name |
eTravel 2.4 en configuration EAC SAC sur plateforme ID Motion V2.0 |
IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
active |
not_valid_after |
27.09.2023 |
09.07.2025 |
not_valid_before |
27.09.2018 |
09.07.2020 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_38v2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_51fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_38v2fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_51fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_38v2en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_51en.pdf |
manufacturer |
Gemalto |
Idemia |
manufacturer_web |
https://www.gemalto.com/ |
https://www.idemia.com |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
b7c38e56539fa8a5 |
0a1a6716d077f73c |
heuristics/cert_id |
ANSSI-CC-2018/38v2 |
ANSSI-CC-2020/51 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.4, AVA_VAN.5, ATE_DPT.1, AGD_OPE.1, ADV_IMP.1, ADV_TDS.3, AGD_PRE.1, ALC_DVS.2, ADV_ARC.1 |
ADV_FSP.4, AVA_VAN.5, ATE_DPT.1, AGD_OPE.1, ADV_IMP.1, ADV_TDS.3, ALC_DVS.2, ADV_ARC.1 |
heuristics/extracted_versions |
2.4, 2.0 |
1.3, 8.2 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2018/35, BSI-DSZ-CC-0945-2017 |
ANSSI-CC-2019/34, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V3-2019, ANSSI-CC-2020/26 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2018/35, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0945-2017 |
ANSSI-CC-2019/34, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-2018, ANSSI-CC-2019/28, ANSSI-CC-2020/26, BSI-DSZ-CC-0973-2016, ANSSI-CC-2017/49 |
heuristics/scheme_data |
- cert_id: 2015/03
- description: Le produit certifié est la carte à puce fermée « MultiApp v3.1 », pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D080PVC fabriqué par la société NXP SEMICONDUCTORS.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile inter
- developer: Gemalto / NXP Semiconductors
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: 2015/03
- certification_date: 12/02/2015
- developer: Gemalto / NXP Semiconductors
- evaluation_facility: Serma Technologies
- level: EAL5+
- mutual_recognition:
- protection_profile: BSI-CC-PP-0056-V2, [PP EAC PACE],BSI-CC-PP-0068-V2, [PP SAC]
- report_link: https://cyber.gouv.fr/sites/default/files/2015/03/ANSSI-CC-2015_03.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/2015/03/anssi_cible_2015-03_LITE.pdf
- level: EAL5+
- product: Application eTravel EAC v2.1, en configuration EAC et SAC, sur la plateforme fermée MultiApp V3.1 masquée sur le composant P60D080PVC
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v21-en-configuration-eac-et-sac-sur-la-plateforme-fermee
|
- cert_id: 2020/50
- description: Le produit évalué est l’application « : IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2, Identification F0 02 02 13 » développée par Idemia et masquée sur le composant NXP P60D145 développé par NXP Semiconductors GmbH.
Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2 et d’un microcontrôleur sécurisés. Il est destiné à être ut
- developer: Idemia, NXP Semiconductors GmbH
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: 2020/50
- certification_date: 09/07/2020
- developer: Idemia, NXP Semiconductors GmbH
- evaluation_facility: CEA-LETI
- expiration_date: 09/07/2025
- level: EAL5+
- mutual_recognition: SOG-IS
CCRA
- protection_profile: PP for secure signature creation device (Part 2, 3, 4, 5, 6)
- report_link: https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cc-2020_50fr.pdf
- sponsor: Idemia, NXP Semiconductors GmbH
- target_link: https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cible-cc-2020_50en.pdf
- expiration_date: 9 Juillet 2025
- level: EAL5+
- product: IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2
- sponsor: Idemia, NXP Semiconductors GmbH
- url: https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-en-configuration-1-sur-la-plateforme-id-one-cosmo-v82-0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0945-2017 |
ANSSI-CC-2020/26 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0945-2017 |
ANSSI-CC-2020/26 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-2018_38v2.pdf |
certificat-2020_51fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: mflament
- /CreationDate: D:20220718103720+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20220718103720+02'00'
- /Producer: Acrobat Distiller 21.0 (Windows)
- /Title: Microsoft Word - PS-certificat-2018_38v2
- pdf_file_size_bytes: 965649
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author:
- /CreationDate: D:20200713154122+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20200713154122+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 495630
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
anssi-cc-2018_38v2fr.pdf |
anssi-cc-2020_51fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2020/51
- cert_item: IAS ECC v2, version 1.3 in configuration #2 on ID-One Cosmo v8.2 open platform
- cert_item_version: Identification de l’applet : F0 02 02 13 Identification du matériel de la plateforme : 09 11 21 Identification du patch : 09 42 22
- cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France NXP Semiconductors GmbH Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- FR:
- ANSSI-CC-2018/35: 1
- ANSSI-CC-2018/38: 2
- ANSSI-CC-2018/38v2: 2
|
- DE:
- BSI-DSZ-CC-1059-2018: 1
- BSI-DSZ-CC-1059-V3-2019: 1
- FR:
- ANSSI-CC-2019/34: 2
- ANSSI-CC-2020/26: 2
- ANSSI-CC-2020/51: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0056-V2-2012-MA02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP- 0075-2012: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-: 2
- PP-SSCD-Part2: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 5: 1
- EAL2: 2
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_OPE: 1
- ADV_PRE: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- AGD_OPE: 3
- AGD_PALP: 1
- AGD_PDEV: 1
- AGD_POPE: 1
- AGD_PPRE: 1
- AGD_PRE: 5
- AGD_QUA: 2
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Idemia:
- NXP:
- NXP: 6
- NXP Semiconductors: 3
|
pdf_data/report_keywords/eval_facility |
|
- CEA-LETI:
- CEA - LETI: 1
- CEA-LETI: 1
- CESTI:
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: mflament
- /CreationDate: D:20220613141402+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20220613141402+02'00'
- /Producer: Acrobat Distiller 21.0 (Windows)
- /Title: Microsoft Word - ANSSI-CC-2018_38v2fr
- pdf_file_size_bytes: 626646
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author:
- /CreationDate: D:20200713152244+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20200713152244+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 149448
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
anssi-cible-cc-2018_38v2en.pdf |
anssi-cible-cc-2020_51en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0055: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 2
- EAL6+: 1
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 6
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_MRTD: 1
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 5
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.4: 1
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_INT: 1
- ADV_TDS: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 10
- AGD_OPE.1: 2
- AGD_PRE: 14
- AGD_PRE_PLT: 2
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 7
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 30
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 45
- FCS_CKM.4.1: 1
- FCS_COP: 57
- FCS_COP.1: 6
- FCS_COP.1.1: 6
- FCS_RND: 7
- FCS_RND.1: 13
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF: 11
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_UCT: 6
- FDP_UCT.1: 3
- FDP_UCT.1.1: 1
- FDP_UIT: 6
- FDP_UIT.1: 3
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 15
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 55
- FIA_UAU.1: 3
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 3
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 1
- FIA_UAU.6.1: 2
- FIA_UID: 11
- FIA_UID.1: 5
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 21
- FMT_LIM.1.1: 3
- FMT_LIM.2: 19
- FMT_LIM.2.1: 3
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 66
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_MTD.3: 7
- FMT_MTD.3.1: 1
