name |
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) |
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
archived |
not_valid_after |
09.02.2029 |
12.12.2023 |
not_valid_before |
09.02.2024 |
17.12.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2023_10-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_58v2.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_10-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_58v2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2023_10-R01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_58v2en.pdf |
manufacturer |
NXP Semiconductors Germany GmbH |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.nxp.com |
https://www.thalesgroup.com/en/europe/france |
security_level |
ADV_INT.2, ALC_CMS.5, ADV_FSP.5, ALC_TAT.2, ADV_TDS.4, ALC_DVS.2, ATE_DPT.3, EAL4+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
ce4fe00bb1d91a41 |
d3410ad9c75334cf |
heuristics/cert_id |
ANSSI-CC-2023/10-R01 |
ANSSI-CC-2018/58v2 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, AVA_VAN.3, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 |
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4 |
heuristics/extracted_versions |
4.5, 4.0.1.52 |
4.1, 2.3 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1149-V2-2023, NSCIB-CC-0313985-CR |
ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, ANSSI-CC-2018/58 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1149-V2-2023, NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-2022 |
ANSSI-CC-2016/59, BSI-DSZ-CC-0782-2012, ANSSI-CC-2017/76, ANSSI-CC-2017/54, ANSSI-CC-2017/07, ANSSI-CC-2018/32, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2018/32v2, ANSSI-CC-2015/66, ANSSI-CC-2017/24, ANSSI-CC-2018/58, BSI-DSZ-CC-0891-2015 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/10-R01
- description: Le produit évalué est « ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration, Version 4.0.1.52 » développé par NXP SEMICONDUCTORS. Il s’agit de documents électroniques, qui permettent différents types d’usage basés sur l’identité électronique.
- developer: NXP SEMICONDUCTORS
- enhanced:
- augmented: ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/10-R01
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-2023_10-R01fr.pdf
- certification_date: 2024-02-09
- developer: NXP SEMICONDUCTORS
- evaluation_facility: THALES / CNES
- expiration_date: 2029-02-09
- level: EAL4+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Machine Readable Travel Document with « ICAO Application », Basic Access Control, version 1.10, certifié BSI-CC-PP-0055-2009
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_10-R01fr.pdf
- sponsor: NXP SEMICONDUCTORS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2023_10-R01en.pdf
- expiration_date: 2029-02-09
- level: EAL4+
- product: ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52)
- sponsor: NXP SEMICONDUCTORS
- url: https://cyber.gouv.fr/produits-certifies/chipdoc-v4-jcop-45-p71-icao-bac-configuration-version-40152
|
- cert_id: ANSSI-CC-2018/58v2
- description: Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern
- developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2018/58v2
- cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
- certification_date: 2021-12-17
- developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility: SERMA SAFETY & SECURITY
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
- report_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
- sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- target_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
- level: EAL5+
- product: eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
- sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- url: https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1149-V2-2023 |
ANSSI-CC-2017/24 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1149-V2-2023 |
ANSSI-CC-2017/24 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-2023_10-R01fr.pdf |
certificat-2018_58v2.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240214223000+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240214231043+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 166046
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: sharbus
- /CreationDate: D:20211222165349+01'00'
- /ModDate: D:20211222165349+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - certificat-2018_58v2
- pdf_file_size_bytes: 1306910
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2023_10-R01fr.pdf |
anssi-cc-2018_58v2.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1149-V2-2023: 1
- FR:
- NL:
- NSCIB-CC-0313985-1MA2: 1
- NSCIB-CC-0313985-CR: 1
|
- FR:
- ANSSI-CC-2017/24: 2
- ANSSI-CC-2018/32v2: 2
- ANSSI-CC-2018/58: 4
- ANSSI-CC-2018/58v2: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-2009: 1
- BSI-PP-0056-2009: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 5
- NXP Semiconductors: 1
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
- EF:
- EF.CardAccess: 1
- EF.DG14: 1
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: sharbus
- /CreationDate: D:20211222164829+01'00'
- /ModDate: D:20211222164829+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - ANSSI-CC-2018_58v2
- pdf_file_size_bytes: 4218025
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
ANSSI-Cible-CC-2023_10-R01en.pdf |
anssi-cible-cc-2018_58v2en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1149-V2-2023: 1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP0055: 1
- BSI-CC-PP0056-V2-2012: 1
|
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-2009: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 3
- EAL 4 augmented: 3
- EAL 4+: 2
- EAL4: 7
- EAL4 augmented: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.5: 11
- ADV_IMP.1: 7
- ADV_INT.2: 6
- ADV_TDS.4: 15
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 5
- ALC_DEL.1: 2
- ALC_DVS.2: 8
- ALC_LCD: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 1
- ALC_TAT.2: 8
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 3
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 4
- ASE_OBJ: 2
- ASE_OBJ.2: 3
- ASE_REQ: 2
- ASE_REQ.2: 4
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 4
- ATE_DPT.3: 5
- ATE_FUN.1: 5
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 12
- FCS_CKM.1: 15
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP: 40
- FCS_COP.1: 8
- FCS_RND: 8
- FCS_RND.1: 15
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_ITC: 2
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 8
- FIA_API.1: 12
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 15
- FIA_UAU.4.1: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UID.1: 7
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 18
- FMT_LIM.1.1: 3
- FMT_LIM.2: 17
- FMT_LIM.2.1: 4
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD: 19
- FMT_MTD.1: 7
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 31
- FCS_CKM.1: 21
- FCS_CKM.1.1: 2
- FCS_CKM.2: 6
- FCS_CKM.4: 42
- FCS_CKM.4.1: 1
- FCS_COP: 65
- FCS_COP.1: 8
- FCS_COP.1.1: 5
- FCS_RND: 7
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RNG: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 1
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 16
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 17
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UAU.5: 13
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID: 20
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 22
- FMT_LIM.1.1: 3
- FMT_LIM.2: 20
- FMT_LIM.2.1: 3
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 53
- FMT_MTD.1: 7
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF.1: 44
- FMT_SMF.1.1: 1
- FMT_SMR.1: 31
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- OE:
- OE.BAC-PP: 3
- OE.BAC_PP: 1
- OE.MRTD_: 3
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 88
- NXP Semiconductors: 30
|
- Gemalto:
- Samsung:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
- Generic:
- Crypto Library ............7: 1
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 6
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 1
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 7
- EF.DG1: 26
- EF.DG13: 3
- EF.DG14: 2
- EF.DG15: 4
- EF.DG16: 26
- EF.DG2: 10
- EF.DG3: 9
- EF.DG4: 8
- EF.DG5: 9
- EF.SOD: 7
|
- EF:
- EF.COM: 7
- EF.DG1: 17
- EF.DG14: 7
- EF.DG15: 3
- EF.DG16: 16
- EF.DG2: 8
- EF.DG3: 19
- EF.DG4: 18
- EF.DG5: 6
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 1
- FIPS 46-3: 2
- FIPS PUB 180-2: 1
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 2
- PKCS:
- RFC:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: David Herrgesell
- /CreationDate: D:20231011002739+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20231011002739+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: CDv4_2_210374_STLite_CDv4_ICAO_BAC
- pdf_file_size_bytes: 1219524
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
- /Author: D1417546
- /CreationDate: D:20210921161242+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: 05-07-2018
- /ModDate: D:20210921161242+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 1.5
- /Title: MultiApp V4.1: eTravel 2.3 EAC on BAC Security Target
- pdf_file_size_bytes: 1888188
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 73
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
True |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |