name |
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0
|
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2020-12-09
|
2021-12-17
|
not_valid_after |
2025-12-09
|
2023-12-12
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_45en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_58v2en.pdf
|
status |
active
|
archived
|
manufacturer |
Thales
|
THALES DIS FRANCE SA
|
manufacturer_web |
None
|
https://www.thalesgroup.com/en/europe/france
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_45.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_58v2.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_45.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_58v2.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': frozenset({'EPASS_PACE_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Machine Readable Travel Document with 'ICAO Application', Extended Access Control, Version ...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026b.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
True
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
79df4063d79d3f574cae6d353afed89dce953451399097931c95e55e304fd9db
|
c489b5992a6700b054536e9bab5a5d1a41e6bd400236c65d2d272bdf5e9cb688
|
state/cert/txt_hash |
c8948cfd45d4013ab53c1cc4172dc7cad3ee8980b8df00fb38111132b902c9a0
|
040af36297d294dabe1dc3a8a4a50a6812450a2ae3cd182b0fc7c0697e90f01d
|
state/report/convert_garbage |
False
|
True
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
d5b151afde4eb1478ce5c776b36d03597ba2f5dfaa1d4b646eb0f627ae1f50ed
|
530b0932054545fb91a9f6ea3ff0ceb1c8de95851cb21f05be1a2014ed9fb973
|
state/report/txt_hash |
71bae8140e38a8242a2395f8ef6932a84958d13c1c969756e3b8f359b7cd06ad
|
c354a7c37efb5a123cdff721b11ea6c618e0d57fd6cd6ea018eb2ef2e36bafab
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
736d22a0b9195411b050521e7c52a01ef463b00001e25d8d595b51113440b1f0
|
6f309c5fba1359c5d44106a7b8059fd312ab220abc2177661b4714b77298e6cd
|
state/st/txt_hash |
d8e68c243d14041bf84561c95696456b73e3be750fe3c40604d2b22e13687e17
|
39ac5bf065d661bf8b9fb9c172732ec902c904f497902290fe90f7bd6ac61dc6
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2020/45
|
ANSSI-CC-2018/58v2
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ATE_DPT.1, AGD_OPE.1, ADV_ARC.1, AGD_PRE.1, ADV_TDS.3, AVA_VAN.5, ADV_IMP.1, ALC_DVS.2, ADV_FSP.4 |
ATE_DPT.1, AGD_OPE.1, ADV_ARC.1, AGD_PRE.1, ADV_TDS.3, AVA_VAN.5, ADV_IMP.1, ALC_DVS.2, ADV_FSP.4 |
heuristics/extracted_versions |
4.0.1, 2.2, 1.0 |
4.1, 2.3 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2020/49 |
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0891-V4-2019, ANSSI-CC-2020/42 |
ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, ANSSI-CC-2018/58 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2020/49 |
None
|
heuristics/scheme_data |
- product:
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0
- url:
https://cyber.gouv.fr/produits-certifies/etravel-v22-eacsac-multiapp-v401-platform-filter-set-10-version-10
- description:
Le produit évalué est « eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0, version 1.0 » développé par THALES DIS. Il s’agit d’une application sur la plateforme « MultiApp V4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip » en composition sur le microcontrôleur « M7892 G12 » développé par INFINEON TECHNOLOGIES AG. Le produit implémente les fonctions de documen
- sponsor:
THALES DIS & INFINEON TECHNOLOGIES AG
- developer:
THALES DIS & INFINEON TECHNOLOGIES AG
- cert_id:
2020/45
- level:
EAL5+
- expiration_date: 9 Décembre 2025
- enhanced:
- cert_id:
2020/45
- certification_date:
09/12/2020
- expiration_date:
09/12/2025
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS & INFINEON TECHNOLOGIES AG
- sponsor:
THALES DIS & INFINEON TECHNOLOGIES AG
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cc-2020_45.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cible-cc-2020_45en.pdf
|
- product:
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
- url:
https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du
- description:
Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern
- sponsor:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- developer:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- cert_id:
2018/58v2
- level:
EAL5+
- enhanced:
- cert_id:
2018/58v2
- certification_date:
17/12/2021
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- sponsor:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link:
https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
