name |
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC(Version du patch : 1.4)
|
IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N – Large R2 masquée sur le composant NXP P6022M VB
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2014-12-22
|
2018-05-04
|
not_valid_after |
2019-12-22
|
2026-06-09
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_86_LITE.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_18en.pdf
|
status |
archived
|
active
|
manufacturer |
Gemalto / NXP Semiconductors
|
Idemia
|
manufacturer_web |
https://www.gemalto.com/
|
https://www.idemia.com
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_86.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018_18fr.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_ANSSI-CC-2018_18-S02fr.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': frozenset({'ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2021, 6, 9), 'maintenance_title': 'Reassessment report: ANSSI-CC-2018/18-S02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018_18-S02fr.pdf', 'maintenance_st_link': None}) |
state/cert/convert_garbage |
False
|
True
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
e5484ad508d6b94568c57dbc24de31df048f88389d93b45016440c3f06fccb7b
|
state/cert/txt_hash |
None
|
fc80a3eba7a8c9428ddae1fc7eedd8771900961f42f182ddb1bb06a4a8f4b36a
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
c11a55d96f7645af38060f050513a34bf020db62b7dffab22b902f2ddfb87c21
|
7a3013c326377e3700c27cdb6820eff2113e6611877a86341950658a0d1ac5cc
|
state/report/txt_hash |
1af2633037cf51255fc3536ab8fb6aaced2078008edd7ffa25b4b1de811cacbe
|
5448ab67ccfa2088d4960546bb683866c470d16410af06dba4a5d59423a985bb
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
d5e97cff024273121e28248463513405b95dcb5ac796c24227003f7030d1dbd6
|
038d9437af7bfa17d470cee36f3b3543d8d649661b4c22317ec16fc990e828fd
|
state/st/txt_hash |
181b2f07c07d227fa74abfc63c36afeb2e1d7a0907d9d66cf42db2e56dd61d61
|
cc50758f69f23824158a4c7933b8d89c66644eedbd4bd6c24d483159b72f1d9f
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2014/86
|
ANSSI-CC-2018/18
|
heuristics/cert_lab |
SERMA
|
CEA
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
3.1, 1.4 |
8.1 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2015/02, ANSSI-CC-2015/04, ANSSI-CC-2015/15, ANSSI-CC-2015/08, ANSSI-CC-2015/01, ANSSI-CC-2015/03, ANSSI-CC-2015/30 |
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0837-2013, ANSSI-CC-2014/06 |
ANSSI-CC-2017/49 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2015/02, ANSSI-CC-2015/38, ANSSI-CC-2015/40, ANSSI-CC-2015/04, ANSSI-CC-2015/37, ANSSI-CC-2015/30, ANSSI-CC-2015/15, ANSSI-CC-2015/41, ANSSI-CC-2015/08, ANSSI-CC-2016/03, ANSSI-CC-2015/39, ANSSI-CC-2016/04, ANSSI-CC-2015/01, ANSSI-CC-2015/03 |
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0837-2013 |
ANSSI-CC-2017/49, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016 |
heuristics/scheme_data |
- product:
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
- url:
https://cyber.gouv.fr/produits-certifies/plateforme-java-card-en-configuration-ouverte-de-la-carte-puce-multiapp-v31
- description:
La certification porte sur la plateforme ouverte Java Card du produit « MultiApp v3.1 » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D080PVC fabriqué par la société NXP SEMICONDUCTORS.
La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui sero
- sponsor:
Gemalto
- developer:
Gemalto / NXP Semiconductors
- cert_id:
2014/86
- level:
EAL5+
- enhanced:
- cert_id:
2014/86
- certification_date:
22/12/2005
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Gemalto / NXP Semiconductors
- sponsor:
Gemalto
- evaluation_facility:
Serma Technologies
- level:
EAL5+
- protection_profile:
PP JCS
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/DCSSI-cible_2014-86en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2014-86fr.pdf
|
- product:
IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB
- url:
https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-en-configuration-1-en-composition-sur-la-plateforme-ouverte-id-one
- description:
Le produit certifié est « IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB, Identification E0 02 02 0A » développé par IDEMIA et NXP SEMICONDUCTORS GMBH.
Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2 et d’un microcontrôleur sécurisés. Il est destiné à être util
- sponsor:
Idemia
- developer:
Idemia, NXP Semiconductors GmbH
- cert_id:
2018/15
- level:
EAL5+
- expiration_date: 9 Juin 2026
- enhanced:
- cert_id:
2018/15
- certification_date:
04/05/2018
- expiration_date:
09/06/2026
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Idemia, NXP Semiconductors GmbH
- sponsor:
Idemia
- evaluation_facility:
CEA - LETI
- level:
EAL5+
- protection_profile:
PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/2018/05/anssi-cible-cc-2018_15en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2018/05/anssi-cc-2018_15fr.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/2018/05/certificat_anssi-cc-2018_15-s02fr.pdf
|
heuristics/scheme_data/cert_id |
2014/86
|
2018/15
|
heuristics/scheme_data/description |
La certification porte sur la plateforme ouverte Java Card du produit « MultiApp v3.1 » qui est une carte à puce pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D080PVC fabriqué par la société NXP SEMICONDUCTORS.
La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui sero
|
Le produit certifié est « IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB, Identification E0 02 02 0A » développé par IDEMIA et NXP SEMICONDUCTORS GMBH.
Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2 et d’un microcontrôleur sécurisés. Il est destiné à être util
|
heuristics/scheme_data/developer |
Gemalto / NXP Semiconductors
|
Idemia, NXP Semiconductors GmbH
|
heuristics/scheme_data/enhanced |
- cert_id:
2014/86
- certification_date:
22/12/2005
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Gemalto / NXP Semiconductors
- sponsor:
Gemalto
- evaluation_facility:
Serma Technologies
- level:
EAL5+
- protection_profile:
PP JCS
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/DCSSI-cible_2014-86en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2014-86fr.pdf
|
- cert_id:
2018/15
- certification_date:
04/05/2018
- expiration_date: 09/06/2026
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r4
- developer:
Idemia, NXP Semiconductors GmbH
- sponsor:
Idemia
- evaluation_facility:
CEA - LETI
- level:
EAL5+
- protection_profile:
PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/2018/05/anssi-cible-cc-2018_15en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2018/05/anssi-cc-2018_15fr.pdf
- cert_link: https://cyber.gouv.fr/sites/default/files/2018/05/certificat_anssi-cc-2018_15-s02fr.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2, AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r4
|
Critères Communs version 3.1r4
|
heuristics/scheme_data/enhanced/cert_id |
2014/86
|
2018/15
|
heuristics/scheme_data/enhanced/certification_date |
22/12/2005
|
04/05/2018
|
heuristics/scheme_data/enhanced/developer |
Gemalto / NXP Semiconductors
|
Idemia, NXP Semiconductors GmbH
|
heuristics/scheme_data/enhanced/evaluation_facility |
Serma Technologies
|
CEA - LETI
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
PP JCS
|
PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2014-86fr.pdf
|
https://cyber.gouv.fr/sites/default/files/2018/05/anssi-cc-2018_15fr.pdf
|
heuristics/scheme_data/enhanced/sponsor |
Gemalto
|
Idemia
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/DCSSI-cible_2014-86en.pdf
|
https://cyber.gouv.fr/sites/default/files/2018/05/anssi-cible-cc-2018_15en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
|
IAS ECC V2 en configuration #1 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB
|
heuristics/scheme_data/sponsor |
Gemalto
|
Idemia
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/plateforme-java-card-en-configuration-ouverte-de-la-carte-puce-multiapp-v31
|
https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-en-configuration-1-en-composition-sur-la-plateforme-ouverte-id-one
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
None
|
ANSSI-CC-2017/49 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
None
|
ANSSI-CC-2017/49, BSI-DSZ-CC-0955-V2-2016 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
certificat_ANSSI-CC-2018_18-S02fr.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- cc_protection_profile_id:
- BSI:
- BSI-CC-PP-0059-2009-MA-01:
1
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
582321
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /CreationDate:
D:20210611115918+02'00'
- /ModDate:
D:20210611115918+02'00'
- pdf_hyperlinks:
|
pdf_data/report_filename |
ANSSI-CC-2014_86.pdf
|
ANSSI-CC-2018_18fr.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Critères Communs version 3.1 révision 4
|
Critères Communs version 3.1 révision 4
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2014/86
|
ANSSI-CC-2018/18
|
pdf_data/report_frontpage/FR/cert_item |
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
|
IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB
|
pdf_data/report_frontpage/FR/cert_item_version |
Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.4
|
Identification E0 02 02 0A
|
pdf_data/report_frontpage/FR/cert_lab |
Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
|
pdf_data/report_frontpage/FR/developer |
Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
|
Idemia 420 rue d’Estienne D’Orves 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101 22539 Hamburg, Allemagne Commanditaire Idemia 420 rue d’Estienne D’Orves, 92700 Colombes, France
|
pdf_data/report_frontpage/FR/match_rules |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
pdf_data/report_frontpage/FR/ref_protection_profiles |
ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
|
Protection profiles for secure signature creation device [PP-SSCD-Part2] Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; [PP-SSCD-Part3] Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; [PP-SSCD-Part4] Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- FR:
- ANSSI-CC-2014/86:
22
- ANSSI-CC-2014/06:
1
|
- FR:
- ANSSI-CC-2018/18:
17
- ANSSI-CC-2017/49:
1
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2014/86:
22
- ANSSI-CC-2014/06:
1
|
- ANSSI-CC-2018/18:
17
- ANSSI-CC-2017/49:
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0035-2007:
2
- BSI-PP-0035-:
1
- ANSSI:
- ANSSI-CC-PP-2010/03-M01:
2
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP- 0059-2009-MA-01:
1
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
- ANSSI:
- other:
- PP-SSCD-Part2:
2
- PP-SSCD-Part3:
2
- PP-SSCD-Part4:
1
- PP-SSCD-:
3
|
pdf_data/report_keywords/cc_protection_profile_id/ANSSI |
- ANSSI-CC-PP-2010/03-M01:
2
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0035-2007:
2
- BSI-PP-0035-:
1
|
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- BSI-CC-PP-0071-2012:
1
- BSI-CC-PP- 0059-2009-MA-01:
1
- BSI-CC-PP- 0075-2012:
1
- BSI-CC-PP- 0071-2012:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE |
3
|
4
|
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE |
3
|
6
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR.1: 1
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_TSS.2: 1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_CCL |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_ECD |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_INT |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_OBJ |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_REQ |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_SPD |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
3
|
5
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
3
- EAL4: 2
- EAL6: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
- EAL 5:
3
- EAL2: 2
- EAL5: 1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
- javacardx:
- com:
- com.gemalto.javacardx.pace:
1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP Semiconductors:
2
- NXP:
3
- Gemalto:
|
- NXP:
- NXP:
27
- NXP Semiconductors:
1
- Idemia:
|
pdf_data/report_keywords/vendor/NXP/NXP |
3
|
27
|
pdf_data/report_keywords/vendor/NXP/NXP Semiconductors |
2
|
1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
Beatrice Duquesnoy
|
cdu
|
pdf_data/report_metadata//CreationDate |
D:20150105175233+01'00'
|
D:20180514092540+02'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//Keywords |
ANSSI-CC-CER-F-07.014
|
ANSSI-CC-CER-F-07.026
|
pdf_data/report_metadata//ModDate |
D:20150105175233+01'00'
|
D:20180514092540+02'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//Subject |
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp v3.1 masquée sur le composant P60D080PVC
|
IAS ECC V2 en configuration #4 en composition sur la plateforme ouverte ID-One Cosmo v8.1-N - Large R2 masquée sur le composant NXP P6022M VB
|
pdf_data/report_metadata//Title |
ANSSI-CC-2014/86
|
ANSSI-CC-2018/18
|
pdf_data/report_metadata/pdf_file_size_bytes |
725914
|
615809
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
21
|
16
|
pdf_data/st_filename |
ANSSI_cible2014_86_LITE.pdf
|
anssi-cible-cc-2018_18en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
8
|
36
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
3
|
2
|
pdf_data/st_keywords/asymmetric_crypto/FF |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
5
|
5
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
4
|
1
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0837-2013-MA-01:
2
- NL:
|
- FR:
- ANSSI-CC-2017/49:
1
- ANSSI-CC-2017/49-M01:
1
|
pdf_data/st_keywords/cc_claims |
- D:
- D.APP_CODE:
6
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.API_DATA:
3
- D.CRYPTO:
5
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- O:
- O.SID:
13
- O.FIREWALL:
12
- O.GLOBAL_ARRAYS_CONFID:
6
- O.GLOBAL_ARRAYS_INTEG:
5
- O.NATIVE:
11
- O.OPERATE:
15
- O.REALLOCATION:
5
- O.RESOURCES:
9
- O.ALARM:
15
- O.CIPHER:
10
- O.KEY-MNGT:
5
- O.PIN-MNGT:
5
- O.TRANSACTION:
6
- O.OBJ-DELETION:
4
- O.DELETION:
8
- O.LOAD:
6
- O.INSTALL:
11
- O.SCP:
36
- O.CARD-MANAGEMENT:
3
- O.RND:
13
- O.KEY_MNGT:
4
- O.CARD_MANAGEMENT:
18
- O.KEY-:
1
- O.PIN-:
1
- O.HW_AES:
2
- O.APPLET:
28
- O.CODE_PKG:
7
- O.JAVAOBJECT:
56
- O.CODE_PCKG:
16
- O.GLOBAL_ARRAYS_CO:
3
- O.GLOBAL_ARRAYS_INT:
3
- T:
- T.CONFID-APPLI-DATA:
4
- T.CONFID-JCS-CODE:
4
- T.CONFID-JCS-DATA:
4
- T.INTEG-APPLI-CODE:
7
- T.INTEG-APPLI-DATA:
8
- T.INTEG-JCS-CODE:
3
- T.INTEG-JCS-DATA:
4
- T.SID:
8
- T.EXE-CODE:
8
- T.NATIVE:
4
- T.RESOURCES:
3
- T.DELETION:
3
- T.INSTALL:
4
- T.OBJ-DELETION:
4
- T.PHYSICAL:
4
- A:
- A.APPLET:
5
- A.DELETION:
5
- A.VERIFICATION:
4
- R:
- OP:
- OP.ARRAY_ACCESS:
6
- OP.CREATE:
10
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
7
- OE:
- OE.VERIFICATION:
25
- OE.APPLET:
4
- OE.CODE-EVIDENCE:
10
- OE.CODE_EVIDENCE:
1
- OE.CARD-MANAGEMENT:
1
- OE.SCP:
6
- OSP:
- OSP:
1
- OSP.VERIFICATION:
4
- OSP.RNG:
1
- OSP.RND:
3
|
- T:
- T.CONFID_APPLI_DATA:
3
- T.RESSOURCES:
3
- T.OBJ_DELETION:
3
- T.PHYSICAL:
3
- T.INTEG_APPLI_DATA:
8
- A:
- A.CGA:
4
- A.SCA:
3
- A.CSP:
4
- A.PLT:
2
- A.APPLET:
1
- A.VERIFICATION:
1
- OE:
- OE.HID_VAD:
4
- OE.PLT:
2
- OE.VERIFICATION:
4
- OE.CODE_EVIDENCE:
2
- OE.APPLET:
1
- OE.CODE-EVIDENCE:
1
- OSP:
- OSP.PLT:
2
- OSP.VERIFICATION:
1
|
pdf_data/st_keywords/cc_claims/A |
- A.APPLET:
5
- A.DELETION: 5
- A.VERIFICATION:
4
|
- A.CGA: 4
- A.SCA: 3
- A.CSP: 4
- A.PLT: 2
- A.APPLET:
1
- A.VERIFICATION:
1
|
pdf_data/st_keywords/cc_claims/A/A.APPLET |
5
|
1
|
pdf_data/st_keywords/cc_claims/A/A.VERIFICATION |
4
|
1
|
pdf_data/st_keywords/cc_claims/OE |
- OE.VERIFICATION:
25
- OE.APPLET:
4
- OE.CODE-EVIDENCE:
10
- OE.CODE_EVIDENCE:
1
- OE.CARD-MANAGEMENT: 1
- OE.SCP: 6
|
- OE.HID_VAD: 4
- OE.PLT: 2
- OE.VERIFICATION:
4
- OE.CODE_EVIDENCE:
2
- OE.APPLET:
1
- OE.CODE-EVIDENCE:
1
|
pdf_data/st_keywords/cc_claims/OE/OE.APPLET |
4
|
1
|
pdf_data/st_keywords/cc_claims/OE/OE.CODE-EVIDENCE |
10
|
1
|
pdf_data/st_keywords/cc_claims/OE/OE.CODE_EVIDENCE |
1
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.VERIFICATION |
25
|
4
|
pdf_data/st_keywords/cc_claims/OSP |
- OSP: 1
- OSP.VERIFICATION:
4
- OSP.RNG: 1
- OSP.RND: 3
|
- OSP.PLT: 2
- OSP.VERIFICATION:
1
|
pdf_data/st_keywords/cc_claims/OSP/OSP.VERIFICATION |
4
|
1
|
pdf_data/st_keywords/cc_claims/T |
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.SID: 8
- T.EXE-CODE: 8
- T.NATIVE: 4
- T.RESOURCES: 3
- T.DELETION: 3
- T.INSTALL: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL:
4
|
- T.CONFID_APPLI_DATA: 3
- T.RESSOURCES: 3
- T.OBJ_DELETION: 3
- T.PHYSICAL:
3
- T.INTEG_APPLI_DATA: 8
|
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL |
4
|
3
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0035:
1
- BSI-CC-PP-0055:
1
- BSI-PP-0005:
1
- BSI-PP-0006:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012:
1
- other:
- PP-SSCD-T2:
2
- PP-SSCD-T3:
2
- PP-SSCD-KG:
2
- PP-SSCD-KI:
2
|
- BSI:
- BSI-CC-PP-0084-2014:
1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075:
1
- BSI-CC-PP-0071:
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0035: 1
- BSI-CC-PP-0055: 1
- BSI-PP-0005: 1
- BSI-PP-0006: 1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075-2012: 1
|
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0059-2009-MA-01:
1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0071: 1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0059-2009-MA-01 |
1
|
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
10
- ADV_TDS.1:
2
- ADV_TDS.4:
8
- ADV_IMP.1:
9
- ADV_TDS.3:
4
- ADV_INT.2:
3
- ADV_FSP.5:
6
- ADV_FSP.1:
1
- ADV_FSP.2:
2
- ADV_FSP.4:
2
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
9
- AGD_PRE.1:
7
- AGD_PRE:
1
- ALC:
- ALC_DVS.2:
9
- ALC_TAT.1:
2
- ALC_TAT.2:
5
- ALC_CMC.4:
3
- ALC_DVS.1:
2
- ALC_LCD.1:
5
- ALC_DEL.1:
3
- ALC_CMS.5:
2
- ATE:
- ATE_COV.2:
4
- ATE_FUN.1:
9
- ATE_COV.1:
2
- ATE_IND.2:
4
- ATE_DPT.1:
2
- ATE_DPT.3:
3
- AVA:
|
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_TDS:
1
- ADV_ARC.1:
2
- ADV_TDS.3:
2
- AGD:
- AGD_PRE:
25
- AGD_OPE:
27
- AGD_PRE_PLT:
3
- AGD_OPE.1:
2
- ALC:
- ALC_DVS.2:
7
- ALC_DVS:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_LCD:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- ATE_DPT.1:
2
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_TSS:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
10
- ADV_TDS.1: 2
- ADV_TDS.4: 8
- ADV_IMP.1: 9
- ADV_TDS.3:
4
- ADV_INT.2: 3
- ADV_FSP.5: 6
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT: 1
- ADV_TDS:
1
- ADV_ARC.1:
2
- ADV_TDS.3:
2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
10
|
2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 |
4
|
2
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
9
- AGD_PRE.1: 7
- AGD_PRE:
1
|
- AGD_PRE:
25
- AGD_OPE: 27
- AGD_PRE_PLT: 3
- AGD_OPE.1:
2
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
9
|
2
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE |
1
|
25
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.2:
9
- ALC_TAT.1: 2
- ALC_TAT.2: 5
- ALC_CMC.4: 3
- ALC_DVS.1: 2
- ALC_LCD.1: 5
- ALC_DEL.1: 3
- ALC_CMS.5: 2
|
- ALC_DVS.2:
7
- ALC_DVS: 2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_LCD: 1
- ALC_TAT: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
9
|
7
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 4
- ATE_FUN.1: 9
- ATE_COV.1: 2
- ATE_IND.2: 4
- ATE_DPT.1:
2
- ATE_DPT.3: 3
|
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- ATE_DPT.1:
2
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.1 |
2
|
2
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
9
|
8
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL5+: 1
- EAL5:
6
- EAL 6+: 1
- EAL5 augmented:
2
|
- EAL5:
6
- EAL 5: 2
- EAL4: 1
- EAL5 augmented:
2
- EAL4 augmented: 1
- EAL 5 augmented: 1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
6
|
6
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
2
|
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1:
15
- FAU_ARP.1.1:
1
- FAU_SAA.1:
2
- FCO:
- FCS:
- FCS_RND:
7
- FCS_RND.1:
12
- FCS_CKM.1:
21
- FCS_RND.1.1:
2
- FCS_CKM.1.1:
1
- FCS_CKM.2:
8
- FCS_CKM.2.1:
1
- FCS_CKM.3:
7
- FCS_CKM.3.1:
1
- FCS_CKM.4:
15
- FCS_CKM.4.1:
1
- FCS_COP.1:
19
- FCS_COP.1.1:
1
- FCS_RNG.1:
1
- FDP:
- FDP_ACC:
40
- FDP_ACC.2:
6
- FDP_ACF:
33
- FDP_ACF.1:
16
- FDP_IFC:
24
- FDP_IFC.1:
12
- FDP_IFF:
17
- FDP_IFF.1:
12
- FDP_RIP:
85
- FDP_RIP.1:
10
- FDP_ROL:
14
- FDP_ROL.1:
2
- FDP_SDI.2:
9
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
12
- FDP_ITC.2:
9
- FDP_IFC.2:
2
- FDP_UIT:
7
- FDP_UIT.1:
2
- FDP_ACC.1:
13
- FDP_ITC.1:
4
- FIA:
- FIA_SOS.2:
1
- FIA_ATD:
9
- FIA_ATD.1:
2
- FIA_UID:
14
- FIA_UID.2:
1
- FIA_USB:
8
- FIA_USB.1:
3
- FIA_UAU:
7
- FIA_UAI.1:
1
- FIA_UAU.1:
1
- FIA_UID.1:
10
- FMT:
- FMT_MSA:
91
- FMT_MSA.1:
11
- FMT_MSA.2:
1
- FMT_MSA.3:
15
- FMT_SMR:
47
- FMT_SMR.1:
22
- FMT_SMF:
33
- FMT_SMF.1:
9
- FMT_MTD:
18
- FMT_MTD.1:
3
- FMT_MTD.3:
1
- FPR:
- FPR_UNO.1:
10
- FPR_UNO.1.1:
1
- FPR_UNO:
7
- FPT:
- FPT_FLS:
46
- FPT_FLS.1:
5
- FPT_TDC.1:
9
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
16
- FPT_RCV.3:
4
- FPT_TST:
7
- FPT_TST.1:
3
- FPT_PHP:
7
- FPT_PHP.3:
2
- FPT_RCV.4:
2
- FPT_ITT:
7
- FPT_ITT.1:
1
- FTP:
- FTP_ITC:
9
- FTP_ITC.1:
5
- FTP_TRP.1:
2
|
- FAU:
- FCS:
- FCS_RNG:
4
- FCS_CKM.1:
41
- FCS_CKM:
37
- FCS_COP:
112
- FCS_RNG.1:
22
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.2:
8
- FCS_COP.1:
38
- FCS_CKM.4:
60
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
3
- FCS_CKM.3:
9
- FDP:
- FDP_ACC:
85
- FDP_ACF:
59
- FDP_ETC:
12
- FDP_ITC:
23
- FDP_UCT:
13
- FDP_UIT:
6
- FDP_ITC.1:
43
- FDP_ITC.2:
35
- FDP_ACF.1:
42
- FDP_ACC.1:
49
- FDP_RIP.1:
10
- FDP_RIP.1.1:
3
- FDP_SDI:
15
- FDP_SDI.1:
2
- FDP_SDI.2:
6
- FDP_IFC.1:
28
- FDP_UCT.1:
2
- FDP_DAU:
6
- FDP_DAU.1:
1
- FDP_DAU.2:
2
- FDP_ETC.1:
4
- FDP_UIT.1:
2
- FDP_CKM:
4
- FDP_CKM.1:
1
- FDP_RIP:
11
- FDP_ROL:
1
- FIA:
- FIA_API:
5
- FIA_API.1:
9
- FIA_UID.1:
19
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UAU.1:
17
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_API.1.1:
1
- FIA_AFL.1:
3
- FIA_AFL:
24
- FIA_AFL.1.1:
1
- FMT:
- FMT_MSA:
35
- FMT_MTD:
44
- FMT_MSA.3:
36
- FMT_SMR.1:
48
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_SMF.1:
50
- FMT_SMF.1.1:
1
- FMT_MSA.1:
8
- FMT_MSA.2:
11
- FMT_MSA.2.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.4:
8
- FMT_MSA.4.1:
1
- FMT_MTD.1:
7
- FMT_MOF.1:
7
- FMT_MOF.1.1:
1
- FMT_SMF:
2
- FPR:
- FPT:
- FPT_EMS:
7
- FPT_EMS.1:
9
- FPT_EMS.1.1:
4
- FPT_EMS.1.2:
2
- FPT_TST.1:
13
- FPT_FLS.1:
10
- FPT_FLS.1.1:
1
- FPT_TST:
1
- FPT_FLS:
5
- FPT_PHP.1:
5
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
- FPT_PHP.3:
7
- FPT_PHP.3.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_RCV:
2
- FPT_PHP:
2
- FTP:
- FTP_ITC:
28
- FTP_ITC.1:
14
- FTP_TRP.1:
6
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_ARP.1:
15
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_ARP.1 |
15
|
2
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_CKM.1:
21
- FCS_RND.1.1: 2
- FCS_CKM.1.1: 1
- FCS_CKM.2:
8
- FCS_CKM.2.1: 1
- FCS_CKM.3:
7
- FCS_CKM.3.1: 1
- FCS_CKM.4:
15
- FCS_CKM.4.1:
1
- FCS_COP.1:
19
- FCS_COP.1.1:
1
- FCS_RNG.1:
1
|
- FCS_RNG: 4
- FCS_CKM.1:
41
- FCS_CKM: 37
- FCS_COP: 112
- FCS_RNG.1:
22
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FCS_CKM.2:
8
- FCS_COP.1:
38
- FCS_CKM.4:
60
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
3
- FCS_CKM.3:
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
21
|
41
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.3 |
7
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
15
|
60
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
19
|
38
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
1
|
22
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC:
40
- FDP_ACC.2: 6
- FDP_ACF:
33
- FDP_ACF.1:
16
- FDP_IFC: 24
- FDP_IFC.1:
12
- FDP_IFF: 17
- FDP_IFF.1: 12
- FDP_RIP:
85
- FDP_RIP.1:
10
- FDP_ROL:
14
- FDP_ROL.1: 2
- FDP_SDI.2:
9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_ITC:
12
- FDP_ITC.2:
9
- FDP_IFC.2: 2
- FDP_UIT:
7
- FDP_UIT.1:
2
- FDP_ACC.1:
13
- FDP_ITC.1:
4
|
- FDP_ACC:
85
- FDP_ACF:
59
- FDP_ETC: 12
- FDP_ITC:
23
- FDP_UCT: 13
- FDP_UIT:
6
- FDP_ITC.1:
43
- FDP_ITC.2:
35
- FDP_ACF.1:
42
- FDP_ACC.1:
49
- FDP_RIP.1:
10
- FDP_RIP.1.1: 3
- FDP_SDI: 15
- FDP_SDI.1: 2
- FDP_SDI.2:
6
- FDP_IFC.1:
28
- FDP_UCT.1: 2
- FDP_DAU: 6
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_ETC.1: 4
- FDP_UIT.1:
2
- FDP_CKM: 4
- FDP_CKM.1: 1
- FDP_RIP:
11
- FDP_ROL:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
40
|
85
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
13
|
49
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
33
|
59
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
16
|
42
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
12
|
28
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
12
|
23
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
4
|
43
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
9
|
35
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
85
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL |
14
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
9
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT |
7
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_SOS.2: 1
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UID: 14
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FIA_UAU: 7
- FIA_UAI.1: 1
- FIA_UAU.1:
1
- FIA_UID.1:
10
|
- FIA_API: 5
- FIA_API.1: 9
- FIA_UID.1:
19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UAU.1:
17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_API.1.1: 1
- FIA_AFL.1: 3
- FIA_AFL: 24
- FIA_AFL.1.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
1
|
17
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
10
|
19
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA:
91
- FMT_MSA.1:
11
- FMT_MSA.2:
1
- FMT_MSA.3:
15
- FMT_SMR: 47
- FMT_SMR.1:
22
- FMT_SMF:
33
- FMT_SMF.1:
9
- FMT_MTD:
18
- FMT_MTD.1:
3
- FMT_MTD.3: 1
|
- FMT_MSA:
35
- FMT_MTD:
44
- FMT_MSA.3:
36
- FMT_SMR.1:
48
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMF.1:
50
- FMT_SMF.1.1: 1
- FMT_MSA.1:
8
- FMT_MSA.2:
11
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD.1:
7
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_SMF:
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
91
|
35
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
11
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
1
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
15
|
36
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
18
|
44
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF |
33
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
9
|
50
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
22
|
48
|
pdf_data/st_keywords/cc_sfr/FPR |
- FPR_UNO.1:
10
- FPR_UNO.1.1: 1
- FPR_UNO:
7
|
|
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO |
7
|
3
|
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 |
10
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS:
46
- FPT_FLS.1:
5
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_RCV:
16
- FPT_RCV.3: 4
- FPT_TST:
7
- FPT_TST.1:
3
- FPT_PHP:
7
- FPT_PHP.3:
2
- FPT_RCV.4: 2
- FPT_ITT: 7
- FPT_ITT.1: 1
|
- FPT_EMS: 7
- FPT_EMS.1: 9
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 2
- FPT_TST.1:
13
- FPT_FLS.1:
10
- FPT_FLS.1.1: 1
- FPT_TST:
1
- FPT_FLS:
5
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3:
7
- FPT_PHP.3.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_RCV:
2
- FPT_PHP:
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS |
46
|
5
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
5
|
10
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP |
7
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
2
|
7
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV |
16
|
2
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
7
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
3
|
13
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC |
9
|
28
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
5
|
14
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
6
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope:
1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are:
1
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
10
|
11
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 |
4
|
7
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-224:
3
- SHA-256:
4
- SHA-384:
4
- SHA-512: 3
- SHA224: 1
|
- SHA-256:
5
- SHA-224:
2
- SHA-384:
2
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
3
|
2
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
4
|
5
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 |
4
|
2
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
- JavaCard:
- Java Card 2.2.2:
7
- JC2.2.2:
1
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
7
|
6
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
3
- physical probing:
2
- DPA:
1
- FI:
- physical tampering:
1
- malfunction:
2
- Malfunction:
3
- fault induction:
2
|
- SCA:
- side channel:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
- FI:
- physical tampering:
5
- DFA:
2
- fault injection:
2
- other:
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering:
1
- malfunction: 2
- Malfunction: 3
- fault induction: 2
|
- physical tampering:
5
- DFA: 2
- fault injection: 2
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
5
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent: 3
- physical probing: 2
- DPA:
1
|
- side channel: 1
- SPA: 1
- DPA:
1
- timing attacks: 1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
1
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- NIST:
- PKCS:
- PKCS#3:
1
- PKCS#1:
8
- PKCS#5:
5
- BSI:
- ICAO:
- SCP:
- SCP01:
3
- SCP02:
3
- SCP03:
3
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
- FIPS:
- FIPS180-3:
1
- FIPS PUB 180-3:
1
- FIPS 180-3:
1
- PKCS:
- PKCS#1:
3
- PKCS #1:
1
- PKCS#3:
3
- PKCS#15:
2
- ISO:
- SCP:
|
pdf_data/st_keywords/standard_id/FIPS |
|
- FIPS180-3:
1
- FIPS PUB 180-3:
1
- FIPS 180-3:
1
|
pdf_data/st_keywords/standard_id/PKCS |
- PKCS#3:
1
- PKCS#1:
8
- PKCS#5: 5
|
- PKCS#1:
3
- PKCS #1: 1
- PKCS#3:
3
- PKCS#15: 2
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 |
8
|
3
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 |
1
|
3
|
pdf_data/st_keywords/standard_id/SCP |
- SCP01: 3
- SCP02:
3
- SCP03:
3
|
|
pdf_data/st_keywords/standard_id/SCP/SCP02 |
3
|
2
|
pdf_data/st_keywords/standard_id/SCP/SCP03 |
3
|
7
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
18
|
17
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
- TDEA: 1
- Triple-DES: 2
- TDES:
9
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
9
|
3
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
20
|
10
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC |
1
|
3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- NXP:
- Oberthur:
- Oberthur Technologies:
2
- Oberthur:
1
- Idemia:
- Morpho:
|
pdf_data/st_keywords/vendor/NXP/NXP |
12
|
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1611052
- pdf_is_encrypted:
False
- pdf_number_of_pages:
93
- /Title: eTravel v1.0 Security Target MAÏA3
- /Author:
Antoine de Lavernette
- /Subject: Security Target
- /Keywords: Security Target, CC
- /Creator:
Microsoft® Office Word 2007
- /CreationDate:
D:20141107143457+01'00'
- /ModDate:
D:20141107143457+01'00'
- /Producer:
Microsoft® Office Word 2007
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
2387254
- pdf_is_encrypted:
False
- pdf_number_of_pages:
135
- /Author:
IDEMIA
- /Creator:
Microsoft® Word 2016
- /CreationDate:
D:20180425142526+02'00'
- /ModDate:
D:20180425142526+02'00'
- /Producer:
Microsoft® Word 2016
- pdf_hyperlinks:
ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD
|
pdf_data/st_metadata//Author |
Antoine de Lavernette
|
IDEMIA
|
pdf_data/st_metadata//CreationDate |
D:20141107143457+01'00'
|
D:20180425142526+02'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Office Word 2007
|
Microsoft® Word 2016
|
pdf_data/st_metadata//ModDate |
D:20141107143457+01'00'
|
D:20180425142526+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Office Word 2007
|
Microsoft® Word 2016
|
pdf_data/st_metadata/pdf_file_size_bytes |
1611052
|
2387254
|
pdf_data/st_metadata/pdf_hyperlinks |
|
ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
93
|
135
|
dgst |
c85d31ec52d309ee
|
7e9be68c611b7c5f
|