name |
eTravel Essential for Japan 1.0, with SAC (BAC+PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit version 0101h |
ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G 1.0.7052 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
JP |
status |
active |
active |
not_valid_after |
13.11.2025 |
24.12.2024 |
not_valid_before |
13.11.2020 |
28.08.2019 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2020_88fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020-88fr_bac-pace.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2020_88en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_st.pdf |
manufacturer |
Thales |
Maxell, Ltd |
manufacturer_web |
|
https://www.maxell.com/ |
security_level |
ALC_DVS.2, ALC_CMC.5, ALC_TAT.2, ADV_TDS.4, ATE_DPT.3, ADV_INT.2, EAL4+, ADV_FSP.5 |
ALC_DVS.2, EAL4+ |
dgst |
b8134d4baf0d4933 |
abb304884762a560 |
heuristics/cert_id |
ANSSI-CC-2020/88 |
JISEC-CC-CRP-C0649-01-2019 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMC.5, ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ALC_FLR.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ADV_FSP.5, ADV_ARC.1, AVA_VAN.3, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
ASE_CCL.1, ADV_ARC.1, ASE_INT.1, ASE_REQ.2, ATE_COV.2, ALC_DEL.1, ADV_IMP.1, ATE_IND.2, ALC_LCD.1, ALC_DVS.2, AGD_OPE.1, ATE_DPT.1, ASE_TSS.1, AVA_VAN.5, ALC_CMC.4 |
heuristics/extracted_versions |
1.0 |
1.0.7052, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1110-V3-2020 |
BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0869-V2-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0869-V2-2019 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2020/88
- description: Le produit évalué est « eTravel Essential for Japan 1.0, with SAC (BAC+PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit, version 0101h » développé par THALES et INFINEON TECHNOLOGIES AG. Le produit certifié est de type « carte à puce » sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civi
- developer: THALES & Infineon Technologies AG
- enhanced:
- expiration_date: 13.11.2025
- level: EAL4+
- product: eTravel Essential for Japan 1.0, with SAC (BAC+PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit version 0101h
- sponsor: THALES & Infineon Technologies AG
- url: https://cyber.gouv.fr/produits-certifies/etravel-essential-japan-10-sac-bacpace-and-aa-embedded-infineon-slc52gda
|
- cert_id: JISEC-CC-CRP-C0649
- certification_date: 01.08.2019
- claim: EAL4+ ALC_DVS.2 PP
- enhanced:
- assurance_level: EAL4 Augmented with ALC_DVS.2
- cc_version: 3.1 release5
- cert_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/c0649_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the BAC, PACE, and Active Authentication specifications defined by Part11 of “ICAO Doc 9303 Machine readable Travel Documents Seventh Edition”. TOE security functionality The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including: Basic Access Control function; Password Authenticated Connection Establishment function; Active Authentication function; Disable function of BAC function; Write protection function; Protection function in transport; and Tamper resistance.
- evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT Security
- product: ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G
- product_type: ICs for e-passports
- protection_profile: Protection Profile for ePassport IC with SAC (BAC+PACE) and Active Authentication version 1.00 (Certification Identification : JISEC-C0500)
- report_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/C0649_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/c0649_st.pdf
- toe_version: v1.0.7052
- vendor: Maxell, Ltd
- expiration_date: 01.09.2026
- supplier: Maxell, Ltd
- toe_japan_name: ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0649_it8679.html
- toe_overseas_name: ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1110-V3-2020 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1110-V3-2020 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat_2020_88fr.pdf |
c0649_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0649-01-2019: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20201117173332+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20201117173332+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 267920
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20191004103237+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20191004103345+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 86383
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
anssi-cc-2020-88fr_bac-pace.pdf |
c0649_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V3-2020: 3
- FR:
|
- DE:
- BSI-DSZ-CC-0869-V2-2019: 2
- BSI-DSZ-CC-0891-V3-2018: 1
- JP:
- JISEC-CC-CRP-C0649-01-2019: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL4: 3
- EAL4 augmented: 2
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_FSP.5: 2
- ADV_IMP: 1
- ADV_INT: 1
- ADV_INT.2: 2
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.4: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_CMS.5: 2
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ALC_TAT.2: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.3: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 1
