Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
ANSSI-CC-2018/56v2
Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A
ANSSI-CC-2012/76
name eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A
not_valid_before 2021-12-17 2012-12-03
not_valid_after 2023-12-12 2019-09-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_56v2en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-76en.pdf
manufacturer THALES DIS FRANCE SA Gemalto / NXP Semiconductors
manufacturer_web https://www.thalesgroup.com/en/europe/france https://www.gemalto.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_56v2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-76fr.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_56v2.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0017b.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': frozenset({'SSCD_TYPE3_V1.05'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 2, Version 1.04', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0005b.pdf', 'pp_ids': frozenset({'SSCD_TYPE2_V1.04'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 10, 14), 'maintenance_title': 'ANSSI-CC-2012/76-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_76_M01.pdf', 'maintenance_st_link': None})
state/cert/convert_garbage True False
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash bc1a323bf86f766a2a05002ebbe6cb7b1bfa796e1bcf72d951179ca97acf29fd None
state/cert/txt_hash 1018fd637a39b2bcf71a00c37edb1cf5c6ef25acde27358ee8cac90a772c107d None
state/report/convert_garbage True False
state/report/pdf_hash ef08f099149e3563348b259c3c17a57af626df249f41afb1f0e7a6c37a0c7275 1bb9605207ef196a21b051eb456beed14054321a1f8da6feddde95d30338ed40
state/report/txt_hash 6a8ba41b7357f6221f27f5a0688a580043952960c24cb2abf92bb773bf07b3d2 5dbe12eec8beb4bac80665e4eeed49a7b20652bde13b844823e376fbd0860a0a
state/st/pdf_hash dbea7643ac66ba446ba75b9bb9ab26725d274afbd3d2469e3901d3ac33ee9adf e73840b50b8d666f3cfa2b4b901c7c509e78801f83f148b9eb85e9af3a2f8df0
state/st/txt_hash 54016fc5b7a689364a2bb7c5b94766f52735101957eba6c31f0059e76b7348e9 35a9b99717eb4b24b063aac0b55e75d4e21177871c5a31c44da75f774b0bd261
heuristics/cert_id ANSSI-CC-2018/56v2 ANSSI-CC-2012/76
heuristics/cert_lab None SERMA
heuristics/extracted_versions 4.1, 2.3 2.1
heuristics/report_references/directly_referencing ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, ANSSI-CC-2018/56 ANSSI-CC-2012/24, BSI-DSZ-CC-0555-2009
heuristics/report_references/indirectly_referencing ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2017/07, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2017/24, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, ANSSI-CC-2018/56, BSI-DSZ-CC-0891-V2-2016 ANSSI-CC-2012/24, BSI-DSZ-CC-0555-2009
heuristics/scheme_data/cert_id 2018/58v2 2012/76
heuristics/scheme_data/description Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern Le produit certifié est l'application « IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A », référence IAS Classic V3 on MultiApp ID V2.1, en version MPH117 avec filtre V2.2, développé par GEMALTO et NXP. Le produit évalué est composé : -de l'applet IAS Classic v3 qui permet à l'utilisateur de signer électroniquement d
heuristics/scheme_data/developer THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD GEMALTO / NXP
heuristics/scheme_data/enhanced
  • cert_id: 2018/58v2
  • certification_date: 17/12/2021
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
  • sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
  • evaluation_facility: SERMA SAFETY & SECURITY
  • level: EAL5+
  • protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
  • cert_id: 2012/76
  • certification_date: 03/12/2012
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r3
  • developer: GEMALTO / NXP
  • sponsor: GEMALTO
  • evaluation_facility: SERMA Technologies
  • level: EAL4+
  • protection_profile: [BSI-PP-0005-2002],[BSI-PP-0006-2002]
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2 et AVA_VAN.5
  • target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-76en.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-76fr.pdf
heuristics/scheme_data/enhanced/augmented ALC_DVS.2, AVA_VAN.5 ALC_DVS.2 et AVA_VAN.5
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r5 Critères Communs version 3.1r3
heuristics/scheme_data/enhanced/cert_id 2018/58v2 2012/76
heuristics/scheme_data/enhanced/certification_date 17/12/2021 03/12/2012
heuristics/scheme_data/enhanced/developer THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD GEMALTO / NXP
heuristics/scheme_data/enhanced/evaluation_facility SERMA SAFETY & SECURITY SERMA Technologies
heuristics/scheme_data/enhanced/level EAL5+ EAL4+
heuristics/scheme_data/enhanced/protection_profile Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10 [BSI-PP-0005-2002],[BSI-PP-0006-2002]
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-76fr.pdf
heuristics/scheme_data/enhanced/sponsor THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD GEMALTO
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-76en.pdf
heuristics/scheme_data/level EAL5+ EAL4+
heuristics/scheme_data/product eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A Référence : IAS Classic V3 on MultiApp ID V2.1 / Version : MPH117 avec filtre V2.2
heuristics/scheme_data/sponsor THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD GEMALTO
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du https://cyber.gouv.fr/produits-certifies/application-ias-classic-v3-sur-plateforme-java-card-en-configuration-ouverte-de
heuristics/st_references/directly_referencing ANSSI-CC-2017/24 BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0555-2009
heuristics/st_references/indirectly_referencing ANSSI-CC-2017/24 BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0555-2009
pdf_data/cert_filename certificat-2018_56v2.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2018/56v2: 2
  • cc_protection_profile_id:
    • BSI:
      • BSI-PP-0055-2009: 1
  • cc_security_level:
    • EAL:
      • EAL4: 1
      • EAL2: 1
  • cc_sar:
    • ADV:
      • ADV_FSP.5: 1
      • ADV_TDS.4: 1
      • ADV_INT.2: 1
    • ALC:
      • ALC_CMS.5: 1
      • ALC_DVS.2: 1
      • ALC_TAT.2: 1
    • ATE:
      • ATE_DPT.3: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • Serma:
      • SERMA: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 1310722
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: sharbus
  • /CreationDate: D:20211222165036+01'00'
  • /ModDate: D:20211222165036+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - certificat-2018_56v2
  • pdf_hyperlinks:
None
pdf_data/report_filename anssi-cc-2018_56v2.pdf ANSSI-CC_2012-76fr.pdf
pdf_data/report_frontpage/FR
  • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
  • cert_id: ANSSI-CC-2012/76
  • cert_item: Application IAS Classic v3 sur plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 sur composant P5CC081V1A
  • cert_item_version: Référence IAS Classic V3 on MultiApp ID V2.1, Version MPH117 avec filtre V2.2
  • ref_protection_profiles: BSI-PP-0005-2002], version v1.04 Protection Profile — Secure Signature-Creation Device Type 2, [BSI-PP-0006-2002], version v1.05 Protection Profile — Secure Signature Creation Device Type 3
  • cc_version: CC version 3.1 révision 3
  • cc_security_level: EAL4 Augmenté ALC_DVS.2 et AVA_VAN.5
  • developer: GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France NXP 101 Stresemanallee, D-22502 Hambourg Allemagne Commanditaire GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France
  • cert_lab: SERMA Technologies 30 Avenue Gustave Eiffel, 33608 Pessac, France
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/56v2: 15
    • ANSSI-CC-2018/56: 4
    • ANSSI-CC-2017/24: 2
    • ANSSI-CC-2018/32v2: 2
  • DE:
    • BSI-DSZ-CC-0555-2009: 3
  • FR:
    • ANSSI-CC-2012/76: 18
    • ANSSI-CC-2012/24: 3
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2018/56v2: 15
  • ANSSI-CC-2018/56: 4
  • ANSSI-CC-2017/24: 2
  • ANSSI-CC-2018/32v2: 2
  • ANSSI-CC-2012/76: 18
  • ANSSI-CC-2012/24: 3
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0055-2009: 1
  • BSI-PP-0084-2014: 1
  • BSI-CC-PP-0055-2009: 1
  • BSI-PP-0005-2002: 3
  • BSI-PP-0006-2002: 2
  • BSI-PP-0035-2007: 2
  • BSI-PP- 0005-2002: 1
  • BSI-PP- 0006-2002: 1
  • BSI-PP- 0035-2007: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 1
    • ADV_TDS.4: 1
    • ADV_INT.2: 1
  • AGD:
    • AGD_PRE: 1
    • AGD_OPE: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_DVS.2: 1
    • ALC_TAT.2: 1
    • ALC_FLR: 1
  • ATE:
    • ATE_DPT.3: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 3
    • AVA_VAN: 3
  • ASE:
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_FSP.5: 1
  • ADV_TDS.4: 1
  • ADV_INT.2: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_CMS.5: 1
  • ALC_DVS.2: 1
  • ALC_TAT.2: 1
  • ALC_FLR: 1
  • ALC_DVS.2: 3
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 2
pdf_data/report_keywords/cc_sar/ATE
  • ATE_DPT.3: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN: 1
  • AVA_VAN.3: 1
  • AVA_VAN.5: 3
  • AVA_VAN: 3
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 1 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 4: 1
  • EAL2: 2
  • EAL7: 1
  • EAL4: 4
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 5: 1
  • EAL 7: 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • SERMA: 1
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 2
pdf_data/report_keywords/eval_facility/Serma/SERMA 1 2
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 1
  • Gemalto:
    • Gemalto: 11
  • NXP:
    • NXP: 6
  • Gemalto:
    • Gemalto: 14
pdf_data/report_keywords/vendor/Gemalto/Gemalto 11 14
pdf_data/report_metadata
  • pdf_file_size_bytes: 4196349
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: sharbus
  • /CreationDate: D:20211222164244+01'00'
  • /ModDate: D:20211222164244+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - ANSSI-CC-2018_56v2fr
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 309844
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /CreationDate: D:20121203163819+01'00'
  • /Keywords:
  • /ModDate: D:20121203163819+01'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
pdf_data/report_metadata//CreationDate D:20211222164244+01'00' D:20121203163819+01'00'
pdf_data/report_metadata//ModDate D:20211222164244+01'00' D:20121203163819+01'00'
pdf_data/report_metadata//Producer Microsoft: Print To PDF Acrobat Distiller 9.0.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 4196349 309844
pdf_data/report_metadata/pdf_hyperlinks http://www.ssi.gouv.fr/, mailto:[email protected]
pdf_data/report_metadata/pdf_number_of_pages 15 17
pdf_data/st_filename anssi-cible-cc-2018_56v2en.pdf ANSSI-CC-cible_2012-76en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 2
  • ECC:
    • ECC: 1
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 2 1
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2017/24: 1
  • NL:
    • CC-1: 2
    • CC-2: 5
    • CC-3: 3
  • DE:
    • BSI-DSZ-CC-0555-2009: 1
    • BSI-DSZ-CC-0645-2010: 1
  • NL:
    • CC-1: 2
    • CC-2: 2
    • CC-3: 3
pdf_data/st_keywords/cc_cert_id/NL/CC-2 5 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 5
  • OE:
    • OE.MRTD_: 3
  • D:
    • D.SCD: 11
    • D.SVD: 7
    • D.DTBS: 6
    • D.VAD: 1
    • D.RAD: 5
    • D.SSCD: 1
    • D.SIG: 3
  • A:
    • A.CGA: 1
    • A.SCA: 1
  • OE:
    • OE.SVD_AUTH_CGA: 1
    • OE.HI_VAD: 1
pdf_data/st_keywords/cc_claims/OE
  • OE.MRTD_: 3
  • OE.SVD_AUTH_CGA: 1
  • OE.HI_VAD: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0056-V2-MA-2012: 1
    • BSI-CC-PP-0068-: 1
    • BSI-PP-0055-2009: 1
  • BSI:
    • BSI-PP-0035: 1
    • BSI-PP-0004-2002: 1
    • BSI-PP-0005-2002: 1
    • BSI-PP-0006-2002: 1
  • other:
    • PP-SSCD /T1: 1
    • PP-SSCD /T2: 9
    • PP-SSCD /T3: 7
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-: 1
  • BSI-PP-0056-V2-MA-2012: 1
  • BSI-CC-PP-0068-: 1
  • BSI-PP-0055-2009: 1
  • BSI-PP-0035: 1
  • BSI-PP-0004-2002: 1
  • BSI-PP-0005-2002: 1
  • BSI-PP-0006-2002: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
    • ADV_ARC.1: 1
  • ALC:
    • ALC_CMS.5: 2
    • ALC_DVS.2: 3
    • ALC_TAT.2: 2
  • ATE:
    • ATE_DPT.3: 2
  • ASE:
    • ASE_ECD: 1
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 1
  • ADV:
    • ADV_IMP.2: 1
    • ADV_IMP.1: 2
    • ADV_ARC: 2
    • ADV_LLD: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_HLD: 1
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_PRE: 3
    • AGD_USR: 1
    • AGD_ADM: 1
    • AGD_OPE: 1
    • AGD_PRE.1: 3
    • AGD_OPE.1: 1
  • ALC:
    • ALC_DVS.2: 4
    • ALC_DVS: 2
    • ALC_CMC: 2
    • ALC_CMS: 2
    • ALC_DEL: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
    • AVA_MSU.3: 1
    • AVA_VLA.4: 1
    • AVA_VAN: 1
    • AVA_CCA: 1
    • AVA_VLA: 1
    • AVA_SOF: 1
    • AVA_MSU: 1
  • ASE:
    • ASE_TSS.2: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.5: 2
  • ADV_INT.2: 2
  • ADV_TDS.4: 2
  • ADV_ARC.1: 1
  • ADV_IMP.2: 1
  • ADV_IMP.1: 2
  • ADV_ARC: 2
  • ADV_LLD: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_HLD: 1
  • ADV_ARC.1: 1
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMS.5: 2
  • ALC_DVS.2: 3
  • ALC_TAT.2: 2
  • ALC_DVS.2: 4
  • ALC_DVS: 2
  • ALC_CMC: 2
  • ALC_CMS: 2
  • ALC_DEL: 2
  • ALC_LCD: 1
  • ALC_TAT: 1
  • ALC_CMC.4: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 3 4
pdf_data/st_keywords/cc_sar/ASE
  • ASE_ECD: 1
  • ASE_TSS.2: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_DPT.3: 2
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL4: 3
  • EAL 6+: 1
  • EAL4 augmented: 1
  • EAL4+: 9
  • EAL4: 7
  • EAL5: 1
  • EAL4 augmented: 3
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL4 3 7
pdf_data/st_keywords/cc_security_level/EAL/EAL4 augmented 1 3
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 12
  • FAU_SAS.1.1: 2
  • FAU_GEN: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 7
  • FCS_CKM: 14
  • FCS_COP: 50
  • FCS_CKM.1: 19
  • FCS_RND.1: 12
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 4
  • FCS_COP.1: 9
  • FCS_CKM.4: 29
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_RNG: 1
  • FCS_CKM: 8
  • FCS_COP: 6
  • FCS_CKM.1: 2
  • FCS_CKM.4: 4
  • FCS_COP.1: 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 14 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 19 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 29 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 50 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 9 8
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF: 1
  • FDP_ITC.1: 12
  • FDP_ITC.2: 12
  • FDP_ACC.1: 18
  • FDP_ACF.1: 11
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 2
  • FDP_UCT.1: 10
  • FDP_IFC.1: 4
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 10
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ITC: 2
  • FDP_ACC: 4
  • FDP_ACF: 3
  • FDP_ETC: 4
  • FDP_ITC: 3
  • FDP_RIP: 3
  • FDP_SDI: 6
  • FDP_UCT: 2
  • FDP_UIT: 3
  • FDP_ACC.1: 9
  • FDP_ACF.1: 24
  • FDP_ETC.1: 4
  • FDP_ITC.1: 8
  • FDP_RIP.1: 2
  • FDP_SDI.2: 6
  • FDP_UCT.1: 4
  • FDP_UIT.1: 6
  • FDP_RIP.1.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 18 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 1 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 11 24
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 2 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 12 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 10 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 10 6
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 13
  • FIA_AFL.1: 11
  • FIA_SOS.2: 1
  • FIA_API.1: 5
  • FIA_API.1.1: 1
  • FIA_UAU.5.2: 3
  • FIA_UAU.4: 11
  • FIA_UAU.6: 11
  • FIA_UID.1: 11
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.1: 10
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.4.1: 1
  • FIA_UAU.5: 10
  • FIA_UAU.5.1: 1
  • FIA_UAU.6.1: 1
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU: 5
  • FIA_AFL: 2
  • FIA_ATD: 2
  • FIA_UAU: 2
  • FIA_UID: 3
  • FIA_AFL.1: 3
  • FIA_ATD.1: 3
  • FIA_UAU.1: 3
  • FIA_UID.1: 4
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 11 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 5 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 10 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 11 4
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 7
  • FMT_LIM.1: 20
  • FMT_LIM.2: 18
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MSA.3: 3
  • FMT_SMF.1: 20
  • FMT_SMR.1: 24
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 6
  • FMT_MTD: 36
  • FMT_MSA.1: 1
  • FMT_SRM.1: 1
  • FMT_MOF: 3
  • FMT_MSA: 4
  • FMT_MTD: 2
  • FMT_SMF: 2
  • FMT_SMR: 2
  • FMT_MOF.1: 2
  • FMT_MSA.1: 4
  • FMT_MSA.2: 3
  • FMT_MSA.3: 7
  • FMT_MTD.1: 3
  • FMT_SMF.1: 3
  • FMT_SMR.1: 3
  • FMT_MOF.1.1: 1
  • FMT_MSA.2.1: 1
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 1 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 3 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 36 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 6 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 20 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 24 3
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 4
  • FPT_EMS.1: 13
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 11
  • FPT_TST.1: 10
  • FPT_PHP.3: 12
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_FLS: 2
  • FPT_PHP: 2
  • FPT_TST: 3
  • FPT_AMT.1: 1
  • FPT_FLS.1: 3
  • FPT_PHP.1: 3
  • FPT_PHP.3: 3
  • FPT_TST.1: 3
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 11 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 12 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 10 3
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 5
  • FTP_TRP.1: 5
  • FTP_ITC: 6
  • FTP_TRP: 6
  • FTP_ITC.1: 14
  • FTP_TRP.1: 3
  • FTP_TRP.1.1: 1
  • FTP_TRP.1.2: 1
  • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 5 14
