name |
Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11 |
Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
10.05.2013 |
14.02.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2013_34fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_70__rapport.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2013_34en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FQR%20110%206731%20Ed1.pdf |
manufacturer |
Gemalto - Infineon Technologies AG |
Oberthur Technologies / NXP Semiconductors GmbH |
manufacturer_web |
https://www.gemalto.com/ |
https://www.oberthur.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
dgst |
b91f51096d7db8b4 |
ca15fe621a99931f |
heuristics/cert_id |
ANSSI-CC-2013/34 |
ANSSI-CC-2013/70 |
heuristics/cert_lab |
SERMA |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, AVA_VAN.5, ADV_ARC.1 |
AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ATE_FUN.1, ALC_DVS.2, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AVA_VAN.5, ATE_DPT.2 |
heuristics/extracted_versions |
2.0 |
2.0, 7.0.1, 1.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2013/32 |
BSI-DSZ-CC-0857-2013, ANSSI-CC-2010/40, ANSSI-CC-2010/58, BSI-DSZ-CC-0555-2009 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2013/32, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0555-2009, ANSSI-CC-2009/46, BSI-DSZ-CC-0410-2007, ANSSI-CC-2010/38, ANSSI-CC-2010/36, ANSSI-CC-2009/36, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0857-2013, ANSSI-CC-2009/11, ANSSI-CC-2009/47, ANSSI-CC-2010/40, BSI-DSZ-CC-0411-2007, ANSSI-CC-2010/37, ANSSI-CC-2010/58, ANSSI-CC-2009/48 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2013/34
- description: Le produit évalué est la carte à puce fermée « MultiApp V3 », pouvant être en mode contact ou sans-contact. Le produit est développé par la société Gemalto et embarqué sur le microcontrôleur M7820 A11 fabriqué par la société Infineon Technologies. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l'organisation de l'aviation civil
- developer: Gemalto / Infineon Technologies AG
- enhanced:
- level: EAL5+
- product: Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v20-en-configuration-sac-sur-la-carte-puce-fermee
|
- cert_id: ANSSI-CC-2013/70
- description: Le produit certifié est la « Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual ». L'applet ainsi que la plateforme sont développées par Oberthur Technologies. Le composant est développé par NXP. La cible d'évaluation (Target of Evaluation – TOE) est un logiciel sécurisé s&#
- developer: Oberthur Technologies / NXP Semiconductors GmbH
- enhanced:
- level: EAL4+
- product: Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/carte-ias-ecc-v101-applet-version-6179-sur-id-one-cosmo-v701-n-r20-masquee-sur
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0829-2012 |
BSI-DSZ-CC-0555-2009, ANSSI-CC-2012/30, ANSSI-CC-2010/40, ANSSI-CC-2009/48 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0555-2009, ANSSI-CC-2012/30, ANSSI-CC-2010/40, ANSSI-CC-2009/48 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
Rapport ANSSI-CC-2013_34fr.pdf |
ANSSI-CC-2013_70__rapport.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2013/34
- cert_item: Application eTravel EAC v2.0, en configuration SAC, sur la carte à puce fermée MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version: Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.3
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0068-V2, [PP SAC], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2013/70
- cert_item: Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual
- cert_item_version: Applet version 6179 Plateforme Cosmo v7.0.1-n R2.0
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Oberthur Technologies 420 rue d’Estienne d’Orves, CS 40008 92705 Colombes Cedex, France NXP Semiconductors GmbH Stresemannallee 101 22529 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d’Estienne d’Orves, CS 40008 92705 Colombes Cedex
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- FR:
- ANSSI-CC-2013/32: 4
- ANSSI-CC-2013/34: 22
|
- DE:
- BSI-DSZ-CC-0555-2009: 1
- BSI-DSZ-CC-0857-2013: 2
- FR:
- ANSSI-CC-2010/40: 3
- ANSSI-CC-2010/58: 3
- ANSSI-CC-2013/70: 21
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0068-V2: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-2007: 2
|
- BSI:
- BSI-PP-0005-: 1
- BSI-PP-0005-2002: 3
- BSI-PP-0006-2002: 3
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies: 23
- Infineon Technologies AG: 1
|
- NXP:
- NXP: 30
- NXP Semiconductors: 1
- Oberthur:
- Oberthur Technologies: 13
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Duquesnoy
- /CreationDate: D:20130712113330+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20130712113330+02'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: Microsoft Word - Rapport ANSSI-CC-2013_34fr.doc
- pdf_file_size_bytes: 301712
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: Jonathan Gimenez
- /CreationDate: D:20140221105451+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.011
- /ModDate: D:20140221105451+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Carte IAS ECC v1.0.1 : applet version 6179 sur ID-One Cosmo v7.0.1-n R2.0, masquée sur composants NXP P5CC081 et P5CD081, en configuration Standard ou Standard Dual
- /Title: ANSSI-CC-2013/70
- pdf_file_size_bytes: 775355
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
Cible ANSSI-CC-2013_34en.pdf |
FQR 110 6731 Ed1.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- FR:
- ANSSI-CC-2009/48: 1
- ANSSI-CC-2010/40: 1
- ANSSI-CC-2012/30: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
|
- BSI:
- BSI-PP-0005-2002: 1
- BSI-PP-0006-2002: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 2
|
- EAL:
- EAL 4+: 2
- EAL4: 3
- EAL4 augmented: 2
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.4: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 7
- AGD_OPE.1: 1
- AGD_PRE: 13
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 8
- FAU_SAS.1: 5
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 23
- FCS_CKM.1: 8
- FCS_CKM.1.1: 2
- FCS_CKM.2: 3
- FCS_CKM.4: 16
- FCS_CKM.4.1: 1
- FCS_COP: 24
- FCS_COP.1: 5
- FCS_COP.1.1: 4
- FCS_RND: 8
- FCS_RND.1: 8
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 3
- FDP_ACC.1.1: 1
- FDP_ACF: 7
- FDP_ACF.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_UCT: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 12
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 7
- FIA_API.1: 4
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 25
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 11
- FIA_UID.1: 3
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 15
- FMT_LIM.1.1: 2
- FMT_LIM.2: 14
- FMT_LIM.2.1: 3
- FMT_MSA.1: 1
- FMT_MSA.3: 2
- FMT_MTD: 15
- FMT_MTD.1: 1
- FMT_MTD.1.1: 4
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 6
- FPT_EMS.1: 6
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 1
- FPT_FLS.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_TST: 3
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 2
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.2: 3
- FCS_CKM.3: 3
- FCS_CKM.4: 8
- FCS_CKM.4.1: 6
- FCS_COP: 2
- FCS_COP.1: 55
- FCS_RNG: 9
- FCS_RNG.1: 5
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 4
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 11
- FDP_ACF: 2
- FDP_ACF.1: 28
- FDP_ETC: 2
- FDP_ETC.1: 6
- FDP_ITC: 2
- FDP_ITC.1: 9
- FDP_RIP: 2
- FDP_RIP.1.1: 3
- FDP_SDI: 2
- FDP_SDI.2: 4
- FDP_UCT: 2
- FDP_UCT.1: 6
- FDP_UIT: 2
- FDP_UIT.1: 16
- FIA:
- FIA_AFL: 3
- FIA_AFL.1.1: 1
- FIA_ATD: 2
- FIA_UAU: 2
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 2
- FIA_UID.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 3
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 6
- FMT_MTD.1: 6
- FMT_SMF: 2
- FMT_SMF.1: 1
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1.1: 1
- FPT:
- FPT_AMT: 1
- FPT_FLS: 2
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3.1: 1
- FPT_TEE: 2
- FPT_TST: 2
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 9
- FTP_ITC.1: 30
- FTP_ITC.1.3: 2
- FTP_TRP: 5
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
|
- A:
- D:
- D.APPLI: 1
- D.AUTH_CRYPTOGRAM: 1
- D.AUTH_KEYS: 7
- D.DTBS: 3
- D.EPHEMERAL_KEYS: 4
- D.ESERVICES_KEYS: 1
- D.IDENTIFICATION_DATA: 1
- D.RAD: 1
- D.SCD: 1
- D.SCD_ID: 1
- D.SM_DATA: 1
- D.STATE: 2
- D.SVD: 1
- D.TOE_AUTH_PRIVATE_KEYS: 1
- D.TOE_AUTH_PUBLIC_KEYS: 1
- D.VAD: 1
- OE:
|
pdf_data/st_keywords/vendor |
|
- Oberthur:
- OBERTHUR: 12
- Oberthur Technologies: 114
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 5
- Triple-DES: 3
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 6
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- Physical Tampering: 2
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- SCA:
- DPA: 2
- Leak-Inherent: 1
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- Side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 3
- EF.DG1: 7
- EF.DG15: 2
- EF.DG16: 5
- EF.DG2: 5
- EF.DG3: 1
- EF.DG4: 1
- EF.DG5: 1
- EF.DG6: 2
- EF.SOD: 4
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816-4: 1
- NIST:
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
- BSI:
- FIPS:
- FIPS 140-2: 5
- FIPS PUB 180-2: 1
- FIPS180-2: 1
- PKCS:
- PKCS #1: 6
- PKCS#1: 4
- PKCS#15: 3
- PKCS#3: 6
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- to the plastic travel document is achieved by physical and organisational security measures being out of scope of the current ST. The TOE comprises: i) the circuitry of the contactless/contact chip incl. all IC: 1
|
|
pdf_data/st_metadata |
- /Author: Antoine de Lavernette
- /CreationDate: D:20130612171602+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20130612171602+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel EAC v2 Security Target
- pdf_file_size_bytes: 887833
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
- /Author: FERAUD
- /CreationDate: D:20130822140818+02'00'
- /Creator: PDFCreator Version 0.9.5
- /Keywords:
- /ModDate: D:20130822140818+02'00'
- /Producer: GPL Ghostscript 8.61
- /Subject:
- /Title: FQR 110 6731 Ed1
- pdf_file_size_bytes: 968663
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 109
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |