name |
eTravel Essential for Japan 1.0, with SAC (BAC+PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit (version 0103h) (ANSSI-CC-2020/88-R01) |
ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G 1.0.7052 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
JP |
status |
active |
active |
not_valid_after |
11.03.2029 |
24.12.2024 |
not_valid_before |
11.03.2024 |
28.08.2019 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2020_88-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_88-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_88en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0649_st.pdf |
manufacturer |
THALES DIS FRANCE SA |
Maxell, Ltd |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.maxell.com/ |
security_level |
ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ADV_TDS.4, ATE_DPT.3, ADV_INT.2, EAL4+, ADV_FSP.5 |
ALC_DVS.2, EAL4+ |
dgst |
c5347a16d05fc4e2 |
abb304884762a560 |
heuristics/cert_id |
ANSSI-CC-2020/88-R01 |
JISEC-CC-CRP-C0649-01-2019 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ALC_FLR.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, AVA_VAN.3, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
ASE_CCL.1, ADV_ARC.1, ASE_INT.1, ASE_REQ.2, ATE_COV.2, ALC_DEL.1, ADV_IMP.1, ATE_IND.2, ALC_LCD.1, ALC_DVS.2, AGD_OPE.1, ATE_DPT.1, ASE_TSS.1, AVA_VAN.5, ALC_CMC.4 |
heuristics/extracted_versions |
1.0 |
1.0.7052, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1110-V6-2023 |
BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0869-V2-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-1110-V4-2021 |
BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0869-V2-2019 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2020/88-R01
- description: Le produit évalué est « eTravel Essential for Japan 1.0, with SAC (BAC+PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit, version 0103h » développé par THALES DIS FRANCE SAS. Le produit certifié est de type « carte à puce » sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internatio
- developer: THALES DIS FRANCE SAS
- enhanced:
- expiration_date: 11.03.2029
- level: EAL4+
- product: eTravel Essential for Japan 1.0, with SAC (BAC+PACE) and AA, embedded in the Infineon SLC52GDA Integrated Circuit (version 0103h)
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-essential-japan-10-sac-bacpace-and-aa-embedded-infineon-slc52gda-0
|
- cert_id: JISEC-CC-CRP-C0649
- certification_date: 01.08.2019
- claim: EAL4+ ALC_DVS.2 PP
- enhanced:
- assurance_level: EAL4 Augmented with ALC_DVS.2
- cc_version: 3.1 release5
- cert_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/c0649_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an ePassport IC (including necessary software). This ePassport IC is IC chip hardware with the contactless communication interface, and basic software and ePassport application program. The operation of the security functions applied to contactless communication with the terminal comply with the BAC, PACE, and Active Authentication specifications defined by Part11 of “ICAO Doc 9303 Machine readable Travel Documents Seventh Edition”. TOE security functionality The main security functions of the TOE are to protect data stored in the TOE from illicit reading or writing. The TOE provides the main security functions, including: Basic Access Control function; Password Authenticated Connection Establishment function; Active Authentication function; Disable function of BAC function; Write protection function; Protection function in transport; and Tamper resistance.
- evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT Security
- product: ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52G
- product_type: ICs for e-passports
- protection_profile: Protection Profile for ePassport IC with SAC (BAC+PACE) and Active Authentication version 1.00 (Certification Identification : JISEC-C0500)
- report_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/C0649_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/b9ck990000000o9u-att/c0649_st.pdf
- toe_version: v1.0.7052
- vendor: Maxell, Ltd
- expiration_date: 01.09.2026
- supplier: Maxell, Ltd
- toe_japan_name: ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/hardware/certified-cert/c0649_it8679.html
- toe_overseas_name: ID&Trust IDentity-J with SAC (BAC+PACE) and AA version 1.0 on IFX M7892 G12 SLJ 52Gv1.0.7052
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1110-V6-2023 |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1110-V6-2023 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-CC-2020_88-R01fr.pdf |
c0649_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0649-01-2019: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240315161148+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240315161309+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 150980
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20191004103237+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20191004103345+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 86383
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2020_88-R01fr.pdf |
c0649_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V6-2023: 2
- FR:
|
- DE:
- BSI-DSZ-CC-0869-V2-2019: 2
- BSI-DSZ-CC-0891-V3-2018: 1
- JP:
- JISEC-CC-CRP-C0649-01-2019: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL4: 3
- EAL4 augmented: 2
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 11
- TÜViT: 7
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- P-256: 1
- P-384: 1
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Fault Injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- Side channel: 1
- physical probing: 1
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
- EF:
- EF.COM: 5
- EF.CardAccess: 8
- EF.DG1: 5
- EF.DG13: 6
- EF.DG14: 7
- EF.DG15: 10
- EF.DG2: 5
- EF.SOD: 5
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
- ISO/IEC 11770-2: 1
- ISO/IEC 7816-4: 4
- ISO/IEC 9797-1: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-CC-2020_88en.pdf |
c0649_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1110-V6-2023: 1
- NL:
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 2
- EAL5: 1
- EAL6: 1
- EAL6 augmented: 1
|
- EAL:
- EAL4: 4
- EAL4 augmented: 1
- EAL4+: 3
- EAL5: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 4
- ADV_IMP.1: 1
- ADV_INT.2: 4
- ADV_TDS.4: 3
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 4
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 10
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 19
- FCS_CKM.1: 27
- FCS_CKM.2: 6
- FCS_CKM.4: 49
- FCS_CKM.4.1: 1
- FCS_COP: 56
- FCS_COP.1: 19
- FCS_RND: 2
- FCS_RND.1: 8
- FCS_RND.1.1: 2
- FCS_RNG: 3
- FDP:
- FDP_ACC: 49
- FDP_ACC.1: 21
- FDP_ACF: 41
- FDP_ACF.1: 20
- FDP_IFC.1: 11
- FDP_ITC.1: 36
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 22
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 10
- FDP_UCT.1: 3
- FDP_UIT: 10
- FDP_UIT.1: 5
- FIA:
- FIA_AFL: 15
- FIA_AFL.1: 6
- FIA_API.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 13
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 2
- FPT_PHP.3: 16
- FPT_PHP.3.1: 1
- FRU:
- FTP:
- FTP_ITC.1: 19
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 42
- FCS_CKM.1: 27
- FCS_CKM.2: 7
- FCS_CKM.3: 1
- FCS_CKM.4: 52
- FCS_CKM.4.1: 1
- FCS_COP: 131
- FCS_COP.1: 59
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG.1: 7
- FDP:
- FDP_ACC: 37
- FDP_ACC.1: 16
- FDP_ACF: 30
- FDP_ACF.1: 18
- FDP_IFC: 2
- FDP_IFC.1: 10
- FDP_IFF: 2
- FDP_ITC: 1
- FDP_ITC.1: 41
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 22
- FDP_RIP: 9
- FDP_ROL: 1
- FDP_SDI.2: 2
- FDP_UCT: 20
- FDP_UCT.1: 2
- FDP_UIT: 21
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 24
- FIA_AFL.1: 6
- FIA_ATD: 1
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 10
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 3
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FMT:
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 13
- FMT_MSA.3: 12
- FMT_MTD: 2
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 2
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_RCV: 3
- FPT_TDC.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 25
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.AA: 10
- O.AES: 1
- O.BAC: 9
- O.PACE: 10
- O.RND: 1
- O.TDES: 1
- OE:
- T:
|
- A:
- A.APPLET: 1
- A.PKI: 5
- A.VERIFICATION: 1
- O:
- O.AA: 8
- O.ALARM: 1
- O.BAC: 12
- O.CIPHER: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.IC_SUPPORT: 1
- O.KEY-MNGT: 1
- O.OPERATE: 1
- O.OS_SUPPORT: 1
- O.PACE: 9
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RECOVERY: 1
- O.RESOURCES: 1
- O.RND: 1
- O.TRANSACTION: 1
- OE:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-DATA: 1
- T.FAULT: 1
- T.INTEG-APPLI-DATA: 1
- T.INTEG-JCS-DATA: 1
- T.LEAKAGE: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RND: 1
- T.SID: 1
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 1
- Thales:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 3
- AES-128: 1
- AES-256: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 4
- malfunction: 3
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 3
- side channel: 1
|
- SCA:
- DPA: 2
- SPA: 1
- side-channel: 1
- timing attack: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 13
- EF.CardAccess: 6
- EF.DG1: 14
- EF.DG13: 15
- EF.DG14: 12
- EF.DG15: 15
- EF.DG16: 1
- EF.DG2: 14
- EF.DG5: 1
- EF.SOD: 13
|
- EF:
- EF.COM: 9
- EF.CardAccess: 6
- EF.DG1: 9
- EF.DG13: 9
- EF.DG14: 9
- EF.DG15: 10
- EF.DG2: 9
- EF.SOD: 9
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
- ISO:
|
- BSI:
- CC:
- ICAO:
- ISO:
- ISO/IEC 10116: 8
- ISO/IEC 9797-1: 6
- NIST:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Gaelle Denis
- /CreationDate: D:20231221111321+01'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: SLB-Private, assurance qualité
- /ModDate: D:20231221111321+01'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: Security Target
- pdf_file_size_bytes: 954729
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
- /Author: LovaszD
- /CreationDate: D:20190726101540+02'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20190726101540+02'00'
- /Producer: Microsoft® Word for Office 365
- /Title: ID&Trust IDENTITY APPLET-J with SAC (BAC+PACE) and AA - Security Target Lite
- pdf_file_size_bytes: 1235950
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 66
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |