Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

eTravel v2.2 on MultiApp v4.0.1 platform, PACE, EAC and AA activated
ANSSI-CC-2017/83
EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
ISCB-5-RPT-C053-CR-v1a
name eTravel v2.2 on MultiApp v4.0.1 platform, PACE, EAC and AA activated EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
category ICs, Smart Cards and Smart Card-Related Devices and Systems Products for Digital Signatures
not_valid_before 2018-01-10 2013-12-27
not_valid_after 2025-06-17 2019-09-01
scheme FR MY
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_83en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EZMCOM%20EzIdentity%20Security%20Target%20v1.1.pdf
status active archived
manufacturer Gemalto - Infineon Technologies AG EZMCOM Inc.
manufacturer_web https://www.gemalto.com/ https://www.ezmcom.com/
security_level EAL5+, AVA_VAN.5, ALC_DVS.2 EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_83fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C053-CR-v1a.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2017_83-s01.pdf None
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2020, 9, 16), 'maintenance_title': 'Reassessment report : ANSSI-CC-2017/83-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_83-s01.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 6, 7), 'maintenance_title': 'Maintenance report : ANSSI-CC-2017/83-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_83-m01.pdf', 'maintenance_st_link': None})
state/cert/convert_garbage True False
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 2b2f28c3f14137a87c7b9411f75ae19b395bd412ce3193cb7684d15b2f66702c None
state/cert/txt_hash b62000776ddb998b731a296e25a1a03e429beb706e4138bb5739512f397e8594 None
state/report/pdf_hash e3b681fa674cbb3c4a25f9735c98704bdb0f9a26f2c236cb93ae934a55781b12 56ae235210872827b94af81907dcc2e6069a531331fe79b138f7e2806374f770
state/report/txt_hash 9ea6a76b0de24a71e3de597cac2b90ea86d1589d4fee28d2cae7f15676bea782 f9b6da6d3ed30a7a1b59c95f30b66250dc569cd2e2b07ef2366d8a4738e9e363
state/st/pdf_hash c4e8e02cf91fca0d87420bdc0cf84bcb731411177118e64ab76808cf047f094b c4b58c015b176a0a7e01812c2ba212bda9c3209d1542b010c2c5497e410a6d1b
state/st/txt_hash d38e6ebf3dc2269fed60a4d66fb8b965b22ec5ec35c7981c7300b9900b0ddd60 175f6ebdca3654eff335ed0c127a1dd565df9d90dd285ba6c8dcc65ef3e3f30f
heuristics/cert_id ANSSI-CC-2017/83 ISCB-5-RPT-C053-CR-v1a
heuristics/cert_lab SERMA None
heuristics/extracted_versions 4.0.1, 2.2 4.0.0.2, 2.0.0.1
heuristics/report_references/directly_referencing ANSSI-CC-2017/76, BSI-DSZ-CC-0891-V2-2016 None
heuristics/report_references/indirectly_referencing ANSSI-CC-2017/07, ANSSI-CC-2017/54, BSI-DSZ-CC-0891-2015, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V2-2016 None
heuristics/scheme_data
  • product: eTravel v2.2 on MultiApp v4.0.1 platform, PACE, EAC and AA activated
  • url: https://cyber.gouv.fr/produits-certifies/etravel-v22-multiapp-v401-platform-pace-eac-and-aa-activated
  • description: Le produit certifié est l’application « eTravel v2.2 sur la Plate-forme MultiApp v4.0.1, PACE, EAC et AA activés » développée par la société GEMALTO et embarquée sur le microcontrôleur M7892 G12 fabriqué par la société INFINEON TECHNOLOGIES AG. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internatio
  • sponsor: Gemalto
  • developer: Gemalto, Infineon Technologies AG
  • cert_id: 2017/83
  • level: EAL5+
  • expiration_date: 17 Juin 2025
  • enhanced:
    • cert_id: 2017/83
    • certification_date: 10/01/2018
    • expiration_date: 17/06/2025
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • developer: Gemalto, Infineon Technologies AG
    • sponsor: Gemalto
    • evaluation_facility: Serma Safety & Security
    • level: EAL5+
    • protection_profile: BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • report_link: https://cyber.gouv.fr/sites/default/files/2018/01/anssi-cc-2017_83fr.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2018/01/anssi-cible-cc-2017_83en.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/2018/01/certificat-cc-2017_83-s01.pdf
  • cert_no: 2013-013-C053
  • developer: EZMCOM Inc.
  • level: EAL2
  • product: EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
  • certification_date: 27-12-2013
  • expiration_date: 27-12-2018
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/83
  • enhanced:
    • cert_id: C053
    • product: EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
    • developer: Anupam Ratha2B-23A-3, Block 2B,Plaza Sentral, Jalan Stesen Sentral 5,50470 Kuala Lumpur,MALAYSIA URL: http://www.ezmcom.comEmail: [email protected]: +6012-570-1114
    • category: Products for Digital Signatures
    • type: Software product used for digital signing of data, file, or transaction that includes the client and server components of the EzIdentityTM.Software product used for digital signing of data, file, or transaction that includes the client and server components of the EzIdentityTM.
    • scope: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.0.2 (hereafter referred as mSign and EzIdentity Platform) from EZMCOM Inc. are the Target of Evaluation (TOE) for this Evaluation Assurance Level (EAL) 2 evaluation. The TOE is consists of two components as follows: Client side: EzIdentity™ mSign. mSign is a smartphone based application that provides users with the ability to apply digital signatures to documents and data that the users receive. The application allows for the generation of a digital signature, which can then be used to approve and sign transactions (such as internet banking, funds transfers, etc.). In addition, the application supports the generation of One Time Password (OTP) for software initialisation and challenge response code in order to unblock the blocked user. Server side: EzIdentity™ Authentication Platform. EzIdentity platform supports an organisations deployment of the mSign application by providing a back-end platform to manage and control deployment and configuration. The platform assists in the transfer of transaction data to be signed between third parties and mSign users, provides user and role management, security and management functions and allows organisations to manage and configure all aspects of both the EzIdentity platform and mSign application deployment. The scope of evaluation covers major security functions described as follows: Security Audit - EzIdentity platform generates audit records for security events. The Administrator, Super Operator and Operator who have roles with access to the audit report module are allowed to view the audit trail. Data Protection - User data such as device ID, user PIN and signature data that is stored within mSign application is encrypted with Triple-DES encryption to prevent from data modification and unauthorised access. Identification and Authentication - The TOE, both mSign and EzIdentity platform, enforce user identification and authentication mechanism prior to allow user to any user action or information flow being permitted. mSign user is required to enter user PIN before permitted to perform any actions. On the EzIdentity platform, users such as Administrators, Super Operators, and Operators must be authenticated using correct combination of username and password before permitted to perform any administrative functions. Security Management - EzIdentity platform provides a wide range of security management function for Administrators including TOE configuration, manage mSign client application, managing users, assign the information flow policy, and audit management among other routine maintenance activities. TOE Access - TOE provides session termination based on time limitation set on user inactivity. The TOE also enforce user blocking session if the user have wrongly entered user PIN after certain number of invalid authentication attempts are made. In order to unblock the session, user is required to request Challenge Response Code which will be sent to his or her registered mobile phone or email as defined during user registration process. Cryptographic Operation - Both mSign and EzIdentity platform provide users with functionality to digitally sign files, data and sensitive transaction (such as internet banking transfer) to provide integrity and non-repudiation. It also provides One Time Password (OTP) generation, secure transit of data between TOE components and secure storage of user data on device.
