name |
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 |
eTravel 2.5.A EAC on SAC on MultiApp V5.0.A(version 2.5.A.0.0) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
09.12.2025 |
12.12.2027 |
not_valid_before |
09.12.2020 |
12.12.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_45.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_56.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_45.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_56fr-eac-on-sac.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_45en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_56en.pdf |
manufacturer |
Thales |
THALES DIS FRANCE SA |
manufacturer_web |
None |
https://www.thalesgroup.com/en/europe/france |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
aae19ec3531ff508 |
0e47f85d8c2ae5e5 |
heuristics/cert_id |
ANSSI-CC-2020/45 |
ANSSI-CC-2022/56 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4 |
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4 |
heuristics/extracted_versions |
1.0, 4.0.1, 2.2 |
2.5, 0.0, 5.0 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2020/49 |
ANSSI-CC-2022/57 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2020/42, BSI-DSZ-CC-0891-V4-2019 |
ANSSI-CC-2022/52, ANSSI-CC-2022/13, BSI-DSZ-CC-1107-V2-2021 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2020/49 |
ANSSI-CC-2022/57 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0782-2012, ANSSI-CC-2017/76, ANSSI-CC-2017/54, ANSSI-CC-2020/42, ANSSI-CC-2017/07, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-2015 |
BSI-DSZ-CC-1107-2020, ANSSI-CC-2022/52, ANSSI-CC-2022/13, ANSSI-CC-2022/10, ANSSI-CC-2021/42, BSI-DSZ-CC-1107-V2-2021 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2020/45
- description: Le produit évalué est « eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0, version 1.0 » développé par THALES DIS. Il s’agit d’une application sur la plateforme « MultiApp V4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip » en composition sur le microcontrôleur « M7892 G12 » développé par INFINEON TECHNOLOGIES AG. Le produit implémente les fonctions de documen
- developer: THALES DIS & INFINEON TECHNOLOGIES AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2020/45
- certification_date: 2020-12-09
- developer: THALES DIS & INFINEON TECHNOLOGIES AG
- evaluation_facility: SERMA SAFETY & SECURITY
- expiration_date: 2025-12-09
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile:
- report_link: https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cc-2020_45.pdf
- sponsor: THALES DIS & INFINEON TECHNOLOGIES AG
- target_link: https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cible-cc-2020_45en.pdf
- expiration_date: 2025-12-09
- level: EAL5+
- product: eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0
- sponsor: THALES DIS & INFINEON TECHNOLOGIES AG
- url: https://cyber.gouv.fr/produits-certifies/etravel-v22-eacsac-multiapp-v401-platform-filter-set-10-version-10
|
- cert_id: ANSSI-CC-2022/56
- description: Le produit évalué est « eTravel 2.5.A EAC on SAC on MultiApp V5.0.A, version 2.5.A.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteu
- developer: THALES DIS FRANCE SAS, INFINEON TECHNOLOGIES AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2022/56
- certification_date: 2022-12-12
- developer: THALES DIS FRANCE SAS, INFINEON TECHNOLOGIES AG
- evaluation_facility: CEA - LETI
- expiration_date: 2027-12-12
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Machine Readable Travel Document with « ICAO Application », Extended Access Control with PACE, version 1.3.2 Certifié BSI-CC-PP-0056-V2-2012-MA-02 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1 Certifié BSI-CC-PP-0068-V2-2011-MA-01
- sponsor: THALES DIS FRANCE SAS
- expiration_date: 2027-12-12
- level: EAL5+
- product: eTravel 2.5.A EAC on SAC on MultiApp V5.0.A(version 2.5.A.0.0)
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-25a-eac-sac-multiapp-v50aversion-25a00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0891-V4-2019 |
BSI-DSZ-CC-1107-V2-2021 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-1107-V2-2021 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-2020_45.pdf |
certificat-cc-2022_56.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-PP-0056-V2-2012-MA-02: 1
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20201215152347+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20201215152347+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 279609
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: GA
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.5
- /Company: SGDSN
- /CreationDate: D:20221216142451+01'00'
- /Creator: Acrobat PDFMaker 22 pour Word
- /Keywords: version 3.1, révision 5
- /ModDate: D:20221216142452+01'00'
- /Producer: Adobe PDF Library 22.3.39
- /SourceModified: D:20221216132437
- /Title: ANSSI-CC-2022/56
- pdf_file_size_bytes: 154507
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
anssi-cc-2020_45.pdf |
anssi-cc-2022_56fr-eac-on-sac.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0891-V4-2019: 2
- FR:
- ANSSI-CC-2017/83-S01: 2
- ANSSI-CC-2020/42: 2
- ANSSI-CC-2020/45: 2
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- FR:
- ANSSI-CC-2022/13: 2
- ANSSI-CC-2022/52: 1
- ANSSI-CC-2022/56: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- ANSSI:
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Microsoft:
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20201215152008+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20201215152008+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 210786
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: [email protected]
- /Category: version 2.5.A.0.0
- /Comments: ANSSI-CC-CER-F-07_v31.3
- /Company: THALES DIS FRANCE SAS
- /CreationDate: D:20221216142404+01'00'
- /Creator: Acrobat PDFMaker 22 pour Word
- /Keywords: [ANSSI Crypto]
- /ModDate: D:20221216142408+01'00'
- /Producer: Adobe PDF Library 22.3.39
- /SourceModified: D:20221216132352
- /Subject: eTravel 2.5.A EAC on SAC on MultiApp V5.0.A
- /Title: ANSSI-CC-2022/56
- pdf_file_size_bytes: 620328
- pdf_hyperlinks: http://www.sogis.eu/, mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
anssi-cible-cc-2020_45en.pdf |
anssi-cible-cc-2022_56en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0891-V4-2019: 1
- NL:
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-V2-MA-: 1
|
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 4
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 49
- FCS_CKM.1: 18
- FCS_CKM.1.1: 3
- FCS_CKM.2: 8
- FCS_CKM.4: 53
- FCS_CKM.4.1: 1
- FCS_COP: 73
- FCS_COP.1: 9
- FCS_COP.1.1: 7
- FCS_RND: 7
- FCS_RND.1: 14
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF: 11
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_UCT: 6
- FDP_UCT.1: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 6
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 20
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 15
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 69
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 2
- FIA_UID: 24
- FIA_UID.1: 6
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 20
- FMT_LIM.1.1: 3
- FMT_LIM.2: 18
- FMT_LIM.2.1: 3
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 66
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF.1: 48
- FMT_SMF.1.1: 1
- FMT_SMR: 31
- FMT_SMR.1: 2
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 12
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 12
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 14
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 68
- FCS_CKM.1: 20
- FCS_CKM.1.1: 2
- FCS_CKM.2: 8
- FCS_CKM.4: 59
- FCS_CKM.4.1: 1
- FCS_COP: 107
- FCS_COP.1: 9
- FCS_COP.1.1: 8
- FCS_RND: 7
- FCS_RND.1: 18
- FCS_RND.1.1: 2
- FCS_RNG: 8
- FDP:
- FDP_ACC: 17
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF: 14
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_ITT.1: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 8
- FDP_UCT.1: 3
- FDP_UCT.1.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 3
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 24
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 20
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 80
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 2
- FIA_UID: 29
- FIA_UID.1: 6
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 23
- FMT_LIM.1.1: 3
- FMT_LIM.2: 21
- FMT_LIM.2.1: 3
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 84
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_MTD.3: 7
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 51
- FMT_SMF.1.1: 1
- FMT_SMR: 34
- FMT_SMR.1: 3
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 15
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 15
- FPT_FLS.1.1: 1
- FPT_ITT.1: 2
- FPT_PHP.3: 15
- FPT_PHP.3.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AES: 1
- O.RND: 1
- O.TDES: 1
- OE:
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Infineon:
- Thales:
|
- Gemalto:
- Infineon:
- Thales:
|
pdf_data/st_keywords/eval_facility |
- Serma:
- Serma Safety & Security: 1
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 7
- Triple-DES: 6
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 8
- Triple-DES: 6
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 2
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 4
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 2
- Leak-Inherent: 1
- Physical Probing: 1
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 11
- EF.DG4: 11
- EF.DG5: 3
- EF.SOD: 4
|
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 10
- EF.DG4: 10
- EF.DG5: 3
- EF.SOD: 4
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-04-003: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: D1433278
- /CreationDate: D:20200722180358+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: 12/10/2017
- /ModDate: D:20200722180358+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 1.1
- /Title: eTravel v2.2 on MultiApp v4.0.1 platform, PACE, EAC and AA activated
- pdf_file_size_bytes: 1877883
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 79
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |