Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
ANSSI-CC-2015/17
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
ANSSI-CC-2018/57v2
name Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
not_valid_after 21.05.2020 12.12.2023
not_valid_before 21.05.2015 17.12.2021
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_57v2.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_57v2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17_cible.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_57v2en.pdf
manufacturer Incard Division / ST Microelectronics THALES DIS FRANCE SA
manufacturer_web None https://www.thalesgroup.com/en/europe/france
security_level EAL4+, AVA_VAN.5 {}
dgst ce97d64b517bf270 a4088c520eb30448
heuristics/cert_id ANSSI-CC-2015/17 ANSSI-CC-2018/57v2
heuristics/cert_lab SERMA []
heuristics/extracted_sars ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, AVA_VLA.4, ALC_DVS.2, ATE_DPT.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, AVA_SOF.1, ASE_ECD.1, AVA_MSU.3, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2 ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4
heuristics/extracted_versions 1.8.4, 2.11.0 4.1, 2.3
heuristics/report_references/directly_referencing ANSSI-CC-2015/16, ANSSI-CC-2012/68 ANSSI-CC-2017/24, ANSSI-CC-2018/57, ANSSI-CC-2018/32v2
heuristics/report_references/indirectly_referencing ANSSI-CC-2009/05, ANSSI-CC-2015/16, ANSSI-CC-2009/50, ANSSI-CC-2009/06, ANSSI-CC-2009/28, ANSSI-CC-2009/62, ANSSI-CC-2009/26, ANSSI-CC-2012/68, ANSSI-CC-2010/02, ANSSI-CC-2010/01, ANSSI-CC-2009/51 ANSSI-CC-2016/59, BSI-DSZ-CC-0782-2012, ANSSI-CC-2017/76, ANSSI-CC-2017/54, ANSSI-CC-2017/07, ANSSI-CC-2018/32, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2018/32v2, ANSSI-CC-2015/66, ANSSI-CC-2017/24, ANSSI-CC-2018/57, BSI-DSZ-CC-0891-2015
heuristics/scheme_data
  • cert_id: ANSSI-CC-2015/17
  • description: Le produit certifié est la carte à puce « Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 » développée par STMicroelectronics S.r.l. – Incard Division et STMicroelectronics. Cette carte fournit une application de création de signature électronique utilisée dans le cadre du déploiement de la CIE/CNS (carte d’identité et de services au citoyen) italienne. Cette applicati
  • developer: STMicroelectronics S.r.l. - Incard Division / STMicroelectronics
  • enhanced:
    • augmented: AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r3
    • cert_id: ANSSI-CC-2015/17
    • certification_date: 2015-05-21
    • developer: STMicroelectronics S.r.l. - Incard Division / STMicroelectronics
    • evaluation_facility: Serma Technologies
    • level: EAL4+
    • mutual_recognition:
    • protection_profile: PP-0006
    • report_link: https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_17.pdf
    • sponsor: STMicroelectronics S.r.l. - Incard Division
    • target_link: https://cyber.gouv.fr/sites/default/files/2015/05/ANSSI-CC-2015_17_cible.pdf
  • level: EAL4+
  • product: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
  • sponsor: STMicroelectronics S.r.l. - Incard Division
  • url: https://cyber.gouv.fr/produits-certifies/application-j-sign-version-184-sur-la-plateforme-j-safe-version-2110
  • cert_id: ANSSI-CC-2018/57v2
  • description: Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile inter
  • developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2018/57v2
    • cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_57v2.pdf
    • certification_date: 2021-12-17
    • developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
    • evaluation_facility: SERMA SAFETY & SECURITY
    • level: EAL5+
    • mutual_recognition: SOG-IS CCRA
    • protection_profile: Machine Readable Travel Document with « ICAO Application », Extended Access Control with PACE, version 1.3.2 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1
    • report_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_57v2.pdf
    • sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
    • target_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_57v2en.pdf
  • level: EAL5+
  • product: eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
  • sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
  • url: https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-pace-eac-and-aa-activated-version-de
heuristics/st_references/directly_referencing ANSSI-CC-2010/02 ANSSI-CC-2017/24
heuristics/st_references/indirectly_referencing ANSSI-CC-2010/02 ANSSI-CC-2017/24
protection_profiles
pdf_data/cert_filename None certificat-2018_57v2.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/57v2: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: sharbus
  • /CreationDate: D:20211222165238+01'00'
  • /ModDate: D:20211222165238+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - certificat-2018_57v2
  • pdf_file_size_bytes: 1321443
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2015_17.pdf anssi-cc-2018_57v2.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 4 augmenté AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2015/17
    • cert_item: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
    • cert_item_version: Version 1.8.4
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: STMicroelectronics S.r.l. - Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP-0006] Protection Profile - Secure Signature Creation Device Type 3, version 1.05
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/68: 1
    • ANSSI-CC-2015/16: 1
    • ANSSI-CC-2015/17: 17
    • ANSSI-CC-PP-2010/07-M01: 1
  • FR:
    • ANSSI-CC-2017/24: 2
    • ANSSI-CC-2018/32v2: 2
    • ANSSI-CC-2018/57: 4
    • ANSSI-CC-2018/57v2: 16
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-PP-0006-: 1
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0056-V2-2012-MAO2: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 5: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 6
  • Gemalto:
    • Gemalto: 11
  • Samsung:
    • Samsung: 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
  • CESTI:
    • CESTI: 1
  • Serma:
    • SERMA: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 28
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ICAO:
    • ICAO: 2
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 1
pdf_data/report_metadata
  • /Author: Administrateur
  • /CreationDate: D:20150522134048+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.016
  • /ModDate: D:20150522134048+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
  • /Title: ANSSI-CC-2015/17
  • pdf_file_size_bytes: 637015
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: sharbus
  • /CreationDate: D:20211222164602+01'00'
  • /ModDate: D:20211222164602+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - ANSSI-CC-2018_57v2
  • pdf_file_size_bytes: 4382162
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename ANSSI-CC-2015_17_cible.pdf anssi-cible-cc-2018_57v2en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-2010/02-M01: 1
    • ANSSI-CC-2010/02: 2
  • FR:
    • ANSSI-CC-2017/24: 1
  • NL:
    • CC-1: 5
    • CC-2: 5
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0006-2002: 2
  • BSI:
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0055-2009: 1
    • BSI-PP-0056-V2-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 1
    • EAL4: 5
    • EAL4 augmented: 2
    • EAL4+: 3
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 1
  • EAL:
    • EAL 6+: 1
    • EAL5: 5
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.4: 2
    • ADV_IMP.1: 4
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 3
    • ALC_CMS.4: 2
    • ALC_DEL.1: 3
    • ALC_DVS.1: 3
    • ALC_DVS.2: 2
    • ALC_LCD.1: 4
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 2
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 3
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.3: 1
    • AVA_SOF: 1
    • AVA_SOF.1: 1
    • AVA_VAN.3: 1
    • AVA_VAN.5: 15
    • AVA_VLA.4: 2
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 4
  • ASE:
    • ASE_ECD: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 4
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 7
    • FCS_CKM.2: 3
    • FCS_CKM.3: 3
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 4
    • FCS_COP: 10
    • FCS_COP.1: 21
  • FDP:
    • FDP_ACC: 29
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 16
    • FDP_ACF: 22
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 16
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 10
    • FDP_ETC: 4
    • FDP_ETC.1: 3
    • FDP_ETC.1.1: 2
    • FDP_ETC.1.2: 2
    • FDP_ITC: 6
    • FDP_ITC.1: 4
    • FDP_ITC.1.1: 2
    • FDP_ITC.1.2: 2
    • FDP_ITC.1.3: 2
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 11
    • FDP_SDI: 7
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 9
    • FDP_SDI.2.2: 7
    • FDP_UIT: 10
    • FDP_UIT.1: 11
    • FDP_UIT.1.1: 7
    • FDP_UIT.1.2: 7
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 22
    • FIA_AFL.1.2: 4
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 6
    • FIA_UAU.1.2: 2
    • FIA_UID.1: 8
    • FIA_UID.1.1: 5
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 2
    • FMT_MSA: 10
    • FMT_MSA.1: 2
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 8
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 5
    • FMT_SMF: 4
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 4
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_AMT.1: 6
    • FPT_AMT.1.1: 4
    • FPT_FLS: 1
    • FPT_FLS.1: 3
    • FPT_FLS.1.1: 8
    • FPT_PHP.1: 4
    • FPT_PHP.1.1: 7
    • FPT_PHP.1.2: 7
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 7
    • FPT_TRP: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 4
    • FPT_TST.1.2: 4
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 11
    • FTP_ITC.1.2: 8
    • FTP_ITC.1.3: 8
    • FTP_TRP: 8
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 7
    • FTP_TRP.1.2: 4
    • FTP_TRP.1.3: 4
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 13
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 55
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 8
    • FCS_CKM.4: 57
    • FCS_CKM.4.1: 1
    • FCS_COP: 90
    • FCS_COP.1: 9
    • FCS_COP.1.1: 8
    • FCS_RND: 7
    • FCS_RND.1: 15
    • FCS_RND.1.1: 2
    • FCS_RNG: 1
  • FDP:
    • FDP_ACC: 15
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF: 12
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
    • FDP_ITC.1: 16
    • FDP_ITC.2: 16
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_UCT: 6
    • FDP_UCT.1: 3
    • FDP_UCT.1.1: 1
    • FDP_UIT: 6
    • FDP_UIT.1: 3
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 22
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 17
    • FIA_API.1: 6
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 75
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 2
    • FIA_UID: 26
    • FIA_UID.1: 6
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 21
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 3
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_MTD: 66
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 7
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 49
    • FMT_SMF.1.1: 1
    • FMT_SMR: 32
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 13
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 13
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 5
    • A.NO-DELETION: 2
    • A.NO-INSTALL: 3
    • A.SCA: 3
    • A.SGA: 1
    • A.VERIFICATION: 3
  • O:
    • O.ALARM: 5
    • O.CIPHER: 4
    • O.CSP: 1
    • O.FIREWALL: 2
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.KEY-MNGT: 4
    • O.NATIVE: 2
    • O.OBJ-DEL: 2
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 4
    • O.ROLES: 1
    • O.SCP: 6
    • O.SID: 1
    • O.SIDE_CHANNEL: 4
    • O.TRANSACTION: 1
  • OE:
    • OE.CARD_MANAGEMENT: 5
    • OE.HI_VAD: 8
    • OE.MANAGEMENT_OF_SECRETS: 5
    • OE.NO-DELETION: 2
    • OE.NO-INSTALL: 1
    • OE.VERIFICATION: 7
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 2
    • OSP.MANAGEMENT_OF_SECRETS: 3
    • OSP.ROLES: 2
    • OSP.VERIFICATION: 1
  • OT:
    • OT.TYPE: 1
  • T:
    • T.EXE-CODE: 6
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 5
    • T.NATIVE: 3
    • T.PHYSICAL: 3
    • T.TYPE: 1
  • O:
    • O.RND: 4
  • OE:
    • OE.BAC-PP: 1
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STM: 1
    • STMicroelectronics: 19
  • Gemalto:
    • Gemalto: 359
  • Samsung:
    • Samsung: 12
  • Thales:
    • Thales: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
    • HPC:
      • HPC: 2
  • DES:
    • 3DES:
      • 3-DES: 1
      • TripleDES: 16
    • DES:
      • DES: 11
  • AES_competition:
    • AES:
      • AES: 10
  • DES:
    • 3DES:
      • 3DES: 2
      • TDES: 7
      • Triple-DES: 5
  • constructions:
    • MAC:
      • CMAC: 3
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 12
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 10
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-224: 1
      • SHA-256: 6
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 8
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 112
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 3
  • RNG:
    • RND: 4
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 4
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v2.0: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Physical tampering: 2
    • physical tampering: 6
  • SCA:
    • DPA: 2
    • SPA: 2
    • timing attacks: 2
  • FI:
    • Malfunction: 6
    • Physical Tampering: 3
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 6
  • SCA:
    • DPA: 2
    • Leak-Inherent: 1
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 3
    • EF.DG1: 11
    • EF.DG14: 5
    • EF.DG15: 2
    • EF.DG16: 9
    • EF.DG2: 5
    • EF.DG3: 10
    • EF.DG4: 10
    • EF.DG5: 3
    • EF.SOD: 4
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS PUB 113: 1
    • FIPS PUB 180-1: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 14443-3: 1
    • ISO/IEC 14443-4: 1
    • ISO/IEC 14888-3: 1
    • ISO/IEC 7816: 12
    • ISO/IEC 7816-: 1
    • ISO/IEC 9797-1: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • RFC:
    • RFC3447: 5
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 186-3: 1
    • FIPS 197: 1
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • NIST:
    • SP 800-67: 1
    • SP 800-90: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 5
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 2
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
  • JavaCard:
    • Java Card 3.0.4: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation: 1
    • This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation) o GP API (This interface is permanently disabled before TOE delivery and it: 1
    • This interface is permanently disabled before TOE delivery and it is out of scope of current evaluation: 1
    • out of scope: 2
    • out of scope of current evaluation) o Javacard 3.0.4 API o Proprietary API o Operating System o The Secured: 1
pdf_data/st_metadata
  • /Author: saverio donatiello
  • /CreationDate: D:20150429154456+02'00'
  • /Creator: PDFCreator Version 1.7.3
  • /Keywords:
  • /ModDate: D:20150429154456+02'00'
  • /Producer: GPL Ghostscript 9.10
  • /Subject:
  • /Title: J-SIGN_SecurtyTarget_Lite
  • pdf_file_size_bytes: 1850122
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 95
  • /Author: D1417547
  • /CreationDate: D:20210921162304+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: 05-07-2018
  • /ModDate: D:20210921162304+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 1.5
  • /Title: MultiApp V4.1: eTravel 2.3 EAC on SAC Security Target
  • pdf_file_size_bytes: 2147397
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
state/cert/convert_garbage False True
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/convert_garbage False True
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different