heuristics/scheme_data/cert_id |
2020/45
|
2018/58v2
|
heuristics/scheme_data/description |
Le produit évalué est « eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0, version 1.0 » développé par THALES DIS. Il s’agit d’une application sur la plateforme « MultiApp V4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip » en composition sur le microcontrôleur « M7892 G12 » développé par INFINEON TECHNOLOGIES AG. Le produit implémente les fonctions de documen
|
Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern
|
heuristics/scheme_data/developer |
THALES DIS & INFINEON TECHNOLOGIES AG
|
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
heuristics/scheme_data/enhanced |
- cert_id:
2020/45
- certification_date:
09/12/2020
- expiration_date: 09/12/2025
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS & INFINEON TECHNOLOGIES AG
- sponsor:
THALES DIS & INFINEON TECHNOLOGIES AG
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cc-2020_45.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cible-cc-2020_45en.pdf
|
- cert_id:
2018/58v2
- certification_date:
17/12/2021
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- sponsor:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
2020/45
|
2018/58v2
|
heuristics/scheme_data/enhanced/certification_date |
09/12/2020
|
17/12/2021
|
heuristics/scheme_data/enhanced/developer |
THALES DIS & INFINEON TECHNOLOGIES AG
|
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
heuristics/scheme_data/enhanced/evaluation_facility |
SERMA SAFETY & SECURITY
|
SERMA SAFETY & SECURITY
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
CCRA
SOG-IS
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
|
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cc-2020_45.pdf
|
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
|
heuristics/scheme_data/enhanced/sponsor |
THALES DIS & INFINEON TECHNOLOGIES AG
|
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cible-cc-2020_45en.pdf
|
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0
|
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
|
heuristics/scheme_data/sponsor |
THALES DIS & INFINEON TECHNOLOGIES AG
|
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/etravel-v22-eacsac-multiapp-v401-platform-filter-set-10-version-10
|
https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0891-V4-2019 |
ANSSI-CC-2017/24 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-V2-2016 |
ANSSI-CC-2017/24 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-2020_45.pdf
|
certificat-2018_58v2.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0056-V2-2012-MA-02:
1
- BSI-CC-PP-0068-V2-2011-MA-01:
1
|
|
pdf_data/cert_keywords/cc_sar/ALC |
|
|
pdf_data/cert_keywords/cc_sar/AVA |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 |
1
|
1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/eval_facility/Serma |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
279609
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
- /CreationDate:
D:20201215152347+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate:
D:20201215152347+01'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1306910
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
sharbus
- /CreationDate:
D:20211222165349+01'00'
- /ModDate:
D:20211222165349+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - certificat-2018_58v2
- pdf_hyperlinks:
|
pdf_data/cert_metadata//Author |
|
sharbus
|
pdf_data/cert_metadata//CreationDate |
D:20201215152347+01'00'
|
D:20211222165349+01'00'
|
pdf_data/cert_metadata//ModDate |
D:20201215152347+01'00'
|
D:20211222165349+01'00'
|
pdf_data/cert_metadata//Producer |
Acrobat Distiller 11.0 (Windows)
|
Microsoft: Print To PDF
|
pdf_data/cert_metadata//Title |
|
Microsoft Word - certificat-2018_58v2
|
pdf_data/cert_metadata/pdf_file_size_bytes |
279609
|
1306910
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
2
|
pdf_data/report_filename |
anssi-cc-2020_45.pdf
|
anssi-cc-2018_58v2.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0891-V4-2019:
2
- FR:
- ANSSI-CC-2020/45:
2
- ANSSI-CC-2020/42:
2
- ANSSI-CC-2017/83-S01:
2
|
- FR:
- ANSSI-CC-2018/58v2:
17
- ANSSI-CC-2018/58:
4
- ANSSI-CC-2017/24:
2
- ANSSI-CC-2018/32v2:
2
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2020/45:
2
- ANSSI-CC-2020/42:
2
- ANSSI-CC-2017/83-S01:
2
|
- ANSSI-CC-2018/58v2:
17
- ANSSI-CC-2018/58:
4
- ANSSI-CC-2017/24:
2
- ANSSI-CC-2018/32v2:
2
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02:
2
- BSI-CC-PP-0068-V2-2011-MA-01:
2
- BSI-PP-0084-2014:
1
- ANSSI:
|
- BSI:
- BSI-PP-0056-2009:
1
- BSI-PP-0084-2014:
1
- BSI-CC-PP-0056-2009:
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-PP-0084-2014:
1
|
- BSI-PP-0056-2009: 1
- BSI-PP-0084-2014:
1
- BSI-CC-PP-0056-2009: 1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0084-2014 |
1
|
1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
3
|
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
3
|
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
3
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL2:
2
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 7: 1
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/eval_facility/Serma/SERMA |
16
|
1
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004: 1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-001 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-002 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-003 |
1
|
1
|
pdf_data/report_keywords/standard_id/ICAO/ICAO |
3
|
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Gemalto:
- Microsoft:
|
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
1
|
11
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
210786
- pdf_is_encrypted:
False
- pdf_number_of_pages:
19
- /Author:
- /CreationDate:
D:20201215152008+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate:
D:20201215152008+01'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
4218025
- pdf_is_encrypted:
False
- pdf_number_of_pages:
16
- /Author:
sharbus
- /CreationDate:
D:20211222164829+01'00'
- /ModDate:
D:20211222164829+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - ANSSI-CC-2018_58v2
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
|
sharbus
|
pdf_data/report_metadata//CreationDate |
D:20201215152008+01'00'
|
D:20211222164829+01'00'
|
pdf_data/report_metadata//ModDate |
D:20201215152008+01'00'
|
D:20211222164829+01'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 11.0 (Windows)
|
Microsoft: Print To PDF
|
pdf_data/report_metadata//Title |
|
Microsoft Word - ANSSI-CC-2018_58v2
|
pdf_data/report_metadata/pdf_file_size_bytes |
210786
|
4218025
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
19
|
16
|
pdf_data/st_filename |
anssi-cible-cc-2020_45en.pdf
|
anssi-cible-cc-2018_58v2en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
2
|
3
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH |
8
|
5
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
6
|
5
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
9
|
9
|
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0891-V4-2019:
1
- NL:
|
|
pdf_data/st_keywords/cc_cert_id/NL/CC-1 |
5
|
4
|
pdf_data/st_keywords/cc_cert_id/NL/CC-2 |
6
|
6
|
pdf_data/st_keywords/cc_cert_id/NL/CC-3 |
3
|
3
|
pdf_data/st_keywords/cc_claims |
|
- O:
- A:
- OE:
- OE.MRTD_:
3
- OE.BAC_PP:
1
- OE.BAC-PP:
3
|
pdf_data/st_keywords/cc_claims/OE |
|
- OE.MRTD_: 3
- OE.BAC_PP: 1
- OE.BAC-PP:
3
|
pdf_data/st_keywords/cc_claims/OE/OE.BAC-PP |
1
|
3
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0084-2014:
1
- BSI-PP-0056-V2-MA-: 1
- BSI-CC-PP-0068-V2-2011-MA-01:
1
- BSI-PP-0055-2009:
1
|
- BSI-CC-PP-0084-2014:
1
- BSI-PP-0056-2009: 1
- BSI-CC-PP-0068-V2-2011-MA-01:
1
- BSI-PP-0055-2009:
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0068-V2-2011-MA-01 |
1
|
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084-2014 |
1
|
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0055-2009 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
2
- ADV_FSP.4:
1
- ADV_TDS.3:
1
- ADV_IMP.1:
1
|
- ADV_ARC.1:
2
- ADV_FSP.4:
1
- ADV_TDS.3:
1
- ADV_IMP.1:
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.3 |
1
|
2
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
4
|
4
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL5+: 1
- EAL6: 1
- EAL6+: 1
- EAL5:
5
- EAL 6+:
1
- EAL6 augmented: 1
- EAL5 augmented:
1
|
- EAL5:
5
- EAL 6+:
1
- EAL5 augmented:
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 6+ |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
5
|
5
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 |
11
|
12
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND:
7
- FCS_CKM:
49
- FCS_COP:
73
- FCS_CKM.1:
18
- FCS_RND.1:
14
- FCS_RND.1.1:
2
- FCS_CKM.2:
8
- FCS_COP.1:
9
- FCS_CKM.4:
53
- FCS_CKM.1.1:
3
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
7
|
- FCS_RND:
7
- FCS_CKM:
31
- FCS_COP:
65
- FCS_CKM.1:
21
- FCS_RND.1:
12
- FCS_RND.1.1:
2
- FCS_CKM.2:
6
- FCS_COP.1:
8
- FCS_CKM.4:
42
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
5
- FCS_RNG: 1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
49
|
31
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
18
|
21
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
8
|
6
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
53
|
42
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
73
|
65
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
8
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
7
|
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 |
14
|
12
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACF:
11
- FDP_ITC.1:
16
- FDP_ITC.2:
16
- FDP_ACC.1:
7
- FDP_ACC: 14
- FDP_ACF.1:
10
- FDP_ACC.1.1: 1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_UCT.1:
2
- FDP_UCT: 6
- FDP_IFC.1:
4
- FDP_UCT.1.1:
1
- FDP_UIT.1:
2
- FDP_UIT: 6
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
|
- FDP_ACF:
1
- FDP_ITC.1:
14
- FDP_ITC.2:
14
- FDP_ACC.1:
19
- FDP_ACF.1:
13
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
2
- FDP_UCT.1:
9
- FDP_IFC.1:
4
- FDP_UCT.1.1:
1
- FDP_UIT.1:
9
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ITC: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
7
|
19
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
11
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
10
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
16
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
16
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 |
2
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
2
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API:
15
- FIA_AFL:
20
- FIA_SOS.2:
1
- FIA_API.1:
6
- FIA_API.1.1:
1
- FIA_UAU.4:
2
- FIA_UAU:
69
- FIA_UAU.1:
4
- FIA_AFL.1.1:
2
- FIA_AFL.1.2:
2
- FIA_UID:
24
- FIA_UID.1.1:
2
- FIA_UID.1.2:
2
- FIA_UID.1:
6
- FIA_UAU.1.1:
2
- FIA_UAU.1.2:
2
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.5:
3
- FIA_UAU.6.1:
2
|
- FIA_API:
16
- FIA_AFL:
11
- FIA_SOS.2:
1
- FIA_API.1:
7
- FIA_API.1.1:
1
- FIA_UAU.4:
12
- FIA_UAU:
17
- FIA_UAU.5:
13
- FIA_UID:
20
- FIA_UAU.1:
5
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UID.1:
8
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6: 9
- FIA_UAU.6.1:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL |
20
|
11
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API |
15
|
16
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
69
|
17
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
4
|
5
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 |
2
|
12
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 |
3
|
13
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
24
|
20
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
6
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM:
7
- FMT_LIM.1:
20
- FMT_LIM.2:
18
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MTD:
66
- FMT_MSA.3:
3
- FMT_SMF.1:
48
- FMT_SMR.1:
2
- FMT_SMF.1.1:
1
- FMT_SMR: 31
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
1
- FMT_MTD.1:
13
- FMT_MTD.1.1: 1
- FMT_MTD.3:
6
- FMT_MTD.3.1:
1
- FMT_MSA.1:
1
|
- FMT_LIM:
7
- FMT_LIM.1:
22
- FMT_LIM.2:
20
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MTD:
53
- FMT_MSA.3:
3
- FMT_SMF.1:
44
- FMT_SMR.1:
31
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
1
- FMT_MTD.1:
7
- FMT_MTD.3:
6
- FMT_MTD.3.1:
1
- FMT_MSA.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
20
|
22
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
18
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
66
|
53
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
13
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.3 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
48
|
44
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
2
|
31
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS:
4
- FPT_TST: 2
- FPT_EMS.1:
12
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
8
- FPT_TST.1:
9
- FPT_PHP.3:
10
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
|
- FPT_EMS:
4
- FPT_EMS.1:
13
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
10
- FPT_TST.1:
10
- FPT_PHP.3:
11
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
12
|
13
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
8
|
10
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
10
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
9
|
10
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
4
- FTP_TRP.1:
4
- FTP_ITC: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FTP_ITC.1:
5
- FTP_TRP.1:
5
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
4
|
5
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
4
|
5
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
4
|
2
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol/PACE/PACE |
189
|
15
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement |
8
|
5
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
6
|
4
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
- Serma:
- Serma Safety & Security:
1
|
|
pdf_data/st_keywords/hash_function/SHA |
|
- SHA1:
- SHA2:
- SHA-224:
1
- SHA-256:
1
- SHA-384:
1
- SHA-512:
1
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
- SHA-224:
1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
1
|
1
|
pdf_data/st_keywords/ic_data_group/EF/EF.COM |
3
|
7
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG1 |
11
|
17
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG14 |
5
|
7
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG15 |
2
|
3
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG16 |
9
|
16
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG2 |
5
|
8
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG3 |
11
|
19
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG4 |
11
|
18
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG5 |
3
|
6
|
pdf_data/st_keywords/ic_data_group/EF/EF.SOD |
4
|
8
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Physical Tampering:
3
- Physical tampering:
2
- Malfunction:
2
- malfunction:
6
- fault injection:
1
|
- Physical Tampering:
5
- physical tampering: 1
- Physical tampering:
1
- Malfunction:
6
- malfunction:
6
- fault injection:
1
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
2
|
6
|
pdf_data/st_keywords/side_channel_analysis/FI/Physical Tampering |
3
|
5
|
pdf_data/st_keywords/side_channel_analysis/FI/Physical tampering |
2
|
1
|
pdf_data/st_keywords/side_channel_analysis/FI/fault injection |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
6
|
6
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
|
- Leak-Inherent: 1
- physical probing:
4
- DPA:
2
- SPA:
1
- timing attacks:
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
3
|
4
|
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/other |
|
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2012-04-003: 1
- CCMB-2017-04-004:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004:
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-004 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS180-2: 1
- FIPS46-3: 1
- FIPS PUB 46-3: 1
- FIPS 186-3:
1
- FIPS 46-3: 1
- FIPS 197:
1
|
- FIPS 186-3:
1
- FIPS 180-2: 1
- FIPS 197:
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 186-3 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 |
1
|
1
|
pdf_data/st_keywords/standard_id/ICAO/ICAO |
10
|
11
|
pdf_data/st_keywords/standard_id/ISO |
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
|
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
|
pdf_data/st_keywords/standard_id/NIST |
|
- SP 800-90: 2
- SP 800-67:
1
|
pdf_data/st_keywords/standard_id/NIST/SP 800-67 |
1
|
1
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 |
2
|
2
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 |
4
|
5
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/standard_id/SCP |
- SCP03:
2
- SCP01:
1
- SCP02:
1
|
- SCP03:
2
- SCP01:
1
- SCP02:
1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
11
|
6
|
pdf_data/st_keywords/symmetric_crypto/DES |
- DES:
- 3DES:
- Triple-DES:
6
- TDES:
7
- 3DES:
2
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
- Triple-DES:
6
- TDES:
7
- 3DES: 2
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
7
|
5
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
6
|
5
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC |
3
|
2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Gemalto:
- Thales:
|
- Samsung:
- Gemalto:
- Thales:
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
1
|
307
|
pdf_data/st_keywords/vendor/Thales/Thales |
12
|
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
D1433278
|
D1417546
|
pdf_data/st_metadata//CreationDate |
D:20200722180358+02'00'
|
D:20210921161242+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Keywords |
12/10/2017
|
05-07-2018
|
pdf_data/st_metadata//ModDate |
D:20200722180358+02'00'
|
D:20210921161242+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Subject |
1.1
|
1.5
|
pdf_data/st_metadata//Title |
eTravel v2.2 on MultiApp v4.0.1 platform, PACE, EAC and AA activated
|
MultiApp V4.1: eTravel 2.3 EAC on BAC Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
1877883
|
1888188
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
79
|
73
|
dgst |
aae19ec3531ff508
|
d3410ad9c75334cf
|