    • assurance_level: EAL2
    • certification_date: 27-12-2013
    • expiration_date: 27-12-2018
    • mutual_recognition: CCRA
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C053/EZMCOM%20EzIdentity%20Security%20Target%20v1.1.pdf
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C053/ISCB-5-RPT-C053-CR-v1a.pdf
    • status: Archive
heuristics/scheme_data/developer Gemalto, Infineon Technologies AG EZMCOM Inc.
heuristics/scheme_data/enhanced
  • cert_id: 2017/83
  • certification_date: 10/01/2018
  • expiration_date: 17/06/2025
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: Gemalto, Infineon Technologies AG
  • sponsor: Gemalto
  • evaluation_facility: Serma Safety & Security
  • level: EAL5+
  • protection_profile: BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • report_link: https://cyber.gouv.fr/sites/default/files/2018/01/anssi-cc-2017_83fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/2018/01/anssi-cible-cc-2017_83en.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/2018/01/certificat-cc-2017_83-s01.pdf
  • cert_id: C053
  • product: EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
  • developer: Anupam Ratha2B-23A-3, Block 2B,Plaza Sentral, Jalan Stesen Sentral 5,50470 Kuala Lumpur,MALAYSIA URL: http://www.ezmcom.comEmail: [email protected]: +6012-570-1114
  • category: Products for Digital Signatures
  • type: Software product used for digital signing of data, file, or transaction that includes the client and server components of the EzIdentityTM.Software product used for digital signing of data, file, or transaction that includes the client and server components of the EzIdentityTM.
  • scope: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.0.2 (hereafter referred as mSign and EzIdentity Platform) from EZMCOM Inc. are the Target of Evaluation (TOE) for this Evaluation Assurance Level (EAL) 2 evaluation. The TOE is consists of two components as follows: Client side: EzIdentity™ mSign. mSign is a smartphone based application that provides users with the ability to apply digital signatures to documents and data that the users receive. The application allows for the generation of a digital signature, which can then be used to approve and sign transactions (such as internet banking, funds transfers, etc.). In addition, the application supports the generation of One Time Password (OTP) for software initialisation and challenge response code in order to unblock the blocked user. Server side: EzIdentity™ Authentication Platform. EzIdentity platform supports an organisations deployment of the mSign application by providing a back-end platform to manage and control deployment and configuration. The platform assists in the transfer of transaction data to be signed between third parties and mSign users, provides user and role management, security and management functions and allows organisations to manage and configure all aspects of both the EzIdentity platform and mSign application deployment. The scope of evaluation covers major security functions described as follows: Security Audit - EzIdentity platform generates audit records for security events. The Administrator, Super Operator and Operator who have roles with access to the audit report module are allowed to view the audit trail. Data Protection - User data such as device ID, user PIN and signature data that is stored within mSign application is encrypted with Triple-DES encryption to prevent from data modification and unauthorised access. Identification and Authentication - The TOE, both mSign and EzIdentity platform, enforce user identification and authentication mechanism prior to allow user to any user action or information flow being permitted. mSign user is required to enter user PIN before permitted to perform any actions. On the EzIdentity platform, users such as Administrators, Super Operators, and Operators must be authenticated using correct combination of username and password before permitted to perform any administrative functions. Security Management - EzIdentity platform provides a wide range of security management function for Administrators including TOE configuration, manage mSign client application, managing users, assign the information flow policy, and audit management among other routine maintenance activities. TOE Access - TOE provides session termination based on time limitation set on user inactivity. The TOE also enforce user blocking session if the user have wrongly entered user PIN after certain number of invalid authentication attempts are made. In order to unblock the session, user is required to request Challenge Response Code which will be sent to his or her registered mobile phone or email as defined during user registration process. Cryptographic Operation - Both mSign and EzIdentity platform provide users with functionality to digitally sign files, data and sensitive transaction (such as internet banking transfer) to provide integrity and non-repudiation. It also provides One Time Password (OTP) generation, secure transit of data between TOE components and secure storage of user data on device.
  • assurance_level: EAL2
  • certification_date: 27-12-2013
  • expiration_date: 27-12-2018
  • mutual_recognition: CCRA
  • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C053/EZMCOM%20EzIdentity%20Security%20Target%20v1.1.pdf
  • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C053/ISCB-5-RPT-C053-CR-v1a.pdf
  • status: Archive
heuristics/scheme_data/enhanced/category Cartes à puce Products for Digital Signatures
heuristics/scheme_data/enhanced/cert_id 2017/83 C053
heuristics/scheme_data/enhanced/certification_date 10/01/2018 27-12-2013
heuristics/scheme_data/enhanced/developer Gemalto, Infineon Technologies AG Anupam Ratha2B-23A-3, Block 2B,Plaza Sentral, Jalan Stesen Sentral 5,50470 Kuala Lumpur,MALAYSIA URL: http://www.ezmcom.comEmail: [email protected]: +6012-570-1114
heuristics/scheme_data/enhanced/expiration_date 17/06/2025 27-12-2018
heuristics/scheme_data/enhanced/mutual_recognition SOG-IS CCRA CCRA
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2018/01/anssi-cc-2017_83fr.pdf https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C053/ISCB-5-RPT-C053-CR-v1a.pdf
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2018/01/anssi-cible-cc-2017_83en.pdf https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C053/EZMCOM%20EzIdentity%20Security%20Target%20v1.1.pdf
heuristics/scheme_data/expiration_date 17 Juin 2025 27-12-2018
heuristics/scheme_data/level EAL5+ EAL2
heuristics/scheme_data/product eTravel v2.2 on MultiApp v4.0.1 platform, PACE, EAC and AA activated EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/etravel-v22-multiapp-v401-platform-pace-eac-and-aa-activated https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/83
heuristics/st_references/directly_referencing BSI-DSZ-CC-0891-V2-2016 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0891-V2-2016 None
pdf_data/cert_filename certificat-cc-2017_83-s01.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2017/83-S01: 2
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0056-V2-2012-MA-02: 1
      • BSI-CC-PP-0068-V2-2011-MA-01: 1
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • Infineon:
      • Infineon Technologies AG: 1
  • eval_facility:
    • Serma:
      • Serma Safety & Security: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
    • PACE:
      • PACE: 1
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 1295972
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: sharbus
  • /CreationDate: D:20220107175029+01'00'
  • /ModDate: D:20220107175029+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - certificat-CC-2017_83-S01
  • pdf_hyperlinks:
None
pdf_data/report_filename anssi-cc-2017_83fr.pdf ISCB-5-RPT-C053-CR-v1a.pdf
pdf_data/report_frontpage
  • FR:
    • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
    • cert_id: ANSSI-CC-2017/83
    • cert_item: eTravel v2.2 on MultiApp v4.0.1 platform, PACE, EAC and AA activated
    • cert_item_version: Version de l’application eTravel : 2.2 Version de la plateforme Java Card MultiApp : 4.0.1
    • ref_protection_profiles: BSI-CC-PP-0056-V2-2012-MA-02, version 1.3.2 Machine Readable Travel Document with ICAO application, Extended Access Control with PACE BSI-CC-PP-0068-V2-2011-MA-01, version 1.0.1 Machine Readable Travel Document using Standard Inspection Procedure with PACE
    • cc_version: Critères Communs version 3.1 révision 5
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • developer: Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France
    • cert_lab: Serma Safety & Security 14, rue Galilée, CS 10055, 33615 Pessac Cedex, France
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0891-V2-2016: 2
  • FR:
    • ANSSI-CC-2017/83: 19
    • ANSSI-CC-2017/76: 2
  • MY:
    • ISCB-5-RPT-C053-CR-v1a: 41
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 2
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 3
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 4
    • AVA_VAN: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 3
    • EAL2: 2
    • EAL7: 1
    • EAL 1: 1
    • EAL 3: 1
    • EAL 7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL2: 9
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL2: 9
pdf_data/report_keywords/cc_security_level/EAL/EAL2 2 9
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
  • FCO:
    • FCO_NRO.1.1: 1
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_COP: 5
    • FCS_CKM.4: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
  • FIA:
    • FIA_ATD: 2
    • FIA_AFL.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MTD: 2
    • FMT_MSA.3.2: 1
    • FMT_MSA: 2
  • FPT:
    • FPT_ITT.1: 1
  • FTA:
    • FTA_SSL.1: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • Ref [6]) are out of scope for this evaluation: 1
    • 11 All of the underlying hardware and the operating systems used by both mSign and EzIdentity are out of scope for this evaluation. 12 Figure 1 identifies the major architectural components that comprise the: 1
    • by both mSign and EzIdentity as described in Section 1.4.3 of the Security Target (Ref [6]) are out of scope for this evaluation. 23 The assurance gained via evaluation applies specifically to the TOE in the: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 30
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Safety & Security: 1
    • SERMA: 2
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/hash_function/SHA
  • SHA2:
    • SHA-2: 1
  • SHA1:
    • SHA-1: 4
  • SHA2:
    • SHA-256: 1
pdf_data/report_keywords/hash_function/SHA/SHA2
  • SHA-2: 1
  • SHA-256: 1
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 3
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 180-2: 1
  • PKCS:
    • PKCS#1: 3
    • PKCS#5: 2
  • RFC:
    • RFC 2898: 2
    • RFC 4226: 2
    • RFC 6328: 2
    • RFC 6287: 2
  • ISO:
    • ISO/IEC15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • DES:
    • 3DES:
      • Triple-DES: 5
      • TDES: 3
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/report_keywords/symmetric_crypto/DES
  • DES:
    • DES: 1
  • 3DES:
    • Triple-DES: 5
    • TDES: 3
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 2
    • Infineon: 1
  • Gemalto:
    • Gemalto: 3
pdf_data/report_metadata
  • pdf_file_size_bytes: 269748
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Category: Référence, Version
  • /Comments: Developpeur
  • /Company: SGDSN/ANSSI
  • /CreationDate: D:20180115110252+01'00'
  • /Creator: Acrobat PDFMaker 11 pour Word
  • /Keywords: ANSSI-CC-CER-F-07.026
  • /ModDate: D:20180116184715+01'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20180115100249
  • /Subject:
  • /Title:
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.sogis.org/, http://www.commoncriteriaportal.org/
  • pdf_file_size_bytes: 398084
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 42
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20140106141939+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: EZMCOM Inc
  • /Document Type: CR
  • /Identifier: ISCB-5-RPT-C053-CR-v1a
  • /Index: MyCB_TMP_002
  • /Keywords: MyCB_TMP_002
  • /ModDate: D:20140106142000+08'00'
  • /Phase: Release
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C053
  • /Released: 27 December 2013
  • /ST Date: 18 November 2013
  • /ST Title: EzIdentity™ mSign™ & EzIdentity™ Authentication Platform Security Target
  • /ST Version: v1.1
  • /SourceModified: D:20140106061916
  • /Sponsor: EZMCOM Inc
  • /Subject: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.0.2
  • /TOE Name: EzIdentity™ mSign™ and EzIdentity™ Authentication Platform
  • /TOE Version: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.02
  • /Title: C053 Certification Report
  • /Version: v1a
  • pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected], http://www.commoncriteriaportal.org/
pdf_data/report_metadata//Category Référence, Version PUBLIC
pdf_data/report_metadata//Company SGDSN/ANSSI CyberSecurity Malaysia
pdf_data/report_metadata//CreationDate D:20180115110252+01'00' D:20140106141939+08'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 11 pour Word Acrobat PDFMaker 10.1 for Word
pdf_data/report_metadata//Keywords ANSSI-CC-CER-F-07.026 MyCB_TMP_002
pdf_data/report_metadata//ModDate D:20180116184715+01'00' D:20140106142000+08'00'
pdf_data/report_metadata//Producer Adobe PDF Library 11.0 Adobe PDF Library 10.0
