Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
ANSSI-CC-2015/16
Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 1.5)
ANSSI-CC-2015/09
name Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 1.5)
not_valid_before 2015-05-15 2015-02-24
not_valid_after 2020-05-15 2020-02-24
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16_Cible.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2015_09_Lite_v1.1p.pdf
manufacturer Incard Division / ST Microelectronics Gemalto - Infineon Technologies AG
manufacturer_web None https://www.gemalto.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_16.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_09.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card System Protection Profile - Closed Configuration version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-07en.pdf', 'pp_ids': frozenset({'ANSSI-CC-PP-2010-07-M01'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 20), 'maintenance_title': 'ANSSI-CC-2015/09-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_09-M01.pdf', 'maintenance_st_link': None})
state/report/pdf_hash b3cb628bfac0a4bce8c004064c9f41c07d14e3f0153073a9f62e56b6d9ca3207 4e1ea763c0055a5281c4277dd1e8ea0b1f7ee867891125ae34988aa7c4a1a291
state/report/txt_hash 5035b7914b7ed978e1ea32111a7492b11f34256e133ad436c1f3097101f76943 9c84022feff695fa6d2b5cdbee3e78f53172d5a000b8fd1ea46016e8b946c70a
state/st/pdf_hash 36c06e10735fe312f02299921740c4a902dff2d83c7340b00c62baca0cf9fb90 4796d22c441035268d011017967e1e43f4c88192f249bb62d4d66057c795a1c6
state/st/txt_hash 59d15b2ee5c2ba904009f029a07f27abd7c67a347f8a2b32e4d374d6f48dcfeb f7a6752bdf51719531e15b926f1d596a67355d2c9fabff70a89cf55489e615e9
heuristics/cert_id ANSSI-CC-2015/16 ANSSI-CC-2015/09
heuristics/extracted_versions 2.11.0 2.0, 1.5
heuristics/report_references/directly_referenced_by ANSSI-CC-2015/17 None
heuristics/report_references/directly_referencing ANSSI-CC-2012/68 BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/06, ANSSI-CC-2014/48
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/17 None
heuristics/report_references/indirectly_referencing ANSSI-CC-2010/01, ANSSI-CC-2009/50, ANSSI-CC-2009/62, ANSSI-CC-2009/26, ANSSI-CC-2009/06, ANSSI-CC-2010/02, ANSSI-CC-2012/68, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/28 BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, ANSSI-CC-2014/48
heuristics/scheme_data
  • product: Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
  • url: https://cyber.gouv.fr/produits-certifies/plateforme-j-safe-en-configuration-fermee-version-2110-sur-le-composant
  • description: Le produit certifié est la « Plateforme J-Safe, en configuration fermée, version 2.11.0, sur lecomposant SB23YR80B » développée par STMicroelectronics S.r.l. – Incard Division et STMicroelectronics. La plateforme est une carte à puce offrant les modes contact, sans contact et duaux. Elle est en configuration fermée, elle ne correspond donc pas un produit utilisable en tant que tel. Elle estn
  • sponsor: STMicroelectronics S.r.l. - Incard Division
  • developer: STMicroelectronics S.r.l. - Incard Division / STMicroelectronics
  • cert_id: 2015/16
  • level: EAL5+
  • enhanced:
    • cert_id: 2015/16
    • certification_date: 15/05/2015
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r3
    • developer: STMicroelectronics S.r.l. - Incard Division / STMicroelectronics
    • sponsor: STMicroelectronics S.r.l. - Incard Division
    • evaluation_facility: Serma Technologies
    • level: EAL5+
    • protection_profile: PP JCS
    • mutual_recognition:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • report_link: https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_16.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_16_Cible.pdf
None
heuristics/st_references/directly_referencing ANSSI-CC-2012/68 BSI-DSZ-CC-0829-2012
