name |
eTravel Essential for Japan 1.0, with SAC (BAC+PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit (version 0103h) (ANSSI-CC-2020/88-R01) |
ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G v1.0.7052 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
JP |
status |
active |
active |
not_valid_after |
11.03.2029 |
24.12.2024 |
not_valid_before |
11.03.2024 |
28.08.2019 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2020_88-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0648_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_88-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0648_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_88en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0648_st.pdf |
manufacturer |
THALES DIS FRANCE SA |
Maxell, Ltd |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.maxell.com/ |
security_level |
ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ADV_TDS.4, ATE_DPT.3, ADV_INT.2, EAL4+, ADV_FSP.5 |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
dgst |
c5347a16d05fc4e2 |
6b52236346d890ba |
heuristics/cert_id |
ANSSI-CC-2020/88-R01 |
JISEC-CC-CRP-C0648-01-2019 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ALC_FLR.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, AVA_VAN.3, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
ASE_CCL.1, ADV_ARC.1, ASE_INT.1, ASE_REQ.2, ATE_FUN.1, ATE_COV.2, ALC_DEL.1, ADV_IMP.1, ALC_DVS.2, ALC_LCD.1, AGD_OPE.1, ASE_TSS.1, AVA_VAN.5, ALC_CMC.4 |
heuristics/extracted_versions |
1.0 |
1.0.7052, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1110-V6-2023 |
BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0869-V2-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-1110-V4-2021 |
BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0869-V2-2019 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2020/88-R01
- description: Le produit évalué est « eTravel Essential for Japan 1.0, with SAC (BAC+PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit, version 0103h » développé par THALES DIS FRANCE SAS. Le produit certifié est de type « carte à puce » sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internatio
- developer: THALES DIS FRANCE SAS
- enhanced:
- expiration_date: 11.03.2029
- level: EAL4+
- product: eTravel Essential for Japan 1.0, with SAC (BAC+PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit (version 0103h)
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-essential-japan-10-sac-bacpace-and-aa-embedded-infineon-slc52gda-0
|
- cert_id: JISEC-CC-CRP-C0648
- certification_date: 01.08.2019
- claim: EAL4+ ALC_DVS.2, AVA_VAN.5 PP
- enhanced:
- assurance_level: EAL4 Augmented with ALC_DVS.2, AVA_VAN.5
- cc_version: 3.1 release5
- cert_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/c0648_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the PACE, and Active Authentication specifications defined by Part11 of “ICAO Doc 9303 Machine readable Travel Documents Seventh Edition”. TOE security functionality The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including: Password Authenticated Connection Establishment function; Active Authentication function; Write protection function; Protection function in transport; and Tamper resistance.
- evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT Security
- product: ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G
- product_type: ICs for e-passports
- protection_profile: Protection Profile for ePassport IC with SAC (PACE) and Active Authentication version 1.00 (Certification Identification: JISEC-C0499)
- report_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/C0648_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000nba-att/c0648_st.pdf
- toe_version: v1.0.7052
- vendor: Maxell, Ltd.
- expiration_date: 01.09.2026
- supplier: Maxell, Ltd.
- toe_japan_name: ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0648_it8678.html
- toe_overseas_name: ID&Trust IDentity-J with SAC (PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1110-V6-2023 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1110-V6-2023 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-CC-2020_88-R01fr.pdf |
c0648_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0648-01-2019: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240315161148+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240315161309+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 150980
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20191004102920+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20191004103115+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 86462
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2020_88-R01fr.pdf |
c0648_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V6-2023: 2
- FR:
|
- DE:
- BSI-DSZ-CC-0869-V2-2019: 2
- BSI-DSZ-CC-0891-V3-2018: 1
- JP:
- JISEC-CC-CRP-C0648-01-2019: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL4: 3
- EAL4 augmented: 2
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 11
- TÜViT: 7
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- P-256: 1
- P-384: 1
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Fault Injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- Side channel: 1
- physical probing: 1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
- EF:
- EF.COM: 4
- EF.CardAccess: 8
- EF.DG1: 4
- EF.DG13: 4
- EF.DG14: 6
- EF.DG15: 9
- EF.DG2: 4
- EF.SOD: 4
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20191113095255+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20191113095335+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 546653
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 48
|
pdf_data/st_filename |
ANSSI-cible-CC-2020_88en.pdf |
c0648_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V6-2023: 1
- NL:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 2
- EAL5: 1
- EAL6: 1
- EAL6 augmented: 1
|
- EAL:
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 3
- EAL5: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 4
- ADV_IMP.1: 1
- ADV_INT.2: 4
- ADV_TDS.4: 3
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 4
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 10
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 19
- FCS_CKM.1: 27
- FCS_CKM.2: 6
- FCS_CKM.4: 49
- FCS_CKM.4.1: 1
- FCS_COP: 56
- FCS_COP.1: 19
- FCS_RND: 2
- FCS_RND.1: 8
- FCS_RND.1.1: 2
- FCS_RNG: 3
- FDP:
- FDP_ACC: 49
- FDP_ACC.1: 21
- FDP_ACF: 41
- FDP_ACF.1: 20
- FDP_IFC.1: 11
- FDP_ITC.1: 36
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 22
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 10
- FDP_UCT.1: 3
- FDP_UIT: 10
- FDP_UIT.1: 5
- FIA:
- FIA_AFL: 15
- FIA_AFL.1: 6
- FIA_API.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 13
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 2
- FPT_PHP.3: 16
- FPT_PHP.3.1: 1
- FRU:
- FTP:
- FTP_ITC.1: 19
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 31
- FCS_CKM.1: 19
- FCS_CKM.2: 5
- FCS_CKM.3: 1
- FCS_CKM.4: 40
- FCS_CKM.4.1: 1
- FCS_COP: 90
- FCS_COP.1: 45
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 6
- FDP:
- FDP_ACC: 26
- FDP_ACC.1: 10
- FDP_ACF: 22
- FDP_ACF.1: 12
- FDP_IFC: 2
- FDP_IFC.1: 6
- FDP_IFF: 2
- FDP_ITC: 1
- FDP_ITC.1: 32
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 16
- FDP_RIP: 9
- FDP_ROL: 1
- FDP_SDI.2: 2
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UIT: 11
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 24
- FIA_AFL.1: 6
- FIA_ATD: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 3
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FMT:
- FMT_MSA: 13
- FMT_MSA.3: 9
- FMT_MTD: 2
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 2
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_RCV: 3
- FPT_TDC.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 19
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.AA: 10
- O.AES: 1
- O.BAC: 9
- O.PACE: 10
- O.RND: 1
- O.TDES: 1
- OE:
- T:
|
- A:
- A.APPLET: 1
- A.PKI: 5
- A.VERIFICATION: 1
- O:
- O.AA: 8
- O.ALARM: 1
- O.CIPHER: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.KEY-MNGT: 1
- O.OPERATE: 1
- O.OS_SUPPORT: 1
- O.PACE: 11
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RECOVERY: 1
- O.RESOURCES: 1
- O.RND: 1
- O.TRANSACTION: 1
- OE:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-DATA: 1
- T.FAULT: 1
- T.INTEG-APPLI-DATA: 1
- T.INTEG-JCS-DATA: 1
- T.LEAKAGE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RND: 1
- T.SID: 1
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 1
- Thales:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 3
- AES-128: 1
- AES-256: 1
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 4
- malfunction: 3
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 3
- side channel: 1
|
- SCA:
- DPA: 2
- SPA: 1
- side-channel: 1
- timing attack: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 13
- EF.CardAccess: 6
- EF.DG1: 14
- EF.DG13: 15
- EF.DG14: 12
- EF.DG15: 15
- EF.DG16: 1
- EF.DG2: 14
- EF.DG5: 1
- EF.SOD: 13
|
- EF:
- EF.COM: 4
- EF.CardAccess: 6
- EF.DG1: 5
- EF.DG13: 5
- EF.DG14: 5
- EF.DG15: 6
- EF.DG2: 5
- EF.SOD: 5
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
- ISO:
|
- BSI:
- CC:
- FIPS:
- FIPS 180-2: 1
- FIPS 180-4: 4
- FIPS 197: 3
- ICAO:
- ISO:
- NIST:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Gaelle Denis
- /CreationDate: D:20231221111321+01'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: SLB-Private, assurance qualité
- /ModDate: D:20231221111321+01'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: Security Target
- pdf_file_size_bytes: 954729
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
- /Author: LovaszD
- /CreationDate: D:20190726101904+02'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20190726101904+02'00'
- /Producer: Microsoft® Word for Office 365
- /Title: ID&Trust IDENTITY APPLET-J with SAC (PACE) and AA - Security Target Lite
- pdf_file_size_bytes: 1095310
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |