eTravel Essential 1.2 – BAC and AA activated (release ‘0300’)

CSV information ?

Status active
Valid from 12.12.2022
Valid until 12.12.2027
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, ALC_TAT.2, ATE_DPT.3, ADV_INT.2, ALC_DVS.2, ADV_TDS.4, ADV_FSP.5, ALC_CMS.5

Heuristics summary ?

Certificate ID: ANSSI-CC-2022/60

Certificate ?

Extracted keywords

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_TAT.2, ALC_DVS.2, ATE_DPT.3
Protection profiles
BSI-CC-PP-0055-2009
Certificates
ANSSI-CC-2022/60
Evaluation facilities
SERMA

Standards
ICAO

File metadata

Title: ANSSI-CC-2022/60
Keywords: version x.x, révision x
Author: DUCLOS Charlene
Creation date: D:20221216141418+01'00'
Modification date: D:20221216141419+01'00'
Pages: 2
Creator: Acrobat PDFMaker 22 pour Word
Producer: Adobe PDF Library 22.3.39

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

CPLC
IC Fabricator, IC Type

Security level
EAL 4, EAL2, EAL6, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_TAT.2, ALC_DVS.2, ALC_FLR, ATE_DPT.3, AVA_VAN, ASE_TSS.2
Protection profiles
BSI-CC-PP-0055-2009, BSI-PP-0084-2014
Certificates
ANSSI-CC-2022/60, ANSSI-CC-2021/26, ANSSI-CC-2020/34, ANSSI-CC-2020/34-M01, ANSSI-CC-2020/34-S02
Evaluation facilities
SERMA, CESTI

Standards
ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title: ANSSI-CC-2022/60
Subject: eTravel Essential 1.2 – BAC and AA activated
Keywords: [ANSSI Crypto] <ou [SOG-IS Crypto]>
Author: qualite@intranet.fr
Creation date: D:20221216141237+01'00'
Modification date: D:20221216141239+01'00'
Pages: 15
Creator: Acrobat PDFMaker 22 pour Word
Producer: Adobe PDF Library 22.3.39

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, KMAC, CMAC
Asymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
RNG
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.DG14, EF.DG15, EF.DG6, EF.COM, EF.SOD
Vendor
Thales

Security level
EAL 4+, EAL4, EAL6, EAL 6+, EAL4 augmented, EAL6 augmented
Claims
OE.MRTD_
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_ARC, AGD_PRE, AGD_OPE, ALC_CMS.5, ALC_TAT.2, ALC_DVS.2, ATE_DPT.3, ASE_ECD, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_COP, FCS_RND.1, FCS_RNG.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_RNG, FDP_SDC.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC, FDP_ACC, FDP_SDI.2, FDP_ITT.1, FIA_API, FIA_AFL.1, FIA_API.1, FIA_SOS.2, FIA_API.1.1, FIA_UAU.5.2, FIA_UAU.4, FIA_UAU.6, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.6.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD, FMT_MSA.1, FMT_SRM.1, FPT_TST, FPT_EMS.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0056, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0055
Certificates
ANSSI-CC-2020/34-S02, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS180-2, FIPS46-3, FIPS PUB 46-3, FIPS 197, FIPS PUB 197, FIPS 186-4, FIPS PUB 186-4, FIPS 180-2, FIPS 46-3, SP 800-90, PKCS#3, RFC3369, ISO/IEC 14443, ISO/IEC 7816, ISO/IEC 7816-4, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title: Security Target eTravel Essential 1.2 - BAC, EAC and AA activated
Keywords: Security Target, CC, eTravel
Author: MORIN Sophie
Creation date: D:20220920164516+02'00'
Modification date: D:20220920164516+02'00'
Pages: 76
Creator: Microsoft® Word 2016
Producer: Microsoft® Word 2016

References

Outgoing

Heuristics ?

Certificate ID: ANSSI-CC-2022/60

Extracted SARs

ALC_CMS.5, ADV_FSP.5, ASE_TSS.2, ALC_TAT.2, ADV_ARC.1, ADV_TDS.4, ATE_DPT.3, ALC_DVS.2, ADV_INT.2

Scheme data ?

Product eTravel Essential 1.2 – BAC and AA activated (release '0300')
Url https://cyber.gouv.fr/produits-certifies/etravel-essential-12-bac-and-aa-activated-release-0300
Description Le produit évalué est « eTravel Essential 1.2 – BAC and AA activated, release '0300' » développé par THALES DIS. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à perme
Sponsor THALES DIS
Developer THALES DIS et THALES DIS DESIGN SERVICES
Cert Id ANSSI-CC-2022/60
Level EAL4+
Expiration Date 12 Décembre 2027
Enhanced
Cert Id ANSSI-CC-2022/60
Certification Date 12/12/2022
Expiration Date 12/12/2027
Category Cartes à puce
Cc Version Critères Communs version 3.1r5
Developer THALES DIS et THALES DIS DESIGN SERVICES
Sponsor THALES DIS
Evaluation Facility SERMA SAFETY & SECURITY
Level EAL4+
Protection Profile Machine Readable Travel Document with « ICAO Application », Basic Access Control, version 1.10, certifié BSI-CC-PP-0055-2009
Mutual Recognition CCRA SOG-IS
Augmented ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3, ALC_DVS.2

References ?

Updates ?

  • 04.03.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': "eTravel Essential 1.2 – BAC and AA activated (release '0300')", 'url': 'https://cyber.gouv.fr/produits-certifies/etravel-essential-12-bac-and-aa-activated-release-0300', 'description': "Le produit évalué est « eTravel Essential 1.2 – BAC and AA activated, release '0300' » développé par THALES DIS.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à perme", 'sponsor': 'THALES DIS', 'developer': 'THALES DIS et THALES DIS DESIGN SERVICES', 'cert_id': 'ANSSI-CC-2022/60', 'level': 'EAL4+', 'expiration_date': '12 Décembre 2027', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2022/60', 'certification_date': '12/12/2022', 'expiration_date': '12/12/2027', 'developer': 'THALES DIS et THALES DIS DESIGN SERVICES', 'sponsor': 'THALES DIS', 'level': 'EAL4+', 'protection_profile': 'Machine Readable Travel Document with « ICAO Application », Basic Access Control, version 1.10, certifié BSI-CC-PP-0055-2009', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3, ALC_DVS.2'}, '__delete__': ['target_link', 'cert_link', 'report_link']}} data.
  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ffa95f41f2609368d5ae0f429698049b5d6ad212ea99476609fe8249af8329d0', 'txt_hash': '5af61727b8a00184d5599348994457d6981345df847533c4499d246cc8f67051'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7951b5a824b9599bd3ac6eb9e75004d01e0a52bcf2ad94bca4f2487894da6fa9', 'txt_hash': '407bd0c78753aa24b72ea3ac21c26dff3d4cbe7d5443dd42745b9d8995ccacb1'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9fb2519388875bbe73661b643e48ea905daee086ea64cd0b3155f404bbb426d7', 'txt_hash': '758416413656c4b365d87695e3717e80801bdfd32f074ace7af3f27a42f287be'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 153997, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': 'DUCLOS Charlene', '/Category': '-R01', '/Comments': 'ANSSI-CC-CER-F-14_v14.8', '/Company': 'SGDSN', '/CreationDate': "D:20221216141418+01'00'", '/Creator': 'Acrobat PDFMaker 22 pour Word', '/Keywords': 'version x.x, révision x', '/ModDate': "D:20221216141419+01'00'", '/Producer': 'Adobe PDF Library 22.3.39', '/SourceModified': 'D:20221216131404', '/Title': 'ANSSI-CC-2022/60', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2022/60': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1}, 'ALC': {'ALC_CMS.5': 1, 'ALC_TAT.2': 1, 'ALC_DVS.2': 1}, 'ATE': {'ATE_DPT.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'certificat-cc-2022_60.pdf'}.
    • The report_frontpage property was set to {'FR': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2022/60': 2, 'ANSSI-CC-2021/26': 2, 'ANSSI-CC-2020/34': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-1': 2, 'CC-2': 5, 'CC-3': 4}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': "eTravel Essential 1.2 – BAC, EAC and AA activated(release '0300')", 'url': 'https://cyber.gouv.fr/produits-certifies/etravel-essential-12-bac-eac-and-aa-activatedrelease-0300', 'description': "Le produit évalué est « eTravel Essential 1.2 – BAC, EAC and AA activated, release '0300' » développé par THALES DIS.