Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

IDeal Citiz v2.17-i on Infineon M7893 B11 Java Card Open Platform
ANSSI-CC-2019/04
IDeal Citiz v2.15-i on Infineon M7892 B11 Java Card Open Platform
ANSSI-CC-2017/59
name IDeal Citiz v2.17-i on Infineon M7893 B11 Java Card Open Platform IDeal Citiz v2.15-i on Infineon M7892 B11 Java Card Open Platform
not_valid_before 2019-01-24 2017-11-09
not_valid_after 2024-01-24 2022-11-09
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_04en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_59en.pdf
manufacturer Idemia / Infineon Technologies AG Idemia
manufacturer_web None https://www.idemia.com
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_04fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_59fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Operating System Protection Profile, Version 2.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0067b_pdf.pdf', 'pp_ids': frozenset({'OSPP_V2.0'})})
state/report/pdf_hash ebfa672be9b1f016197c7dc2da7bc1f1f4c29570ed6243a5d2300a6bab5aeba9 eb8abb76b440e482c2f11ce483d1c1dbb6b1b38b70ea1150363b04430ce3539d
state/report/txt_hash d831a0e652312cb7351c733bb730c1e37e8d4d82c09dc92e3510126c51f4f0d1 6a547d74dd451bf42f75c10adda8d5bad75a39ffc36c57bf0ec4045e05b6b3bf
state/st/pdf_hash 502500950e8394b5dacee0c2c71ea6ed93d01c770cc1a2ef8c59423a1dfc230b 2b825f9cbd29ecc0f6cf518c52992cff972bc60319797ff7c72636b629155072
state/st/txt_hash f6acd656a86af14976690b2f536199bf4bd809426f32345bb00ec3544bacf60b dd7d7af388706b5117170738d48aa2ad772fc6dc3720b360fb2eefeccb57c719
heuristics/cert_id ANSSI-CC-2019/04 ANSSI-CC-2017/59
heuristics/cert_lab CEA None
heuristics/extracted_versions 2.17 2.15
heuristics/report_references/directly_referenced_by None ANSSI-CC-2017/74, ANSSI-CC-2018/22, ANSSI-CC-2017/66, ANSSI-CC-2017/65, ANSSI-CC-2018/27
heuristics/report_references/directly_referencing BSI-DSZ-CC-0879-V3-2018, ANSSI-CC-2018/27 ANSSI-CC-2016/66, BSI-DSZ-CC-0782-V2-2015
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2017/74, ANSSI-CC-2018/22, NSCIB-CC-195748-CR, NSCIB-CC-196231-CR, ANSSI-CC-2017/66, ANSSI-CC-2017/65, ANSSI-CC-2018/27, ANSSI-CC-2019/04
heuristics/scheme_data/cert_id 2019/04 2017/59
heuristics/scheme_data/description Ce produit est une plateforme ouverte JavaCard conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueillir les applets de l’utilisateur pré-émission et/ou post-émission, et à leur fournir les services de sécurité détaillés dans la cible de sécurité. Le produit certifié est la carte à puce « IDeal Citiz v2.15-I on M7892 B11- Java Card Open Platform » développée par IDEMIA (ex SAFRAN IDENTITY & SECURITY) sur un microcontrôleur fabriqué par la société INFINEON TECHNOLOGIES. Ce produit est une plateforme ouverte JavaCard conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueillir les applets de
heuristics/scheme_data/developer Idemia & Infineon IDEMIA, INFINEON Technologies AG
heuristics/scheme_data/enhanced/cert_id 2019/04 2017/59
heuristics/scheme_data/enhanced/certification_date 24/01/2019 09/11/2017
heuristics/scheme_data/enhanced/developer Idemia & Infineon IDEMIA, INFINEON Technologies AG
heuristics/scheme_data/enhanced/evaluation_facility CEA-LETI CEA - LETI
heuristics/scheme_data/enhanced/protection_profile ANSSI-CC-PP-2010/03-M01 ANSSI-CC-PP-2010/03-M0
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2019/01/anssi-cc-2019_04fr.pdf https://cyber.gouv.fr/sites/default/files/2017/11/anssi-cc-2017_59fr.pdf
heuristics/scheme_data/enhanced/sponsor Idemia IDEMIA
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2019/01/anssi-cible-cc-2019_04en.pdf https://cyber.gouv.fr/sites/default/files/2017/11/anssi-cible-cc-2017_59en.pdf
heuristics/scheme_data/product IDeal Citiz v2.17-i on Infineon M7893 B11 IDeal Citiz v2.15-I on M7892 B11-Java Card Open Platform
heuristics/scheme_data/sponsor Idemia IDEMIA
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/ideal-citiz-v217-i-infineon-m7893-b11 https://cyber.gouv.fr/produits-certifies/ideal-citiz-v215-i-m7892-b11-java-card-open-platform
heuristics/st_references/directly_referenced_by ANSSI-CC-2024/13 ANSSI-CC-2017/65, ANSSI-CC-2017/66, ANSSI-CC-2018/22
heuristics/st_references/directly_referencing BSI-DSZ-CC-0879-V3-2018 None
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2024/13 ANSSI-CC-2017/65, ANSSI-CC-2017/66, ANSSI-CC-2018/22
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0879-V3-2018 None
pdf_data/report_filename anssi-cc-2019_04fr.pdf anssi-cc-2017_59fr.pdf
pdf_data/report_frontpage/FR
  • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
  • cert_id: ANSSI-CC-2019/04
  • cert_item: IDeal Citiz v2.17-i on Infineon M7893 B11
  • cert_item_version: OFFICIEL_IDealCitiz_SLE78CLFX5000PHM_2_1_3
  • ref_protection_profiles: Java Card Protection Profile – Open Configuration Version 3.0, ANSSI-CC-PP-2010/03-M01
  • cc_version: Critères Communs version 3.1 révision 5
  • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
  • developer: IDEMIA 18 Chaussée Jules César, 95520 Osny, France INFINEON Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2, place Samuel de Champlain, 92400 Courbevoie, France
  • cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0879-V3-2018: 2
  • BSI-DSZ-CC-0782-V2-2015: 2
  • BSI-DSZ-CC-0782-V2-2015-RA-01: 1
  • BSI-DSZ-CC-0782-V2-: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2019/04: 17
  • ANSSI-CC-2018/27: 2
  • ANSSI-CC-2017/59: 17
  • ANSSI-CC-2016/66: 2
pdf_data/report_keywords/cc_protection_profile_id/ANSSI
  • ANSSI-CC-PP-2010/03-M01: 2
  • ANSSI-CC-PP-2010/03-M0: 1
  • ANSSI-CC-PP-2010/03-M01: 1
pdf_data/report_keywords/cc_protection_profile_id/ANSSI/ANSSI-CC-PP-2010/03-M01 2 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 9
pdf_data/report_keywords/eval_facility/CEA-LETI/CEA-LETI 2 1
pdf_data/report_keywords/eval_facility/CESTI/CESTI 2 1
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-2 2 3
pdf_data/report_keywords/vendor/Idemia/IDEMIA 12 7
pdf_data/report_keywords/vendor/Infineon/Infineon 23 5
pdf_data/report_metadata//Category Référence, Version OFFICIEL_IDealCitiz_SLE78CLFX4000PM_2_1_1_0_R2
pdf_data/report_metadata//Comments Idemia Safran I&S
pdf_data/report_metadata//CreationDate D:20190125165248+01'00' D:20171113141434+01'00'
pdf_data/report_metadata//Keywords ANSSI-CC-CER-F-07.28.1 ANSSI-CC-CER-F-07.025
pdf_data/report_metadata//ModDate D:20190125170057+01'00' D:20171113175755+01'00'
pdf_data/report_metadata//SourceModified D:20190125155243 D:20171113131431
pdf_data/report_metadata//Subject IDeal Citiz v2.17-i on Infineon M7893 B11
pdf_data/report_metadata//Title ANSSI-CC-2019/04
pdf_data/report_metadata/pdf_file_size_bytes 255149 256325
pdf_data/st_filename anssi-cible-cc-2019_04en.pdf anssi-cible-cc-2017_59en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-CRT: 1
  • ECC:
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 5
    • ECC:
      • ECC: 3
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • ECC:
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 6
    • ECC:
      • ECC: 6
  • FF:
    • DH:
      • Diffie-Hellman: 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 3 6
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 5 6
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0879-V3-2018: 2
  • BSI-DSZ-CC-0782-V2-2015-RA-01: 2
pdf_data/st_keywords/cc_claims/A/A.PRODUCTION 5 6
pdf_data/st_keywords/cc_claims/O
  • O.REMOTE: 1
  • O.SCP: 59
  • O.BIO-MNGT: 21
  • O.RND: 1
  • O.SID: 33
  • O.FIREWALL: 43
  • O.GLOBAL_ARRAYS_CONFID: 13
  • O.GLOBAL_ARRAYS_INTEG: 10
  • O.NATIVE: 14
  • O.OPERATE: 35
  • O.REALLOCATION: 17
  • O.RESOURCES: 23
  • O.ALARM: 22
  • O.CIPHER: 19
  • O.KEY-MNGT: 28
  • O.PIN-MNGT: 17
  • O.TRANSACTION: 18
  • O.OBJ-DELETION: 9
  • O.DELETION: 14
  • O.LOAD: 17
  • O.INSTALL: 15
  • O.CARD-MANAGEMENT: 35
  • O.CARD-: 4
  • O.PIN-: 5
  • O.APPLET: 16
  • O.CARD_LC: 4
  • O.CODE_PKG: 14
  • O.JAVAOBJECT: 31
  • O.BIO-: 1
  • O.REMOTE: 1
  • O.SCP: 62
  • O.BIO-MNGT: 16
  • O.RND: 1
  • O.SID: 33
  • O.FIREWALL: 43
  • O.GLOBAL_ARRAYS_CONFID: 19
  • O.GLOBAL_ARRAYS_INTEG: 10
  • O.NATIVE: 14
  • O.OPERATE: 35
  • O.REALLOCATION: 17
  • O.RESOURCES: 23
  • O.ALARM: 22
  • O.CIPHER: 19
  • O.KEY-MNGT: 18
  • O.PIN-MNGT: 22
  • O.TRANSACTION: 18
  • O.OBJ-DELETION: 9
  • O.DELETION: 14
  • O.LOAD: 17
  • O.INSTALL: 15
  • O.CARD-MANAGEMENT: 36
  • O.KEY-: 10
  • O.CARD-: 4
  • O.APPLET: 16
  • O.CARD_LC: 4
  • O.CODE_PKG: 14
  • O.JAVAOBJECT: 31
  • O.BIO-: 6
pdf_data/st_keywords/cc_claims/O/O.BIO- 1 6
pdf_data/st_keywords/cc_claims/O/O.BIO-MNGT 21 16
pdf_data/st_keywords/cc_claims/O/O.CARD-MANAGEMENT 35 36
pdf_data/st_keywords/cc_claims/O/O.GLOBAL_ARRAYS_CONFID 13 19
pdf_data/st_keywords/cc_claims/O/O.KEY-MNGT 28 18
pdf_data/st_keywords/cc_claims/O/O.PIN-MNGT 17 22
pdf_data/st_keywords/cc_claims/O/O.SCP 59 62
pdf_data/st_keywords/cc_claims/OE
  • OE.CARD-: 1
  • OE.APPLET: 10
  • OE.VERIFICATION: 38
  • OE.CODE-EVIDENCE: 16
  • OE.CARD-MANAGEMENT: 1
  • OE.SCP: 3
  • OE.SECURITY-DOMAINS: 7
  • OE.QUOTAS: 5
  • OE.SHARE-CONTROL: 9
  • OE.KEY_GENERATION: 6
  • OE.PRODUCTION: 6
  • OE.CODE-: 3
  • OE.CARD-MANAGEMENT: 2
  • OE.SCP: 3
  • OE.APPLET: 10
  • OE.VERIFICATION: 38
  • OE.CODE-EVIDENCE: 19
  • OE.SECURITY-DOMAINS: 7
  • OE.QUOTAS: 5
  • OE.SHARE-CONTROL: 9
  • OE.KEY_GENERATION: 6
  • OE.PRODUCTION: 6
pdf_data/st_keywords/cc_claims/OE/OE.CARD-MANAGEMENT 1 2
pdf_data/st_keywords/cc_claims/OE/OE.CODE-EVIDENCE 16 19
pdf_data/st_keywords/cc_claims/OSP/OSP.SECURITY_DOMAINS 6 5
pdf_data/st_keywords/cc_claims/T
  • T.EXE-: 2
  • T.APP_DATA_INTEGRITY: 5
  • T.UNAUTH_CARD_MNGT: 5
  • T.LIFE_CYCLE: 5
  • T.UNAUTH_ACCESS: 5
  • T.RND: 1
  • T.CONFID-APPLI-DATA: 17
  • T.CONFID-JCS-CODE: 6
  • T.CONFID-JCS-DATA: 11
  • T.INTEG-APPLI-CODE: 11
  • T.INTEG-APPLI-DATA: 21
  • T.INTEG-JCS-CODE: 6
  • T.INTEG-JCS-DATA: 11
  • T.SID: 18
  • T.EXE-CODE: 8
  • T.NATIVE: 6
  • T.RESOURCES: 8
  • T.DELETION: 5
  • T.INSTALL: 6
  • T.OBJ-DELETION: 4
  • T.PHYSICAL: 4
  • T.INTEG-APPLI-: 6
  • T.CONFID-APPLI-: 1
  • T.INTEG-: 2
  • T.EXE-CODE-: 1
  • T.APP_DATA_INTEGRITY: 5
  • T.UNAUTH_CARD_MNGT: 5
  • T.LIFE_CYCLE: 5
  • T.UNAUTH_ACCESS: 5
  • T.RND: 1
  • T.CONFID-APPLI-DATA: 17
  • T.CONFID-JCS-CODE: 6
  • T.CONFID-JCS-DATA: 10
  • T.INTEG-APPLI-CODE: 11
  • T.INTEG-APPLI-DATA: 22
  • T.INTEG-JCS-CODE: 6
  • T.INTEG-JCS-DATA: 10
  • T.SID: 18
  • T.EXE-CODE: 9
  • T.NATIVE: 6
  • T.RESOURCES: 8
  • T.DELETION: 5
  • T.INSTALL: 6
  • T.OBJ-DELETION: 4
  • T.PHYSICAL: 4
  • T.INTEG-APPLI-: 5
  • T.INTEG-: 3
  • T.CONFID-: 1
  • T.CONFID-JCS-: 1
pdf_data/st_keywords/cc_claims/T/T.CONFID-JCS-DATA 11 10
pdf_data/st_keywords/cc_claims/T/T.EXE-CODE 8 9
pdf_data/st_keywords/cc_claims/T/T.INTEG- 2 3
pdf_data/st_keywords/cc_claims/T/T.INTEG-APPLI- 6 5
pdf_data/st_keywords/cc_claims/T/T.INTEG-APPLI-DATA 21 22
pdf_data/st_keywords/cc_claims/T/T.INTEG-JCS-DATA 11 10
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 1
  • BSI-CC-PP-0055-2009: 1
  • BSI-CC-PP-0056-2009: 1
  • BSI-PP-0035: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 11
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 12
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 3
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_FLR.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 11 12
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 7 8
pdf_data/st_keywords/cc_security_level/EAL/EAL6 1 2
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented 1 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 1
  • FAU_ARP.1: 16
  • FAU_ARP.1.1: 1
  • FAU_SAA.1: 3
  • FAU_SAS.1: 2
  • FAU_ARP.1: 14
  • FAU_ARP.1.1: 1
  • FAU_SAA.1: 3
  • FAU_ARP: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_ARP.1 16 14
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 1 2
pdf_data/st_keywords/cc_sfr/FCO/FCO_NRO 8 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 26 30
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 27 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 12 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2.1 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.3 10 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.3.1 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 26 20
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 15 20
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 16 21
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 1 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 41
  • FDP_ACF: 38
  • FDP_SDC.1: 1
  • FDP_SDI.2: 15
  • FDP_ITT.1: 1
  • FDP_IFC.1: 13
  • FDP_ACC.1: 14
  • FDP_ACF.1: 17
  • FDP_ACC.2: 5
  • FDP_IFC: 29
  • FDP_IFF: 24
  • FDP_IFF.1: 13
  • FDP_RIP: 132
  • FDP_RIP.1: 10
  • FDP_ROL: 16
  • FDP_ROL.1: 2
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC: 14
  • FDP_ITC.2: 15
  • FDP_IFC.2: 2
  • FDP_IFF.1.2: 1
  • FDP_UIT: 8
  • FDP_UIT.1: 2
  • FDP_ITC.1: 10
  • FDP_ACC: 38
  • FDP_ACF: 35
  • FDP_ITT.1: 2
  • FDP_IFC.1: 14
  • FDP_ACC.1: 15
  • FDP_ACF.1: 18
  • FDP_SDI.1: 2
  • FDP_SDI.2: 16
  • FDP_ACC.2: 5
  • FDP_IFC: 27
  • FDP_IFF: 22
  • FDP_IFF.1: 13
  • FDP_RIP: 135
  • FDP_RIP.1: 10
  • FDP_ROL: 15
  • FDP_ROL.1: 2
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC: 13
  • FDP_ITC.2: 12
  • FDP_IFC.2: 2
  • FDP_IFF.1.2: 1
  • FDP_UIT: 7
  • FDP_UIT.1: 2
  • FDP_ITC.1: 7
  • FDP_SDI: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 41 38
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 14 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 38 35
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 17 18
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC 29 27
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 13 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF 24 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 14 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 15 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 132 135
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL 16 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 15 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 8 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD 11 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 19 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB 10 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 125 114
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 12 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 16 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 24 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF 29 28
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 39 37
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 34 32
pdf_data/st_keywords/cc_sfr/FPR
  • FPR_UNO.1: 14
  • FPR_UNO.1.1: 1
  • FPR_UNO.1: 12
  • FPR_UNO.1.1: 1
  • FPR_UNO: 1
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 14 12
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_RCV: 37
  • FPT_FLS: 53
  • FPT_PHP: 11
  • FPT_FLS.1: 18
  • FPT_PHP.3: 2
  • FPT_ITT.1: 1
  • FPT_FLS.1.1: 1
  • FPT_TDC.1: 10
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV.3: 8
  • FPT_RCV.4: 1
  • FPT_RCV: 34
  • FPT_FLS: 54
  • FPT_PHP: 10
  • FPT_FLS.1: 17
  • FPT_PHP.3: 4
  • FPT_ITT.1: 2
  • FPT_TST.2: 2
  • FPT_FLS.1.1: 1
  • FPT_TDC.1: 8
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV.3: 8
  • FPT_RCV.4: 1
  • FPT_TDC: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 53 54
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 18 17
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 1 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP 11 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 2 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV 37 34
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 10 8
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 1 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 19 17
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 1
  • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
  • out of scope: 2
  • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
  • SFR of the composite product. This function is not used by the platform. The RSA key generation is out of scope of the chip evaluation FCS_COP.1/ECDH Cryptographic operation The cryptographic co-processor is: 1
pdf_data/st_keywords/certification_process/OutOfScope/out of scope 1 2
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library .................................................................................................11: 1
  • Infineon:
    • v1.02.013: 9
pdf_data/st_keywords/crypto_protocol/PACE/PACE 16 14
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 2 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-2 2 5
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 2 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 2 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 2 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 2 1
pdf_data/st_keywords/javacard_version/GlobalPlatform/GlobalPlatform 2.1.1 3 2
pdf_data/st_keywords/javacard_version/JavaCard
  • Java Card 3.0.1: 3
  • JavaCard 3.0.1: 6
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 2
  • RNG:
    • RNG: 1
    • RND: 2
  • RNG:
    • RND: 2
    • RNG: 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 2
  • physical probing: 4
  • Physical Probing: 2
  • DPA: 1
  • Leak-Inherent: 2
  • physical probing: 5
  • Physical Probing: 2
  • side channel: 1
  • DPA: 1
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 4 5
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • ISO:
    • ISO/IEC9796: 6
    • ISO/IEC 14443: 2
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP02: 4
    • SCP03: 4
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO-SAC: 1
    • ICAO: 1
  • SCP:
    • SCP02: 4
    • SCP03: 4
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/standard_id/ICAO
  • ICAO: 1
  • ICAO-SAC: 1
  • ICAO: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 13 18
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDEA: 1
  • 3DES: 4
  • TDES: 5
  • 3DES: 6
  • TDES: 5
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 4 6
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 5 7
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC 4 3
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC 2 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110-1: 1
    • BSI TR-03110-2: 1
    • BSI TR-03110-3: 1
    • BSI TR-03110-4: 1
pdf_data/st_keywords/vendor/Idemia/IDEMIA 41 34
pdf_data/st_keywords/vendor/Infineon/Infineon 147 29
pdf_data/st_metadata//CreationDate D:20190114134220+01'00' D:20171013145142+02'00'
pdf_data/st_metadata//Creator Microsoft® Word 2016 Microsoft® Word 2013
pdf_data/st_metadata//ModDate D:20190114173704+01'00' D:20171113175808+01'00'
pdf_data/st_metadata//Producer Microsoft® Word 2016 Microsoft® Word 2013
pdf_data/st_metadata/pdf_file_size_bytes 2072102 2374492
pdf_data/st_metadata/pdf_number_of_pages 118 117
dgst fc915db77dfb73d2 33c384bb89058653