eTravel EAC v1.2 masquée sur le composant S3CC9LC
CSV information ?
Status | archived |
---|---|
Valid from | 16.03.2012 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | Gemalto / Samsung |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_DVS.2, AVA_MSU.3, EAL4+, AVA_VLA.4, ADV_IMP.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
ECDH, ECDSA, ECC, DHHash functions
SHA-1Vendor
Samsung, GemaltoSecurity level
EAL 4, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL4+, EAL5+, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_FLR, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_VLA, AVA_CCA, AVA_MSU, AVA_SOFProtection profiles
BSI-PP-0026, BSI-PP-0002-2001, BSI-PP-0002-, BSI-PP-0026-2006-MA-Certificates
BSI-DSZ-CC-0624-2010, BSI-DSZ-CC-0624-, BSI-DSZ-CC-0624-2010-MA-01, DCSSI-2008/45, ANSSI-CC-2012/09, ANSSI-2009/17Evaluation facilities
Serma TechnologiesStandards
AIS 34, AIS34, ISO/IEC 15408:2005, ISO/IEC 18045:2005, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Creation date | D:20120320094044+01'00' |
---|---|
Modification date | D:20120320094044+01'00' |
Pages | 22 |
Producer | Acrobat Distiller 8.0.0 (Windows) |
Frontpage
Certificate ID | ANSSI-CC-2012/09 |
---|---|
Certified item | eTravel EAC v1.2 masquée sur le composant S3CC9LC |
Certification lab | Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France |
Developer | Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics La Boursidière, RN 186, Bâtiment Jura, BP 202, 92357 Le Plessis-Robinson, France Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France |
References
Outgoing- ANSSI-CC-2009/17 - archived - eTravel EAC version 1.0 (version 01 03) on SLE66CLX800PE m1581 e13/a14
- BSI-DSZ-CC-0624-2010 - archived - Samsung S3CC9LC 16-bit RISC Microcontroller for Smart Card, Revision 9 with optional secure RSA 3.7S and ECC 2.4S Libraries including specific IC Dedicated Software
- ANSSI-CC-2008/45 - archived - eTravel EAC version 1.1 (version 01 02) embedded on P5CD080 and P5CD144 microcontrollers
Security target ?
Extracted keywords
Symmetric Algorithms
DES, Triple-DES, TDES, KMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384Schemes
MAC, Key AgreementRandomness
RND, RNGBlock cipher modes
CBCCPLC
IC Fabricator, IC TypeIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG9, EF.DG10, EF.DG11, EF.DG12, EF.DG13, EF.DG15, EF.DG6, EF.DG7, EF.DG8, EF.COM, EF.SODTrusted Execution Environments
SSCVendor
Samsung, GemaltoSecurity level
EAL4+, EAL4, EAL 5, EAL4 augmentedClaims
D.LDS, D.MRTD, T.INFORMATION_LEAKAGE, T.PHYS_TAMPER, T.MALFUNCTION, A.PERS_AGENT, A.INSP_SYS, OT.AC_PERS, OT.DATA_INT, OT.DATA_CONF, OT.IDENTIFICATION, OT.PROT_ABUSE_FUNC, OT.PROT_INF_LEAK, OT.PROT_PHYS_TAMPER, OT.PROT_MALFUNCTION, OE.PASS_AUTH_SIGN, OE.EXAM_MRTD, OE.PROT_LOGICAL_MRTDSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_FSP, ADV_HLD, ADV_LLD, ADV_IMP, ADV_RCR, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.4, FCS_COP.1, FCS_CKM, FCS_COP, FDP_ACF, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UCT, FDP_UIT.1, FDP_UIT, FDP_DAU.1, FDP_DAU, FIA_API, FIA_UAU, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_AFL.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1.1, FIA_AFL.1.2, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MOF.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHPProtection profiles
BSI-PP-0017, BSI-PP-0026, BSI-PP-0002Certificates
CC-1, CC-2, CC-3Evaluation facilities
Serma TechnologiesSide-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS180-2, FIPS46-3, FIPS PUB 46-3, FIPS 46-3, FIPS 180-2, PKCS#3, AIS20, RFC3369, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003File metadata
Creation date | D:20120320094137+01'00' |
---|---|
Modification date | D:20120320094137+01'00' |
Pages | 75 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4Scheme data ?
