name |
FIN.X RTOS SE V5 |
ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
IT |
FR |
status |
active |
archived |
not_valid_after |
21.06.2027 |
23.06.2021 |
not_valid_before |
21.06.2022 |
23.06.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_finx_rtos_se_v5_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-En_2016_39en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_finx_rtos_se_v5_rev02_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_39_LITE.pdf |
manufacturer |
MBDA Italia S.p.A. |
Oberthur Technologies |
manufacturer_web |
https://www.mbda-systems.com/ |
https://www.oberthur.com/ |
security_level |
{} |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
e1338a1b4a36e01a |
00bd946e44e82bd4 |
heuristics/cert_id |
OCSI/CERT/LEO/08/2021/RC |
ANSSI-CC-2016/39 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ASE_SPD.1, ALC_TSU_EXT.1, ASE_REQ.2, ATE_IND.1, ASE_TSS.1, ALC_CMC.1, ASE_OBJ.2, AGD_OPE.1 |
ATE_DPT.3, ADV_INT.2, ADV_TDS.4, ALC_TAT.2, AVA_VAN.5, ASE_TSS.2, ADV_FSP.5, ALC_CMS.5, ALC_FLR.1, ALC_DVS.2 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
OCSI/CERT/RES/06/2014/RC |
BSI-DSZ-CC-0978-2016 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
OCSI/CERT/RES/03/2012/RC, OCSI/CERT/RES/06/2014/RC |
BSI-DSZ-CC-0978-2016 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0978-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0978-2016 |
heuristics/protection_profiles |
c40ae795865a0dba, e34797b67a3163c5 |
b380aabf93b29692, a33327d40f253f46 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
rc_finx_rtos_se_v5_v1.0.pdf |
ANSSI-CC-En_2016_39en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1 revision 4
- cert_id: ANSSI-CC-2016/39
- cert_item: ID-One ePass Full EAC v2 MRTD in EAC and PACE configuration with AA on P60x144PVA/PVE components
- cert_item_version: SAAAAR 080031 : ePass V3 Full EACv2 on NXP SAAAAR 082456 : Code r6.0 Generic SAAAAR 082844 : Optional Code r4.0 Digital Blurred Image
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France NXP Semiconductors Box 54 02 40, D-22502 Hamburg, Allemagne Sponsor Oberthur Technologies 420 rue d'Estienne d'Orves CS 40008 92705 Colombes, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: BSI-CC-PP-0056-V2, [PP EAC PACE], version 1.3.1 Machine Readable Travel Document with ICAO Application, BSI-CC-PP-0068-V2, [PP SAC], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
|
pdf_data/report_keywords/cc_cert_id |
- IT:
- OCSI/CERT/LEO/08/2021/RC: 26
- OCSI/CERT/RES/06/2014/RC: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2: 1
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0068-V2: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP- 0035-2007: 2
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 2
- EAL 5 augmented: 1
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL5 augmented: 1
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.1: 3
- ALC_CMS.1: 3
- ALC_FLR: 1
- ALC_TSU_EXT.1: 3
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 8
- NXP Semiconductors: 2
- Oberthur:
- OBERTHUR: 4
- Oberthur Technologies: 8
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: OCSI
- /CreationDate: D:20220621125759+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220621130817+02'00'
- /Producer: Microsoft® Word 2016
- /Title: Rapporto di Certificazione del prodotto "FIN.X RTOS SE V5"
- pdf_file_size_bytes: 903328
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-En_2016_39en
- pdf_file_size_bytes: 207356
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
st_finx_rtos_se_v5_rev02_lite.pdf |
anssi_cible_2016_39_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035: 1
- BSI-PP-0056: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 6: 1
- EAL4: 2
- EAL5: 8
- EAL5 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_FSP.5: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- AGD:
- ALC:
- ALC_CMS.5: 2
- ALC_DVS.2: 11
- ALC_FLR.1: 1
- ALC_TAT.2: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 4
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.1.1: 2
- FCS_CKM.2: 6
- FCS_CKM.2.1: 2
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 8
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 25
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT: 1
- FCS_SSHC_EXT.1: 3
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHS_EXT: 2
- FCS_SSHS_EXT.1: 2
- FCS_SSHS_EXT.1.1: 1
- FCS_SSH_EXT: 2
- FCS_SSH_EXT.1: 8
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_SSH_EXT.1.8: 1
- FCS_STO_EXT: 1
- FCS_STO_EXT.1: 4
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 14
- FCS_TLSC_EXT.1.1: 4
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.2: 8
- FCS_TLSC_EXT.2.1: 5
- FCS_TLSC_EXT.3: 8
- FCS_TLSC_EXT.3.1: 1
- FCS_TLSC_EXT.4: 7
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSC_EXT.5: 7
- FCS_TLSC_EXT.5.1: 1
- FCS_TLSS_EXT: 1
- FCS_TLSS_EXT.1: 8
- FCS_TLSS_EXT.1.1: 4
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.2: 7
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.3: 6
- FCS_TLSS_EXT.3.1: 1
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 3
- FDP:
- FDP_ACF_EXT: 1
- FDP_ACF_EXT.1: 4
- FDP_ACF_EXT.1.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 6
- FMT_MOF_EXT.1.1: 1
- FMT_SMF_EXT: 2
- FMT_SMF_EXT.1: 4
- FMT_SMF_EXT.1.1: 2
- FPT:
- FPT_ACF_EXT: 1
- FPT_ACF_EXT.1: 4
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT: 1
- FPT_ASLR_EXT.1: 4
- FPT_ASLR_EXT.1.1: 1
- FPT_SBOP_EXT: 1
- FPT_SBOP_EXT.1: 4
- FPT_SBOP_EXT.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 4
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 4
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 9
- FTP_ITC_EXT.1.1: 1
- FTP_TRP: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS: 4
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FAU_STG: 4
- FAU_STG.2: 3
- FCS:
- FCS_CKM: 25
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.4: 2
- FCS_COP: 59
- FCS_COP.1: 25
- FCS_RND: 4
- FCS_RND.1: 6
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 7
- FDP_ACC.1: 1
- FDP_ACC.2: 2
- FDP_ACF: 7
- FDP_ACF.1: 11
- FDP_DAU: 4
- FDP_DAU.1: 2
- FDP_ITC: 9
- FDP_ITC.1: 6
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_UCT: 7
- FDP_UCT.1: 2
- FDP_UIT: 12
- FDP_UIT.1: 6
- FIA:
- FIA_AFL: 7
- FIA_AFL.1: 4
- FIA_API: 4
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_UAU: 53
- FIA_UAU.1: 8
- FIA_UAU.4: 5
- FIA_UAU.5: 15
- FIA_UAU.6: 3
- FIA_UID: 13
- FIA_UID.1: 8
- FMT:
- FMT_LIM: 10
- FMT_LIM.1: 11
- FMT_LIM.1.1: 1
- FMT_LIM.2: 11
- FMT_LIM.2.1: 1
- FMT_MOF: 4
- FMT_MOF.1: 1
- FMT_MTD: 61
- FMT_MTD.1: 18
- FMT_MTD.3: 2
- FMT_SMF: 2
- FMT_SMF.1: 2
- FMT_SMR: 10
- FMT_SMR.1: 8
- FPT:
- FPT_EMS: 13
- FPT_EMS.1: 17
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 2
- FPT_FLS.1: 2
- FPT_PHP: 2
- FPT_PHP.3: 2
- FPT_TST: 6
- FPT_TST.1: 14
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 3
- A.PROPER_ADMIN: 3
- A.PROPER_USER: 3
- O:
- O.ACCOUNTABILITY: 6
- O.INTEGRITY: 6
- O.MANAGEMENT: 6
- O.PROTECTED_COMMS: 8
- O.PROTECTED_STORAGE: 4
- OE:
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 3
- T:
- T.LIMITED_PHYSICAL_ACCESS: 2
- T.LOCAL_ATTACK: 2
- T.NETWORK_ATTACK: 6
- T.NETWORK_EAVESDROP: 4
|
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 117
- NXP Semiconductors: 6
- Oberthur:
- Oberthur: 1
- Oberthur Technologies: 117
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 12
- AES-128: 2
- AES-192: 1
- AES-256: 3
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 5
- SHA-256: 6
- SHA-384: 3
- SHA-512: 6
- SHA256: 5
- SHA384: 4
- SHA512: 4
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA224: 1
- SHA256: 4
- SHA384: 1
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 119
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 5
- TLS v1.2: 3
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 4
- P-384: 4
- P-521: 4
- secp256r1: 4
- secp384r1: 4
- secp521r1: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_GCM_SHA384: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- SCA:
- DPA: 1
- physical probing: 3
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 4
- EF.DG1: 7
- EF.DG14: 3
- EF.DG15: 2
- EF.DG16: 5
- EF.DG2: 3
- EF.DG3: 8
- EF.DG4: 8
- EF.DG5: 1
- EF.SOD: 4
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-2012-09-003: 1
- CCMB-2012-09-001: 1
- FIPS:
- FIPS 186-4: 2
- FIPS PUB 186-4: 5
- FIPS140: 2
- FIPS186: 1
- FIPS186-4: 4
- FIPS197: 2
- FIPS198-1: 1
- NIST:
- NIST SP 800-131A: 1
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-57: 2
- NIST SP 800-90A: 1
- RFC:
- RFC 3526: 2
- RFC 4151: 1
- RFC 4251: 1
- RFC 4252: 5
- RFC 4253: 11
- RFC 4256: 2
- RFC 4344: 3
- RFC 5246: 21
- RFC 5280: 4
- RFC 5288: 12
- RFC 5289: 24
- RFC 5656: 16
- RFC 5759: 1
- RFC 6125: 2
- RFC 6668: 3
- RFC 6960: 1
- RFC 8017: 1
- RFC 8268: 2
- RFC 8332: 7
- X509:
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 11770-2: 3
- ISO/IEC 15946: 2
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-9: 1
- NIST:
- PKCS:
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects that are accessible to users but cannot be used to store: 1
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 2
|
|
pdf_data/st_metadata |
- /Author: MBDA Italia S.p.A.
- /CreationDate: D:20220620122243Z00'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220620122243Z00'00'
- /Producer: Mac OS X 10.13.6 Quartz PDFContext
- /Title: FIN.X RTOS SE V5 Security Target (Lite)
- pdf_file_size_bytes: 1810845
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc4251.txt, http://www.ietf.org/rfc/rfc5647.txt, http://www.gentoo.org/, https://datatracker.ietf.org/doc/html/rfc8268, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0525, https://tools.ietf.org/html/rfc5288, https://tools.ietf.org/html/rfc8332, https://tools.ietf.org/html/rfc5246, https://datatracker.ietf.org/doc/html/rfc4344, http://www.ietf.org/rfc/rfc2898.txt, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0463, https://www.ietf.org/rfc/rfc6668.txt, http://www.ietf.org/rfc/rfc4253.txt, http://rt.wiki.kernel.org/, http://www.ietf.org/rfc/rfc4254.txt, https://datatracker.ietf.org/doc/html/rfc5280, https://tools.ietf.org/html/rfc5289, http://www.ietf.org/rfc/rfc4252.txt, https://tools.ietf.org/html/rfc6125, http://www.ietf.org/rfc/rfc5656.txt, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, https://www.ietf.org/rfc/rfc4256.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
- /Author: michetho
- /CreationDate: D:20160318102331+01'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20160318102331+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: <Document name>
- /Title: ID-One ePass Full EAC v2 MRTD in EAC with PACE configuration with AA on NXP P60x144 PVA/PVE - Public Security Target
- pdf_file_size_bytes: 2141209
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 108
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |