name |
eTravel 2.5.A BAC on MultiApp V5.0.A(version 2.5.A.0) |
eTravel 2.5.A EAC on SAC on MultiApp V5.0.A (version 2.5.A.0.0) |
category |
Trusted Computing |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
12.12.2027 |
16.05.2027 |
not_valid_before |
12.12.2022 |
16.05.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_54.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_13.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_54fr-bac.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_13fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_54en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_13en.pdf |
manufacturer |
THALES DIS FRANCE SA |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.thalesgroup.com/en/europe/france |
security_level |
ADV_INT.2, ALC_CMS.5, ADV_FSP.5, ALC_TAT.2, ADV_TDS.4, ALC_DVS.2, ATE_DPT.3, EAL4+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
fd12e4a5d64c3ecd |
1ad390a1bab466a3 |
heuristics/cert_id |
ANSSI-CC-2022/54 |
ANSSI-CC-2022/13 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, ATE_DPT.3, ADV_INT.2, ALC_TAT.2, ADV_TDS.4 |
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4 |
heuristics/extracted_versions |
2.5, 5.0 |
2.5, 0.0, 5.0 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2022/56, ANSSI-CC-2022/22 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/22 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2021/42, BSI-DSZ-CC-1107-2020, ANSSI-CC-2022/10, BSI-DSZ-CC-1107-V2-2021 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2018/36V2
- description: Le produit évalué est eTravel 2.4 en configuration BAC sur plateforme ID Motion V2.0, Version de l’application eTravel : 2.4 développé par THALES DIS FRANCE SAS et INFINEON TECHNOLOGIES AG. Le produit certifié est de type carte à puce avec ou sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisat
- developer: THALES DIS FRANCE SAS / INFINEON TECHNOLOGIES AG
- enhanced:
- augmented: ALC_DVS.2
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2018/36V2
- cert_link: https://cyber.gouv.fr/sites/default/files/2022/06/certificat-2018_36v2.pdf
- certification_date: 2022-06-07
- developer: THALES DIS FRANCE SAS / INFINEON TECHNOLOGIES AG
- evaluation_facility: THALES (TCS – CNES)
- expiration_date: 2027-06-07
- level: EAL4+
- mutual_recognition: SOG-IS
- protection_profile: Machine Readable Travel Document with ICAO Application , Basic Access Control, version 1.10 Certifié BSI-CC-PP-0055
- report_link: https://cyber.gouv.fr/sites/default/files/2022/06/anssi-cc-2018_36v2fr.pdf
- sponsor: THALES DIS FRANCE SAS
- expiration_date: 2027-06-07
- level: EAL4+
- product: eTravel 2.4 en configuration BAC sur plateforme ID Motion V2.0
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/etravel-24-en-configuration-bac-sur-plateforme-id-motion-v20
|
- cert_id: ANSSI-CC-2022/13
- description: Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur notamment lors du contrôle aux frontières, à l’aide d’un système d’inspection. Il est disponible en mode contact ou sans conta
- developer: THALES DIS FRANCE SAS INFINEON TECHNOLOGIES AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2022/13
- cert_link: https://cyber.gouv.fr/sites/default/files/2022/05/certificat-anssi-cc-2022_13.pdf
- certification_date: 2022-05-16
- developer: THALES DIS FRANCE SAS INFINEON TECHNOLOGIES AG
- evaluation_facility: CEA - LETI
- expiration_date: 2027-05-16
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: Machine Readable Travel Document with " ICAO Application ", Extended Access Control with PACE, version 1.3.2 Certifié BSI-CC-PP-0056-V2-2012-MA-02
- report_link: https://cyber.gouv.fr/sites/default/files/2022/05/anssi-cc-2022_13fr.pdf
- sponsor: THALES DIS FRANCE SAS INFINEON TECHNOLOGIES AG
- target_link: https://cyber.gouv.fr/sites/default/files/2022/05/anssi-cible-cc-2022_13en.pdf
- expiration_date: 2027-05-16
- level: EAL5+
- product: eTravel 2.5.A EAC on SAC on MultiApp V5.0.A (version 2.5.A.0.0)
- sponsor: THALES DIS FRANCE SAS INFINEON TECHNOLOGIES AG
- url: https://cyber.gouv.fr/produits-certifies/etravel-25a-eac-sac-multiapp-v50a-version-25a00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V2-2021 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V2-2021 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
certificat-cc-2022_54.pdf |
certificat-anssi-cc-2022_13.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: mflament
- /CreationDate: D:20220523132737+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20220523132737+02'00'
- /Producer: Acrobat Distiller 21.0 (Windows)
- /Title: Microsoft Word - PS-certificat-ANSSI-CC-2022_13
- pdf_file_size_bytes: 1553235
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
anssi-cc-2022_54fr-bac.pdf |
anssi-cc-2022_13fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- FR:
- ANSSI-CC-2022/11: 2
- ANSSI-CC-2022/52: 1
- ANSSI-CC-2022/54: 2
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- FR:
- ANSSI-CC-2022/10: 1
- ANSSI-CC-2022/13: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_TAT.2: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Gemalto:
- Infineon:
- Infineon Technologies AG: 1
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: mflament
- /CreationDate: D:20220523132449+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20220523132449+02'00'
- /Producer: Acrobat Distiller 21.0 (Windows)
- /Title: Microsoft Word - PS-ANSSI-CC-2022_13fr
- pdf_file_size_bytes: 489413
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
anssi-cible-cc-2022_54en.pdf |
anssi-cible-cc-2022_13en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- NL:
|
- DE:
- BSI-DSZ-CC-1107-V2-2021: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0084-: 1
- BSI-PP- 0056-V2-MA-2012: 1
- BSI-PP-0055-2009: 1
|
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
|
- EAL:
- EAL 6+: 1
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP.5: 3
- ADV_INT.2: 3
- ADV_TDS.4: 3
- ALC:
- ALC_CMS.5: 3
- ALC_DVS.2: 3
- ALC_TAT.2: 3
- ASE:
- ATE:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ASE:
- ATE:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 29
- FCS_CKM.1: 16
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 32
- FCS_CKM.4.1: 1
- FCS_COP: 66
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 17
- FCS_RND.1.1: 2
- FCS_RNG: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 21
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 14
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 5
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 13
- FDP_UCT.1.1: 1
- FDP_UIT.1: 12
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 14
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 15
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 5
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 13
- FIA_UAU.4.1: 1
- FIA_UAU.5: 12
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.6: 13
- FIA_UAU.6.1: 1
- FIA_UID: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 23
- FMT_LIM.1.1: 2
- FMT_LIM.2: 21
- FMT_LIM.2.1: 2
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 48
- FMT_MTD.1: 6
- FMT_SMF: 1
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SRM.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 15
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC.1: 6
- FTP_TRP.1: 5
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 60
- FCS_CKM.1: 20
- FCS_CKM.1.1: 2
- FCS_CKM.2: 8
- FCS_CKM.4: 57
- FCS_CKM.4.1: 1
- FCS_COP: 88
- FCS_COP.1: 9
- FCS_COP.1.1: 8
- FCS_RND: 7
- FCS_RND.1: 15
- FCS_RND.1.1: 2
- FCS_RNG: 8
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF: 12
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_ITT.1: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 6
- FDP_UCT.1: 3
- FDP_UCT.1.1: 1
- FDP_UIT: 6
- FDP_UIT.1: 3
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 20
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 16
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 69
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 2
- FIA_UID: 25
- FIA_UID.1: 6
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 21
- FMT_LIM.1.1: 3
- FMT_LIM.2: 19
- FMT_LIM.2.1: 3
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 67
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 49
- FMT_SMF.1.1: 1
- FMT_SMR: 32
- FMT_SMR.1: 3
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 2
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FTP:
- FTP_ITC: 12
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AES: 1
- O.RND: 1
- O.TDES: 1
- OE:
|
pdf_data/st_keywords/vendor |
- Gemalto:
- Infineon:
- Thales:
|
- Gemalto:
- Infineon:
- Thales:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDES: 8
- Triple-DES: 6
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 4
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
- FI:
- Malfunction: 4
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 2
- Leak-Inherent: 1
- Physical Probing: 1
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 8
- EF.DG1: 28
- EF.DG13: 3
- EF.DG14: 3
- EF.DG15: 5
- EF.DG16: 26
- EF.DG2: 10
- EF.DG3: 6
- EF.DG4: 6
- EF.DG5: 7
- EF.DG6: 1
- EF.SOD: 8
|
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 10
- EF.DG4: 10
- EF.DG5: 3
- EF.SOD: 4
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- FIPS46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- RFC:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-3: 1
- FIPS 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- NIST:
- SP 800-67: 1
- SP 800-90: 2
- PKCS:
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: OHAYON Franck
- /CreationDate: D:20220222154649+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220222154649+01'00'
- /Producer: Microsoft® Word 2016
- /Title: MultiApp V5.0.A: eTravel 2.5.A EAC on SAC Security Target
- pdf_file_size_bytes: 2177017
- pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 79
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
False |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |