Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03)
ANSSI-CC-2024/03
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 )
ANSSI-CC-2023/35
name MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03) eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 )
not_valid_after 15.04.2029 22.09.2028
not_valid_before 15.04.2024 22.09.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_03fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_35fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_03fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_35fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_03en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_35en.pdf
manufacturer STMicroelectronics THALES DIS FRANCE SA
manufacturer_web https://www.st.com/ https://www.thalesgroup.com/en/europe/france
security_level AVA_VAN.5, ALC_DVS.2, EAL5+, ALC_FLR.1 AVA_VAN.5, ALC_DVS.2, EAL5+
dgst d2f309e22cf72396 57f8d990050b2ead
heuristics/cert_id ANSSI-CC-2024/03 ANSSI-CC-2023/35
heuristics/extracted_sars ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ALC_FLR.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 AGD_PRE.1, ADV_ARC.1, ADV_FSP.4, ALC_DVS.2, ADV_IMP.1, ADV_TDS.3, ASE_TSS.2, AGD_OPE.1, ALC_FLR.2, ATE_DPT.1, AVA_VAN.5
heuristics/extracted_versions 1.0.2 5.1, 3.1, 3.1.0.0
heuristics/report_references/directly_referencing ANSSI-CC-2022/21 ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/report_references/indirectly_referencing ANSSI-CC-2022/21 ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/scheme_data
  • cert_id: ANSSI-CC-2024/03
  • description: Le produit évalué est « MIFARE Plus EV2 on ST31N600 A01, Version 1.0.2 » développé par STMICROELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés
  • developer: STMICROELECTRONICS
  • enhanced:
    • augmented: ALC_DVS.2, ALC_FLR.1, AVA_VAN.
    • category: Micro-circuits
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2024/03
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_03fr.pdf
    • certification_date: 15.04.2024
    • developer: STMICROELECTRONICS
    • evaluation_facility: THALES / CNES
    • expiration_date: 15.04.2029
    • level: EAL5+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only”
    • sponsor: STMICROELECTRONICS
  • expiration_date: 15.04.2029
  • level: EAL5+
  • product: MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2)
  • sponsor: STMICROELECTRONICS
  • url: https://cyber.gouv.fr/produits-certifies/mifare-plus-ev2-st31n600-a01-version-102
  • cert_id: ANSSI-CC-2023/35
  • description: Le produit évalué est « eTravel 3.1 EAC on BAC on MultiApp V5.1, Version 3.1.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur notam
  • developer: THALES DIS FRANCE SAS
  • enhanced:
  • expiration_date: 22.09.2028
  • level: EAL5+
  • product: eTravel 3.1 EAC on BAC on MultiApp V5.1 (Version 3.1.0.0)
  • sponsor: THALES DIS FRANCE SAS
  • url: https://cyber.gouv.fr/produits-certifies/etravel-31-eac-bac-multiapp-v51-version-3100
heuristics/st_references/directly_referencing {} ANSSI-CC-2023/01
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2023/01
maintenance_updates
protection_profiles
pdf_data/cert_filename Certificat-CC-2024_03fr.pdf Certificat-CC-2023_35fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2024/03: 2
  • FR:
    • ANSSI-CC-2023/35: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • BSI:
    • BSI-PP-0056: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.1: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20240419102056+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240419102224+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 149588
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20230929174932+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20230929175423+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 157976
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2024_03fr.pdf ANSSI-CC-2023_35fr.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2022/21: 1
    • ANSSI-CC-2024/03: 2
  • FR:
    • ANSSI-CC-2023/01: 1
    • ANSSI-CC-2023/31: 1
    • ANSSI-CC-2023/35: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