Product | eTravel EAC v1.2 masquée sur le composant S3CC9LC | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/etravel-eac-v12-masquee-sur-le-composant-s3cc9lc | |
Description | Le produit certifié est la carte « eTravel EAC v1.2 masquée sur le composant S3CC9LC » développée par la société Gemalto. Le microcontrôleur est développé et fabriqué par la société Samsung Electronics. Le produit est une carte à puce sans contact comportant un logiciel destiné à vérifier l'authenticité du document de voyage et à identifier son porteur lors d'un contrôle frontalier, à l | |
Sponsor | Gemalto | |
Developer | Gemalto et Samsung Electronics | |
Cert Id | ANSSI-CC-2012/09 | |
Level | EAL4+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2012/09 | |
Certification Date | 16.03.2012 | |
Category | Cartes à puce | |
Cc Version | Critères Communs version 2.3 | |
Developer | Gemalto et Samsung Electronics | |
Sponsor | Gemalto | |
Evaluation Facility | Serma Technologies | |
Level | EAL4+ | |
Protection Profile | BSI-PP-0026 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-09en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-09fr.pdf |
References ?
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'eTravel EAC v1.2 masquée sur le composant S3CC9LC', 'url': 'https://cyber.gouv.fr/produits-certifies/etravel-eac-v12-masquee-sur-le-composant-s3cc9lc', 'description': 'Le produit certifié est la carte « eTravel EAC v1.2 masquée sur le composant S3CC9LC » développée par la société Gemalto. Le microcontrôleur est développé et fabriqué par la société Samsung Electronics. Le produit est une carte à puce sans contact comportant un logiciel destiné à vérifier l'authenticité du document de voyage et à identifier son porteur lors d'un contrôle frontalier, à l', 'sponsor': 'Gemalto', 'developer': 'Gemalto et Samsung Electronics', 'cert_id': 'ANSSI-CC-2012/09', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2012/09', 'certification_date': '2012-03-16', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto et Samsung Electronics', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'BSI-PP-0026', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-09en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-09fr.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit certifié est la carte « eTravel EAC v1.2 masquée sur le composant S3CC9LC » développée par la société Gemalto. Le microcontrôleur est développé et fabriqué par la société Samsung Electronics. Le produit est une carte à puce sans contact comportant un logiciel destiné à vérifier l'authenticité du document de voyage et à identifier son porteur lors d'un contrôle frontalier, à l', 'cert_id': 'ANSSI-CC-2012/09', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2012/09', 'certification_date': '2012-03-16', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'eTravel EAC v1.2 masquée sur le composant S3CC9LC', 'url': 'https://cyber.gouv.fr/produits-certifies/etravel-eac-v12-masquee-sur-le-composant-s3cc9lc', 'description': 'Le produit certifié est la carte « eTravel EAC v1.2 masquée sur le composant S3CC9LC » développée par la société Gemalto. Le microcontrôleur est développé et fabriqué par la société Samsung Electronics.\n\nLe produit est une carte à puce sans contact comportant un logiciel destiné à vérifier l'authenticité du document de voyage et à identifier son porteur lors d'un contrôle frontalier, à l', 'sponsor': 'Gemalto', 'developer': 'Gemalto et Samsung Electronics', 'cert_id': '2012/09', 'level': 'EAL4+', 'enhanced': {'cert_id': '2012/09', 'certification_date': '16/03/2012', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto et Samsung Electronics', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'BSI-PP-0026', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-09en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-09fr.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '10d459bda67168ecb7dcbd1bc8439fff32cf012046f3f3f48df8f51df1110d7e', 'txt_hash': 'def4971701461024d263b899cc5d72912327d2dc4b74e7c181cc58a55fc703fa'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f95496a79a2b7a4a036e6014d942ad23f89c0c6418f511e2ac7b92cb843be741', 'txt_hash': 'd81e87d4821ec02484f809380fc3730552181c0fbae55894b9ca60014b16bd54'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 249858, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 22, '/Comments': 'Developpeur', '/Company': 'SGDSN/ANSSI', '/CreationDate': "D:20120320094044+01'00'", '/Keywords': '', '/ModDate': "D:20120320094044+01'00'", '/Producer': 'Acrobat Distiller 8.0.0 (Windows)', '/SourceModified': 'D:20120319122111', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 945987, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 75, '/CreationDate': "D:20120320094137+01'00'", '/Keywords': '', '/ModDate': "D:20120320094137+01'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2012/09', 'cert_item': 'eTravel EAC v1.2 masquée sur le composant S3CC9LC', 'cert_item_version': 'T1004548 avec softmask S1081425 révision 01 02', 'ref_protection_profiles': 'BSI-PP-0026, [PP EAC], version 1.2 Protection Profile – Machine Readable Travel Document with ICAO application, Extended Access Control', 'cc_version': 'Critères Communs version 2.3 conforme à la norme ISO 15408:2005', 'cc_security_level': 'EAL 4 augmenté ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'developer': 'Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics La Boursidière, RN 186, Bâtiment Jura, BP 202, 92357 Le Plessis-Robinson, France Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France', 'cert_lab': 'Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0624-2010': 3, 'BSI-DSZ-CC-0624-': 1, 'BSI-DSZ-CC-0624-2010-MA-01': 1}, 'FR': {'DCSSI-2008/45': 1, 'ANSSI-CC-2012/09': 23, 'ANSSI-2009/17': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0026': 2, 'BSI-PP-0002-2001': 2, 'BSI-PP-0002-': 1, 'BSI-PP-0026-2006-MA-': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL4+': 1, 'EAL5+': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ACM': {'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 2, 'AVA_VLA': 2, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 50}, 'Gemalto': {'Gemalto': 46}}, 'eval_facility': {'Serma': {'Serma Technologies': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 2}, 'ECC': {'ECC': 2}}, 'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS34': 1}, 'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 1}, 'ICAO': {'ICAO': 1}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'NL': {'CC-1': 3, 'CC-2': 39, 'CC-3': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0017': 1, 'BSI-PP-0026': 2, 'BSI-PP-0002': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL4': 2, 'EAL 5': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 2, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_IMP': 1, 'ADV_RCR': 1}, 'ALC': {'ALC_DVS.2': 2}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_GEN': 1, 'FAU_SAS.1': 6, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 9, 'FCS_CKM.1': 27, 'FCS_RND.1': 14, 'FCS_RND.1.1': 1, 'FCS_CKM.4': 10, 'FCS_COP.1': 58, 'FCS_CKM': 9, 'FCS_COP': 21}, 'FDP': {'FDP_ACF': 1, 'FDP_ACC.1': 2, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 2, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_UCT.1': 4, 'FDP_UCT': 2, 'FDP_UIT.1': 6, 'FDP_UIT': 2, 'FDP_DAU.1': 4, 'FDP_DAU': 1}, 'FIA': {'FIA_API': 16, 'FIA_UAU': 26, 'FIA_SOS.2': 1, 'FIA_API.1': 8, 'FIA_API.1.1': 1, 'FIA_AFL.1': 5, 'FIA_UID.1': 3, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 3, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 6, 'FIA_UAU.5': 6, 'FIA_UAU.6': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_LIM': 7, 'FMT_LIM.1': 12, 'FMT_LIM.2': 11, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_MTD': 7, 'FMT_MOF.1': 1, 'FMT_SMF.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1': 13, 'FMT_MTD.3': 1, 'FMT_MTD.3.1': 1}, 'FPT': {'FPT_FLS.1': 3, 'FPT_TST.1': 4, 'FPT_PHP.3': 5, 'FPT_RVM.1': 3, 'FPT_SEP.1': 3, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_PHP': 1}}, 'cc_claims': {'D': {'D.LDS': 4, 'D.MRTD': 1}, 'T': {'T.INFORMATION_LEAKAGE': 1, 'T.PHYS_TAMPER': 1, 'T.MALFUNCTION': 1}, 'A': {'A.PERS_AGENT': 1, 'A.INSP_SYS': 1}, 'OT': {'OT.AC_PERS': 1, 'OT.DATA_INT': 1, 'OT.DATA_CONF': 1, 'OT.IDENTIFICATION': 1, 'OT.PROT_ABUSE_FUNC': 1, 'OT.PROT_INF_LEAK': 1, 'OT.PROT_PHYS_TAMPER': 1, 'OT.PROT_MALFUNCTION': 1}, 'OE': {'OE.PASS_AUTH_SIGN': 1, 'OE.EXAM_MRTD': 1, 'OE.PROT_LOGICAL_MRTD': 1}}, 'vendor': {'Samsung': {'Samsung': 23}, 'Gemalto': {'Gemalto': 100}}, 'eval_facility': {'Serma': {'Serma Technologies': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 5}, '3DES': {'Triple-DES': 14, 'TDES': 3}}, 'constructions': {'MAC': {'KMAC': 6}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 8}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 8, 'DH': 5}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 9}, 'SHA2': {'SHA-224': 6, 'SHA-256': 7, 'SHA-384': 6}}}, 'crypto_scheme': {'MAC': {'MAC': 14}, 'KA': {'Key Agreement': 6}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 5, 'RNG': 8}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 1, 'Physical tampering': 3, 'Malfunction': 1, 'malfunction': 3, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1}}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICType': {'IC Type': 1}}, 'ic_data_group': {'EF': {'EF.DG1': 22, 'EF.DG2': 9, 'EF.DG3': 15, 'EF.DG4': 15, 'EF.DG5': 8, 'EF.DG16': 22, 'EF.DG14': 8, 'EF.DG9': 1, 'EF.DG10': 1, 'EF.DG11': 1, 'EF.DG12': 1, 'EF.DG13': 3, 'EF.DG15': 2, 'EF.DG6': 2, 'EF.DG7': 1, 'EF.DG8': 1, 'EF.COM': 11, 'EF.SOD': 10}}, 'standard_id': {'FIPS': {'FIPS180-2': 6, 'FIPS46-3': 2, 'FIPS PUB 46-3': 1, 'FIPS 46-3': 2, 'FIPS 180-2': 8}, 'PKCS': {'PKCS#3': 1}, 'BSI': {'AIS20': 2}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 17}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC_2012-09fr.pdf
. - The st_filename property was set to
ANSSI-CC-cible_2012-09en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['SERMA']
. - The cert_id property was set to
ANSSI-CC-2012/09
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/17', 'BSI-DSZ-CC-0624-2010', 'ANSSI-CC-2008/45']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0400-2007', 'BSI-DSZ-CC-0399-2007', 'BSI-DSZ-CC-0452-2007', 'BSI-DSZ-CC-0410-2007', 'ANSSI-CC-2008/28', 'ANSSI-CC-2009/17', 'BSI-DSZ-CC-0438-2007', 'BSI-DSZ-CC-0411-2007', 'ANSSI-CC-2008/45', 'BSI-DSZ-CC-0501-2008', 'BSI-DSZ-CC-0404-2007', 'BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-0624-2010', 'BSI-DSZ-CC-0322-2005', 'BSI-DSZ-CC-0482-2008']}}
data.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-09fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-09en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0624-2010']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0266-2005', 'BSI-DSZ-CC-0400-2007', 'BSI-DSZ-CC-0452-2007', 'BSI-DSZ-CC-0410-2007', 'ANSSI-CC-2008/28', 'BSI-DSZ-CC-0438-2007', 'BSI-DSZ-CC-0501-2008', 'BSI-DSZ-CC-0169-2002', 'BSI-DSZ-CC-0624-2010', 'BSI-DSZ-CC-0322-2005']}}}
data. - The scheme_data property was set to
{'product': 'eTravel EAC v1.2 masquée sur le composant S3CC9LC', 'url': 'https://cyber.gouv.fr/produits-certifies/etravel-eac-v12-masquee-sur-le-composant-s3cc9lc', 'description': 'Le produit certifié est la carte « eTravel EAC v1.2 masquée sur le composant S3CC9LC » développée par la société Gemalto. Le microcontrôleur est développé et fabriqué par la société Samsung Electronics.\n\nLe produit est une carte à puce sans contact comportant un logiciel destiné à vérifier l'authenticité du document de voyage et à identifier son porteur lors d'un contrôle frontalier, à l', 'sponsor': 'Gemalto', 'developer': 'Gemalto et Samsung Electronics', 'cert_id': '2012/09', 'level': 'EAL4+', 'enhanced': {'cert_id': '2012/09', 'certification_date': '16/03/2012', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 2.3', 'developer': 'Gemalto et Samsung Electronics', 'sponsor': 'Gemalto', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'BSI-PP-0026', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-09en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-09fr.pdf'}}
.
- The report_references property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name eTravel EAC v1.2 masquée sur le composant S3CC9LC was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "7c1a2e19236b65ac",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2012/09",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0624-2010",
"ANSSI-CC-2009/17",
"ANSSI-CC-2008/45"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0399-2007",
"BSI-DSZ-CC-0223-2003",
"ANSSI-CC-2008/45",
"BSI-DSZ-CC-0452-2007",
"BSI-DSZ-CC-0410-2007",
"BSI-DSZ-CC-0624-2010",
"BSI-DSZ-CC-0438-2007",
"ANSSI-CC-2009/17",
"BSI-DSZ-CC-0169-2002",
"BSI-DSZ-CC-0404-2007",
"BSI-DSZ-CC-0482-2008",
"ANSSI-CC-2008/28",
"BSI-DSZ-CC-0501-2008",
"BSI-DSZ-CC-0322-2005",
"BSI-DSZ-CC-0266-2005",
"BSI-DSZ-CC-0411-2007",
"BSI-DSZ-CC-0400-2007"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2012/09",
"description": "Le produit certifi\u00e9 est la carte \u00ab eTravel EAC v1.2 masqu\u00e9e sur le composant S3CC9LC \u00bb d\u00e9velopp\u00e9e par la soci\u00e9t\u00e9 Gemalto. Le microcontr\u00f4leur est d\u00e9velopp\u00e9 et fabriqu\u00e9 par la soci\u00e9t\u00e9 Samsung Electronics. Le produit est une carte \u00e0 puce sans contact comportant un logiciel destin\u00e9 \u00e0 v\u00e9rifier l\u0026#39;authenticit\u00e9 du document de voyage et \u00e0 identifier son porteur lors d\u0026#39;un contr\u00f4le frontalier, \u00e0 l",
"developer": "Gemalto et Samsung Electronics",
"enhanced": {
"augmented": "ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 2.3",
"cert_id": "ANSSI-CC-2012/09",
"certification_date": "2012-03-16",
"developer": "Gemalto et Samsung Electronics",
"evaluation_facility": "Serma Technologies",
"level": "EAL4+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "BSI-PP-0026",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-09fr.pdf",
"sponsor": "Gemalto",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-09en.pdf"
},
"level": "EAL4+",
"product": "eTravel EAC v1.2 masqu\u00e9e sur le composant S3CC9LC",
"sponsor": "Gemalto",
"url": "https://cyber.gouv.fr/produits-certifies/etravel-eac-v12-masquee-sur-le-composant-s3cc9lc"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Gemalto / Samsung",
"manufacturer_web": "https://www.gemalto.com/",
"name": "eTravel EAC v1.2 masqu\u00e9e sur le composant S3CC9LC",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-03-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC_2012-09fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augment\u00e9 ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4",
"cc_version": "Crit\u00e8res Communs version 2.3 conforme \u00e0 la norme ISO 15408:2005",
"cert_id": "ANSSI-CC-2012/09",
"cert_item": "eTravel EAC v1.2 masqu\u00e9e sur le composant S3CC9LC",
"cert_item_version": "T1004548 avec softmask S1081425 r\u00e9vision 01 02",
"cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France",
"developer": "Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics La Boursidi\u00e8re, RN 186, B\u00e2timent Jura, BP 202, 92357 Le Plessis-Robinson, France Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur\\(s\\)(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "BSI-PP-0026, [PP EAC], version 1.2 Protection Profile \u2013 Machine Readable Travel Document with ICAO application, Extended Access Control"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"DH": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0624-": 1,
"BSI-DSZ-CC-0624-2010": 3,
"BSI-DSZ-CC-0624-2010-MA-01": 1
},
"FR": {
"ANSSI-2009/17": 1,
"ANSSI-CC-2012/09": 23,
"DCSSI-2008/45": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-": 1,
"BSI-PP-0002-2001": 2,
"BSI-PP-0026": 2,
"BSI-PP-0026-2006-MA-": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_CAP": 1,
"ACM_SCP": 1
},
"ADO": {
"ADO_DEL": 1,
"ADO_IGS": 1
},
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_LLD": 1,
"ADV_RCR": 1,
"ADV_SPM": 1
},
"AGD": {
"AGD_ADM": 1,
"AGD_USR": 1
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_CCA": 1,
"AVA_MSU": 1,
"AVA_MSU.3": 2,
"AVA_SOF": 1,
"AVA_VLA": 2,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 3,
"EAL4+": 1,
"EAL5": 1,
"EAL5+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 34": 2,
"AIS34": 1
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 15408:2005": 1,
"ISO/IEC 18045:2005": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 46
},
"Samsung": {
"Samsung": 50
}
},
"vulnerability": {}
},
"report_metadata": {
"/Comments": "Developpeur",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20120320094044+01\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20120320094044+01\u002700\u0027",
"/Producer": "Acrobat Distiller 8.0.0 (Windows)",
"/SourceModified": "D:20120319122111",
"pdf_file_size_bytes": 249858,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 22
},
"st_filename": "ANSSI-CC-cible_2012-09en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 8
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 8
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"NL": {
"CC-1": 3,
"CC-2": 39,
"CC-3": 2
}
},
"cc_claims": {
"A": {
"A.INSP_SYS": 1,
"A.PERS_AGENT": 1
},
"D": {
"D.LDS": 4,
"D.MRTD": 1
},
"OE": {
"OE.EXAM_MRTD": 1,
"OE.PASS_AUTH_SIGN": 1,
"OE.PROT_LOGICAL_MRTD": 1
},
"OT": {
"OT.AC_PERS": 1,
"OT.DATA_CONF": 1,
"OT.DATA_INT": 1,
"OT.IDENTIFICATION": 1,
"OT.PROT_ABUSE_FUNC": 1,
"OT.PROT_INF_LEAK": 1,
"OT.PROT_MALFUNCTION": 1,
"OT.PROT_PHYS_TAMPER": 1
},
"T": {
"T.INFORMATION_LEAKAGE": 1,
"T.MALFUNCTION": 1,
"T.PHYS_TAMPER": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 1,
"BSI-PP-0017": 1,
"BSI-PP-0026": 2
}
},
"cc_sar": {
"ADV": {
"ADV_FSP": 1,
"ADV_HLD": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 2,
"ADV_LLD": 1,
"ADV_RCR": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_MSU.3": 2,
"AVA_VLA.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 6,
"FAU_SAS.1": 6,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 9,
"FCS_CKM.1": 27,
"FCS_CKM.4": 10,
"FCS_COP": 21,
"FCS_COP.1": 58,
"FCS_RND": 9,
"FCS_RND.1": 14,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 2,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_DAU": 1,
"FDP_DAU.1": 4,
"FDP_UCT": 2,
"FDP_UCT.1": 4,
"FDP_UIT": 2,
"FDP_UIT.1": 6
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 16,
"FIA_API.1": 8,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 26,
"FIA_UAU.1": 3,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 6,
"FIA_UAU.5": 6,
"FIA_UAU.6": 6,
"FIA_UID.1": 3,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 12,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 11,
"FMT_LIM.2.1": 2,
"FMT_MOF.1": 1,
"FMT_MTD": 7,
"FMT_MTD.1": 13,
"FMT_MTD.3": 1,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 2,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 2,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 3,
"FPT_FLS.1.1": 1,
"FPT_PHP": 1,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 1,
"FPT_RVM.1": 3,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 3,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TST.1": 4,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICType": {
"IC Type": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 6
},
"MAC": {
"MAC": 14
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA2": {
"SHA-224": 6,
"SHA-256": 7,
"SHA-384": 6
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 11,
"EF.DG1": 22,
"EF.DG10": 1,
"EF.DG11": 1,
"EF.DG12": 1,
"EF.DG13": 3,
"EF.DG14": 8,
"EF.DG15": 2,
"EF.DG16": 22,
"EF.DG2": 9,
"EF.DG3": 15,
"EF.DG4": 15,
"EF.DG5": 8,
"EF.DG6": 2,
"EF.DG7": 1,
"EF.DG8": 1,
"EF.DG9": 1,
"EF.SOD": 10
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 8
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"Physical Tampering": 2,
"Physical tampering": 3,
"fault injection": 1,
"malfunction": 3,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 4,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 2
},
"CC": {
"CCMB-2005-08-001": 2,
"CCMB-2005-08-002": 2,
"CCMB-2005-08-003": 2
},
"FIPS": {
"FIPS 180-2": 8,
"FIPS 46-3": 2,
"FIPS PUB 46-3": 1,
"FIPS180-2": 6,
"FIPS46-3": 2
},
"ICAO": {
"ICAO": 17
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816-4": 1
},
"PKCS": {
"PKCS#3": 1
},
"RFC": {
"RFC3369": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 3,
"Triple-DES": 14
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"KMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 100
},
"Samsung": {
"Samsung": 23
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20120320094137+01\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20120320094137+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"pdf_file_size_bytes": 945987,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 75
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026_ma1b.pdf",
"pp_name": "Machine Readable Travel Document with [ICAO Application], Extended Access Control, Version ..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-09fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_MSU.3",
"ADV_IMP.2",
"AVA_VLA.4",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-09en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "10d459bda67168ecb7dcbd1bc8439fff32cf012046f3f3f48df8f51df1110d7e",
"txt_hash": "def4971701461024d263b899cc5d72912327d2dc4b74e7c181cc58a55fc703fa"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f95496a79a2b7a4a036e6014d942ad23f89c0c6418f511e2ac7b92cb843be741",
"txt_hash": "d81e87d4821ec02484f809380fc3730552181c0fbae55894b9ca60014b16bd54"
}
},
"status": "archived"
}