eTravel Essential 1.3-2.0 – BAC, EAC and AA activated (Version 1.0)

CSV information

Status active
Valid from 27.12.2021
Valid until 27.12.2025
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL5+, AVA_VAN.5
Protection profiles

Heuristics summary

Certificate ID: ANSSI-CC-2021/64

Certificate

Extracted keywords

Security level
EAL2
Security Assurance Requirements (SAR)
AVA_VAN.5
Certificates
ANSSI-CC-2021/64
Evaluation facilities
CEA - LETI

Standards
ICAO

File metadata

Title ANSSI-CC-2021/63
Keywords version x.x, révision x
Author DUCLOS Charlene
Creation date D:20220107145739+01'00'
Modification date D:20220107145739+01'00'
Pages 2
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Certification report

Extracted keywords

Symmetric Algorithms
DES

CPLC
IC Fabricator, IC Type
Vendor
Infineon Technologies AG

Security level
EAL 5, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-PP-0056-2009, BSI-PP-0084-2014, BSI-CC-PP-0056-2009
Certificates
BSI-DSZ-CC-1156-V2-2021, ANSSI-CC-2021/64
Evaluation facilities
CESTI, CEA - LETI

Standards
ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Subject eTravel Essential 1.3-2.0- BAC, EAC and AA activated
Keywords [ANSSI Crypto]
Author [email protected]
Creation date D:20220107144608+01'00'
Modification date D:20220107144608+01'00'
Pages 14
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

References

Outgoing
  • BSI-DSZ-CC-1156-V2-2021 - active - IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance

Security target

Extracted keywords

Symmetric Algorithms
AES, AES-256, DES, Triple-DES, TDES, CMAC
Asymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
RND, RNG
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG15, EF.COM, EF.SOD
Vendor
Infineon, Thales

Security level
EAL5+, EAL5, EAL6, EAL 6+, EAL5 augmented, EAL6 augmented
Claims
D.ACODE, D.ACODE_CIPHEREDSIGNED, D.ACODE-ID, D.ACODE_DEC-KEY, D.ACODE_ENC-KEY, D.ACODE_SGNVER-KEY, D.ACODE_SGNGEN-KEY, D.ACODE_, D.ACODE_SGNVER-, O.SECURE_LOAD_ACODE, O.SECURE_ACTIVATION_ACODE, O.TOE_IDENTIFICATION, O.CONFID-LOAD_ACODE, O.RND, O.SECURE_AC_ACTIVATION, O.CONFID-ES-UPDATE, T.UNAUTHORIZED_ES_UPDATE, T.FAKE-SGNVER-KEY, T.WRONG-UPDATE-STATE, T.INTEG-ACODE_LOAD, T.CONFID-ACODE_LOAD, T.INTEG-, T.CONFID-, A.ACODE-EVIDENCE, A.ACODE-KEY-MANAGEMENT, A.MRTD_, OE.ENCRYPTION_ACODE, OE.BAC_PP, OE.ACODE_SECURE_LOAD, OE.ACODE-VERIFICATION, OE.ACODE-EVIDENCE, OE.CODE-VERIFICATION, OE.ACODE-TRUSTED-DEVELOPER, OE.ACODE-ENCRYPTION, OE.ACODE-KEY-MANAGEMENT, OE.BAC-PP, OE.MRTD_, OE.ACODE-SECURE_LOAD, OE.ACODE-TRUSTED-, OE.ACODE-, OSP
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_ARC, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, AVA_VAN.3, AVA_VAN.5, ASE_ECD, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_COP, FCS_RND.1, FCS_RNG.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_RNG, FDP_SDC.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC, FDP_ITC, FDP_SDI.2, FDP_ITT.1, FIA_API, FIA_AFL, FIA_API.1, FIA_SOS.2, FIA_API.1.1, FIA_UAU, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID, FIA_UID.1.1, FIA_UID.1.2, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6, FIA_UAU.6.1, FIA_ATD, FIA_ATD.1, FIA_AFL.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FMT_MSA, FMT_MSA.1, FMT_SMR, FMT_SMF, FPT_EMS, FPT_TST, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_FLS, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0056, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0055
Certificates
BSI-DSZ-CC-1156-2021, CC-1, CC-2, CC-3

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS180-2, FIPS186-4, FIPS46-3, FIPS PUB 46-3, FIPS 197, FIPS PUB 197, FIPS 180-2, SP 800-90, SP 800-67, PKCS#3, PKCS#1, RFC 2631, RFC 3369, ISO/IEC 14443, ISO/IEC 7816, ISO/IEC 7816-4, ICAO, SCP03, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004
Technical reports
BSI TR-03110

File metadata

Title Security Target eTravel Essential 1.2 - BAC, EAC and AA activated
Keywords Security Target, CC, eTravel
Author Thales
Creation date D:20210906101704+02'00'
Modification date D:20210906101704+02'00'
Pages 99
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • BSI-DSZ-CC-1156-2021 - active - IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch, design step S11 with firmware 80.310.03.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2021/64

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ASE_TSS.2, ATE_DPT.1, AVA_VAN.5

Similar certificates

Name Certificate ID
eTravel Essential 1.3-2.0 - BAC and AA activated (Version 1.0) ANSSI-CC-2021/60 Compare
eTravel Essential 1.3-2.0 – PACE, EAC and AA activated (Version 1.0) ANSSI-CC-2021/63 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/56v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’applicati... ANSSI-CC-2018/58v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated Version de l’application eTravel : 2.3 Version de ... ANSSI-CC-2018/57v2 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/44 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3... BSI-DSZ-CC-0772-2014 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/44-R01) ANSSI-CC-2020/44-R01 Compare
eTravel Essential 1.2 – BAC, EAC and AA activated (release ‘0300’) ANSSI-CC-2022/61 Compare
eTravel Essential 1.2 – BAC, EAC and AA activated (release ‘0300’) ANSSI-CC-2021/27 Compare
eTravel v2.2 on MultiApp v4.0.1 platform, BAC, EAC and AA activated ANSSI-CC-2017/82 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel v2.2 BAC on MultiApp platform v4.0.1 with Filter Set 1.0 Version 1.0 ANSSI-CC-2020/43 Compare
ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0 BSI-DSZ-CC-0623-V2-2018 Compare
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionSer... None Compare
eTravel 3.0 BAC on MultiApp v4.2 (version 3.0.0) ANSSI-CC-2021/38 Compare
eTravel Essential 1.0 avec BAC, AA et EAC activés, sur composants M7794 A12/G12 (identifiant : B2 8C 01, version 01 02) ANSSI-CC-2020/84 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 ANSSI-CC-2020/45 Compare
eTravel 3.0 EAC on SAC on MultiApp v4.2 (version 3.0.0) ANSSI-CC-2021/39 Compare
eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/55 Compare
eTravel 2.5.A EAC on BAC on MultiApp V5.0.A (version 2.5.A.0.0) ANSSI-CC-2022/12 Compare
eTravel v2.2 BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/43-R01) ANSSI-CC-2020/43-R01 Compare
eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/45-R01) ANSSI-CC-2020/45-R01 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP... NSCIB-CC-3110-2025-08-2500052-01-CR Compare
Stationäres eHealth-Kartenterminal ORGA 6141 online Version 3.9.2:1.2.0 / 3.9.2:2.0.0 BSI-DSZ-CC-0519-V6-2025 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware c... 21.0.03/TSE-CCCS-48 Compare
Showing 5 out of 32.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021-64.pdf",
  "dgst": "69906de02df692c3",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2021/64",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0",
        "1.0",
        "1.3"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "f826c2b289ac76dc"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1156-V2-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1156-2021",
          "BSI-DSZ-CC-1156-V2-2021"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1156-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1156-2021"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "eTravel Essential 1.3-2.0 \u2013 BAC, EAC and AA activated (Version 1.0)",
  "not_valid_after": "2025-12-27",
  "not_valid_before": "2021-12-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-anssi-cc-2021-64.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/64": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ICAO": {
          "ICAO": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "DUCLOS Charlene",
      "/CreationDate": "D:20220107145739+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "version x.x, r\u00e9vision x",
      "/ModDate": "D:20220107145739+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Title": "ANSSI-CC-2021/63",
      "pdf_file_size_bytes": 366396,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2021-64.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1156-V2-2021": 1
        },
        "FR": {
          "ANSSI-CC-2021/64": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-2009": 1,
          "BSI-PP-0056-2009": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        },
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1
        },
        "CESTI": {
          "CESTI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "ICAO": {
          "ICAO": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "[email protected]",
      "/CreationDate": "D:20220107144608+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "[ANSSI Crypto]",
      "/ModDate": "D:20220107144608+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Subject": "eTravel Essential 1.3-2.0- BAC, EAC and AA activated",
      "pdf_file_size_bytes": 2395724,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]",
          "http://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "anssi-cible-cc-2021_64en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 8
          }
        },
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1156-2021": 1
        },
        "NL": {
          "CC-1": 4,
          "CC-2": 6,
          "CC-3": 5
        }
      },
      "cc_claims": {
        "A": {
          "A.ACODE-EVIDENCE": 3,
          "A.ACODE-KEY-MANAGEMENT": 3,
          "A.MRTD_": 1
        },
        "D": {
          "D.ACODE": 8,
          "D.ACODE-ID": 3,
          "D.ACODE_": 1,
          "D.ACODE_CIPHEREDSIGNED": 7,
          "D.ACODE_DEC-KEY": 4,
          "D.ACODE_ENC-KEY": 2,
          "D.ACODE_SGNGEN-KEY": 2,
          "D.ACODE_SGNVER-": 1,
          "D.ACODE_SGNVER-KEY": 4
        },
        "O": {
          "O.CONFID-ES-UPDATE": 1,
          "O.CONFID-LOAD_ACODE": 4,
          "O.RND": 1,
          "O.SECURE_ACTIVATION_ACODE": 4,
          "O.SECURE_AC_ACTIVATION": 1,
          "O.SECURE_LOAD_ACODE": 9,
          "O.TOE_IDENTIFICATION": 7
        },
        "OE": {
          "OE.ACODE-": 1,
          "OE.ACODE-ENCRYPTION": 6,
          "OE.ACODE-EVIDENCE": 5,
          "OE.ACODE-KEY-MANAGEMENT": 6,
          "OE.ACODE-SECURE_LOAD": 1,
          "OE.ACODE-TRUSTED-": 1,
          "OE.ACODE-TRUSTED-DEVELOPER": 5,
          "OE.ACODE-VERIFICATION": 4,
          "OE.ACODE_SECURE_LOAD": 4,
          "OE.BAC-PP": 3,
          "OE.BAC_PP": 2,
          "OE.CODE-VERIFICATION": 1,
          "OE.ENCRYPTION_ACODE": 1,
          "OE.MRTD_": 2
        },
        "OSP": {
          "OSP": 1
        },
        "T": {
          "T.CONFID-": 1,
          "T.CONFID-ACODE_LOAD": 2,
          "T.FAKE-SGNVER-KEY": 3,
          "T.INTEG-": 1,
          "T.INTEG-ACODE_LOAD": 2,
          "T.UNAUTHORIZED_ES_UPDATE": 3,
          "T.WRONG-UPDATE-STATE": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056": 1,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_DVS.2": 6
        },
        "ASE": {
          "ASE_ECD": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_DPT.1": 1
        },
        "AVA": {
          "AVA_VAN.3": 2,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6+": 1,
          "EAL5": 7,
          "EAL5 augmented": 3,
          "EAL5+": 1,
          "EAL6": 1,
          "EAL6 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 7,
          "FAU_SAS.1": 16,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 38,
          "FCS_CKM.1": 26,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 6,
          "FCS_CKM.4": 47,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 82,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 5,
          "FCS_RND": 11,
          "FCS_RND.1": 16,
          "FCS_RND.1.1": 2,
          "FCS_RNG": 5,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 11,
          "FDP_ACC.1": 22,
          "FDP_ACF": 10,
          "FDP_ACF.1": 23,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 5,
          "FDP_ITC": 1,
          "FDP_ITC.1": 19,
          "FDP_ITC.2": 19,
          "FDP_ITT.1": 1,
          "FDP_SDC.1": 5,
          "FDP_SDI.2": 2,
          "FDP_UCT.1": 9,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 11,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL": 10,
          "FIA_AFL.1": 1,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 14,
          "FIA_API.1": 11,
          "FIA_API.1.1": 1,
          "FIA_ATD": 7,
          "FIA_ATD.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 47,
          "FIA_UAU.1": 3,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.4": 1,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 1,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 1,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 25,
          "FIA_UID.1": 17,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 9,
          "FMT_LIM.1": 27,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 25,
          "FMT_LIM.2.1": 3,
          "FMT_MSA": 8,
          "FMT_MSA.1": 6,
          "FMT_MSA.3": 5,
          "FMT_MTD": 52,
          "FMT_MTD.1": 5,
          "FMT_MTD.3": 6,
          "FMT_MTD.3.1": 1,
          "FMT_SMF": 8,
          "FMT_SMF.1": 49,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 13,
          "FMT_SMR.1": 36,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 16,
          "FPT_EMS.1": 18,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 7,
          "FPT_FLS.1": 21,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 3,
          "FPT_PHP.3": 15,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 13,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 2,
          "FPT_TST.1.2": 2,
          "FPT_TST.1.3": 2,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 2
        },
        "FTP": {
          "FTP_ITC.1": 6,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 21
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 5
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 7,
          "EF.DG1": 17,
          "EF.DG14": 7,
          "EF.DG15": 3,
          "EF.DG16": 15,
          "EF.DG2": 8,
          "EF.DG3": 18,
          "EF.DG4": 18,
          "EF.DG5": 6,
          "EF.SOD": 8
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 7,
          "Physical Tampering": 5,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 3,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 3,
          "SPA": 1,
          "physical probing": 3
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 197": 2,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1,
          "FIPS180-2": 1,
          "FIPS186-4": 2,
          "FIPS46-3": 1
        },
        "ICAO": {
          "ICAO": 14
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 7816": 2,
          "ISO/IEC 7816-4": 1
        },
        "NIST": {
          "SP 800-67": 1,
          "SP 800-90": 2
        },
        "PKCS": {
          "PKCS#1": 2,
          "PKCS#3": 2
        },
        "RFC": {
          "RFC 2631": 1,
          "RFC 3369": 1
        },
        "SCP": {
          "SCP03": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9,
            "AES-256": 2
          }
        },
        "DES": {
          "3DES": {
            "TDES": 5,
            "Triple-DES": 6
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 10
        },
        "Thales": {
          "Thales": 43
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Thales",
      "/CreationDate": "D:20210906101704+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "Security Target, CC, eTravel",
      "/ModDate": "D:20210906101704+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Security Target eTravel Essential 1.2 - BAC, EAC and AA activated",
      "pdf_file_size_bytes": 2100622,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 99
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026b.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021-64.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL5+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_64en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b504232876c704f27971f6529c80fa96a38e1719c8586446d56ecde8498b723a",
      "txt_hash": "108f7439b21314f782843aeadfb5b23c6ebf9b30ed8b16bc0217b346325e3c5b"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "56762696a39f4b3cf641987930c38da5f71d55c0874bcca5f9e97164f349ab10",
      "txt_hash": "8fd31f28965708c14343311f39ccd8ef474df9b890ad7c1bbad4e72ae18c7680"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c79567b0fb5ebd89879d1857f39228a67366a05a0fefd29cb971ae6b59e245a2",
      "txt_hash": "b542561720fbe457c66d4dd995d9737d87748fa53ae73faf54c6b508547f79f5"
    }
  },
  "status": "active"
}