name |
Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v4, masquée sur composants IFX M7820 A11 |
Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA (version du patch: 1.3) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
02.10.2020 |
not_valid_before |
06.07.2012 |
02.10.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_2012-40fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_40.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible_2012-40en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015-40_LITE.pdf |
manufacturer |
Gemalto - Infineon Technologies AG |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://www.gemalto.com/ |
https://www.gemalto.com/ |
security_level |
EAL4+, ALC_DVS.2 |
EAL4+, ALC_DVS.2 |
dgst |
eda70727fc31baf1 |
0f7bd25c0253d284 |
heuristics/cert_id |
ANSSI-CC-2012/40 |
ANSSI-CC-2015/40 |
heuristics/cert_lab |
THALES |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, AVA_VAN.5, ADV_ARC.1 |
AVA_VAN.3, ALC_DVS.2, ALC_FLR.1, ASE_TSS.2, ADV_ARC.1 |
heuristics/extracted_versions |
1.4 |
3.1, 1.3, 2.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0813-2012 |
BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2015/15 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0845-V2-2013, ANSSI-CC-2015/15, BSI-DSZ-CC-0728-2011, ANSSI-CC-2014/86, ANSSI-CC-2014/06, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0829-2012 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2012/40
- description: Le produit certifié est le passeport électronique intitulé « Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v4, masquée sur composants IFX M7820 A11 ». La version de l'application et de la plateforme est 023078 pour SLE78CLXxxxxP et 023079 pour SLE78CLXxxxxPM, la version de l'AMD (patch dans la terminologie Multos) est 113v4 quelle que soit la variante du composant, l
- developer: Gemalto et Infineon Technologies AG
- enhanced:
- augmented: ALC_DVS.2
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r3
- cert_id: ANSSI-CC-2012/40
- certification_date: 2012-07-06
- developer: Gemalto et Infineon Technologies AG
- evaluation_facility: THALES (TCS – CNES)
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0055-2009, [PP BAC], version 1.10
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI_2012-40fr.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-cible_2012-40en.pdf
- level: EAL4+
- product: Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v4, masquée sur composants IFX M7820 A11
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-14-avec-aa-configuration-bac-avec-amd-113v4-masquee-sur
|
- cert_id: ANSSI-CC-2015/40
- description: Le produit certifé est la carte à puce ouverte ou fermée« MultiApp v3.1 », pouvant être en mode contact ou sans contact. Le produit est développé par la société GEMALTO et embarqué sur le microcontrôleur P60D144PVA fabriqué par la société NXP SEMICONDUCTORS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civ
- developer: Gemalto / NXP Semiconductors
- enhanced:
- augmented: ALC_DVS.2
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2015/40
- certification_date: 2015-10-02
- developer: Gemalto / NXP Semiconductors
- evaluation_facility: Serma Technologies
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: PP BAC
- report_link: https://cyber.gouv.fr/sites/default/files/2015/10/ANSSI-CC-2015_40.pdf
- sponsor: Gemalto
- target_link: https://cyber.gouv.fr/sites/default/files/2015/10/anssi_cible_2015-40_LITE.pdf
- level: EAL4+
- product: Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
- sponsor: Gemalto
- url: https://cyber.gouv.fr/produits-certifies/application-etravel-eac-v21-en-configuration-bac-sur-la-plateforme-ouverte-ou
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
BSI-DSZ-CC-0845-V2-2013 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI_2012-40fr.pdf |
ANSSI-CC-2015_40.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2012/40
- cert_item: Application eTravel EAC 1.4 avec AA, configuration BAC avec AMD 113v4, masquée sur composants IFX M7820 A11
- cert_item_version: Version de l’application et de la plateforme : 023078 / 023079 Version de l’AMD (patch) : 113v4 Version du composant IFX M7820 A11 : SLE78CLXxxxxP / SLE78CLXxxxxPM
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0055-2009, [PP BAC], version 1.10 Machine Readable Travel Document with “ICAO Application”, Basic Access Control
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/40
- cert_item: Application eTravel EAC v2.1, en configuration BAC, sur la plateforme ouverte ou fermée MultiApp V3.1 masquée sur le composant P60D144PVA
- cert_item_version: Version de l’application eTravel EAC : 2.1 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0055, [PP BAC], version 1.10 Machine Readable Travel Document with ICAO application, Basic Access Control
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0845-V2-2013: 3
- FR:
- ANSSI-CC-2015/15: 3
- ANSSI-CC-2015/40: 22
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-2007: 2
- BSI-PP-0055-2009: 1
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 3
|
- Gemalto:
- NXP:
- NXP: 3
- NXP Semiconductors: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ICAO:
- PKCS:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20120706162834+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120711195343+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title:
- pdf_file_size_bytes: 473741
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: Rapport ANSSI-CC-2015_40
- pdf_file_size_bytes: 289332
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
ANSSI-cible_2012-40en.pdf |
anssi_cible_2015-40_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0640-2010: 1
- BSI-DSZ-CC-0813-2012: 1
- NL:
|
- DE:
- BSI-DSZ-CC-0845: 1
- BSI-DSZ-CC-0845-V2-2013: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 3
- BSI-PP-0056: 1
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 1
|
- EAL:
- EAL 6+: 1
- EAL4: 3
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- ALC:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 6
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP: 9
- FCS_COP.1: 8
- FCS_RND: 6
- FCS_RND.1: 6
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 5
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 3
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 7
- FDP_ITC.2: 7
- FDP_UCT.1: 3
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 1
- FIA_API.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 2
- FIA_UAU.1: 3
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UAU.5: 2
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 3
- FIA_UAU.6.1: 1
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 14
- FMT_LIM.1.1: 2
- FMT_LIM.2: 13
- FMT_LIM.2.1: 2
- FMT_MSA.3: 1
- FMT_MTD: 5
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_TST.1: 4
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 27
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_COP: 53
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 13
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 13
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 12
- FIA_UAU.4.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 21
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 40
- FMT_MTD.1: 6
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SRM.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 1
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 3
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 6
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 10
- EF.DG1: 25
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 4
- EF.DG16: 22
- EF.DG2: 11
- EF.DG3: 6
- EF.DG4: 6
- EF.DG5: 6
- EF.DG6: 2
- EF.SOD: 10
|
- EF:
- EF.COM: 9
- EF.DG1: 30
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 4
- EF.DG16: 28
- EF.DG2: 12
- EF.DG3: 8
- EF.DG4: 8
- EF.DG5: 8
- EF.DG6: 2
- EF.SOD: 9
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
- FIPS 180-2: 1
- FIPS 48-3: 2
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20120627110007+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120711195355+02'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title:
- pdf_file_size_bytes: 337977
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20150423185724+02'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20150423185724+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel EAC v2 Security Target
- pdf_file_size_bytes: 1119178
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |