name |
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
|
Application eTravel EAC v2.1, en configuration "EAC on BAC", sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2021-12-17
|
2015-09-28
|
not_valid_after |
2023-12-12
|
2020-09-28
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_56v2en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015-41_LITE.pdf
|
status |
archived
|
archived
|
manufacturer |
THALES DIS FRANCE SA
|
Gemalto / NXP Semiconductors
|
manufacturer_web |
https://www.thalesgroup.com/en/europe/france
|
https://www.gemalto.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_56v2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_41.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_56v2.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0017b.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 5, 20), 'maintenance_title': 'ANSSI-CC-2015/41-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_41-M01.pdf', 'maintenance_st_link': None}) |
state/cert/convert_garbage |
True
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
bc1a323bf86f766a2a05002ebbe6cb7b1bfa796e1bcf72d951179ca97acf29fd
|
None
|
state/cert/txt_hash |
1018fd637a39b2bcf71a00c37edb1cf5c6ef25acde27358ee8cac90a772c107d
|
None
|
state/report/convert_garbage |
True
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
ef08f099149e3563348b259c3c17a57af626df249f41afb1f0e7a6c37a0c7275
|
4b31ecff7a33db15d0c34c636038a40fc4e544d8e06311edca39dbc8e1880554
|
state/report/txt_hash |
6a8ba41b7357f6221f27f5a0688a580043952960c24cb2abf92bb773bf07b3d2
|
863a992cd668a9c10eed5ca033373c3a9da58c0fc139a6b1d683a656decb56c5
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
dbea7643ac66ba446ba75b9bb9ab26725d274afbd3d2469e3901d3ac33ee9adf
|
c0a10b799dad2c7595035c075de45af439f08d3c0ad51d0afb424af93beb965b
|
state/st/txt_hash |
54016fc5b7a689364a2bb7c5b94766f52735101957eba6c31f0059e76b7348e9
|
f6f61d580dac75b768e88e4ce11a1f47ea034e621c65c022544c1f5d25fb322a
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2018/56v2
|
ANSSI-CC-2015/41
|
heuristics/cert_lab |
None
|
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
4.1, 2.3 |
2.1, 3.1, 1.3 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, ANSSI-CC-2018/56 |
ANSSI-CC-2015/15, BSI-DSZ-CC-0845-V2-2013 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2017/07, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2017/24, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, ANSSI-CC-2018/56, BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0837-2013, ANSSI-CC-2015/15, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0845-2012, ANSSI-CC-2014/06, ANSSI-CC-2014/86, BSI-DSZ-CC-0845-V2-2013 |
heuristics/scheme_data/cert_id |
2018/58v2
|
2015/41
|
heuristics/scheme_data/description |
Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern
|
Le produit certifié est la carte à puce ouverte ou fermée « MultiApp v3.1 », pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation c
|
heuristics/scheme_data/developer |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
Gemalto / NXP Semiconductors
|
heuristics/scheme_data/enhanced |
- cert_id:
2018/58v2
- certification_date:
17/12/2021
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- sponsor:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
- cert_id:
2015/41
- certification_date:
28/09/2015
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Gemalto / NXP Semiconductors
- sponsor:
Gemalto
- evaluation_facility:
Serma Technologies
- level:
EAL5+
- protection_profile:
PP EAC
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/2015/10/ANSSI-CC-2015_41.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2015/10/anssi_cible_2015-41_LITE.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r4
|
heuristics/scheme_data/enhanced/cert_id |
2018/58v2
|
2015/41
|
heuristics/scheme_data/enhanced/certification_date |
17/12/2021
|
28/09/2015
|
heuristics/scheme_data/enhanced/developer |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
Gemalto / NXP Semiconductors
|
heuristics/scheme_data/enhanced/evaluation_facility |
SERMA SAFETY & SECURITY
|
Serma Technologies
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
|
PP EAC
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
|
https://cyber.gouv.fr/sites/default/files/2015/10/ANSSI-CC-2015_41.pdf
|
heuristics/scheme_data/enhanced/sponsor |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
Gemalto
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
https://cyber.gouv.fr/sites/default/files/2015/10/anssi_cible_2015-41_LITE.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
|
Application eTravel EAC v2.1, en configuration "EAC on BAC", sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
|
heuristics/scheme_data/sponsor |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
Gemalto
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du
|
https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v21-en-configuration-eac-bac-sur-la-plateforme-ouverte
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
ANSSI-CC-2017/24 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2017/24 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-2018_56v2.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- ADV:
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
- ALC:
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ATE:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
1310722
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
sharbus
- /CreationDate:
D:20211222165036+01'00'
- /ModDate:
D:20211222165036+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - certificat-2018_56v2
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
anssi-cc-2018_56v2.pdf
|
ANSSI-CC-2015_41.pdf
|
pdf_data/report_frontpage/FR |
|
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2015/41
- cert_item:
Application eTravel EAC v2.1, en configuration "EAC on BAC", sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
- cert_item_version:
Version de l’application eTravel EAC : 2.1 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
- ref_protection_profiles:
BSI-CC-PP-0056-2009, [PP EAC], version 1.10 Machine Readable Travel Document with ICAO Application
- cc_version:
Critères Communs version 3.1 révision 4
- cc_security_level:
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- developer:
Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- cert_lab:
Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2018/56v2:
15
- ANSSI-CC-2018/56:
4
- ANSSI-CC-2017/24:
2
- ANSSI-CC-2018/32v2:
2
|
- DE:
- BSI-DSZ-CC-0845-V2-2013:
3
- FR:
- ANSSI-CC-2015/41:
23
- ANSSI-CC-2015/15:
3
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2018/56v2:
15
- ANSSI-CC-2018/56:
4
- ANSSI-CC-2017/24:
2
- ANSSI-CC-2018/32v2:
2
|
- ANSSI-CC-2015/41:
23
- ANSSI-CC-2015/15:
3
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0055-2009:
1
- BSI-PP-0084-2014:
1
- BSI-CC-PP-0055-2009:
1
|
- BSI-CC-PP-0056-2009:
1
- BSI-PP-0035-2007:
2
- BSI-PP-0056-2009:
1
- BSI-PP-0035-:
1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
- AGD:
- ALC:
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ALC_FLR:
1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR.1:
1
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
1
|
2
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
1
|
3
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_CMS.5: 1
- ALC_DVS.2:
1
- ALC_TAT.2: 1
- ALC_FLR:
1
|
- ALC_DVS.2:
2
- ALC_FLR.1: 1
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
2
|
pdf_data/report_keywords/cc_sar/ATE |
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
1
|
2
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL 5: 3
- EAL4: 2
- EAL6: 1
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 7: 1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/CESTI |
|
|
pdf_data/report_keywords/eval_facility/Serma |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/standard_id/ICAO/ICAO |
1
|
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP Semiconductors:
2
- NXP:
4
- Gemalto:
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
11
|
27
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
4196349
- pdf_is_encrypted:
False
- pdf_number_of_pages:
15
- /Author:
sharbus
- /CreationDate:
D:20211222164244+01'00'
- /ModDate:
D:20211222164244+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - ANSSI-CC-2018_56v2fr
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
294156
- pdf_is_encrypted:
False
- pdf_number_of_pages:
22
- /Producer:
GPL Ghostscript 9.02
- /CreationDate:
- /ModDate:
- /Title:
Rapport ANSSI-CC-2015_41
- /Creator: PDFCreator Version 1.2.1
- /Author:
- /Keywords:
- /Subject:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
sharbus
|
|
pdf_data/report_metadata//CreationDate |
D:20211222164244+01'00'
|
|
pdf_data/report_metadata//ModDate |
D:20211222164244+01'00'
|
|
pdf_data/report_metadata//Producer |
Microsoft: Print To PDF
|
GPL Ghostscript 9.02
|
pdf_data/report_metadata//Title |
Microsoft Word - ANSSI-CC-2018_56v2fr
|
Rapport ANSSI-CC-2015_41
|
pdf_data/report_metadata/pdf_file_size_bytes |
4196349
|
294156
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
15
|
22
|
pdf_data/st_filename |
anssi-cible-cc-2018_56v2en.pdf
|
anssi_cible_2015-41_LITE.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
1
|
5
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
1
|
8
|
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0845-V2-2013:
2
- NL:
|
pdf_data/st_keywords/cc_cert_id/NL/CC-1 |
2
|
4
|
pdf_data/st_keywords/cc_cert_id/NL/CC-2 |
5
|
6
|
pdf_data/st_keywords/cc_cert_id/NL/CC-3 |
3
|
3
|
pdf_data/st_keywords/cc_claims |
|
- A:
- OE:
- OE.MRTD_:
3
- OE.BAC_PP:
2
- OE.BAC-PP:
3
|
pdf_data/st_keywords/cc_claims/OE |
|
- OE.MRTD_:
3
- OE.BAC_PP: 2
- OE.BAC-PP: 3
|
pdf_data/st_keywords/cc_claims/OE/OE.MRTD_ |
3
|
3
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0084-:
1
- BSI-PP-0056-V2-MA-2012:
1
- BSI-CC-PP-0068-:
1
- BSI-PP-0055-2009:
1
|
- BSI-PP-0002:
1
- BSI-PP-0035:
1
- BSI-CC-PP-0056:
1
- BSI-CC-PP-0056-V2-2012:
1
- BSI-CC-PP-0068-V2-2011:
1
- BSI-PP-0055:
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_FSP.5:
2
- ADV_INT.2:
2
- ADV_TDS.4:
2
- ADV_ARC.1:
1
- ALC:
- ALC_CMS.5:
2
- ALC_DVS.2:
3
- ALC_TAT.2:
2
- ATE:
- ASE:
|
- ADV:
- ADV_ARC.1:
2
- ADV_FSP.4:
1
- ADV_TDS.3:
1
- ADV_IMP.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ATE:
- AVA:
- AVA_VAN.3:
2
- AVA_VAN.5:
4
- ASE:
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP.5: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- ADV_ARC.1:
1
|
- ADV_ARC.1:
2
- ADV_FSP.4: 1
- ADV_TDS.3: 1
- ADV_IMP.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMS.5: 2
- ALC_DVS.2:
3
- ALC_TAT.2: 2
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
3
|
4
|
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4: 3
- EAL 6+:
1
- EAL4 augmented: 1
|
- EAL5: 5
- EAL 6+:
1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 6+ |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 |
12
|
13
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND:
7
- FCS_CKM:
14
- FCS_COP:
50
- FCS_CKM.1:
19
- FCS_RND.1:
12
- FCS_RND.1.1:
2
- FCS_CKM.2:
4
- FCS_COP.1:
9
- FCS_CKM.4:
29
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_RNG: 1
|
- FCS_RND:
7
- FCS_CKM:
31
- FCS_COP:
63
- FCS_CKM.1:
23
- FCS_RND.1:
13
- FCS_RND.1.1:
2
- FCS_CKM.2:
6
- FCS_COP.1:
10
- FCS_CKM.4:
43
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
14
|
31
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
19
|
23
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
4
|
6
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
29
|
43
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
50
|
63
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
10
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 |
12
|
13
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACF:
1
- FDP_ITC.1:
12
- FDP_ITC.2:
12
- FDP_ACC.1:
18
- FDP_ACF.1:
11
- FDP_ACC.1.1: 1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
2
- FDP_UCT.1:
10
- FDP_IFC.1:
4
- FDP_UCT.1.1:
1
- FDP_UIT.1:
10
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ITC:
2
|
- FDP_ACF:
1
- FDP_ITC.1:
14
- FDP_ITC.2:
14
- FDP_ACC.1:
20
- FDP_ACF.1:
14
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
2
- FDP_UCT.1:
10
- FDP_IFC.1:
4
- FDP_UCT.1.1:
1
- FDP_UIT.1:
10
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ITC:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
18
|
20
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
11
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
12
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
12
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API:
13
- FIA_AFL.1: 11
- FIA_SOS.2:
1
- FIA_API.1:
5
- FIA_API.1.1:
1
- FIA_UAU.5.2:
3
- FIA_UAU.4:
11
- FIA_UAU.6:
11
- FIA_UID.1:
11
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UAU.1:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4.1:
1
- FIA_UAU.5:
10
- FIA_UAU.5.1:
1
- FIA_UAU.6.1:
1
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UAU:
5
|
- FIA_API:
16
- FIA_AFL: 11
- FIA_SOS.2:
1
- FIA_API.1:
8
- FIA_API.1.1:
1
- FIA_UAU.4:
13
- FIA_UAU:
17
- FIA_UAU.5:
14
- FIA_UID: 20
- FIA_UAU.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UID.1:
9
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4.1:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.6:
10
- FIA_UAU.6.1:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API |
13
|
16
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 |
5
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
5
|
17
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
10
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 |
11
|
13
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 |
10
|
14
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.2 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 |
11
|
10
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
11
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM:
7
- FMT_LIM.1:
20
- FMT_LIM.2:
18
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
2
- FMT_MSA.3:
3
- FMT_SMF.1:
20
- FMT_SMR.1:
24
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
6
- FMT_MTD:
36
- FMT_MSA.1:
1
- FMT_SRM.1: 1
|
- FMT_LIM:
7
- FMT_LIM.1:
23
- FMT_LIM.2:
21
- FMT_LIM.1.1:
3
- FMT_LIM.2.1:
3
- FMT_MTD:
62
- FMT_MSA.3:
3
- FMT_SMF.1:
45
- FMT_SMR.1:
32
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
1
- FMT_MTD.1:
5
- FMT_MTD.3: 7
- FMT_MTD.3.1: 1
- FMT_MSA.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
20
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
18
|
21
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
36
|
62
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
20
|
45
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
24
|
32
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS:
4
- FPT_EMS.1:
13
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
11
- FPT_TST.1:
10
- FPT_PHP.3:
12
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
|
- FPT_EMS:
4
- FPT_TST: 2
- FPT_EMS.1:
14
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
11
- FPT_TST.1:
11
- FPT_PHP.3:
12
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
13
|
14
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
10
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
5
- FTP_TRP.1:
5
|
- FTP_ITC.1:
5
- FTP_TRP.1:
5
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
1
|
2
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol/PACE/PACE |
2
|
17
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement |
2
|
5
|
pdf_data/st_keywords/crypto_scheme/MAC |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
- SHA-224: 2
- SHA-256:
1
- SHA-384: 1
- SHA-512:
1
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
1
|
1
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 |
1
|
1
|
pdf_data/st_keywords/ic_data_group/EF |
- EF.DG1:
28
- EF.DG2:
10
- EF.DG3:
6
- EF.DG4:
6
- EF.DG5:
7
- EF.DG16:
26
- EF.DG13: 3
- EF.DG14:
3
- EF.DG15:
5
- EF.DG6: 1
- EF.COM:
8
- EF.SOD:
8
|
- EF.DG1:
17
- EF.DG2:
8
- EF.DG3:
20
- EF.DG4:
19
- EF.DG5:
6
- EF.DG16:
16
- EF.DG14:
7
- EF.DG15:
3
- EF.COM:
7
- EF.SOD:
8
|
pdf_data/st_keywords/ic_data_group/EF/EF.COM |
8
|
7
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG1 |
28
|
17
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG14 |
3
|
7
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG15 |
5
|
3
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG16 |
26
|
16
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG2 |
10
|
8
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG3 |
6
|
20
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG4 |
6
|
19
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG5 |
7
|
6
|
pdf_data/st_keywords/ic_data_group/EF/EF.SOD |
8
|
8
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
3
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
6
|
6
|
pdf_data/st_keywords/side_channel_analysis/FI/Physical Tampering |
5
|
5
|
pdf_data/st_keywords/side_channel_analysis/FI/Physical tampering |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/FI/fault injection |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
5
|
6
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
1
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
3
|
4
|
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/other |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS46-3:
3
- FIPS PUB 46-3:
1
- FIPS 180-2:
1
- FIPS 46-3:
2
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
- FIPS:
- FIPS180-2:
1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS 186-3:
1
- FIPS 180-2:
1
- FIPS 46-3:
1
- FIPS 197:
1
- NIST:
- SP 800-90:
2
- SP 800-67:
1
- PKCS:
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
- SCP:
- SCP03:
2
- SCP01:
1
- SCP02:
1
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS46-3:
3
- FIPS PUB 46-3:
1
- FIPS 180-2:
1
- FIPS 46-3:
2
|
- FIPS180-2: 1
- FIPS46-3:
1
- FIPS PUB 46-3:
1
- FIPS 186-3: 1
- FIPS 180-2:
1
- FIPS 46-3:
1
- FIPS 197: 1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 46-3 |
2
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS46-3 |
3
|
1
|
pdf_data/st_keywords/standard_id/ICAO/ICAO |
12
|
14
|
pdf_data/st_keywords/standard_id/ISO |
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
|
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
1
|
5
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
7
|
7
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
2
|
1
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Samsung:
- Gemalto:
- Thales:
|
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
235
|
20
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
D1417545
|
Antoine de Lavernette
|
pdf_data/st_metadata//CreationDate |
D:20210921161905+02'00'
|
D:20150423182838+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Keywords |
05-07-2018
|
Security Target, CC, eTravel
|
pdf_data/st_metadata//ModDate |
D:20210921161905+02'00'
|
D:20150423182838+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Subject |
1.5
|
MRTD
|
pdf_data/st_metadata//Title |
MultiApp V4.1: eTravel 2.3 BAC Security Target
|
eTravel EAC v2 Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
1660503
|
1443123
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
55
|
81
|
dgst |
c41fa08d50e81932
|
367644d8a3711dec
|