name |
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 |
IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/53-R01) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
active |
not_valid_after |
12.12.2023 |
10.11.2028 |
not_valid_before |
17.12.2021 |
10.11.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_56v2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_53-R01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_56v2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_53-R01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_56v2en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_53-R01en.pdf |
manufacturer |
THALES DIS FRANCE SA |
Idemia |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.idemia.com |
security_level |
ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ADV_TDS.4, ATE_DPT.3, ADV_INT.2, EAL4+, ADV_FSP.5 |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
c41fa08d50e81932 |
dd265816d22f3a00 |
heuristics/cert_id |
ANSSI-CC-2018/56v2 |
ANSSI-CC-2020/53-R01 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.5, ALC_CMS.5, ADV_ARC.1, AVA_VAN.3, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3, ADV_TDS.4, ADV_INT.2 |
ADV_ARC.1, ALC_DVS.2, AGD_OPE.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.5 |
heuristics/extracted_versions |
4.1, 2.3 |
8.2, 1.3 |
heuristics/prev_certificates |
ANSSI-CC-2018/56 |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2018/32v2, ANSSI-CC-2017/24, ANSSI-CC-2018/56 |
ANSSI-CC-2020/26-R01, BSI-DSZ-CC-1059-V5-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2018/56, ANSSI-CC-2017/54, ANSSI-CC-2018/32, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/59, ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2017/07, ANSSI-CC-2015/66 |
ANSSI-CC-2020/26-R01, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V4-2021, BSI-DSZ-CC-1059-V5-2022, BSI-DSZ-CC-1059-V3-2019 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2018/56v2
- description: Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationa
- developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- enhanced:
- level: EAL4+
- product: eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
- sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- url: https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-and-aa-activated-version-de-lapplication
|
- cert_id: ANSSI-CC-2020/53-R01
- description: Le produit évalué est « IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VB, Identification de l’application : F0 02 02 13 » développé par IDEMIA et masquée sur le composant NXP P6022M VB développé par NXP SEMICONDUCTORS GMBH.
- developer: ALC_DVS.2, AVA_VAN.5
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2020/53-R01
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_53-R01.pdf
- certification_date: 10.11.2023
- developer: ALC_DVS.2, AVA_VAN.5
- evaluation_facility: CEA-LETI
- expiration_date: 10.11.2028
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection profiles for secure signature creation device: Part 2 : Device with key generation, BSI-CC-PP-0059-2009-MA-01 Part 3 : Device with key import, BSI-CC-PP-0075-2012 Part 4 : Extension for device with key generation and trusted communication with certificate generation application, BSI-CC-PP-0071-2012
- sponsor: IDEMIA
- expiration_date: 10.11.2028
- level: EAL5+
- product: IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VB Identification de l’application : F0 02 02 13
- sponsor: IDEMIA
- url: https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-configuration-4-id-one-cosmo-v82-open-platform-nxp-p6022m
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
ANSSI-CC-2017/24 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2017/24 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-2018_56v2.pdf |
Certificat-CC-2020_53-R01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0075-2012: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- CEA-LETI:
- CEA - LETI: 1
- CEA-LETI: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: sharbus
- /CreationDate: D:20211222165036+01'00'
- /ModDate: D:20211222165036+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - certificat-2018_56v2
- pdf_file_size_bytes: 1310722
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20231117171844+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20231117172054+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 158255
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
anssi-cc-2018_56v2.pdf |
ANSSI-CC-2020_53-R01fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2017/24: 2
- ANSSI-CC-2018/32v2: 2
- ANSSI-CC-2018/56: 4
- ANSSI-CC-2018/56v2: 15
|
- DE:
- BSI-DSZ-CC-1059-V5-2022: 2
- FR:
- ANSSI-CC-2020/26-R01: 1
- ANSSI-CC-2020/53-R01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0071-2012: 2
- BSI-CC-PP-0075-2012: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
- ADV:
- AGD:
- AGD_OPE: 2
- AGD_PRE: 4
- AGD_QUA: 1
- ALC:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Idemia:
- NXP:
- NXP: 10
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: sharbus
- /CreationDate: D:20211222164244+01'00'
- /ModDate: D:20211222164244+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - ANSSI-CC-2018_56v2fr
- pdf_file_size_bytes: 4196349
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
|
pdf_data/st_filename |
anssi-cible-cc-2018_56v2en.pdf |
ANSSI-cible-CC-2020_53-R01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0084-: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL4: 3
- EAL4 augmented: 1
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 6
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- ALC:
- ALC_CMS.5: 2
- ALC_DVS.2: 3
- ALC_TAT.2: 2
- ASE:
- ATE:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 10
- AGD_OPE.1: 2
- AGD_PRE: 14
- AGD_PRE_PLT: 2
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 7
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 14
- FCS_CKM.1: 19
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 29
- FCS_CKM.4.1: 1
- FCS_COP: 50
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG: 1
- FDP:
- FDP_ACC.1: 18
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_UCT.1: 10
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 13
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 11
- FIA_UAU.4.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 20
- FMT_LIM.1.1: 2
- FMT_LIM.2: 18
- FMT_LIM.2.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 36
- FMT_MTD.1: 6
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SRM.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
- FAU:
- FCS:
- FCS_CKM: 36
- FCS_CKM.1: 41
- FCS_CKM.2: 8
- FCS_CKM.3: 9
- FCS_CKM.4: 60
- FCS_CKM.4.1: 1
- FCS_COP: 113
- FCS_COP.1: 38
- FCS_COP.1.1: 3
- FCS_RNG: 4
- FCS_RNG.1: 22
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 85
- FDP_ACC.1: 49
- FDP_ACF: 59
- FDP_ACF.1: 42
- FDP_CKM: 4
- FDP_CKM.1: 1
- FDP_DAU: 6
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_ETC: 12
- FDP_ETC.1: 4
- FDP_IFC.1: 28
- FDP_ITC: 23
- FDP_ITC.1: 43
- FDP_ITC.2: 35
- FDP_RIP: 11
- FDP_RIP.1: 10
- FDP_RIP.1.1: 3
- FDP_ROL: 1
- FDP_SDI: 15
- FDP_SDI.1: 2
- FDP_SDI.2: 6
- FDP_UCT: 13
- FDP_UCT.1: 2
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 24
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_API: 5
- FIA_API.1: 9
- FIA_API.1.1: 1
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 36
- FMT_MSA.1: 8
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 35
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 44
- FMT_MTD.1: 7
- FMT_SMF: 2
- FMT_SMF.1: 50
- FMT_SMF.1.1: 1
- FMT_SMR.1: 48
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 7
- FPT_EMS.1: 9
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 2
- FPT_FLS: 5
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_TST: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 28
- FTP_ITC.1: 14
- FTP_TRP.1: 6
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 1
- A.CGA: 5
- A.CSP: 5
- A.PLT: 1
- A.SCA: 3
- A.VERIFICATION: 1
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.CODE_EVIDENCE: 2
- OE.HID_VAD: 4
- OE.PLT: 2
- OE.VERIFICATION: 4
- OSP:
- OSP.PLT: 2
- OSP.VERIFICATION: 1
- T:
- T.CONFID_APPLI_DATA: 3
- T.INTEG_APPLI_DATA: 8
- T.OBJ_DELETION: 3
- T.PHYSICAL: 3
- T.RESSOURCES: 3
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Samsung:
- Thales:
|
- Idemia:
- Morpho:
- NXP:
- Oberthur:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 5
- SHA-384: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 6
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 1
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- DFA: 2
- fault injection: 2
- physical tampering: 5
- SCA:
- DPA: 1
- SPA: 1
- side channel: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 8
- EF.DG1: 28
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 5
- EF.DG16: 26
- EF.DG2: 10
- EF.DG3: 6
- EF.DG4: 6
- EF.DG5: 7
- EF.DG6: 1
- EF.SOD: 8
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- RFC:
|
- FIPS:
- FIPS 180-3: 1
- FIPS PUB 180-3: 1
- FIPS180-3: 1
- ISO:
- PKCS:
- PKCS #1: 1
- PKCS#1: 3
- PKCS#15: 2
- PKCS#3: 3
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: D1417545
- /CreationDate: D:20210921161905+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: 05-07-2018
- /ModDate: D:20210921161905+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 1.5
- /Title: MultiApp V4.1: eTravel 2.3 BAC Security Target
- pdf_file_size_bytes: 1660503
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
- /Author: IDEMIA
- /CreationDate: D:20230922153019+02'00'
- /Creator: Microsoft® Word pour Microsoft 365
- /Keywords: Quality
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application: Microsoft Azure Information Protection
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled: True
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method: Automatic
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name: Public
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner: [email protected]
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Ref: https://api.informationprotection.azure.com/api/7694d41c-5504-43d9-9e40-cb254ad755ec
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate: 2019-05-16T11:56:55.2321137+02:00
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
- /ModDate: D:20230922153019+02'00'
- /Producer: Microsoft® Word pour Microsoft 365
- /Subject: FQR standard
- pdf_file_size_bytes: 2001451
- pdf_hyperlinks: ftp://ftp.itc.1/SCD, ftp://ftp.itc.1/SVD
- pdf_is_encrypted: False
- pdf_number_of_pages: 99
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |