name |
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
|
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2021-12-17
|
2020-12-09
|
not_valid_after |
2023-12-12
|
2025-12-09
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_56v2en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_43en.pdf
|
status |
archived
|
active
|
manufacturer |
THALES DIS FRANCE SA
|
Thales
|
manufacturer_web |
https://www.thalesgroup.com/en/europe/france
|
None
|
security_level |
ADV_INT.2, ATE_DPT.3, ALC_CMS.5, ADV_TDS.4, ALC_TAT.2, ALC_DVS.2, EAL4+, ADV_FSP.5 |
ADV_INT.2, ATE_DPT.3, ALC_CMS.5, ADV_TDS.4, ALC_TAT.2, ALC_DVS.2, EAL4+, ADV_FSP.5 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_56v2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_43.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_56v2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_43.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0017b.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
True
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
bc1a323bf86f766a2a05002ebbe6cb7b1bfa796e1bcf72d951179ca97acf29fd
|
61c77fc8b5d25a0dbf44b1c86788c3b6b2442c34c9848d96dc9f069ab8b82aa8
|
state/cert/txt_hash |
1018fd637a39b2bcf71a00c37edb1cf5c6ef25acde27358ee8cac90a772c107d
|
44a159b715ff219449f1263e52d4d438ab4eefecbaec2e98acffa0c4df88fc6b
|
state/report/convert_garbage |
True
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
ef08f099149e3563348b259c3c17a57af626df249f41afb1f0e7a6c37a0c7275
|
224fc2858fb64689b495b140059c6a4988c55f244bf2a891bef1fbf13666e37d
|
state/report/txt_hash |
6a8ba41b7357f6221f27f5a0688a580043952960c24cb2abf92bb773bf07b3d2
|
839d5e18ed90a9c232d9e534f219ddcc7a65968b056c8ce3249e9c6f5501af4e
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
dbea7643ac66ba446ba75b9bb9ab26725d274afbd3d2469e3901d3ac33ee9adf
|
b4851df2abd6e829b128f6bd24a89d57d8f5cc2439919aedd3eb7b8f607475bf
|
state/st/txt_hash |
54016fc5b7a689364a2bb7c5b94766f52735101957eba6c31f0059e76b7348e9
|
a2196efb0a7fe3cca78f3cdc0e304e59f94a3cac02483421c728f8d3e06bfa4f
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2018/56v2
|
ANSSI-CC-2020/43
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ADV_ARC.1, ALC_TAT.2, ADV_INT.2, ATE_DPT.3, AVA_VAN.3, ALC_DVS.2, ADV_FSP.5, ADV_TDS.4, ALC_CMS.5 |
ADV_ARC.1, ALC_TAT.2, ADV_INT.2, ATE_DPT.3, AVA_VAN.3, ALC_DVS.2, ADV_FSP.5, ADV_TDS.4, ALC_CMS.5 |
heuristics/extracted_versions |
4.1, 2.3 |
4.0.1, 2.2, 1.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2020/49 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, ANSSI-CC-2018/56 |
BSI-DSZ-CC-0891-V4-2019, ANSSI-CC-2020/42 |
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2020/49 |
heuristics/scheme_data |
- product:
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
- url:
https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du
- description:
Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern
- sponsor:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- developer:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- cert_id:
2018/58v2
- level:
EAL5+
- enhanced:
- cert_id:
2018/58v2
- certification_date:
17/12/2021
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- sponsor:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link:
https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
- product:
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0
- url:
https://cyber.gouv.fr/produits-certifies/etravel-v22-bac-multiapp-platform-v401-filter-set-10-version-10
- description:
Le produit évalué est « eTravel v2.2 BAC on MultiApp v4.0.1 platform with Filter Set 1.0, version 1.0 » développé par THALES DIS. Il s’agit d’une application sur la plateforme « MultiApp V4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip » en composition sur le microcontrôleur « M7892 G12 » développé par INFINEON TECHNOLOGIES AG. Le produit implémente les fonctions de document de
- sponsor:
THALES DIS & INFINEON TECHNOLOGIES AG
- developer:
THALES DIS & INFINEON TECHNOLOGIES AG
- cert_id:
2020/43
- level:
EAL4+
- expiration_date: 9 Décembre 2025
- enhanced:
- cert_id:
2020/43
- certification_date:
09/12/2020
- expiration_date:
09/12/2025
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS & INFINEON TECHNOLOGIES AG
- sponsor:
THALES DIS & INFINEON TECHNOLOGIES AG
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL4+
- protection_profile:
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
- report_link:
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cc-2020_43.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cible-cc-2020_43en.pdf
|
heuristics/scheme_data/cert_id |
2018/58v2
|
2020/43
|
heuristics/scheme_data/description |
Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern
|
Le produit évalué est « eTravel v2.2 BAC on MultiApp v4.0.1 platform with Filter Set 1.0, version 1.0 » développé par THALES DIS. Il s’agit d’une application sur la plateforme « MultiApp V4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip » en composition sur le microcontrôleur « M7892 G12 » développé par INFINEON TECHNOLOGIES AG. Le produit implémente les fonctions de document de
|
heuristics/scheme_data/developer |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
THALES DIS & INFINEON TECHNOLOGIES AG
|
heuristics/scheme_data/enhanced |
- cert_id:
2018/58v2
- certification_date:
17/12/2021
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- sponsor:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
- cert_id:
2020/43
- certification_date:
09/12/2020
- expiration_date: 09/12/2025
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS & INFINEON TECHNOLOGIES AG
- sponsor:
THALES DIS & INFINEON TECHNOLOGIES AG
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL4+
- protection_profile:
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
- report_link:
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cc-2020_43.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cible-cc-2020_43en.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
2018/58v2
|
2020/43
|
heuristics/scheme_data/enhanced/certification_date |
17/12/2021
|
09/12/2020
|
heuristics/scheme_data/enhanced/developer |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
THALES DIS & INFINEON TECHNOLOGIES AG
|
heuristics/scheme_data/enhanced/evaluation_facility |
SERMA SAFETY & SECURITY
|
SERMA SAFETY & SECURITY
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL4+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
CCRA
SOG-IS
|
heuristics/scheme_data/enhanced/protection_profile |
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
|
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
|
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cc-2020_43.pdf
|
heuristics/scheme_data/enhanced/sponsor |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
THALES DIS & INFINEON TECHNOLOGIES AG
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
https://cyber.gouv.fr/sites/default/files/2020/12/anssi-cible-cc-2020_43en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL4+
|
heuristics/scheme_data/product |
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
|
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0
|
heuristics/scheme_data/sponsor |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
THALES DIS & INFINEON TECHNOLOGIES AG
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du
|
https://cyber.gouv.fr/produits-certifies/etravel-v22-bac-multiapp-platform-v401-filter-set-10-version-10
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
ANSSI-CC-2017/24 |
BSI-DSZ-CC-0891-V4-2019 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2017/24 |
BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-V2-2016 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-2018_56v2.pdf
|
certificat-2020_43.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
- ALC:
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ATE:
|
- ADV:
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
- ALC:
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ATE:
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
1310722
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
sharbus
- /CreationDate:
D:20211222165036+01'00'
- /ModDate:
D:20211222165036+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - certificat-2018_56v2
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
279491
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
- /CreationDate:
D:20201215152110+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate:
D:20201215152110+01'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/cert_metadata//Author |
sharbus
|
|
pdf_data/cert_metadata//CreationDate |
D:20211222165036+01'00'
|
D:20201215152110+01'00'
|
pdf_data/cert_metadata//ModDate |
D:20211222165036+01'00'
|
D:20201215152110+01'00'
|
pdf_data/cert_metadata//Producer |
Microsoft: Print To PDF
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/cert_metadata//Title |
Microsoft Word - certificat-2018_56v2
|
|
pdf_data/cert_metadata/pdf_file_size_bytes |
1310722
|
279491
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
2
|
pdf_data/report_filename |
anssi-cc-2018_56v2.pdf
|
anssi-cc-2020_43.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2018/56v2:
15
- ANSSI-CC-2018/56:
4
- ANSSI-CC-2017/24:
2
- ANSSI-CC-2018/32v2:
2
|
- DE:
- BSI-DSZ-CC-0891-V4-2019:
2
- FR:
- ANSSI-CC-2020/43:
2
- ANSSI-CC-2020/42:
2
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2018/56v2:
15
- ANSSI-CC-2018/56:
4
- ANSSI-CC-2017/24:
2
- ANSSI-CC-2018/32v2:
2
|
- ANSSI-CC-2020/43:
2
- ANSSI-CC-2020/42:
2
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0055-2009:
1
- BSI-PP-0084-2014:
1
- BSI-CC-PP-0055-2009:
1
|
- BSI:
- BSI-CC-PP-0055-2009:
1
- BSI-PP-0084-2014:
1
- BSI-PP- 0055-2009:
1
- ANSSI:
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0055-2009: 1
- BSI-PP-0084-2014:
1
- BSI-CC-PP-0055-2009:
1
|
- BSI-CC-PP-0055-2009:
1
- BSI-PP-0084-2014:
1
- BSI-PP- 0055-2009: 1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0055-2009 |
1
|
1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0084-2014 |
1
|
1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
- AGD:
- ALC:
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ALC_FLR:
1
- ATE:
- AVA:
|
- ADV:
- ADV_FSP.5:
2
- ADV_INT.2:
2
- ADV_TDS.4:
2
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_CMS.5:
2
- ALC_DVS.2:
2
- ALC_TAT.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_DPT.3:
2
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
|
- ADV_FSP.5:
2
- ADV_INT.2:
2
- ADV_TDS.4:
2
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.5 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.2 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.4 |
1
|
2
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
1
|
3
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
1
|
3
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ALC_FLR:
1
|
- ALC_CMS.5:
2
- ALC_DVS.2:
2
- ALC_TAT.2:
2
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ATE |
|
- ATE_DPT.3:
2
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.3 |
1
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
1
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.3 |
1
|
2
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL 4:
1
- EAL2:
2
- EAL4: 1
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/eval_facility/Serma/SERMA |
1
|
16
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-001 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-002 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-003 |
1
|
1
|
pdf_data/report_keywords/standard_id/ICAO/ICAO |
1
|
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Gemalto:
- Microsoft:
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto |
11
|
1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
4196349
- pdf_is_encrypted:
False
- pdf_number_of_pages:
15
- /Author:
sharbus
- /CreationDate:
D:20211222164244+01'00'
- /ModDate:
D:20211222164244+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - ANSSI-CC-2018_56v2fr
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
209100
- pdf_is_encrypted:
False
- pdf_number_of_pages:
19
- /Author:
- /CreationDate:
D:20201215151730+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate:
D:20201215151730+01'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
sharbus
|
|
pdf_data/report_metadata//CreationDate |
D:20211222164244+01'00'
|
D:20201215151730+01'00'
|
pdf_data/report_metadata//ModDate |
D:20211222164244+01'00'
|
D:20201215151730+01'00'
|
pdf_data/report_metadata//Producer |
Microsoft: Print To PDF
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/report_metadata//Title |
Microsoft Word - ANSSI-CC-2018_56v2fr
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
4196349
|
209100
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
15
|
19
|
pdf_data/st_filename |
anssi-cible-cc-2018_56v2en.pdf
|
anssi-cible-cc-2020_43en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
2
|
1
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF |
|
|
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V4-2019:
1
- NL:
|
pdf_data/st_keywords/cc_cert_id/NL/CC-1 |
2
|
2
|
pdf_data/st_keywords/cc_cert_id/NL/CC-2 |
5
|
4
|
pdf_data/st_keywords/cc_cert_id/NL/CC-3 |
3
|
3
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_claims/OE/OE.MRTD_ |
3
|
2
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0084-:
1
- BSI-PP-0056-V2-MA-2012: 1
- BSI-CC-PP-0068-:
1
- BSI-PP-0055-2009:
1
|
- BSI-CC-PP-0084-:
1
- BSI-PP-0056: 1
- BSI-CC-PP-0068-:
1
- BSI-PP-0055-2009:
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0068- |
1
|
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084- |
1
|
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0055-2009 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_INT.2 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.4 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
3
|
3
|
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 |
2
|
1
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4:
3
- EAL 6+:
1
- EAL4 augmented:
1
|
- EAL4+: 1
- EAL6: 1
- EAL6+: 1
- EAL4:
3
- EAL 6+:
1
- EAL6 augmented: 1
- EAL4 augmented:
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 6+ |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4 |
3
|
3
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4 augmented |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 |
12
|
10
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND:
7
- FCS_CKM:
14
- FCS_COP:
50
- FCS_CKM.1:
19
- FCS_RND.1:
12
- FCS_RND.1.1:
2
- FCS_CKM.2:
4
- FCS_COP.1:
9
- FCS_CKM.4:
29
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_RNG: 1
|
- FCS_RND:
7
- FCS_CKM:
5
- FCS_COP:
48
- FCS_CKM.1:
25
- FCS_RND.1:
11
- FCS_RND.1.1:
2
- FCS_CKM.2:
4
- FCS_COP.1:
9
- FCS_CKM.4:
28
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
14
|
5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
19
|
25
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
29
|
28
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
50
|
48
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 |
12
|
11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
18
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
11
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
10
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
11
|
10
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API |
13
|
12
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4 |
11
|
10
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 |
11
|
10
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
11
|
10
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
20
|
19
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
18
|
17
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
36
|
32
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
20
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
24
|
21
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SRM.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS |
4
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 |
13
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.1 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1.2 |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
11
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
12
|
10
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
5
- FTP_TRP.1:
5
|
- FTP_ITC.1:
5
- FTP_TRP.1:
5
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol/PACE/PACE |
2
|
1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security:
1
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
- SHA-224: 1
- SHA-256:
1
- SHA-512:
1
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
1
|
1
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 |
1
|
1
|
pdf_data/st_keywords/ic_data_group/EF/EF.COM |
8
|
9
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG1 |
28
|
29
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG13 |
3
|
3
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG14 |
3
|
3
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG15 |
5
|
4
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG16 |
26
|
27
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG2 |
10
|
11
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG3 |
6
|
6
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG4 |
6
|
6
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG5 |
7
|
7
|
pdf_data/st_keywords/ic_data_group/EF/EF.DG6 |
1
|
2
|
pdf_data/st_keywords/ic_data_group/EF/EF.SOD |
8
|
9
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
6
|
3
|
pdf_data/st_keywords/side_channel_analysis/FI/Physical Tampering |
5
|
5
|
pdf_data/st_keywords/side_channel_analysis/FI/Physical tampering |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/FI/fault injection |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
5
|
5
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent: 1
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
|
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
3
|
3
|
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/other |
|
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2012-04-003: 1
- CCMB-2017-04-004:
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 |
1
|
1
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-004 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS46-3:
3
- FIPS PUB 46-3:
1
- FIPS 180-2:
1
- FIPS 46-3:
2
|
- FIPS180-2: 1
- FIPS46-3:
3
- FIPS PUB 46-3:
1
- FIPS 180-2:
1
- FIPS 46-3:
2
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 46-3 |
2
|
2
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS46-3 |
3
|
3
|
pdf_data/st_keywords/standard_id/ICAO |
|
|
pdf_data/st_keywords/standard_id/ISO |
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
|
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Samsung:
- Gemalto:
- Thales:
|
- Infineon:
- Gemalto:
- Thales:
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
235
|
1
|
pdf_data/st_keywords/vendor/Thales/Thales |
1
|
12
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
D1417545
|
D1433276
|
pdf_data/st_metadata//CreationDate |
D:20210921161905+02'00'
|
D:20200710132006+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Keywords |
05-07-2018
|
12/10/2017
|
pdf_data/st_metadata//ModDate |
D:20210921161905+02'00'
|
D:20200710132006+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Subject |
1.5
|
1.1
|
pdf_data/st_metadata//Title |
MultiApp V4.1: eTravel 2.3 BAC Security Target
|
eTravel v2.2 on MultiApp v4.0.1 platform, BAC and AA activated
|
pdf_data/st_metadata/pdf_file_size_bytes |
1660503
|
1575146
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
55
|
55
|
dgst |
c41fa08d50e81932
|
e7fba508ae89ac91
|