pdf_data/report_metadata//SourceModified D:20180115100249 D:20140106061916
pdf_data/report_metadata//Subject EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.0.2
pdf_data/report_metadata//Title C053 Certification Report
pdf_data/report_metadata/pdf_file_size_bytes 269748 398084
pdf_data/report_metadata/pdf_is_encrypted False True
pdf_data/report_metadata/pdf_number_of_pages 18 42
pdf_data/st_filename anssi-cible-cc-2017_83en.pdf EZMCOM EzIdentity Security Target v1.1.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 9
      • DH: 6
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0891-V2-2016: 1
  • NL:
    • CC-1: 6
    • CC-2: 6
    • CC-3: 3
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.BAC-PP: 1
  • O:
    • O.CRYPT: 4
    • O.COMMSEC: 4
    • O.MODIFY: 4
    • O.CONTROL: 3
    • O.KEYPROTECT: 3
    • O.-CONTROL: 1
  • T:
    • T.COMINT: 3
    • T.MODIFY: 3
    • T.TSFDATA: 3
    • T.UNAUTHORISED_A: 1
    • T.UNAUTHORISED_ACCESS: 2
  • A:
    • A.ADMIN: 2
    • A.OS: 2
    • A.TIMESTAMP: 3
    • A.DATACONTROL: 2
    • A.UPDATE: 2
    • A.PHYSICAL: 2
  • OE:
    • OE.INSTALL: 1
    • OE.ADMIN: 2
    • OE.OPSYS: 2
    • OE.ENVIRONMENT: 3
    • OE.UPDATE: 2
    • OE.TIMESTAMP: 2
pdf_data/st_keywords/cc_claims/OE
  • OE.BAC-PP: 1
  • OE.INSTALL: 1
  • OE.ADMIN: 2
  • OE.OPSYS: 2
  • OE.ENVIRONMENT: 3
  • OE.UPDATE: 2
  • OE.TIMESTAMP: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0056-V2-: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-PP-0055-2009: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
  • ADV_IMP.1: 1
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 2 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 4
  • ALC_CMS.2: 1
  • ALC_CMC.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_ECD: 1
  • ASE_INT.1: 4
  • ASE_CCL.1: 4
  • ASE_SPD.1: 4
  • ASE_OBJ.2: 4
  • ASE_REQ.2: 4
  • ASE_TSS.1: 4
  • ASE_ECD.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_DPT.1: 1
  • ATE_IND.2: 1
  • ATE_FUN.1: 1
  • ATE_COV.1: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.3: 1
  • AVA_VAN.5: 4
  • AVA_VAN.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 1
  • EAL6+: 1
  • EAL5: 5
  • EAL 6+: 1
  • EAL6 augmented: 1
  • EAL5 augmented: 1
  • EAL2: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 6
    • FAU_GEN: 1
    • FAU_SAS.1: 13
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 7
    • FCS_CKM: 49
    • FCS_COP: 73
    • FCS_CKM.1: 20
    • FCS_RND.1: 15
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 8
    • FCS_COP.1: 11
    • FCS_CKM.4: 54
    • FCS_CKM.1.1: 2
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 7
  • FDP:
    • FDP_ACF: 12
    • FDP_ITC.1: 16
    • FDP_ITC.2: 16
    • FDP_ACC.1: 7
    • FDP_ACC: 15
    • FDP_ACF.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_UCT.1: 3
    • FDP_UCT: 6
    • FDP_IFC.1: 4
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 3
    • FDP_UIT: 6
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 15
    • FIA_AFL: 20
    • FIA_SOS.2: 1
    • FIA_API.1: 7
    • FIA_API.1.1: 1
    • FIA_UAU.4: 3
    • FIA_UAU: 69
    • FIA_UAU.1: 5
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID: 24
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.1: 7
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.6.1: 2
    • FIA_UAU.6: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.2: 19
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MTD: 66
    • FMT_MSA.3: 3
    • FMT_SMF.1: 49
    • FMT_SMR.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR: 32
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 7
    • FMT_MTD.3.1: 1
    • FMT_MSA.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 2
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 10
    • FPT_TST.1: 10
    • FPT_PHP.3: 12
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP.1: 4
    • FTP_ITC: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN.1: 5
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCO:
    • FCO_NRO.1: 6
    • FCO_NRO.1.1: 1
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 1
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.4: 23
    • FCS_COP: 28
    • FCS_CKM.2: 4