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 5 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 2
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 1
  • SHA1: 1
  • SHA-1: 3
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 1 3
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 1
  • SHA-512: 1
  • SHA256: 2
  • SHA-256: 3
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 1 3
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 28
    • EF.DG2: 10
    • EF.DG3: 6
    • EF.DG4: 6
    • EF.DG5: 7
    • EF.DG16: 26
    • EF.DG13: 3
    • EF.DG14: 3
    • EF.DG15: 5
    • EF.DG6: 1
    • EF.COM: 8
    • EF.SOD: 8
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.2: 7
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 2
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 3
pdf_data/st_keywords/randomness/RNG
  • RND: 5
  • RNG: 2
  • RNG: 3
pdf_data/st_keywords/randomness/RNG/RNG 2 3
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 3
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 5
    • physical tampering: 1
    • Physical tampering: 1
    • Malfunction: 6
    • malfunction: 5
    • fault injection: 1
  • other:
    • reverse engineering: 1
  • SCA:
    • Side channel: 1
    • SPA: 1
    • DPA: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 4
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical Tampering: 5
  • physical tampering: 1
  • Physical tampering: 1
  • Malfunction: 6
  • malfunction: 5
  • fault injection: 1
  • physical tampering: 4
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 1 4
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 1
  • physical probing: 3
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
  • Side channel: 1
  • SPA: 1
  • DPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 2 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS46-3: 3
    • FIPS PUB 46-3: 1
    • FIPS 180-2: 1
    • FIPS 46-3: 2
  • RFC:
    • RFC3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 12
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 46-3: 1
    • FIPS 180-2: 1
  • PKCS:
    • PKCS #1: 1
  • BSI:
    • AIS31: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2009-07-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS46-3: 3
  • FIPS PUB 46-3: 1
  • FIPS 180-2: 1
  • FIPS 46-3: 2
  • FIPS 46-3: 1
  • FIPS 180-2: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS 46-3 2 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • TDES: 1
      • Triple-DES: 7
  • constructions:
    • MAC:
      • KMAC: 1
  • AES_competition:
    • HPC:
      • HPC: 1
  • DES:
    • DES:
      • DES: 3
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
      • TDES: 8
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDES: 1
  • Triple-DES: 7
  • 3DES: 1
  • Triple-DES: 2
  • TDES: 8
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 1 8
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 7 2
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 2 3
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 12
  • Gemalto:
    • Gemalto: 235
  • Thales:
    • Thales: 1
  • NXP:
    • NXP: 20
  • Gemalto:
    • Gemalto: 74
pdf_data/st_keywords/vendor/Gemalto/Gemalto 235 74
pdf_data/st_metadata
  • pdf_file_size_bytes: 1660503
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 55
  • /Title: MultiApp V4.1: eTravel 2.3 BAC Security Target
  • /Author: D1417545
  • /Subject: 1.5
  • /Keywords: 05-07-2018
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20210921161905+02'00'
  • /ModDate: D:20210921161905+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 480443
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /CreationDate: D:20121019145156Z
  • /Creator: PDFCreator Version 0.9.3
  • /Keywords:
  • /ModDate: D:20121203163659+01'00'
  • /Producer: GPL Ghostscript 8.54
  • /Subject:
  • /Title:
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20210921161905+02'00' D:20121019145156Z
pdf_data/st_metadata//Creator Microsoft® Word 2016 PDFCreator Version 0.9.3
pdf_data/st_metadata//Keywords 05-07-2018
pdf_data/st_metadata//ModDate D:20210921161905+02'00' D:20121203163659+01'00'
pdf_data/st_metadata//Producer Microsoft® Word 2016 GPL Ghostscript 8.54
pdf_data/st_metadata//Subject 1.5
pdf_data/st_metadata//Title MultiApp V4.1: eTravel 2.3 BAC Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1660503 480443
pdf_data/st_metadata/pdf_number_of_pages 55 51
dgst c41fa08d50e81932 3ccbc80437c97a32