- FMT_SMF.1: 49
- FMT_SMF.1.1: 1
- FMT_SMR: 30
- FMT_SMR.1: 2
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 12
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 13
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
- FAU:
- FCS:
- FCS_CKM: 34
- FCS_CKM.1: 41
- FCS_CKM.2: 8
- FCS_CKM.3: 5
- FCS_CKM.4: 60
- FCS_CKM.4.1: 1
- FCS_COP: 105
- FCS_COP.1: 38
- FCS_COP.1.1: 3
- FCS_RNG: 4
- FCS_RNG.1: 19
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 69
- FDP_ACC.1: 38
- FDP_ACF: 48
- FDP_ACF.1: 36
- FDP_CKM: 4
- FDP_CKM.1: 1
- FDP_ETC: 5
- FDP_ETC.1: 2
- FDP_IFC.1: 20
- FDP_ITC: 21
- FDP_ITC.1: 42
- FDP_ITC.2: 35
- FDP_RIP: 11
- FDP_RIP.1: 10
- FDP_RIP.1.1: 3
- FDP_ROL: 1
- FDP_SDI: 15
- FDP_SDI.1: 2
- FDP_SDI.2: 6
- FDP_UCT: 7
- FDP_UCT.1: 1
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 31
- FMT_MSA.1: 7
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 31
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 39
- FMT_MTD.1: 6
- FMT_SMF.1: 44
- FMT_SMF.1.1: 1
- FMT_SMR.1: 42
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 7
- FPT_EMS.1: 9
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 2
- FPT_FLS: 5
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_TST: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 10
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.AES: 1
- O.APPLI_DEV: 1
- O.CIPHER: 1
- O.DECIPHER: 1
- O.DEV_DIS_ES: 1
- O.DLV_DATA: 1
- O.EFFECT_L: 1
- O.EFFECT_R: 1
- O.INIT_ACS: 1
- O.LOAD: 1
- O.REMOVE: 1
- O.RESOURCE: 1
- O.RND: 1
- O.ROLLBACK: 1
- O.SAMPLE_ACS: 1
- O.SECURITY: 1
- O.SEGREGATE: 1
- O.SIDE: 1
- O.TAMPER_ES: 1
- O.TDES: 1
- OE:
- OSP:
- OSP.CIPHER: 1
- OSP.CONF-ALU: 1
- OT:
- T:
- T.APP_CORR: 1
- T.APP_DISC: 1
- T.APP_MOD: 1
- T.APP_READ: 1
- T.APP_REMOVE: 1
- T.DEL_REMOVE: 1
- T.DIS_DATA: 1
- T.DIS_TEST_ES: 1
- T.ERR_REMOVE: 1
- T.LOAD_APP: 1
- T.LOAD_MAN: 1
- T.LOAD_MOD: 1
- T.LOAD_OTHER: 1
- T.MOD: 1
- T.MOD_DATA: 1
- T.MOD_EXE: 1
- T.MOD_LOAD: 1
- T.MOD_SHARE: 1
- T.MOD_TSF: 1
- T.RESOURCES: 1
- T.RND: 1
- T.T_CMD: 1
- T.T_DEL: 1
- T.T_ES: 1
- T.T_TOOLS: 1
|
- A:
- A.APPLET: 1
- A.CGA: 4
- A.CSP: 4
- A.PLT: 2
- A.SCA: 3
- A.VERIFICATION: 1
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.CODE_EVIDENCE: 2
- OE.HID_VAD: 4
- OE.PLT: 2
- OE.VERIFICATION: 4
- OSP:
- OSP.PLT: 1
- OSP.VERIFICATION: 1
- T:
- T.CONFID_APPLI_DATA: 3
- T.INTEG_APPLI_DATA: 6
- T.OBJ_DELETION: 3
- T.PHYSICAL: 3
- T.RESSOURCES: 3
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Infineon:
- Thales:
|
- Idemia:
- Morpho:
- NXP:
- Oberthur:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 6
- Triple-DES: 5
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 5
- SHA-384: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 12
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 7
- SCA:
- DPA: 2
- Leak-Inherent: 4
- Physical Probing: 2
- SPA: 1
- physical probing: 4
- side channel: 1
- timing attacks: 1
- other:
|
- FI:
- DFA: 2
- fault injection: 2
- physical tampering: 5
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 3
- EF.CardAccess: 1
- EF.DG1: 10
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 8
- EF.DG2: 5
- EF.DG3: 11
- EF.DG4: 11
- EF.DG5: 3
- EF.SOD: 4
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
- FIPS:
- FIPS 180-3: 1
- FIPS PUB 180-3: 1
- FIPS180-3: 1
- ISO:
- PKCS:
- PKCS #1: 1
- PKCS#1: 3
- PKCS#15: 2
- PKCS#3: 3
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Jorge VARGAS
- /CreationDate: D:20220324171455+01'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Security Target, CC, eTravel, ICAO, MULTOS, EAC, SAC, PACE
- /ModDate: D:20220324171455+01'00'
- /Producer: Microsoft® Word 2016
- /Subject: MRTD
- /Title: eTravel EAC SAC Security Target
- pdf_file_size_bytes: 2404740
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 101
|
- /Author: IDEMIA
- /CreationDate: D:20200421132036+05'30'
- /Creator: Microsoft® Word 2016
- /Keywords: Quality
- /ModDate: D:20200421211625+05'30'
- /Producer: Microsoft® Word 2016
- /Subject: FQR standard
- pdf_file_size_bytes: 2737504
- pdf_hyperlinks: ftp://ftp.itc.1/SCD
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |