
  • FIPS 46-3: 2
  • FIPS180-2: 1
  • FIPS197: 3
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 1
  • PKCS#3: 1
  • PKCS#1: 8
  • PKCS#5: 3
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • Triple-DES: 7
      • TDES: 1
  • constructions:
    • MAC:
      • KMAC: 1
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • DES:
      • DES: 14
    • 3DES:
      • TDEA: 1
      • 3DES: 1
      • TDES: 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 7
  • TDES: 1
  • TDEA: 1
  • 3DES: 1
  • TDES: 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 1 7
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 2 14
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 327
  • Infineon:
    • Infineon: 5
  • Gemalto:
    • Gemalto: 520
pdf_data/st_keywords/vendor/Gemalto/Gemalto 327 520
pdf_data/st_metadata//CreationDate D:20140127114357+01'00' D:20150908153505+02'00'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 Microsoft® Word 2013
pdf_data/st_metadata//Keywords Security Target, CC, eTravel Security Target, CC
pdf_data/st_metadata//ModDate D:20140127114357+01'00' D:20150908153505+02'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Microsoft® Word 2013
pdf_data/st_metadata//Subject MRTD Security Target
pdf_data/st_metadata//Title eTravel EAC v2 Security Target eTravel v1.0 Security Target MAÏA3
pdf_data/st_metadata/pdf_file_size_bytes 718988 1662139
pdf_data/st_metadata/pdf_number_of_pages 51 83
dgst aa9c6870d885ee7a 832bbe4dde3c99d0