heuristics/st_references/indirectly_referencing ANSSI-CC-2012/68 BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
pdf_data/report_filename ANSSI-CC-2015_16.pdf ANSSI-CC-2015_09.pdf
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 3 Critères Communs version 3.1 révision 4
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2015/16 ANSSI-CC-2015/09
pdf_data/report_frontpage/FR/cert_item Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B Application eTravel EAC v2.0, en configuration "EAC on BAC", sur la plateforme fermée MultiApp V3 masquée sur le composant M7820 A11
pdf_data/report_frontpage/FR/cert_item_version Version 2.11.0 Version de l’application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
pdf_data/report_frontpage/FR/developer STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
pdf_data/report_frontpage/FR/ref_protection_profiles PP JCS] Java Card protection profile – closed configuration, version 3.0 BSI-CC-PP-0056-2009, [PP EACv1], version 1.10 Machine Readable Travel Document with ICAO Application, Extended Access Control
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2015/16: 16
    • ANSSI-CC-2012/68: 2
    • ANSSI-CC-2012/68-S02: 1
  • DE:
    • BSI-DSZ-CC-0829-2012: 3
  • FR:
    • ANSSI-CC-2015/09: 22
    • ANSSI-CC-2014/06: 3
    • ANSSI-CC-2014/48: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2015/16: 16
  • ANSSI-CC-2012/68: 2
  • ANSSI-CC-2012/68-S02: 1
  • ANSSI-CC-2015/09: 22
  • ANSSI-CC-2014/06: 3
  • ANSSI-CC-2014/48: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 1
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-CC-PP-0056-2009: 1
    • BSI-PP-0035-2007: 2
    • BSI-PP-0056-2009: 1
    • BSI-PP- 0035-2007: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035-2007: 1
  • BSI-CC-PP-0056-2009: 1
  • BSI-PP-0035-2007: 2
  • BSI-PP-0056-2009: 1
  • BSI-PP- 0035-2007: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0035-2007 1 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR.1: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 2 3
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 4 6
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL4: 2
  • EAL6: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL4: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
  • Serma:
    • Serma Technologies: 1
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 6
  • Infineon:
    • Infineon Technologies AG: 1
    • Infineon Technologies: 23
    • Infineon: 2
  • Gemalto:
    • Gemalto: 28
pdf_data/report_metadata//Author Administrateur
pdf_data/report_metadata//CreationDate D:20150522134001+02'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 PDFCreator Version 1.2.1
pdf_data/report_metadata//Keywords ANSSI-CC-CER-F-07.016
pdf_data/report_metadata//ModDate D:20150522134001+02'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 GPL Ghostscript 9.02
pdf_data/report_metadata//Subject Plateforme J-Safe, en configuration fermée, version 2.11.0, sur le composant SB23YR80B
pdf_data/report_metadata//Title ANSSI-CC-2015/16 Rapport ANSSI-CC-2015_09
pdf_data/report_metadata/pdf_file_size_bytes 579179 275692
pdf_data/report_metadata/pdf_hyperlinks http://www.ssi.gouv.fr/, mailto:[email protected]
pdf_data/report_metadata/pdf_number_of_pages 15 21
pdf_data/st_filename ANSSI-CC-2015_16_Cible.pdf cible_2015_09_Lite_v1.1p.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 8
      • DH: 5
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDSA:
    • ECDSA: 1
  • ECDH:
    • ECDH: 4
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 1 2
pdf_data/st_keywords/asymmetric_crypto/FF
  • DH:
    • Diffie-Hellman: 5
  • DSA:
    • DSA: 1
  • DH:
    • Diffie-Hellman: 8
    • DH: 5
pdf_data/st_keywords/asymmetric_crypto/FF/DH
  • Diffie-Hellman: 5
  • Diffie-Hellman: 8
  • DH: 5
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 5 8
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/68: 2
  • DE:
    • BSI-DSZ-CC-0829-2012: 1
  • NL:
    • CC-1: 4
    • CC-2: 6
    • CC-3: 3
pdf_data/st_keywords/cc_claims
  • D:
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 9
    • D.API_DATA: 3
    • D.CRYPTO: 6
    • D.JCS_CODE: 4
    • D.JCS_DATA: 6
    • D.SEC_DATA: 5
    • D.EMBEDDED_SW_CODE: 4
    • D.EMBEDDED_SW_DATA: 4
    • D.GP_CODE: 3
    • D.GP_SENSITIVE_DATA: 3
  • O:
    • O.SCP: 65
    • O.SIDE_CHANNEL: 10
    • O.LIFE_CYCLE: 12
    • O.RND: 1
    • O.CIPHER: 40
    • O.SID: 25
    • O.GLOBAL_ARRAYS_CONFID: 15
    • O.NATIVE: 12
    • O.REALLOCATION: 9
    • O.KEY_MNGT: 1
    • O.TRANSACTION: 16
    • O.OPERATE: 34
    • O.ROLES: 7
    • O.FIREWALL: 26
    • O.GLOBAL_ARRAYS_INTEG: 8
    • O.RESOURCES: 9
    • O.ALARM: 21
    • O.KEY-MNGT: 15
    • O.PIN-MNGT: 13
    • O.OBJ-DELETION: 6
    • O.APPLET: 1
    • O.JAVAOBJECT: 20
    • O.GP_REGISTRY: 10
    • O.JAVA: 3
    • O.JAVAOB: 2
    • O.OBJ-DEL: 1
  • T:
    • T.LIFE_CYCLE: 7
    • T.PHYSICAL: 9
    • T.CONFID-APPLI-DATA: 17
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 11
    • T.INTEG-APPLI-CODE: 10
    • T.INTEG-APPLI-DATA: 21
    • T.INTEG-JCS-CODE: 6
    • T.INTEG-JCS-DATA: 10
    • T.SID: 16
    • T.EXE-CODE: 9
    • T.NATIVE: 4
    • T.RESOURCES: 7
    • T.OBJ-DELETION: 4
    • T.LEAKAGE: 1
    • T.INTEG-: 1
  • A:
    • A.XXX: 1
    • A.VERIFICATION: 4
    • A.NO-INSTALL: 5
    • A.NO-DELETION: 5
  • R:
    • R.JAVA: 5
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_VIRTUAL: 6
    • OP.INVK_INTERFACE: 7
    • OP.JAVA: 5
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
    • OP.PUT: 6
    • OP.MANAGE_APP_LIFE_CYC: 1
    • OP.GET_CARD_LIFE_CYCLE_: 1
    • OP.CARD_LOCK: 4
    • OP.CARD_TERMINATE: 4
    • OP.MANAGE_APP_LIFE_CYCLE_STATE: 3
    • OP.GET_CARD_LIFE_CYCLE_STATE: 2
  • OE:
    • OE.SCP: 3
    • OE.NO-DELETION: 6
    • OE.VERIFICATION: 32
    • OE.CARD_MANAGEMENT: 16
    • OE.NO-INSTALL: 5
    • OE.MANAGEMENT_OF_SECRETS: 3
    • OE.CARD-MANAGEMENT: 12
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 5
    • OSP.MANAGEMENT_OF_SECRETS: 6
    • OSP.ROLES: 5
    • OSP.VERIFICATION: 5
  • OE:
    • OE.MRTD_: 1
    • OE.BAC_PP: 1
    • OE.BAC-PP: 1
pdf_data/st_keywords/cc_claims/OE
  • OE.SCP: 3
  • OE.NO-DELETION: 6
  • OE.VERIFICATION: 32
  • OE.CARD_MANAGEMENT: 16
  • OE.NO-INSTALL: 5
  • OE.MANAGEMENT_OF_SECRETS: 3
  • OE.CARD-MANAGEMENT: 12
  • OE.MRTD_: 1
  • OE.BAC_PP: 1
  • OE.BAC-PP: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0055: 2
  • BSI-PP- 0035: 2
  • BSI-PP-0002: 1
  • BSI-PP-0035: 1
  • BSI-PP-0056: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0068-V2-2011: 1
  • BSI-PP-0055: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 9
    • ADV_ARC.1: 7
    • ADV_TDS.4: 9
    • ADV_IMP.1: 10
    • ADV_INT.2: 2
    • ADV_FSP.1: 4
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
  • AGD:
    • AGD_OPE.1: 7
    • AGD_PRE.1: 7
  • ALC:
    • ALC_DVS.2: 9
    • ALC_CMC.4: 2
    • ALC_CMS.5: 1
    • ALC_LCD.1: 4
    • ALC_TAT.2: 4
    • ALC_DVS.1: 3
    • ALC_TAT.1: 2
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.3: 2
    • ATE_FUN.1: 7
    • ATE_IND.2: 1
    • ATE_COV.1: 2
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.5: 9
    • AVA_VAN.4: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_SPD: 2
    • ASE_OBJ: 2
    • ASE_ECD: 2
    • ASE_REQ: 2
    • ASE_TSS: 2
    • ASE_CCL.1: 2
    • ASE_ECD.1: 5
    • ASE_INT.1: 6
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 2
    • ASE_REQ.1: 2
  • ADV:
    • ADV_ARC.1: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.3: 2
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.5: 9
  • ADV_ARC.1: 7
  • ADV_TDS.4: 9
  • ADV_IMP.1: 10
  • ADV_INT.2: 2
  • ADV_FSP.1: 4
  • ADV_TDS.1: 2
  • ADV_TDS.3: 4
  • ADV_FSP.2: 2
  • ADV_FSP.4: 1
  • ADV_ARC.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 7 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 9
  • ALC_CMC.4: 2
  • ALC_CMS.5: 1
  • ALC_LCD.1: 4
  • ALC_TAT.2: 4
  • ALC_DVS.1: 3
  • ALC_TAT.1: 2
  • ALC_CMS.1: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 9 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 9
  • AVA_VAN.4: 1
  • AVA_VAN.3: 2
  • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 9 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 3
  • EAL4+: 1
  • EAL5: 12
  • EAL5 augmented: 2
  • EAL5: 2
  • EAL 5+: 1
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 12 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 2 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 2
    • FAU_ARP.1: 3
    • FAU_ARP: 5
    • FAU_SAA.1: 2
  • FCS:
    • FCS_RNG: 2
    • FCS_RNG.1: 7
    • FCS_COP.1: 4
    • FCS_COP: 9
    • FCS_CKM.1: 4
    • FCS_CKM: 3
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 2
  • FDP:
    • FDP_ITT.1: 4
    • FDP_IFC.1: 7
    • FDP_ACC.2: 1
    • FDP_ACF.1: 4
    • FDP_ACF: 7
    • FDP_IFF.1: 5
    • FDP_ROL: 12
    • FDP_ROL.1: 3
    • FDP_ACC: 8
    • FDP_IFF: 3
    • FDP_IFC: 3
    • FDP_RIP: 36
    • FDP_RIP.1: 3
    • FDP_SDI.2: 2
  • FIA:
    • FIA_ATD: 2
    • FIA_UID: 1
    • FIA_USB: 2
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 13
    • FMT_LIM.2: 12
    • FMT_MSA.3: 4
    • FMT_MSA.1: 2
    • FMT_LIM.1.1: 1
    • FMT_LIM.2.1: 1
    • FMT_MSA: 14
    • FMT_MSA.2: 2
    • FMT_SMR.1: 3
    • FMT_MTD: 6
    • FMT_SMR: 1
    • FMT_SMF.1: 6
  • FPR:
    • FPR_UNO.1: 3
  • FPT:
    • FPT_FLS.1: 5
    • FPT_PHP.3: 2
    • FPT_ITT.1: 2
    • FPT_FLS: 17
    • FPT_TDC.1: 1
    • FPT_TST.1: 2
  • FRU:
    • FRU_FLT.2: 3
  • FAU:
    • FAU_SAS: 6
    • FAU_GEN: 1
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 7
    • FCS_CKM: 21
    • FCS_COP: 34
    • FCS_CKM.1: 9
    • FCS_RND.1: 6
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 3
    • FCS_COP.1: 5
    • FCS_CKM.4: 20
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 5
  • FDP:
    • FDP_ACF: 2
    • FDP_ITC.1: 7
    • FDP_ITC.2: 7
    • FDP_ACC.1: 6
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_UCT.1: 4
    • FDP_IFC.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 4
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_ACC: 1
  • FIA:
    • FIA_API: 9
    • FIA_AFL: 5
    • FIA_SOS.2: 1
    • FIA_API.1: 7
    • FIA_API.1.1: 1
    • FIA_UAU.4: 6
    • FIA_UAU.5: 6
    • FIA_UAU.6: 4
    • FIA_UID: 8
    • FIA_UAU.1: 4
    • FIA_UAU: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 17
    • FMT_LIM.2: 16
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MTD: 27
    • FMT_MSA.3: 1
    • FMT_SMF.1: 22
    • FMT_SMR.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.3: 3
    • FMT_MTD.3.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_TST: 2
    • FPT_EMS.1: 8
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 4
    • FPT_TST.1: 5
    • FPT_PHP.3: 5
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 2
  • FAU_ARP.1: 3
  • FAU_ARP: 5
  • FAU_SAA.1: 2
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 2 7
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 2
  • FCS_RNG.1: 7
  • FCS_COP.1: 4
  • FCS_COP: 9
  • FCS_CKM.1: 4
  • FCS_CKM: 3
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM.2: 2
  • FCS_CKM.3: 2
  • FCS_CKM.4: 2
  • FCS_RND: 7
  • FCS_CKM: 21
  • FCS_COP: 34
  • FCS_CKM.1: 9
  • FCS_RND.1: 6
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 3
  • FCS_COP.1: 5
  • FCS_CKM.4: 20
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 3 21
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 4 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 20
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 9 34
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 4 5
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITT.1: 4
  • FDP_IFC.1: 7
  • FDP_ACC.2: 1
  • FDP_ACF.1: 4
  • FDP_ACF: 7
  • FDP_IFF.1: 5
  • FDP_ROL: 12
  • FDP_ROL.1: 3
  • FDP_ACC: 8
  • FDP_IFF: 3
  • FDP_IFC: 3
  • FDP_RIP: 36
  • FDP_RIP.1: 3
  • FDP_SDI.2: 2
  • FDP_ACF: 2
  • FDP_ITC.1: 7
  • FDP_ITC.2: 7
  • FDP_ACC.1: 6
  • FDP_ACF.1: 5
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_UCT.1: 4
  • FDP_IFC.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 4
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ACC: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 8 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 7 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 4 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 7 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_ATD: 2
  • FIA_UID: 1
  • FIA_USB: 2
  • FIA_API: 9
  • FIA_AFL: 5
  • FIA_SOS.2: 1
  • FIA_API.1: 7
  • FIA_API.1.1: 1
  • FIA_UAU.4: 6
  • FIA_UAU.5: 6
  • FIA_UAU.6: 4
  • FIA_UID: 8
  • FIA_UAU.1: 4
  • FIA_UAU: 5
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UID.1: 6
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 1 8
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 5
  • FMT_LIM.1: 13
  • FMT_LIM.2: 12
  • FMT_MSA.3: 4
  • FMT_MSA.1: 2
  • FMT_LIM.1.1: 1
  • FMT_LIM.2.1: 1
  • FMT_MSA: 14
  • FMT_MSA.2: 2
  • FMT_SMR.1: 3
  • FMT_MTD: 6
  • FMT_SMR: 1
  • FMT_SMF.1: 6
  • FMT_LIM: 7
  • FMT_LIM.1: 17
  • FMT_LIM.2: 16
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 27
  • FMT_MSA.3: 1
  • FMT_SMF.1: 22
  • FMT_SMR.1: 17
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 3
  • FMT_MTD.3: 3
  • FMT_MTD.3.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 13 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 12 16
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 6 27
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 3 17
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 5
  • FPT_PHP.3: 2
  • FPT_ITT.1: 2
  • FPT_FLS: 17
  • FPT_TDC.1: 1
  • FPT_TST.1: 2
  • FPT_EMS: 4
  • FPT_TST: 2
  • FPT_EMS.1: 8
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 4
  • FPT_TST.1: 5
  • FPT_PHP.3: 5
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 2 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 2 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 4
    • interface for the secure management of applications on the smart card. The Card Manager is out of scope of current evaluation and its administrative interface is permanently disabled before TOE delivery: 1
    • and is out of the scope of current evaluation. Any other application being loaded pre-issuance is out of scope of current evaluation. 4.1.2.1 Java Card Platform The Java technology, embedded on the TOE: 1
    • of the TOE to the parties responsible of the following usage phases. Application development is out of scope of current evaluation. TOE Construction phase includes: Product Development Product: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 5
  • CBC:
    • CBC: 2
pdf_data/st_keywords/cipher_mode/CBC/CBC 5 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v.3.1: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 21
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 5
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 3
  • SHA1: 2
  • SHA-1: 1
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 3 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 2
  • SHA-256: 2
  • SHA-384: 1
  • SHA-512: 2
  • SHA224: 2
  • SHA256: 2
  • SHA384: 2
  • SHA512: 2
  • SHA-224: 2
  • SHA-256: 1
  • SHA-384: 1
  • SHA-512: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 2 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 2 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 14
    • EF.DG2: 8
    • EF.DG3: 18
    • EF.DG4: 17
    • EF.DG5: 6
    • EF.DG16: 13
    • EF.DG14: 6
    • EF.DG15: 2
    • EF.COM: 7
    • EF.SOD: 8
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 23
    • javacard.security.interface: 4
  • javacardx:
    • javacardx.crypto: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 1
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 2
pdf_data/st_keywords/randomness/RNG
  • RND: 1
  • RNG: 4
  • RNG: 2
pdf_data/st_keywords/randomness/RNG/RNG 4 2
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 4
    • side channel: 1
    • DPA: 3
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical tampering: 2
    • physical tampering: 1
    • Malfunction: 1
    • malfunction: 2
    • fault injection: 2
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 4
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 2
    • physical tampering: 1
    • Physical tampering: 1
    • Malfunction: 3
    • malfunction: 4
    • fault injection: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical tampering: 2
  • physical tampering: 1
  • Malfunction: 1
  • malfunction: 2
  • fault injection: 2
  • Physical Tampering: 2
  • physical tampering: 1
  • Physical tampering: 1
  • Malfunction: 3
  • malfunction: 4
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 1 3
pdf_data/st_keywords/side_channel_analysis/FI/Physical tampering 2 1
pdf_data/st_keywords/side_channel_analysis/FI/fault injection 2 1
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 2 4
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 1
  • physical probing: 4
  • side channel: 1
  • DPA: 3
  • SPA: 1
  • timing attacks: 1
  • Leak-Inherent: 1
  • physical probing: 4
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 3 2
pdf_data/st_keywords/standard_id
  • PKCS:
    • PKCS#1: 1
    • PKCS3: 1
    • PKCS1: 1
  • SCP:
    • SCP02: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS180-2: 1
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
    • FIPS 186-3: 1
    • FIPS 180-2: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 4
    • PKCS#1: 2
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 13
  • SCP:
    • SCP03: 2
    • SCP01: 1
    • SCP02: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 1
  • PKCS3: 1
  • PKCS1: 1
  • PKCS#3: 4
  • PKCS#1: 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 1 2
pdf_data/st_keywords/standard_id/SCP
  • SCP02: 1
  • SCP03: 2
  • SCP01: 1
  • SCP02: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3-DES: 2
  • TripleDES: 1
  • Triple-DES: 1
  • Triple-DES: 6
  • TDES: 5
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 6
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 7 1
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CBC-MAC: 1
  • CMAC: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 8
    • STM: 15
  • Gemalto:
    • Gemalto: 398
pdf_data/st_metadata
  • pdf_file_size_bytes: 1236830
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author: Luca Di Cosmo
  • /CreationDate: D:20150402161829+02'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20150522134244+02'00'
  • /Producer: Microsoft® Word 2013
  • /Title: J-Safe_SB23YR80B_Security_Target
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 914256
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Title: eTravel EAC v2 Security Target
  • /Author: Antoine de Lavernette
  • /Subject: MRTD
  • /Keywords: Security Target, CC, eTravel
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20140227160145+01'00'
  • /ModDate: D:20140227160145+01'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Luca Di Cosmo Antoine de Lavernette
pdf_data/st_metadata//CreationDate D:20150402161829+02'00' D:20140227160145+01'00'
pdf_data/st_metadata//Creator Microsoft® Word 2013 Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20150522134244+02'00' D:20140227160145+01'00'
pdf_data/st_metadata//Producer Microsoft® Word 2013 Microsoft® Office Word 2007
pdf_data/st_metadata//Title J-Safe_SB23YR80B_Security_Target eTravel EAC v2 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1236830 914256
pdf_data/st_metadata/pdf_number_of_pages 90 63
dgst bb81f40b202b203a fab2b3734a8a20b4