This page was not yet optimized for use on mobile devices.
Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 1.5)
CSV information ?
Status | archived |
---|---|
Valid from | 24.02.2015 |
Valid until | 24.02.2020 |
Scheme | 🇫🇷 FR |
Manufacturer | Gemalto - Infineon Technologies AG |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_DVS.2, AVA_VAN.5, EAL5+ |
Maintenance updates | ANSSI-CC-2015/09-M01 (20.05.2016) Certification report |
Heuristics summary ?
Certificate ID: ANSSI-CC-2015/09
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESHash functions
SHA-2Libraries
v1.02.013Vendor
Infineon Technologies AG, Infineon Technologies, Infineon, GemaltoSecurity level
EAL 5, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0056-2009, BSI-PP-0035-2007, BSI-PP-0056-2009, BSI-PP- 0035-2007Certificates
BSI-DSZ-CC-0829-2012, ANSSI-CC-2015/09, ANSSI-CC-2014/06, ANSSI-CC-2014/48Evaluation facilities
Serma Technologies, CESTIStandards
ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | Rapport ANSSI-CC-2015_09 |
---|---|
Pages | 21 |
Creator | PDFCreator Version 1.2.1 |
Producer | GPL Ghostscript 9.02 |
Frontpage
Certificate ID | ANSSI-CC-2015/09 |
---|---|
Certified item | Application eTravel EAC v2.0, en configuration "EAC on BAC", sur la plateforme fermée MultiApp V3 masquée sur le composant M7820 A11 |
Certification lab | Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France |
Developer | Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France |
References
Outgoing- ANSSI-CC-2014/48 - archived - Application eTravel EAC v2.0, en configuration "EAC on BAC" sur la plateforme ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5)
- ANSSI-CC-2014/06 - archived - Plateforme Java Card en configuration ouverte de la carte à puce MultiApp V3 masquée sur le composant M7820 A11
- BSI-DSZ-CC-0829-2012 - archived - Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, CMACAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512Schemes
MAC, Key AgreementProtocols
PACERandomness
RNGBlock cipher modes
CBCCPLC
IC Fabricator, IC TypeIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG15, EF.COM, EF.SODVendor
GemaltoSecurity level
EAL5, EAL 5+, EAL5 augmentedClaims
OE.MRTD_, OE.BAC_PP, OE.BAC-PPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ALC_DVS.2, AVA_VAN.3, AVA_VAN.5Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_COP, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC, FIA_API, FIA_AFL, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_UID, FIA_UAU.1, FIA_UAU, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FPT_EMS, FPT_TST, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0002, BSI-PP-0035, BSI-PP-0056, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011, BSI-PP-0055Certificates
BSI-DSZ-CC-0829-2012, CC-1, CC-2, CC-3Evaluation facilities
Serma TechnologiesSide-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS180-2, FIPS46-3, FIPS PUB 46-3, FIPS 186-3, FIPS 180-2, FIPS 197, SP 800-67, PKCS#3, PKCS#1, RFC 2631, RFC 3369, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, SCP03, SCP01, SCP02, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004Technical reports
BSI TR-03110File metadata
Title | eTravel EAC v2 Security Target |
---|---|
Subject | MRTD |
Keywords | Security Target, CC, eTravel |
Author | Antoine de Lavernette |
Creation date | D:20140227160145+01'00' |
Modification date | D:20140227160145+01'00' |
Pages | 63 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
References
Outgoing- BSI-DSZ-CC-0829-2012 - archived - Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software
Heuristics ?
Certificate ID: ANSSI-CC-2015/09
Extracted SARs
AVA_VAN.5, ADV_ARC.1, ALC_DVS.2References ?
Updates ?
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 1.5) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "fab2b3734a8a20b4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2015/09",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.5",
"2.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/48",
"ANSSI-CC-2014/06",
"BSI-DSZ-CC-0829-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/48",
"BSI-DSZ-CC-0829-2012",
"BSI-DSZ-CC-0728-2011",
"ANSSI-CC-2014/06",
"BSI-DSZ-CC-0640-2010"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0829-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0829-2012",
"BSI-DSZ-CC-0813-2012",
"BSI-DSZ-CC-0728-2011",
"BSI-DSZ-CC-0695-2011",
"BSI-DSZ-CC-0640-2010"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-05-20",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_09-M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2015/09-M01"
}
]
},
"manufacturer": "Gemalto - Infineon Technologies AG",
"manufacturer_web": "https://www.gemalto.com/",
"name": "Application eTravel EAC v2.0, en configuration \"EACon BAC\" sur la plateforme ferm\u00e9e MultiApp V3masqu\u00e9e sur le composant M7820 A11(Version du patch : 1.5)",
"not_valid_after": "2020-02-24",
"not_valid_before": "2015-02-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2015_09.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2015/09",
"cert_item": "Application eTravel EAC v2.0, en configuration \"EAC on BAC\", sur la plateforme ferm\u00e9e MultiApp V3 masqu\u00e9e sur le composant M7820 A11",
"cert_item_version": "Version de l\u2019application eTravel EAC : 2.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5",
"cert_lab": "Serma Technologies 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
"developer": "Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "BSI-CC-PP-0056-2009, [PP EACv1], version 1.10 Machine Readable Travel Document with ICAO Application, Extended Access Control"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0829-2012": 3
},
"FR": {
"ANSSI-CC-2014/06": 3,
"ANSSI-CC-2014/48": 1,
"ANSSI-CC-2015/09": 22
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-2009": 1,
"BSI-PP- 0035-2007": 1,
"BSI-PP-0035-2007": 2,
"BSI-PP-0056-2009": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL4": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 3
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ICAO": {
"ICAO": 2
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 28
},
"Infineon": {
"Infineon": 2,
"Infineon Technologies": 23,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "PDFCreator Version 1.2.1",
"/Keywords": "",
"/ModDate": "",
"/Producer": "GPL Ghostscript 9.02",
"/Subject": "",
"/Title": "Rapport ANSSI-CC-2015_09",
"pdf_file_size_bytes": 275692,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "cible_2015_09_Lite_v1.1p.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 8
}
},
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0829-2012": 1
},
"NL": {
"CC-1": 4,
"CC-2": 6,
"CC-3": 3
}
},
"cc_claims": {
"OE": {
"OE.BAC-PP": 1,
"OE.BAC_PP": 1,
"OE.MRTD_": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0068-V2-2011": 1,
"BSI-PP-0002": 1,
"BSI-PP-0035": 1,
"BSI-PP-0055": 1,
"BSI-PP-0056": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_VAN.3": 2,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 1,
"EAL5": 2,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 6,
"FAU_SAS.1": 7,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 21,
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 3,
"FCS_CKM.4": 20,
"FCS_CKM.4.1": 1,
"FCS_COP": 34,
"FCS_COP.1": 5,
"FCS_COP.1.1": 5,
"FCS_RND": 7,
"FCS_RND.1": 6,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 6,
"FDP_ACF": 2,
"FDP_ACF.1": 5,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2,
"FDP_ITC.1": 7,
"FDP_ITC.2": 7,
"FDP_UCT.1": 4,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 4,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 9,
"FIA_API.1": 7,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 5,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 6,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 4,
"FIA_UAU.6.1": 1,
"FIA_UID": 8,
"FIA_UID.1": 6,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 17,
"FMT_LIM.1.1": 3,
"FMT_LIM.2": 16,
"FMT_LIM.2.1": 3,
"FMT_MSA.3": 1,
"FMT_MTD": 27,
"FMT_MTD.1": 3,
"FMT_MTD.3": 3,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 17,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 4,
"FPT_EMS.1": 8,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 4,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 1,
"FPT_TST": 2,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 2,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICType": {
"IC Type": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 21
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 5
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 7,
"EF.DG1": 14,
"EF.DG14": 6,
"EF.DG15": 2,
"EF.DG16": 13,
"EF.DG2": 8,
"EF.DG3": 18,
"EF.DG4": 17,
"EF.DG5": 6,
"EF.SOD": 8
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"Physical Tampering": 2,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 4,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 1,
"SPA": 1,
"physical probing": 4,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 180-2": 1,
"FIPS 186-3": 1,
"FIPS 197": 1,
"FIPS PUB 46-3": 1,
"FIPS180-2": 1,
"FIPS46-3": 1
},
"ICAO": {
"ICAO": 13
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816-4": 1
},
"NIST": {
"SP 800-67": 1
},
"PKCS": {
"PKCS#1": 2,
"PKCS#3": 4
},
"RFC": {
"RFC 2631": 1,
"RFC 3369": 1
},
"SCP": {
"SCP01": 1,
"SCP02": 1,
"SCP03": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
},
"DES": {
"3DES": {
"TDES": 5,
"Triple-DES": 6
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 398
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Antoine de Lavernette",
"/CreationDate": "D:20140227160145+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "Security Target, CC, eTravel",
"/ModDate": "D:20140227160145+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "MRTD",
"/Title": "eTravel EAC v2 Security Target",
"pdf_file_size_bytes": 914256,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 63
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf",
"pp_name": "Machine Readable Travel Document with [ICAO Application] Extended Access Control, Version 1..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_09.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ALC_DVS.2",
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2015_09_Lite_v1.1p.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4e1ea763c0055a5281c4277dd1e8ea0b1f7ee867891125ae34988aa7c4a1a291",
"txt_hash": "9c84022feff695fa6d2b5cdbee3e78f53172d5a000b8fd1ea46016e8b946c70a"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4796d22c441035268d011017967e1e43f4c88192f249bb62d4d66057c795a1c6",
"txt_hash": "f7a6752bdf51719531e15b926f1d596a67355d2c9fabff70a89cf55489e615e9"
}
},
"status": "archived"
}