|
- Gemalto:
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 11
- TÜViT: 7
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- P-256: 1
- P-384: 1
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Fault Injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- Side channel: 1
- physical probing: 1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
- EF:
- EF.COM: 5
- EF.CardAccess: 8
- EF.DG1: 5
- EF.DG13: 6
- EF.DG14: 7
- EF.DG15: 10
- EF.DG2: 5
- EF.SOD: 5
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
- ISO/IEC 11770-2: 1
- ISO/IEC 7816-4: 4
- ISO/IEC 9797-1: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20201117173230+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20201117173230+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 149201
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
|
pdf_data/st_filename |
anssi-cible-2020_88en.pdf |
c0649_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V3-2020: 1
- NL:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 2
- EAL5: 1
- EAL6: 1
- EAL6 augmented: 1
|
- EAL:
- EAL4: 4
- EAL4 augmented: 1
- EAL4+: 3
- EAL5: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 4
- ADV_IMP.1: 1
- ADV_INT.2: 4
- ADV_TDS.4: 3
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 4
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 10
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 19
- FCS_CKM.1: 27
- FCS_CKM.2: 6
- FCS_CKM.4: 49
- FCS_CKM.4.1: 1
- FCS_COP: 56
- FCS_COP.1: 19
- FCS_RND: 2
- FCS_RND.1: 8
- FCS_RND.1.1: 2
- FCS_RNG: 3
- FDP:
- FDP_ACC: 49
- FDP_ACC.1: 21
- FDP_ACF: 41
- FDP_ACF.1: 20
- FDP_IFC.1: 11
- FDP_ITC.1: 36
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 22
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 10
- FDP_UCT.1: 3
- FDP_UIT: 10
- FDP_UIT.1: 5
- FIA:
- FIA_AFL: 15
- FIA_AFL.1: 6
- FIA_API.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 13
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 2
- FPT_PHP.3: 16
- FPT_PHP.3.1: 1
- FRU:
- FTP:
- FTP_ITC.1: 19
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 42
- FCS_CKM.1: 27
- FCS_CKM.2: 7
- FCS_CKM.3: 1
- FCS_CKM.4: 52
- FCS_CKM.4.1: 1
- FCS_COP: 131
- FCS_COP.1: 59
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 7
- FDP:
- FDP_ACC: 37
- FDP_ACC.1: 16
- FDP_ACF: 30
- FDP_ACF.1: 18
- FDP_IFC: 2
- FDP_IFC.1: 10
- FDP_IFF: 2
- FDP_ITC: 1
- FDP_ITC.1: 41
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 22
- FDP_RIP: 9
- FDP_ROL: 1
- FDP_SDI.2: 2
- FDP_UCT: 20
- FDP_UCT.1: 2
- FDP_UIT: 21
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 24
- FIA_AFL.1: 6
- FIA_ATD: 1
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 10
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 3
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 13
- FMT_MSA.3: 12
- FMT_MTD: 2
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 2
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_RCV: 3
- FPT_TDC.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 25
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.AA: 10
- O.AES: 1
- O.BAC: 9
- O.PACE: 10
- O.RND: 1
- O.TDES: 1
- OE:
- T:
|
- A:
- A.APPLET: 1
- A.PKI: 5
- A.VERIFICATION: 1
- O:
- O.AA: 8
- O.ALARM: 1
- O.BAC: 12
- O.CIPHER: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.IC_SUPPORT: 1
- O.KEY-MNGT: 1
- O.OPERATE: 1
- O.OS_SUPPORT: 1
- O.PACE: 9
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RECOVERY: 1
- O.RESOURCES: 1
- O.RND: 1
- O.TRANSACTION: 1
- OE:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-DATA: 1
- T.FAULT: 1
- T.INTEG-APPLI-DATA: 1
- T.INTEG-JCS-DATA: 1
- T.LEAKAGE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RND: 1
- T.SID: 1
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 1
- Thales:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 3
- AES-128: 1
- AES-256: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 4
- malfunction: 3
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 3
- side channel: 1
|
- SCA:
- DPA: 2
- SPA: 1
- side-channel: 1
- timing attack: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 13
- EF.CardAccess: 6
- EF.DG1: 14
- EF.DG13: 15
- EF.DG14: 12
- EF.DG15: 15
- EF.DG16: 1
- EF.DG2: 14
- EF.DG5: 1
- EF.SOD: 13
|
- EF:
- EF.COM: 9
- EF.CardAccess: 6
- EF.DG1: 9
- EF.DG13: 9
- EF.DG14: 9
- EF.DG15: 10
- EF.DG2: 9
- EF.SOD: 9
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
- ISO:
|
- BSI:
- CC:
- ICAO:
- ISO:
- ISO/IEC 10116: 8
- ISO/IEC 9797-1: 6
- NIST:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Gaelle Denis
- /CreationDate: D:20200901110836+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: SLB-Private, assurance qualité
- /ModDate: D:20200901110836+02'00'
- /Producer: Microsoft® Word 2013
- /Title: Security Target
- pdf_file_size_bytes: 1802600
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
- /Author: LovaszD
- /CreationDate: D:20190726101540+02'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20190726101540+02'00'
- /Producer: Microsoft® Word for Office 365
- /Title: ID&Trust IDENTITY APPLET-J with SAC (BAC+PACE) and AA - Security Target Lite
- pdf_file_size_bytes: 1235950
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 66
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |