Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
ANSSI-CC-2015/17
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
ANSSI-CC-2018/58v2
name Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0 eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
not_valid_before 2015-05-21 2021-12-17
not_valid_after 2020-05-21 2023-12-12
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17_cible.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_58v2en.pdf
manufacturer Incard Division / ST Microelectronics THALES DIS FRANCE SA
manufacturer_web None https://www.thalesgroup.com/en/europe/france
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_17.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_58v2.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_58v2.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile - Secure Signature-Creation Device Type 3, Version 1.05', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0006b.pdf', 'pp_ids': frozenset({'SSCD_TYPE3_V1.05'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Machine Readable Travel Document with 'ICAO Application', Extended Access Control, Version ...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026b.pdf', 'pp_ids': None})
state/cert/convert_garbage False True
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None c489b5992a6700b054536e9bab5a5d1a41e6bd400236c65d2d272bdf5e9cb688
state/cert/txt_hash None 040af36297d294dabe1dc3a8a4a50a6812450a2ae3cd182b0fc7c0697e90f01d
state/report/convert_garbage False True
state/report/pdf_hash f59fdca14ff92f6d44757c578366db02afe0c33e4f269225b76886a99a3fa2e3 530b0932054545fb91a9f6ea3ff0ceb1c8de95851cb21f05be1a2014ed9fb973
state/report/txt_hash 90662b988c68fed21df7d4378ce9b46724d1ec9a73b26e16a9ce343397af4b76 c354a7c37efb5a123cdff721b11ea6c618e0d57fd6cd6ea018eb2ef2e36bafab
state/st/pdf_hash 5ed9d7d7c45ce54ba0eb3e2cf7982f93b05ba884ad9817515a4f156eb0036d1d 6f309c5fba1359c5d44106a7b8059fd312ab220abc2177661b4714b77298e6cd
state/st/txt_hash 64b31389ed4827da4d7b779693cce5ab29f2adb8d3abfa2d0c21135cc7d05b6b 39ac5bf065d661bf8b9fb9c172732ec902c904f497902290fe90f7bd6ac61dc6
heuristics/cert_id ANSSI-CC-2015/17 ANSSI-CC-2018/58v2
heuristics/cert_lab SERMA None
heuristics/extracted_versions 1.8.4, 2.11.0 4.1, 2.3
heuristics/report_references/directly_referencing ANSSI-CC-2015/16, ANSSI-CC-2012/68 ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, ANSSI-CC-2018/58
heuristics/report_references/indirectly_referencing ANSSI-CC-2010/01, ANSSI-CC-2009/50, ANSSI-CC-2015/16, ANSSI-CC-2009/62, ANSSI-CC-2009/26, ANSSI-CC-2009/06, ANSSI-CC-2010/02, ANSSI-CC-2012/68, ANSSI-CC-2009/05, ANSSI-CC-2009/51, ANSSI-CC-2009/28 ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2017/07, BSI-DSZ-CC-0891-V2-2016, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2017/24, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, ANSSI-CC-2018/58
heuristics/scheme_data None
  • product: eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
  • url: https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du
  • description: Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern
  • sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
  • developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
  • cert_id: 2018/58v2
  • level: EAL5+
  • enhanced:
    • cert_id: 2018/58v2
    • certification_date: 17/12/2021
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • developer: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
    • sponsor: THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
    • evaluation_facility: SERMA SAFETY & SECURITY
    • level: EAL5+
    • protection_profile: Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
    • report_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
heuristics/st_references/directly_referencing ANSSI-CC-2010/02 ANSSI-CC-2017/24
heuristics/st_references/indirectly_referencing ANSSI-CC-2010/02 ANSSI-CC-2017/24
pdf_data/cert_filename None certificat-2018_58v2.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2018/58v2: 2
  • cc_protection_profile_id:
    • BSI:
      • BSI-PP-0056-2009: 1
  • cc_security_level:
    • EAL:
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • Serma:
      • SERMA: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 1306910
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: sharbus
  • /CreationDate: D:20211222165349+01'00'
  • /ModDate: D:20211222165349+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - certificat-2018_58v2
  • pdf_hyperlinks:
pdf_data/report_filename ANSSI-CC-2015_17.pdf anssi-cc-2018_58v2.pdf
pdf_data/report_frontpage/FR
  • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
  • cert_id: ANSSI-CC-2015/17
  • cert_item: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
  • cert_item_version: Version 1.8.4
  • ref_protection_profiles: PP-0006] Protection Profile - Secure Signature Creation Device Type 3, version 1.05
  • cc_version: Critères Communs version 3.1 révision 3
  • cc_security_level: EAL 4 augmenté AVA_VAN.5
  • developer: STMicroelectronics S.r.l. - Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie STMicroelectronics 29 Boulevard Romain Rolland, 75669 Paris Cedex 14, France Commanditaire STMicroelectronics S.r.l. – Incard Division Z.I Marcianise Sud, 81025 Marcianise, Italie
  • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2015/17: 17
  • ANSSI-CC-2012/68: 1
  • ANSSI-CC-2015/16: 1
  • ANSSI-CC-2018/58v2: 17
  • ANSSI-CC-2018/58: 4
  • ANSSI-CC-2017/24: 2
  • ANSSI-CC-2018/32v2: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0006-: 1
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2010/07-M01: 1
  • BSI:
    • BSI-PP-0056-2009: 1
    • BSI-PP-0084-2014: 1
    • BSI-CC-PP-0056-2009: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0006-: 1
  • BSI-PP-0056-2009: 1
  • BSI-PP-0084-2014: 1
  • BSI-CC-PP-0056-2009: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 2
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 5
    • AVA_VAN: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • AGD:
    • AGD_PRE: 1
    • AGD_OPE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 3
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 1
  • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 2 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.5: 5
  • AVA_VAN: 2
  • AVA_VAN: 3
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 2 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 4: 2
  • EAL4: 2
  • EAL5: 1
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 5: 1
  • EAL 7: 1
  • EAL 5: 1
  • EAL2: 2
  • EAL7: 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
  • Serma:
    • SERMA: 1
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/eval_facility/Serma
  • Serma Technologies: 1
  • SERMA: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 1
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 6
  • Samsung:
    • Samsung: 1
  • Gemalto:
    • Gemalto: 11
pdf_data/report_metadata
  • pdf_file_size_bytes: 637015
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Title: ANSSI-CC-2015/17
  • /Author: Administrateur
  • /Subject: Application J-Sign version 1.8.4 sur la plateforme J-Safe version 2.11.0
  • /Keywords: ANSSI-CC-CER-F-07.016
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20150522134048+02'00'
  • /ModDate: D:20150522134048+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_file_size_bytes: 4218025
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: sharbus
  • /CreationDate: D:20211222164829+01'00'
  • /ModDate: D:20211222164829+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - ANSSI-CC-2018_58v2
  • pdf_hyperlinks:
pdf_data/report_metadata//Author Administrateur sharbus
pdf_data/report_metadata//CreationDate D:20150522134048+02'00' D:20211222164829+01'00'
pdf_data/report_metadata//ModDate D:20150522134048+02'00' D:20211222164829+01'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Microsoft: Print To PDF
pdf_data/report_metadata//Title ANSSI-CC-2015/17 Microsoft Word - ANSSI-CC-2018_58v2
pdf_data/report_metadata/pdf_file_size_bytes 637015 4218025
pdf_data/report_metadata/pdf_hyperlinks http://www.ssi.gouv.fr/, mailto:[email protected]
pdf_data/st_filename ANSSI-CC-2015_17_cible.pdf anssi-cible-cc-2018_58v2en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 12
  • RSA:
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 3
  • FF:
    • DH:
      • Diffie-Hellman: 9
      • DH: 5
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECC:
    • ECC: 12
  • ECDH:
    • ECDH: 5
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 3
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 12 3
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-2010/02-M01: 1
    • ANSSI-CC-2010/02: 2
  • FR:
    • ANSSI-CC-2017/24: 1
  • NL:
    • CC-1: 4
    • CC-2: 6
    • CC-3: 3
pdf_data/st_keywords/cc_cert_id/FR
  • ANSSI-2010/02-M01: 1
  • ANSSI-CC-2010/02: 2
  • ANSSI-CC-2017/24: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.SCP: 6
    • O.ALARM: 5
    • O.SIDE_CHANNEL: 4
    • O.CIPHER: 4
    • O.KEY-MNGT: 4
    • O.REALLOCATION: 4
    • O.CSP: 1
    • O.OBJ-DEL: 2
    • O.NATIVE: 2
    • O.SID: 1
    • O.FIREWALL: 2
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.PIN-MNGT: 1
    • O.TRANSACTION: 1
    • O.OPERATE: 1
    • O.ROLES: 1
  • T:
    • T.TYPE: 1
    • T.PHYSICAL: 3
    • T.INTEG-APPLI-DATA: 5
    • T.EXE-CODE: 6
    • T.NATIVE: 3
    • T.INTEG-APPLI-CODE: 2
  • A:
    • A.CGA: 5
    • A.SCA: 3
    • A.VERIFICATION: 3
    • A.NO-INSTALL: 3
    • A.NO-DELETION: 2
    • A.SGA: 1
  • OT:
    • OT.TYPE: 1
  • OE:
    • OE.HI_VAD: 8
    • OE.CARD_MANAGEMENT: 5
    • OE.VERIFICATION: 7
    • OE.MANAGEMENT_OF_SECRETS: 5
    • OE.NO-DELETION: 2
    • OE.NO-INSTALL: 1
  • OSP:
    • OSP.CARD_ADMINISTRATION_DISABLED: 2
    • OSP.ROLES: 2
    • OSP.MANAGEMENT_OF_SECRETS: 3
    • OSP.VERIFICATION: 1
  • O:
    • O.RND: 4
  • A:
    • A.MRTD_: 1
  • OE:
    • OE.MRTD_: 3
    • OE.BAC_PP: 1
    • OE.BAC-PP: 3
pdf_data/st_keywords/cc_claims/A
  • A.CGA: 5
  • A.SCA: 3
  • A.VERIFICATION: 3
  • A.NO-INSTALL: 3
  • A.NO-DELETION: 2
  • A.SGA: 1
  • A.MRTD_: 1
pdf_data/st_keywords/cc_claims/O
  • O.SCP: 6
  • O.ALARM: 5
  • O.SIDE_CHANNEL: 4
  • O.CIPHER: 4
  • O.KEY-MNGT: 4
  • O.REALLOCATION: 4
  • O.CSP: 1
  • O.OBJ-DEL: 2
  • O.NATIVE: 2
  • O.SID: 1
  • O.FIREWALL: 2
  • O.GLOBAL_ARRAYS_INTEG: 1
  • O.PIN-MNGT: 1
  • O.TRANSACTION: 1
  • O.OPERATE: 1
  • O.ROLES: 1
  • O.RND: 4
pdf_data/st_keywords/cc_claims/OE
  • OE.HI_VAD: 8
  • OE.CARD_MANAGEMENT: 5
  • OE.VERIFICATION: 7
  • OE.MANAGEMENT_OF_SECRETS: 5
  • OE.NO-DELETION: 2
  • OE.NO-INSTALL: 1
  • OE.MRTD_: 3
  • OE.BAC_PP: 1
  • OE.BAC-PP: 3
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0006-2002: 2
  • BSI-CC-PP-0084-2014: 1
  • BSI-PP-0056-2009: 1
  • BSI-CC-PP-0068-V2-2011-MA-01: 1
  • BSI-PP-0055-2009: 1
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.4: 2
    • ADV_IMP.1: 4
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_DVS.2: 2
    • ALC_CMC.4: 3
    • ALC_CMS.4: 2
    • ALC_DEL.1: 3
    • ALC_DVS.1: 3
    • ALC_LCD.1: 4
    • ALC_TAT.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 15
    • AVA_VAN.3: 1
    • AVA_SOF: 1
    • AVA_VLA.4: 2
    • AVA_MSU.3: 1
    • AVA_SOF.1: 1
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 2
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 3
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_TDS.3: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 4
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 2
    • AVA_VAN.5: 4
  • ASE:
    • ASE_ECD: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 3 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 4 1
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 3 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_CMC.4: 3
  • ALC_CMS.4: 2
  • ALC_DEL.1: 3
  • ALC_DVS.1: 3
  • ALC_LCD.1: 4
  • ALC_TAT.1: 3
  • ALC_DVS.2: 4
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 2 4
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL.1: 3
  • ASE_ECD.1: 2
  • ASE_INT.1: 3
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 3
  • ASE_SPD.1: 2
  • ASE_TSS.1: 3
  • ASE_ECD: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 3
  • ATE_DPT.1: 2
  • ATE_FUN.1: 3
  • ATE_IND.2: 2
  • ATE_DPT.1: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.1 2 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 15
  • AVA_VAN.3: 1
  • AVA_SOF: 1
  • AVA_VLA.4: 2
  • AVA_MSU.3: 1
  • AVA_SOF.1: 1
  • AVA_VAN.3: 2
  • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.3 1 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 15 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 4: 4
  • EAL4+: 3
  • EAL 4+: 1
  • EAL4: 5
  • EAL5+: 1
  • EAL5: 1
  • EAL 4 augmented: 2
  • EAL4 augmented: 2
  • EAL5 augmented: 1
  • EAL5: 5
  • EAL 6+: 1
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 1 5
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN: 1
  • FAU_SAS: 6
  • FAU_GEN: 1
  • FAU_SAS.1: 12
  • FAU_SAS.1.1: 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_CKM.1.1: 7
  • FCS_CKM.4.1: 4
  • FCS_COP.1: 21
  • FCS_CKM.1: 7
  • FCS_CKM.4: 9
  • FCS_CKM.2: 3
  • FCS_CKM.3: 3
  • FCS_COP: 10
  • FCS_CKM: 4
  • FCS_RND: 7
  • FCS_CKM: 31
  • FCS_COP: 65
  • FCS_CKM.1: 21
  • FCS_RND.1: 12
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 6
  • FCS_COP.1: 8
  • FCS_CKM.4: 42
  • FCS_CKM.1.1: 2
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 5
  • FCS_RNG: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 4 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 7 21
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 7 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 3 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 9 42
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 4 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 10 65
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 21 8
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 9
  • FDP_ACF.1: 23
  • FDP_ETC.1: 3
  • FDP_ITC.1: 4
  • FDP_RIP.1: 5
  • FDP_RIP.1.1: 11
  • FDP_SDI.2: 6
  • FDP_UIT.1: 11
  • FDP_UIT.1.1: 7
  • FDP_UIT.1.2: 7
  • FDP_SDI.2.1: 9
  • FDP_ACC: 29
  • FDP_ACF: 22
  • FDP_ETC: 4
  • FDP_ITC: 6
  • FDP_SDI: 7
  • FDP_UIT: 10
  • FDP_ACC.1.1: 16
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 16
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 10
  • FDP_ETC.1.1: 2
  • FDP_ETC.1.2: 2
  • FDP_ITC.1.1: 2
  • FDP_ITC.1.2: 2
  • FDP_ITC.1.3: 2
  • FDP_SDI.2.2: 7
  • FDP_ACF: 1
  • FDP_ITC.1: 14
  • FDP_ITC.2: 14
  • FDP_ACC.1: 19
  • FDP_ACF.1: 13
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 2
  • FDP_UCT.1: 9
  • FDP_IFC.1: 4
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 9
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ITC: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 9 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 22 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 23 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 16 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 10 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 4 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 11 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.1 7 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1.2 7 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1.1: 22
  • FIA_AFL.1: 6
  • FIA_AFL.1.2: 4
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_UAU.1: 7
  • FIA_UAU.1.1: 6
  • FIA_UID.1: 8
  • FIA_UAU.1.2: 2
  • FIA_UID.1.1: 5
  • FIA_UID.1.2: 2
  • FIA_API: 16
  • FIA_AFL: 11
  • FIA_SOS.2: 1
  • FIA_API.1: 7
  • FIA_API.1.1: 1
  • FIA_UAU.4: 12
  • FIA_UAU: 17
  • FIA_UAU.5: 13
  • FIA_UID: 20
  • FIA_UAU.1: 5
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UID.1: 8
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 9
  • FIA_UAU.6.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 22 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 4 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 7 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 6 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 5 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 2 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF: 4
  • FMT_SMF.1: 23
  • FMT_SMF.1.1: 4
  • FMT_MOF.1: 7
  • FMT_MOF.1.1: 2
  • FMT_MSA.1: 2
  • FMT_MSA.1.1: 4
  • FMT_MSA.2: 8
  • FMT_MSA.2.1: 2
  • FMT_MSA.3: 11
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 5
  • FMT_MTD.1.1: 5
  • FMT_SMR.1: 9
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_MSA: 10
  • FMT_MOF: 1
  • FMT_MTD: 1
  • FMT_LIM: 7
  • FMT_LIM.1: 22
  • FMT_LIM.2: 20
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 53
  • FMT_MSA.3: 3
  • FMT_SMF.1: 44
  • FMT_SMR.1: 31
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 7
  • FMT_MTD.3: 6
  • FMT_MTD.3.1: 1
  • FMT_MSA.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 1 53
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 23 44
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 9 31
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 2 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_AMT.1.1: 4
  • FPT_FLS.1.1: 8
  • FPT_PHP.3.1: 7
  • FPT_TST.1.1: 4
  • FPT_AMT.1: 6
  • FPT_FLS.1: 3
  • FPT_PHP.1: 4
  • FPT_PHP.1.1: 7
  • FPT_PHP.1.2: 7
  • FPT_PHP.3: 4
  • FPT_TST.1: 5
  • FPT_TST.1.2: 4
  • FPT_TST.1.3: 2
  • FPT_FLS: 1
  • FPT_TRP: 1
  • FPT_EMS: 4
  • FPT_EMS.1: 13
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 10
  • FPT_TST.1: 10
  • FPT_PHP.3: 11
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 3 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 8 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 4 11
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3.1 7 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 5 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.1 4 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.2 4 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1.3 2 1
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 17
  • FTP_TRP.1: 12
  • FTP_TRP: 8
  • FTP_ITC: 14
  • FTP_ITC.1.1: 11
  • FTP_TRP.1.1: 7
  • FTP_ITC.1.2: 8
  • FTP_ITC.1.3: 8
  • FTP_TRP.1.2: 4
  • FTP_TRP.1.3: 4
  • FTP_ITC.1: 5
  • FTP_TRP.1: 5
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 17 5
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 12 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation: 1
    • This interface is permanently disabled before TOE delivery and it is out of scope of current evaluation: 1
    • This component and its interface is permanently disabled before TOE delivery. The Card Manager is out of scope of current evaluation) o GP API (This interface is permanently disabled before TOE delivery and it: 1
    • out of scope of current evaluation) o Javacard 3.0.4 API o Proprietary API o Operating System o The Secured: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 3
  • CBC:
    • CBC: 2
pdf_data/st_keywords/cipher_mode/CBC/CBC 3 2
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib v2.0: 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 15
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • MAC:
    • MAC: 4
  • KA:
    • Key Agreement: 5
pdf_data/st_keywords/crypto_scheme/MAC/MAC 3 4
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 6 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 1
  • SHA-256: 6
  • SHA-512: 1
  • SHA-224: 1
  • SHA-256: 1
  • SHA-384: 1
  • SHA-512: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 6 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 17
    • EF.DG2: 8
    • EF.DG3: 19
    • EF.DG4: 18
    • EF.DG5: 6
    • EF.DG16: 16
    • EF.DG14: 7
    • EF.DG15: 3
    • EF.COM: 7
    • EF.SOD: 8
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 2
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 3
  • RNG:
    • RNG: 1
  • RNG:
    • RND: 4
    • RNG: 2
pdf_data/st_keywords/randomness/RNG
  • RNG: 1
  • RND: 4
  • RNG: 2
pdf_data/st_keywords/randomness/RNG/RNG 1 2
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • SPA: 2
    • DPA: 2
    • timing attacks: 2
  • FI:
    • physical tampering: 6
    • Physical tampering: 2
    • DFA: 1
  • SCA:
    • Leak-Inherent: 1
    • physical probing: 4
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Physical Tampering: 5
    • physical tampering: 1
    • Physical tampering: 1
    • Malfunction: 6
    • malfunction: 6
    • fault injection: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 6
  • Physical tampering: 2
  • DFA: 1
  • Physical Tampering: 5
  • physical tampering: 1
  • Physical tampering: 1
  • Malfunction: 6
  • malfunction: 6
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/Physical tampering 2 1
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 6 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • SPA: 2
  • DPA: 2
  • timing attacks: 2
  • Leak-Inherent: 1
  • physical probing: 4
  • DPA: 2
  • SPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 2 1
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks 2 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 113: 1
    • FIPS PUB 180-1: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • RFC:
    • RFC3447: 5
  • ISO:
    • ISO/IEC 7816: 12
    • ISO/IEC 14443-3: 1
    • ISO/IEC 14443-4: 1
    • ISO/IEC 14888-3: 1
    • ISO/IEC 9797-1: 1
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-: 1
  • CC:
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS 186-3: 1
    • FIPS 180-2: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-90: 2
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 5
    • PKCS#1: 2
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 11
  • SCP:
    • SCP03: 2
    • SCP01: 1
    • SCP02: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-002: 1
  • CCMB-2009-07-003: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 113: 1
  • FIPS PUB 180-1: 1
  • FIPS 186-3: 1
  • FIPS 180-2: 1
  • FIPS 197: 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816: 12
  • ISO/IEC 14443-3: 1
  • ISO/IEC 14443-4: 1
  • ISO/IEC 14888-3: 1
  • ISO/IEC 9797-1: 1
  • ISO/IEC 14443: 2
  • ISO/IEC 7816-: 1
  • ISO/IEC 14443: 2
  • ISO/IEC 7816-4: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS #1: 2
  • PKCS#1: 1
  • PKCS#3: 5
  • PKCS#1: 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 1 2
pdf_data/st_keywords/standard_id/RFC
  • RFC3447: 5
  • RFC 2631: 1
  • RFC 3369: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
    • HPC:
      • HPC: 2
  • DES:
    • DES:
      • DES: 11
    • 3DES:
      • 3-DES: 1
      • TripleDES: 16
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • Triple-DES: 5
      • TDES: 5
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition
  • AES:
    • AES: 5
  • HPC:
    • HPC: 2
  • AES:
    • AES: 6
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 5 6
pdf_data/st_keywords/symmetric_crypto/DES
  • DES:
    • DES: 11
  • 3DES:
    • 3-DES: 1
    • TripleDES: 16
  • 3DES:
    • Triple-DES: 5
    • TDES: 5
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3-DES: 1
  • TripleDES: 16
  • Triple-DES: 5
  • TDES: 5
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 19
    • STM: 1
  • Samsung:
    • Samsung: 12
  • Gemalto:
    • Gemalto: 307
  • Thales:
    • Thales: 1
pdf_data/st_metadata//Author saverio donatiello D1417546
pdf_data/st_metadata//CreationDate D:20150429154456+02'00' D:20210921161242+02'00'
pdf_data/st_metadata//Creator PDFCreator Version 1.7.3 Microsoft® Word 2016
pdf_data/st_metadata//Keywords 05-07-2018
pdf_data/st_metadata//ModDate D:20150429154456+02'00' D:20210921161242+02'00'
pdf_data/st_metadata//Producer GPL Ghostscript 9.10 Microsoft® Word 2016
pdf_data/st_metadata//Subject 1.5
pdf_data/st_metadata//Title J-SIGN_SecurtyTarget_Lite MultiApp V4.1: eTravel 2.3 EAC on BAC Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1850122 1888188
pdf_data/st_metadata/pdf_number_of_pages 95 73
dgst ce97d64b517bf270 d3410ad9c75334cf