  • BSI:
    • BSI-CC-PP-0056-2009: 1
    • BSI-PP-0056: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO: 1
pdf_data/report_metadata
pdf_data/st_filename ANSSI-Cible-CC-2024_03en.pdf ANSSI-cible-2023_35en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/01: 1
  • NL:
    • CC-1: 4
    • CC-2: 6
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 11
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 64
  • BSI:
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-2014: 2
    • BSI-PP-0055-2009: 1
    • BSI-PP-0056-2009: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 19
    • EAL5 augmented: 3
    • EAL6: 2
    • EAL6 augmented: 2
  • EAL:
    • EAL 6+: 1
    • EAL5: 5
    • EAL5 augmented: 1
    • EAL5+: 1
    • EAL6: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.5: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 6
    • ALC_FLR.1: 9
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 4
    • ASE_CCL.1: 1
    • ASE_ECD: 3
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 12
    • ASE_OBJ.2: 1
    • ASE_REQ: 15
    • ASE_REQ.2: 1
    • ASE_SPD: 5
    • ASE_SPD.1: 1
    • ASE_TSS: 6
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 6
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 4
    • ALC_FLR.2: 1
  • ASE:
    • ASE_ECD: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 2
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 2
    • FAU_SAR.1: 11
    • FAU_SAS: 1
    • FAU_SAS.1: 13
  • FCS:
    • FCS_CKM.1: 22
    • FCS_CKM.2: 1
    • FCS_CKM.4: 15
    • FCS_COP.1: 25
    • FCS_RNG: 1
    • FCS_RNG.1: 6
  • FDP:
    • FDP_ACC.1: 36
    • FDP_ACC.2: 2
    • FDP_ACF.1: 26
    • FDP_CKM.2: 1
    • FDP_COP.1: 1
    • FDP_IFC.1: 18
    • FDP_ITC.1: 3
    • FDP_ITC.2: 13
    • FDP_ITT.1: 9
    • FDP_SDC: 1
    • FDP_SDC.1: 7
    • FDP_SDI.2: 10
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
    • FDP_UCT.1: 8
    • FDP_UIT.1: 8
  • FIA:
    • FIA_API: 1
    • FIA_API.1: 4
    • FIA_UAU.1: 8
    • FIA_UAU.2: 9
    • FIA_UAU.3: 11
    • FIA_UAU.5: 8
    • FIA_UID.1: 12
    • FIA_UID.2: 11
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 20
    • FMT_LIM.2: 20
    • FMT_MSA.1: 25
    • FMT_MSA.3: 25
    • FMT_MTD.1: 9
    • FMT_SMF.1: 26
    • FMT_SMR.1: 23
  • FPR:
    • FPR_UNL.1: 9
  • FPT:
    • FPT_FLS.1: 15
    • FPT_ITT.1: 9
    • FPT_PHP.3: 9
    • FPT_RPL.1: 11
    • FPT_TDC.1: 10
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC.1: 18
    • FTP_TRP.1: 17
    • FTP_TRP.1.3: 3
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 32
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 6
    • FCS_CKM.4: 45
    • FCS_CKM.4.1: 1
    • FCS_COP: 63
    • FCS_COP.1: 10
    • FCS_COP.1.1: 4
    • FCS_RND: 7
    • FCS_RND.1: 10
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 8
    • FDP_ACC.1: 18
    • FDP_ACF: 9
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 5
    • FDP_ITC: 1
    • FDP_ITC.1: 17
    • FDP_ITC.2: 17
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 13
    • FIA_API.1: 6
    • FIA_API.1.1: 1
    • FIA_ATD: 4
    • FIA_ATD.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 13
    • FIA_UAU.1: 5
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 10
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UID: 17
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 20
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 3
    • FMT_MSA: 9
    • FMT_MSA.1: 3
    • FMT_MSA.3: 6
    • FMT_MTD: 39
    • FMT_MTD.1: 4
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
    • FMT_SMF: 7
    • FMT_SMF.1: 43
    • FMT_SMF.1.1: 1
    • FMT_SMR: 8
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 6
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 8
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_TRP: 4
    • FTP_TRP.1: 10
pdf_data/st_keywords/cc_claims
  • O:
    • O.ABUSE-FUNC: 3
    • O.ADD-FUNCTIONS: 3
    • O.IDENTIFICATION: 3
    • O.LEAK-: 2
    • O.LEAK-FORCED: 3
    • O.LEAK-INHERENT: 6
    • O.MAC: 13
    • O.MALFUNCTION: 6
    • O.MEM-ACCESS: 3
    • O.PHYS-: 1
    • O.PHYS-MANIPULATION: 5
    • O.PHYS-PROBING: 5
    • O.RND: 6
  • OE:
    • OE.LIM-BLOCK-LOADER: 3
    • OE.LOADER-USAGE: 3
    • OE.PROCESS-SEC-IC: 3
    • OE.RESP-APPL: 3
  • T:
    • T.RND: 3
  • A:
    • A.MRTD_: 1
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
  • D:
    • D.ACODE_: 1
    • D.APP_KEYS: 2
    • D.JCS_CODE: 5
    • D.JCS_DATA: 5
    • D.OS-: 1
    • D.OS-UPDATE-CODE-: 1
    • D.OS-UPDATE-CODE-ID: 2
    • D.OS-UPDATE_ADDITIONALCODE: 6
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
  • O:
    • O.CONFID-: 1
    • O.CONFID-OS-: 1
    • O.CONFID-OS-UPDATE: 4
    • O.RND: 1
    • O.SECURE_AC_ACTIVATION: 5
    • O.SECURE_LOAD_ACODE: 9
    • O.TOE_IDENTIFICATION: 7
  • OE:
    • OE.BAC-PP: 3
    • OE.BAC_PP: 2
    • OE.MRTD_: 2
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 4
    • OE.SECURE_ACODE_MANAG: 1
    • OE.SECURE_ACODE_MANAGEMENT: 3
  • OSP:
    • OSP: 2
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.TOE_IDENTIFICATION: 3
  • T:
    • T.CONFID-OS-UPDATE_LOAD: 4
    • T.FAKE-SGNVER-KEY: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.UNAUTHORISED-TOE-CODE-UPDATE: 3
    • T.WRONG-UPDATE-STATE: 3
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 1
  • STMicroelectronics:
    • STMicroelectronics: 11
  • Thales:
    • Thales: 36
pdf_data/st_keywords/eval_facility
  • CESTI:
    • CESTI: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 7
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 5
  • AES_competition:
    • AES:
      • AES: 6
      • AES-256: 2
  • DES:
    • 3DES:
      • TDES: 5
      • Triple-DES: 5
  • constructions:
    • MAC:
      • CMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 9
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 32
  • KA:
    • Key Agreement: 5
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 15
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 9
  • TRNG:
    • TRNG: 1
  • RNG:
    • RND: 1
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
  • SCA:
    • Leak-Inherent: 7
    • Physical Probing: 4
    • side-channel: 1
  • other:
    • JIL: 28
  • FI:
    • Malfunction: 5
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 1
    • Physical Probing: 1
    • SPA: 1
    • physical probing: 5
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 7
    • EF.DG1: 17
    • EF.DG14: 7
    • EF.DG15: 2
    • EF.DG16: 16
    • EF.DG2: 8
    • EF.DG3: 19
    • EF.DG4: 18
    • EF.DG5: 6
    • EF.SOD: 8
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 30
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 197: 3
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38B: 4
    • NIST SP 800-67: 1
    • SP 800-67: 1
  • BSI:
    • BSI-AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 186-3: 1
    • FIPS 197: 1
  • ICAO:
    • ICAO: 11
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-4: 1
  • NIST:
    • SP 800-67: 1
    • SP 800-90: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 5
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Level. Proximity Check, Virtual Card Architecture, data access of sectors in SL3 or SL1SL3Mix, are out of scope. • Security level 3 (SL3): The card user can access the data and value blocks in the TOE after an: 1
    • Target for composition 12/74 SMD_MFPEV2_ST31N600_ST_22_002 Virtual Card Architecture are also out of scope. Personalization and Originality Check are in scope. • Security level 1 (SL1): Different: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: feixbeno
  • /CreationDate: D:20240305180700Z
  • /Creator: FrameMaker 17.0.1
  • /CreatorTool: FrameMaker 17.0.1
  • /ModDate: D:20240305182758+01'00'
  • /Producer: Adobe PDF Library 17.0
  • /Title: SMD_MFP_ST31N600_V01_1P.pdf
  • /Trapped: /False
  • pdf_file_size_bytes: 1996053
  • pdf_hyperlinks: http://www.st.com
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
  • /Author: THALES
  • /CreationDate: D:20230517105401+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: Security Target LITE
  • /ModDate: D:20230517105401+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: MultiApp V5.1: eTravel 3.1 EAC on BAC Security Target
  • pdf_file_size_bytes: 2212367
  • pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different