name |
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09) |
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) |
category |
Trusted Computing |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
17.04.2029 |
22.09.2028 |
not_valid_before |
17.04.2024 |
22.09.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_09fr%201.1.2.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_36fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_09fr%201.1.2.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_36fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_09en%201.1.2.2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_36en.pdf |
manufacturer |
Nuvoton Technology |
THALES DIS FRANCE SA |
manufacturer_web |
None |
https://www.thalesgroup.com/en/europe/france |
security_level |
AVA_VAN.4, EAL4+, ALC_FLR.1, ALC_DVS.2 |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
aac4c61aee502a1e |
a774412def438291 |
heuristics/cert_id |
ANSSI-CC-2024/09 |
ANSSI-CC-2023/36 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VAN.4, ALC_FLR.1, ALC_DVS.2 |
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_DVS.2, ATE_DPT.1, ASE_TSS.2, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4 |
heuristics/extracted_versions |
2.0, 1.59, 1.1.2.2 |
3.1, 3.1.0.0, 5.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2024/09
- description: Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.1.2.2 » développé par NUVOTON TECHNOLOGY CORPORATION. Ce produit est un TPM (Trusted Platform Module). Il est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0.
- developer: NUVOTON TECHNOLOGY CORPORATION
- enhanced:
- augmented: ALC_FLR.1, AVA_VAN.4, ALC_DVS.2
- category: Micro-circuits
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2024/09
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_09fr%201.1.2.2.pdf
- certification_date: 2024-04-17
- developer: NUVOTON TECHNOLOGY CORPORATION
- evaluation_facility: SERMA SAFETY & SECURITY
- expiration_date: 2029-04-17
- level: EAL4+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection Profile PC Client Specific TPM PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_09fr%201.1.2.2.pdf
- sponsor: NUVOTON TECHNOLOGY CORPORATION
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_09en%201.1.2.2.pdf
- expiration_date: 2029-04-17
- level: EAL4+
- product: NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2)
- sponsor: NUVOTON TECHNOLOGY CORPORATION
- url: https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1122
|
- cert_id: ANSSI-CC-2023/36
- description: Le produit évalué est « eTravel 3.1 EAC on SAC on MultiApp V5.1, Version 3.1.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur not
- developer: THALES DIS FRANCE SAS / THALES DIS DESIGN SERVICES
- enhanced:
- augmented: ALC_DVS.2 et AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/36
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_36fr_0.pdf
- certification_date: 2023-09-22
- developer: THALES DIS FRANCE SAS / THALES DIS DESIGN SERVICES
- evaluation_facility: CEA - LETI
- expiration_date: 2028-09-21
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Machine Readable Travel Document with “ICAO Application”, Extended Access Control with PACE, version 1.3.2 ,Certifié BSI-CC-PP-0056-V2-2012-MA-02 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.01,Certifié BSI-CC-PP-0068-V2-2011-MA-01
- sponsor: THALES DIS FRANCE SAS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_36-M01en_0.pdf
- expiration_date: 2028-09-21
- level: EAL5+
- product: eTravel 3.1 EAC on SAC on MultiApp V5.1 (Version 3.1.0.0)
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-31-eac-sac-multiapp-v51-version-3100-0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2023/01 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2023/01 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2024_09fr 1.1.2.2.pdf |
Certificat-CC-2023_36fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2024/09: 2
- ANSSI-CC-PP-2021/02: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.1: 2
- AVA:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240424095859+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240424100717+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 149443
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20230929175248+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230929175422+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 153767
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2024_09fr 1.1.2.2.pdf |
ANSSI-CC-2023_36fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2024/09: 2
- ANSSI-CC-PP-2021/02: 2
|
- FR:
- ANSSI-CC-2023/01: 1
- ANSSI-CC-2023/31: 1
- ANSSI-CC-2023/36: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-CC-2024_09en 1.1.2.2.pdf |
ANSSI-cible-2023_36en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 2
- BSI-PP-0055-2009: 1
- BSI-PP-0056-V2-: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
- EAL6: 1
|
pdf_data/st_keywords/cc_sar |
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 3
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.2: 4
- ALC_FLR.2: 1
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 4
|
pdf_data/st_keywords/cc_sfr |
- FCO:
- FCS:
- FCS_CKM: 12
- FCS_CKM.1: 12
- FCS_CKM.2: 4
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COP: 21
- FCS_COP.1: 11
- FCS_RNG.1: 4
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 21
- FDP_ACC.1: 35
- FDP_ACC.2: 2
- FDP_ACF: 23
- FDP_ACF.1: 35
- FDP_ETC: 6
- FDP_ETC.1: 2
- FDP_ETC.2: 4
- FDP_IFC.1: 20
- FDP_ITC: 6
- FDP_ITC.1: 11
- FDP_ITC.2: 13
- FDP_ITT.1: 3
- FDP_ITT.1.1: 1
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_SDI.1: 3
- FDP_SDI.1.1: 1
- FDP_UCT: 7
- FDP_UCT.1: 2
- FDP_UIT: 9
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 8
- FIA_ATD.1: 1
- FIA_SOS.1: 1
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 3
- FIA_UAU.6.1: 1
- FIA_UID.1: 7
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 3
- FMT_MOF.1: 1
- FMT_MSA: 51
- FMT_MSA.1: 15
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 22
- FMT_MSA.4: 3
- FMT_MTD: 6
- FMT_MTD.1: 2
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 21
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS: 7
- FPT_FLS.1: 2
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_STM.1: 2
- FPT_STM.1.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 10
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 49
- FCS_CKM.1: 23
- FCS_CKM.1.1: 2
- FCS_CKM.2: 8
- FCS_CKM.4: 60
- FCS_CKM.4.1: 1
- FCS_COP: 83
- FCS_COP.1: 11
- FCS_COP.1.1: 7
- FCS_RND: 7
- FCS_RND.1: 13
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 21
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF: 18
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 21
- FDP_ITC.2: 21
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_UCT: 5
- FDP_UCT.1: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 5
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 18
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 14
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_ATD: 4
- FIA_ATD.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 63
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 2
- FIA_UID: 23
- FIA_UID.1: 7
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 19
- FMT_LIM.1.1: 3
- FMT_LIM.2: 17
- FMT_LIM.2.1: 3
- FMT_MSA: 9
- FMT_MSA.1: 3
- FMT_MSA.3: 6
- FMT_MTD: 52
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF: 7
- FMT_SMF.1: 48
- FMT_SMF.1.1: 1
- FMT_SMR: 35
- FMT_SMR.1: 5
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 11
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 6
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 11
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 9
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.OS-UPDATE-EVIDENCE: 3
- A.SECURE_ACODE_MANAGEMENT: 3
- D:
- D.ACODE_: 1
- D.JCS_CODE: 4
- D.JCS_DATA: 4
- D.OS-: 1
- D.OS-UPDATE-CODE-ID: 3
- D.OS-UPDATE_ADDITIONALCODE: 5
- D.OS-UPDATE_DEC-KEY: 2
- D.OS-UPDATE_SGNVER-KEY: 2
- O:
- O.CONFID-: 1
- O.CONFID-OS-: 1
- O.CONFID-OS-UPDATE: 3
- O.RND: 1
- O.SECURE_AC_ACTIVATION: 5
- O.SECURE_LOAD_ACODE: 9
- O.TOE_IDENTIFICATION: 7
- OE:
- OE.BAC-PP: 1
- OE.OS-UPDATE-ENCRYPTION: 5
- OE.OS-UPDATE-EVIDENCE: 4
- OE.SECURE_ACODE_MANAGEMENT: 4
- OSP:
- OSP: 2
- OSP.ADDITIONAL_CODE_ENCRYPTION: 3
- OSP.ADDITIONAL_CODE_SIGNING: 3
- OSP.ATOMIC_ACTIVATION: 3
- OSP.TOE_IDENTIFICATION: 3
- T:
- T.CONFID-OS-UPDATE_LOAD: 3
- T.FAKE-SGNVER-KEY: 3
- T.INTEG-OS-UPDATE_LOAD: 3
- T.UNAUTHORISED-TOE-CODE-UPDATE: 1
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 2
- T.WRONG-UPDATE-STATE: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 9
- AES-: 1
- AES-256: 2
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 7
- Triple-DES: 5
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- NIST P-384: 1
- P-256: 2
- P-384: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 2
- Physical Tampering: 2
- malfunction: 2
- physical tampering: 2
- SCA:
|
- FI:
- Malfunction: 5
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 7
- SCA:
- DPA: 2
- Leak-Inherent: 1
- Physical Probing: 1
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 10
- EF.DG4: 10
- EF.DG5: 3
- EF.SOD: 4
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-2: 3
- FIPS 180-1: 1
- FIPS 180-4: 1
- FIPS 186-3: 4
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS PUB 186-4: 1
- FIPS140-2: 2
- FIPS180-4: 1
- FIPS186-4: 2
- FIPS198-1: 1
- ISO:
- ISO/IEC 10116:2006: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 15408: 2
- ISO/IEC 15946-1: 1
- ISO/IEC 18033-3: 1
- ISO/IEC 9797-2: 1
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |