eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02
CSV information ?
Status | active |
---|---|
Valid from | 15.12.2020 |
Valid until | 15.12.2025 |
Scheme | 🇫🇷 FR |
Manufacturer | Thales |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Protection profiles | |
Maintenance updates | Maintenant report: ANSSI-CC-2020/83-M01 (18.02.2022) Certification report |
Heuristics summary ?
Certificate ?
Extracted keywords
Protocols
PACESecurity level
EAL5, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011Certificates
ANSSI-CC-2020/83Evaluation facilities
SERMAFile metadata
Creation date | D:20210104173220+01'00' |
---|---|
Modification date | D:20210104173220+01'00' |
Pages | 2 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DESAsymmetric Algorithms
ECDH, ECDSA, DHProtocols
PACELibraries
v1.02.013Vendor
Infineon TechnologiesSecurity level
EAL 5, EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMS, ALC_DEL, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011, BSI-PP-0084-2014, BSI-CC-PP-0056-V2-2012-MA-02Certificates
BSI-DSZ-CC-0964-V4-2019, ANSSI-CC-2020/83, ANSSI-CC-2015/32Evaluation facilities
SERMAStandards
ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Creation date | D:20201216183614+01'00' |
---|---|
Modification date | D:20201216183614+01'00' |
Pages | 16 |
References
Outgoing- BSI-DSZ-CC-0964-V4-2019 - archived - Infineon Technologies Security Controller M7794 A12 / G12 with optional RSA2048/4096v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
- ANSSI-CC-2015/32 - archived - eTravel Essential 1.0, avec SAC, AA et EAC activés sur composant M7794 A12/G12
Security target ?
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, TDES, 3DES, KMAC, CMACAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DHSchemes
MAC, Key AgreementProtocols
PACERandomness
RNGBlock cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG15, EF.COM, EF.SODVendor
GemaltoSecurity level
EAL 5+, EAL5, EAL5 augmentedClaims
OE.BAC-PPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, AVA_VAN.3, AVA_VAN.5, ASE_ECDSecurity Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_COP, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1, FDP_RIP.1.1, FDP_UCT.1, FDP_UCT, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT, FDP_UIT.1.1, FDP_UIT.1.2, FIA_API, FIA_AFL, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.4, FIA_UAU, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID, FIA_UID.1.1, FIA_UID.1.2, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.5, FIA_UAU.6.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FMT_MSA.1, FPT_EMS, FPT_TST, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-PP-0035, BSI-PP-0056-V2-MA-2012, BSI-PP-0056-2009, BSI-CC-PP-0068-V2-2011-MA-01, BSI-PP-0055-2009Certificates
BSI-DSZ-CC-0964-V4-2019, CC-1, CC-2, CC-3Evaluation facilities
Serma TechnologiesSide-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, Physical Tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS 186-3, FIPS 46-3, FIPS 197, SP 800-90, SP 800-67, PKCS#3, PKCS#1, RFC 2631, RFC 3369, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Technical reports
BSI TR-03110File metadata
Title | Erodium2: eTravel Essential 1.0 EAC on PACE Security Target Lite |
---|---|
Subject | 1.7p |
Keywords | 10-06-2020 |
Author | D1315455 |
Creation date | D:20200928110811+02'00' |
Modification date | D:20200928110811+02'00' |
Pages | 83 |
Creator | Microsoft® Word 2013 |
Producer | Microsoft® Word 2013 |
References
Outgoing- BSI-DSZ-CC-0964-V4-2019 - archived - Infineon Technologies Security Controller M7794 A12 / G12 with optional RSA2048/4096v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, AVA_VAN.5Similar certificates
Scheme data ?
Product | eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/etravel-essential-10-avec-sac-aa-et-eac-actives-sur-composants-m7794-a12g12 | |
Description | Le produit évalué est « eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12, identifiant : B2 8C 01, version 01 02 » développé par THALES et INFINEON TECHNOLOGIES AG. Le produit certifié est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile | |
Sponsor | THALES INFINEON TECHNOLOGIES AG | |
Developer | THALES INFINEON TECHNOLOGIES AG | |
Cert Id | ANSSI-CC-2020/83 | |
Level | EAL5+ | |
Expiration Date | 15.12.2025 | |
Enhanced | ||
Cert Id | ANSSI-CC-2020/83 | |
Certification Date | 15.12.2020 | |
Expiration Date | 15.12.2025 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | THALES INFINEON TECHNOLOGIES AG | |
Sponsor | THALES INFINEON TECHNOLOGIES AG | |
Evaluation Facility | SERMA SAFETY & SECURITY | |
Level | EAL5+ | |
Protection Profile | Machine Readable Travel Document with “ICAO Application”, Extended Access Control with PACE & Machine Readable Travel Document using Standard Inspection Procedure with PACE | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Report Link | https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cc-2020-83fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cible-2020_83-m01en.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/2021/01/certificat_2020_83fr.pdf |
References ?
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02', 'url': 'https://cyber.gouv.fr/produits-certifies/etravel-essential-10-avec-sac-aa-et-eac-actives-sur-composants-m7794-a12g12', 'description': 'Le produit évalué est « eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12, identifiant : B2 8C 01, version 01 02 » développé par THALES et INFINEON TECHNOLOGIES AG. Le produit certifié est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile', 'sponsor': 'THALES INFINEON TECHNOLOGIES AG', 'developer': 'THALES INFINEON TECHNOLOGIES AG', 'cert_id': 'ANSSI-CC-2020/83', 'level': 'EAL5+', 'expiration_date': '2025-12-15', 'enhanced': {'cert_id': 'ANSSI-CC-2020/83', 'certification_date': '2020-12-15', 'expiration_date': '2025-12-15', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES INFINEON TECHNOLOGIES AG', 'sponsor': 'THALES INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Machine Readable Travel Document with “ICAO Application”, Extended Access Control with PACE & Machine Readable Travel Document using Standard Inspection Procedure with PACE', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cc-2020-83fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cible-2020_83-m01en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/01/certificat_2020_83fr.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit évalué est « eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12, identifiant : B2 8C 01, version 01 02 » développé par THALES et INFINEON TECHNOLOGIES AG. Le produit certifié est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile', 'cert_id': 'ANSSI-CC-2020/83', 'expiration_date': '2025-12-15', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2020/83', 'certification_date': '2020-12-15', 'expiration_date': '2025-12-15', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['EPASS_PACE_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02', 'url': 'https://cyber.gouv.fr/produits-certifies/etravel-essential-10-avec-sac-aa-et-eac-actives-sur-composants-m7794-a12g12', 'description': 'Le produit évalué est « eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12, identifiant : B2 8C 01, version 01 02 » développé par THALES et INFINEON TECHNOLOGIES AG.\nLe produit certifié est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile', 'sponsor': 'THALES INFINEON TECHNOLOGIES AG', 'developer': 'THALES INFINEON TECHNOLOGIES AG', 'cert_id': '2020/83', 'level': 'EAL5+', 'expiration_date': '15 Décembre 2025', 'enhanced': {'cert_id': '2020/83', 'certification_date': '15/12/2020', 'expiration_date': '15/12/2025', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES INFINEON TECHNOLOGIES AG', 'sponsor': 'THALES INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Machine Readable Travel Document with “ICAO Application”, Extended Access Control with PACE & Machine Readable Travel Document using Standard Inspection Procedure with PACE', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cc-2020-83fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cible-2020_83-m01en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/01/certificat_2020_83fr.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd514ae71974f435d1a9f41202471b755ed8e711af8b67f60d25f0314b7af23f8', 'txt_hash': '395990b624f546bb98577e799df327d8501f2560506fd90cc514b5bd53f0e3dd'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '426f00bb33b7f035657f92112253324a3cbe57e33a05e29704c5e76ec767848a', 'txt_hash': 'acd9a274b25496bfa3fab59e80192b5cfcd39aa189d2b932f1a2691e1337db5b'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1509090, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 83, '/Title': 'Erodium2: eTravel Essential 1.0 EAC on PACE Security Target Lite', '/Author': 'D1315455', '/Subject': '1.7p', '/Keywords': '10-06-2020', '/Creator': 'Microsoft® Word 2013', '/CreationDate': "D:20200928110811+02'00'", '/ModDate': "D:20200928110811+02'00'", '/Producer': 'Microsoft® Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 267658, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20210104173220+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210104173220+01'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0964-V4-2019': 1}, 'NL': {'CC-1': 5, 'CC-2': 6, 'CC-3': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1, 'BSI-PP-0056-V2-MA-2012': 1, 'BSI-PP-0056-2009': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1, 'BSI-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL 5+': 2, 'EAL5': 5, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 4}, 'ATE': {'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN.5': 4}, 'ASE': {'ASE_ECD': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_GEN': 1, 'FAU_SAS.1': 11, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 7, 'FCS_CKM': 48, 'FCS_COP': 70, 'FCS_CKM.1': 18, 'FCS_RND.1': 14, 'FCS_RND.1.1': 2, 'FCS_CKM.2': 8, 'FCS_COP.1': 9, 'FCS_CKM.4': 53, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 7}, 'FDP': {'FDP_ACF': 11, 'FDP_ITC.1': 16, 'FDP_ITC.2': 16, 'FDP_ACC.1': 7, 'FDP_ACC': 14, 'FDP_ACF.1': 10, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP.1': 7, 'FDP_RIP.1.1': 1, 'FDP_UCT.1': 2, 'FDP_UCT': 6, 'FDP_IFC.1': 4, 'FDP_UCT.1.1': 1, 'FDP_UIT.1': 2, 'FDP_UIT': 6, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1}, 'FIA': {'FIA_API': 15, 'FIA_AFL': 20, 'FIA_SOS.2': 1, 'FIA_API.1': 6, 'FIA_API.1.1': 1, 'FIA_UAU.4': 2, 'FIA_UAU': 69, 'FIA_UAU.1': 4, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_UID': 24, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2, 'FIA_UID.1': 6, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.5': 3, 'FIA_UAU.6.1': 2}, 'FMT': {'FMT_LIM': 7, 'FMT_LIM.1': 20, 'FMT_LIM.2': 18, 'FMT_LIM.1.1': 3, 'FMT_LIM.2.1': 3, 'FMT_MTD': 66, 'FMT_MSA.3': 3, 'FMT_SMF.1': 48, 'FMT_SMR.1': 3, 'FMT_SMF.1.1': 1, 'FMT_SMR': 31, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 1, 'FMT_MTD.1': 13, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 6, 'FMT_MTD.3.1': 1, 'FMT_MSA.1': 1}, 'FPT': {'FPT_EMS': 4, 'FPT_TST': 2, 'FPT_EMS.1': 12, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 8, 'FPT_TST.1': 9, 'FPT_PHP.3': 10, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 4, 'FTP_ITC': 12, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'OE': {'OE.BAC-PP': 1}}, 'vendor': {'Gemalto': {'Gemalto': 19}}, 'eval_facility': {'Serma': {'Serma Technologies': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12}}, 'DES': {'3DES': {'Triple-DES': 6, 'TDES': 7, '3DES': 2}}, 'constructions': {'MAC': {'KMAC': 3, 'CMAC': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 8}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 2}}, 'FF': {'DH': {'Diffie-Hellman': 9, 'DH': 9}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KA': {'Key Agreement': 11}}, 'crypto_protocol': {'PACE': {'PACE': 117}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 3, 'Physical tampering': 2, 'Malfunction': 5, 'malfunction': 6, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 11, 'EF.DG2': 5, 'EF.DG3': 11, 'EF.DG4': 11, 'EF.DG5': 3, 'EF.DG16': 9, 'EF.DG14': 5, 'EF.DG15': 2, 'EF.COM': 3, 'EF.SOD': 4}}, 'standard_id': {'FIPS': {'FIPS 186-3': 1, 'FIPS 46-3': 1, 'FIPS 197': 1}, 'NIST': {'SP 800-90': 2, 'SP 800-67': 1}, 'PKCS': {'PKCS#3': 5, 'PKCS#1': 2}, 'RFC': {'RFC 2631': 1, 'RFC 3369': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 15}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2020/83': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-2020_83en.pdf
. - The cert_filename property was set to
certificat_2020_83fr.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0964-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0964-V4-2019']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2015/32', 'BSI-DSZ-CC-0964-V4-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0917-2014', 'ANSSI-CC-2015/32', 'BSI-DSZ-CC-0964-V4-2019', 'BSI-DSZ-CC-0964-V3-2017', 'ANSSI-CC-2014/77', 'BSI-DSZ-CC-0814-2012', 'BSI-DSZ-CC-0786-2012', 'BSI-DSZ-CC-0883-2013']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]}
values added.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020-83fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2020_83en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7a5d78cc11943d2b42df3113da02191e51fc11e2d666ddaf00c325bd83be6a41', 'txt_hash': '3a631e0b048b479dc3b5b920a8f7b340029bb3a9ecca3955736b26e0ff556385'}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 2876998, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20201216183614+01'00'", '/ModDate': "D:20201216183614+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'http://www.sogis.eu/', 'mailto:[email protected]', 'file://intranet.fr/sgdsn/anssi/SDE/PSS/CCN/Qualite/_répertoire%20de%20travail/ANSSI-CC-CER-F-07%20Rapport%20de%20certification/v30%20-%20Charte/Relecture/www.ssi.gouv.fr', 'http://www.commoncriteriaportal.org/']}}
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0964-V4-2019': 2}, 'FR': {'ANSSI-CC-2020/83': 17, 'ANSSI-CC-2015/32': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011': 2, 'BSI-PP-0084-2014': 1, 'BSI-CC-PP-0056-V2-2012-MA-02': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 2}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 6}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies': 1}}, 'eval_facility': {'Serma': {'SERMA': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}}, 'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 12}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 3}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
anssi-cc-2020-83fr.pdf
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The scheme_data property was set to
{'product': 'eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02', 'url': 'https://cyber.gouv.fr/produits-certifies/etravel-essential-10-avec-sac-aa-et-eac-actives-sur-composants-m7794-a12g12', 'description': 'Le produit évalué est « eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12, identifiant : B2 8C 01, version 01 02 » développé par THALES et INFINEON TECHNOLOGIES AG.\nLe produit certifié est de type « carte à puce » avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile', 'sponsor': 'THALES INFINEON TECHNOLOGIES AG', 'developer': 'THALES INFINEON TECHNOLOGIES AG', 'cert_id': '2020/83', 'level': 'EAL5+', 'expiration_date': '15 Décembre 2025', 'enhanced': {'cert_id': '2020/83', 'certification_date': '15/12/2020', 'expiration_date': '15/12/2025', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES INFINEON TECHNOLOGIES AG', 'sponsor': 'THALES INFINEON TECHNOLOGIES AG', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Machine Readable Travel Document with “ICAO Application”, Extended Access Control with PACE & Machine Readable Travel Document using Standard Inspection Procedure with PACE', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cc-2020-83fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cible-2020_83-m01en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/01/certificat_2020_83fr.pdf'}}
.
- The report property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2020_83fr.pdf",
"dgst": "340aeee69861d949",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2020/83",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2015/32",
"BSI-DSZ-CC-0964-V4-2019"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0814-2012",
"BSI-DSZ-CC-0786-2012",
"ANSSI-CC-2014/77",
"BSI-DSZ-CC-0964-V3-2017",
"BSI-DSZ-CC-0917-2014",
"BSI-DSZ-CC-0964-V4-2019",
"BSI-DSZ-CC-0883-2013",
"ANSSI-CC-2015/32"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2020/83",
"description": "Le produit \u00e9valu\u00e9 est \u00ab eTravel Essential 1.0 avec SAC, AA et EAC activ\u00e9s sur composants M7794 A12/G12, identifiant : B2 8C 01, version 01 02 \u00bb d\u00e9velopp\u00e9 par THALES et INFINEON TECHNOLOGIES AG. Le produit certifi\u00e9 est de type \u00ab carte \u00e0 puce \u00bb avec et sans contact. Il impl\u00e9mente les fonctions de document de voyage \u00e9lectronique conform\u00e9ment aux sp\u00e9cifications de l\u2019organisation de l\u2019aviation civile",
"developer": "THALES INFINEON TECHNOLOGIES AG",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2020/83",
"cert_link": "https://cyber.gouv.fr/sites/default/files/2021/01/certificat_2020_83fr.pdf",
"certification_date": "2020-12-15",
"developer": "THALES INFINEON TECHNOLOGIES AG",
"evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
"expiration_date": "2025-12-15",
"level": "EAL5+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "Machine Readable Travel Document with \u201cICAO Application\u201d, Extended Access Control with PACE \u0026 Machine Readable Travel Document using Standard Inspection Procedure with PACE",
"report_link": "https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cc-2020-83fr.pdf",
"sponsor": "THALES INFINEON TECHNOLOGIES AG",
"target_link": "https://cyber.gouv.fr/sites/default/files/2021/01/anssi-cible-2020_83-m01en.pdf"
},
"expiration_date": "2025-12-15",
"level": "EAL5+",
"product": "eTravel Essential 1.0 avec SAC, AA et EAC activ\u00e9s sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02",
"sponsor": "THALES INFINEON TECHNOLOGIES AG",
"url": "https://cyber.gouv.fr/produits-certifies/etravel-essential-10-avec-sac-aa-et-eac-actives-sur-composants-m7794-a12g12"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0964-V4-2019"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0964-V4-2019"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-02-18",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_83-m01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Maintenant report: ANSSI-CC-2020/83-M01"
}
]
},
"manufacturer": "Thales",
"manufacturer_web": null,
"name": "eTravel Essential 1.0 avec SAC, AA et EAC activ\u00e9s sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02",
"not_valid_after": "2025-12-15",
"not_valid_before": "2020-12-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "certificat_2020_83fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2020/83": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0068-V2-2011": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "",
"/CreationDate": "D:20210104173220+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20210104173220+01\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 267658,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "anssi-cc-2020-83fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0964-V4-2019": 2
},
"FR": {
"ANSSI-CC-2015/32": 1,
"ANSSI-CC-2020/83": 17
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0056-V2-2012-MA-02": 1,
"BSI-CC-PP-0068-V2-2011": 2,
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 2,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 3
}
},
"crypto_protocol": {
"PACE": {
"PACE": 12
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"SERMA": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"ICAO": {
"ICAO": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20201216183614+01\u002700\u0027",
"/ModDate": "D:20201216183614+01\u002700\u0027",
"pdf_file_size_bytes": 2876998,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/",
"file://intranet.fr/sgdsn/anssi/SDE/PSS/CCN/Qualite/_r\u00c3\u00a9pertoire%20de%20travail/ANSSI-CC-CER-F-07%20Rapport%20de%20certification/v30%20-%20Charte/Relecture/www.ssi.gouv.fr",
"http://www.sogis.eu/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "anssi-cible-2020_83en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 8
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 9,
"Diffie-Hellman": 9
}
},
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0964-V4-2019": 1
},
"NL": {
"CC-1": 5,
"CC-2": 6,
"CC-3": 3
}
},
"cc_claims": {
"OE": {
"OE.BAC-PP": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0068-V2-2011-MA-01": 1,
"BSI-PP-0035": 1,
"BSI-PP-0055-2009": 1,
"BSI-PP-0056-2009": 1,
"BSI-PP-0056-V2-MA-2012": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_DVS.2": 4
},
"ASE": {
"ASE_ECD": 1
},
"ATE": {
"ATE_DPT.1": 1
},
"AVA": {
"AVA_VAN.3": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 2,
"EAL5": 5,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 6,
"FAU_SAS.1": 11,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 48,
"FCS_CKM.1": 18,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 8,
"FCS_CKM.4": 53,
"FCS_CKM.4.1": 1,
"FCS_COP": 70,
"FCS_COP.1": 9,
"FCS_COP.1.1": 7,
"FCS_RND": 7,
"FCS_RND.1": 14,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 14,
"FDP_ACC.1": 7,
"FDP_ACC.1.1": 1,
"FDP_ACF": 11,
"FDP_ACF.1": 10,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 4,
"FDP_ITC.1": 16,
"FDP_ITC.2": 16,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_UCT": 6,
"FDP_UCT.1": 2,
"FDP_UCT.1.1": 1,
"FDP_UIT": 6,
"FDP_UIT.1": 2,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 20,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_API": 15,
"FIA_API.1": 6,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 69,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.4": 2,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 3,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6.1": 2,
"FIA_UID": 24,
"FIA_UID.1": 6,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 2
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 20,
"FMT_LIM.1.1": 3,
"FMT_LIM.2": 18,
"FMT_LIM.2.1": 3,
"FMT_MSA.1": 1,
"FMT_MSA.3": 3,
"FMT_MTD": 66,
"FMT_MTD.1": 13,
"FMT_MTD.1.1": 1,
"FMT_MTD.3": 6,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 48,
"FMT_SMF.1.1": 1,
"FMT_SMR": 31,
"FMT_SMR.1": 3,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 4,
"FPT_EMS.1": 12,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 10,
"FPT_PHP.3.1": 1,
"FPT_TST": 2,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 12,
"FTP_ITC.1": 4,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 117
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 11
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {},
"ic_data_group": {
"EF": {
"EF.COM": 3,
"EF.DG1": 11,
"EF.DG14": 5,
"EF.DG15": 2,
"EF.DG16": 9,
"EF.DG2": 5,
"EF.DG3": 11,
"EF.DG4": 11,
"EF.DG5": 3,
"EF.SOD": 4
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 5,
"Physical Tampering": 3,
"Physical tampering": 2,
"fault injection": 1,
"malfunction": 6
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 2,
"SPA": 1,
"physical probing": 3,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 186-3": 1,
"FIPS 197": 1,
"FIPS 46-3": 1
},
"ICAO": {
"ICAO": 15
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816-4": 1
},
"NIST": {
"SP 800-67": 1,
"SP 800-90": 2
},
"PKCS": {
"PKCS#1": 2,
"PKCS#3": 5
},
"RFC": {
"RFC 2631": 1,
"RFC 3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDES": 7,
"Triple-DES": 6
}
},
"constructions": {
"MAC": {
"CMAC": 3,
"KMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 2
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 19
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "D1315455",
"/CreationDate": "D:20200928110811+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/Keywords": "10-06-2020",
"/ModDate": "D:20200928110811+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "1.7p",
"/Title": "Erodium2: eTravel Essential 1.0 EAC on PACE Security Target Lite",
"pdf_file_size_bytes": 1509090,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 83
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"MRTD_SAC_PACEV2_V1.0",
"EPASS_PACE_V1.0",
"EPASS_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf",
"pp_name": "Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)"
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4",
"pp_ids": {
"_type": "Set",
"elements": [
"MRTD-PP_V1.10",
"MRTD_ICAO_EAC_V1.3"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf",
"pp_name": "Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020-83fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2020_83en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "426f00bb33b7f035657f92112253324a3cbe57e33a05e29704c5e76ec767848a",
"txt_hash": "acd9a274b25496bfa3fab59e80192b5cfcd39aa189d2b932f1a2691e1337db5b"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7a5d78cc11943d2b42df3113da02191e51fc11e2d666ddaf00c325bd83be6a41",
"txt_hash": "3a631e0b048b479dc3b5b920a8f7b340029bb3a9ecca3955736b26e0ff556385"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d514ae71974f435d1a9f41202471b755ed8e711af8b67f60d25f0314b7af23f8",
"txt_hash": "395990b624f546bb98577e799df327d8501f2560506fd90cc514b5bd53f0e3dd"
}
},
"status": "active"
}