    • FCS_COP.1: 5
    • FCS_CKM.4.1: 1
    • FCS_CKM.1: 13
  • FDP:
    • FDP_IFF: 2
    • FDP_ACC.1: 17
    • FDP_ACF.1: 6
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 5
  • FIA:
    • FIA_AFL.1: 7
    • FIA_ATD: 8
    • FIA_UID.2: 6
    • FIA_UAU.2: 9
    • FIA_UID.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 4
    • FIA_ATD.1.1: 2
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 6
    • FMT_MSA.3: 8
    • FMT_MTD: 12
    • FMT_SMF.1: 14
    • FMT_SMR.1: 24
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.1: 3
  • FPT:
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FTA:
    • FTA_SSL.1: 5
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 13
  • FAU_SAS.1.1: 2
  • FAU_GEN.1: 5
  • FAU_SAR.1: 4
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 7
  • FCS_CKM: 49
  • FCS_COP: 73
  • FCS_CKM.1: 20
  • FCS_RND.1: 15
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 8
  • FCS_COP.1: 11
  • FCS_CKM.4: 54
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 7
  • FCS_CKM: 14
  • FCS_CKM.4: 23
  • FCS_COP: 28
  • FCS_CKM.2: 4
  • FCS_COP.1: 5
  • FCS_CKM.4.1: 1
  • FCS_CKM.1: 13
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 49 14
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 20 13
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 8 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 54 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 73 28
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 5
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF: 12
  • FDP_ITC.1: 16
  • FDP_ITC.2: 16
  • FDP_ACC.1: 7
  • FDP_ACC: 15
  • FDP_ACF.1: 10
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1: 8
  • FDP_RIP.1.1: 1
  • FDP_UCT.1: 3
  • FDP_UCT: 6
  • FDP_IFC.1: 4
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 3
  • FDP_UIT: 6
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_IFF: 2
  • FDP_ACC.1: 17
  • FDP_ACF.1: 6
  • FDP_ITC.1: 12
  • FDP_ITC.2: 12
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 7 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 10 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 4 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 16 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 16 12
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 15
  • FIA_AFL: 20
  • FIA_SOS.2: 1
  • FIA_API.1: 7
  • FIA_API.1.1: 1
  • FIA_UAU.4: 3
  • FIA_UAU: 69
  • FIA_UAU.1: 5
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID: 24
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID.1: 7
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.5: 4
  • FIA_UAU.6.1: 2
  • FIA_UAU.6: 1
  • FIA_AFL.1: 7
  • FIA_ATD: 8
  • FIA_UID.2: 6
  • FIA_UAU.2: 9
  • FIA_UID.1: 6
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU.1: 4
  • FIA_ATD.1.1: 2
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 5 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 7 6
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 7
  • FMT_LIM.1: 21
  • FMT_LIM.2: 19
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 66
  • FMT_MSA.3: 3
  • FMT_SMF.1: 49
  • FMT_SMR.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR: 32
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 14
  • FMT_MTD.1.1: 1
  • FMT_MTD.3: 7
  • FMT_MTD.3.1: 1
  • FMT_MSA.1: 1
  • FMT_MSA: 6
  • FMT_MSA.3: 8
  • FMT_MTD: 12
  • FMT_SMF.1: 14
  • FMT_SMR.1: 24
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1: 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 3 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 66 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 49 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 2 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 2 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 4
  • FPT_TST: 2
  • FPT_EMS.1: 13
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 10
  • FPT_TST.1: 10
  • FPT_PHP.3: 12
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_ITT.1: 5
  • FPT_ITT.1.1: 1
  • FPT_STM.1: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • Please note that the RSA encryption and decryption operations performed on the EzIdentity are out of scope for this evaluation. COMMERCIAL-IN-CONFIDENCE 13 of 43 2 Conformance Claim (ASE_CCL.1) The ST and: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 110
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 6
  • KA:
    • Key Agreement: 8
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Safety & Security: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-224: 1
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 4
  • PBKDF:
    • PBKDF2: 2
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-224: 1
  • SHA1:
    • SHA-1: 7
  • SHA2:
    • SHA-256: 4
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 1
  • SHA-256: 4
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 11
    • EF.DG2: 5
    • EF.DG3: 11
    • EF.DG4: 11
    • EF.DG5: 3
    • EF.DG16: 9
    • EF.DG14: 5
    • EF.DG15: 2
    • EF.COM: 3
    • EF.SOD: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 2
    • physical probing: 3
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 3
    • Physical tampering: 2
    • Malfunction: 5
    • malfunction: 6
    • fault injection: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
    • FIPS 186-3: 1
    • FIPS 46-3: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 4
    • PKCS#1: 2
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 10
  • SCP:
    • SCP03: 2
    • SCP01: 1
    • SCP02: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 46-3: 1
    • FIPS 180-2: 1
    • FIPS PUB 180-3: 1
    • FIPS 180-3: 1
  • PKCS:
    • PKCS#1: 6
    • PKCS#5: 3
  • RFC:
    • RFC 2898: 2
    • RFC 4226: 2
    • RFC 6328: 2
    • RFC 6287: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS180-2: 1
  • FIPS46-3: 1
  • FIPS PUB 46-3: 1
  • FIPS 186-3: 1
  • FIPS 46-3: 1
  • FIPS 197: 1
  • FIPS 46-3: 1
  • FIPS 180-2: 1
  • FIPS PUB 180-3: 1
  • FIPS 180-3: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#3: 4
  • PKCS#1: 2
  • PKCS#1: 6
  • PKCS#5: 3
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 2 6
pdf_data/st_keywords/standard_id/RFC
  • RFC 2631: 1
  • RFC 3369: 1
  • RFC 2898: 2
  • RFC 4226: 2
  • RFC 6328: 2
  • RFC 6287: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • Triple-DES: 6
      • TDES: 7
      • 3DES: 2
  • constructions:
    • MAC:
      • KMAC: 3
      • CMAC: 3
  • DES:
    • 3DES:
      • Triple-DES: 7
      • TDES: 7
  • constructions:
    • MAC:
      • HMAC: 5
pdf_data/st_keywords/symmetric_crypto/DES
  • DES:
    • DES: 1
  • 3DES:
    • Triple-DES: 6
    • TDES: 7
    • 3DES: 2
  • 3DES:
    • Triple-DES: 7
    • TDES: 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 6
  • TDES: 7
  • 3DES: 2
  • Triple-DES: 7
  • TDES: 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 6 7
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • KMAC: 3
  • CMAC: 3
  • HMAC: 5
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 7
  • Gemalto:
    • Gemalto: 519
  • STMicroelectronics:
    • STM: 1
  • Thales:
    • Thales: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 1931748
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 84
  • /CreationDate: D:20171113143948+01'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: 12/10/2017
  • /ModDate: D:20180116184802+01'00'
  • /Producer: Microsoft® Word 2013
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 928180
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
  • /Title: EzIdentity™ mSign™ & EzIdentity™ Authentication Platform Security Target EAL2 Security Target
  • /Author: Soshinee Govindasamy
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20131121122329+08'00'
  • /ModDate: D:20131121122329+08'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20171113143948+01'00' D:20131121122329+08'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 Microsoft® Word 2010
pdf_data/st_metadata//ModDate D:20180116184802+01'00' D:20131121122329+08'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 Microsoft® Word 2010
pdf_data/st_metadata//Title EzIdentity™ mSign™ & EzIdentity™ Authentication Platform Security Target EAL2 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1931748 928180
pdf_data/st_metadata/pdf_number_of_pages 84 43
dgst b6e776e146165ffc 80a30e9889a58515