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à", 'sponsor': 'THALES DIS DESIGN SERVICES', 'developer': 'THALES DIS', 'cert_id': '2021/27', 'level': 'EAL5+', 'expiration_date': '15 Juin 2026', 'enhanced': {'cert_id': '2021/27', 'certification_date': '15/06/2021', 'expiration_date': '15/06/2026', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS', 'sponsor': 'THALES DIS DESIGN SERVICES', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Machine Readable Travel Document with « ICAO Application », Extended Access Control', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/07/anssi-cible-cc-2021_27-m01en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/07/certificat-2021_27.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/07/anssi-cc-2021_27fr.pdf'}}.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2022/60': 4, 'ANSSI-CC-2021/26': 4, 'ANSSI-CC-2020/34': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['NL']}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'7 5 7': 1, '2 0 2': 14, '0 3 0': 14, '1 5 1': 1, '1 5 2': 2, '1 5 3': 1}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2022/60': 2, 'ANSSI-CC-2021/26': 2, 'ANSSI-CC-2020/34': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-1': 2, 'CC-2': 5, 'CC-3': 4}}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': "eTravel Essential 1.2 – BAC, EAC and AA activated(release '0300')", 'url': 'https://cyber.gouv.fr/produits-certifies/etravel-essential-12-bac-eac-and-aa-activatedrelease-0300', 'description': "Le produit évalué est « eTravel Essential 1.2 – BAC, EAC and AA activated, release '0300' » développé par THALES DIS.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à", 'sponsor': 'THALES DIS DESIGN SERVICES', 'developer': 'THALES DIS', 'cert_id': '2021/27', 'level': 'EAL5+', 'expiration_date': '15 Juin 2026', 'enhanced': {'cert_id': '2021/27', 'certification_date': '15/06/2021', 'expiration_date': '15/06/2026', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES DIS', 'sponsor': 'THALES DIS DESIGN SERVICES', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Machine Readable Travel Document with « ICAO Application », Extended Access Control', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/07/anssi-cible-cc-2021_27-m01en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/07/certificat-2021_27.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/07/anssi-cc-2021_27fr.pdf'}}.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was set to None.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'product': 'eTravel Essential 1.2 – BAC and AA activated (release ‘0300’)', 'vendor': 'THALES DIS et THALES DIS DESIGN SERVICESTHALES DIS', 'level': 'EAL4+', 'id': '2022/60', 'certification_date': '12/12/2022', 'url': 'https://www.ssi.gouv.fr/certification_cc/etravel-essential-1-2-bac-and-aa-activated-release-0300/', 'enhanced': {'__update__': {'id': '2022/60', 'certification_date': '12/12/2022', 'expiration_date': '12/12/2027', 'level': 'EAL4+', 'augmentations': 'ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3, ALC_DVS.2', 'protection_profile': 'Machine Readable Travel Document with « ICAO Application », Basic Access Control, version 1.10, certifié BSI-CC-PP-0055-2009', 'developer': 'THALES DIS et THALES DIS DESIGN SERVICES / THALES DIS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « eTravel Essential 1.2 – BAC and AA activated, release ‘0300’ » développé par THALES DIS.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à permettre la vérification de l’authenticité du document de voyage et à identifier son porteur lors d’un contrôle, à l’aide d’un système d’inspection. Ce microcontrôleur et son logiciel embarqué ont typiquement vocation à être insérés dans la couverture des passeports traditionnels, dans une eCover ou dans une eDatapage.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2022/12/anssi-cc-2022_60.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2022/12/anssi-cible-cc-2022_60en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2022/12/certificat-cc-2022_60.pdf'}}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'product': 'eTravel Essential 1.3-2.0 – PACE, EAC and AA activated (Version 1.0)', 'vendor': 'THALES DIS FRANCE SASTHALES DIS FRANCE SAS', 'level': 'EAL5+', 'id': '2021/63', 'certification_date': '27/12/2021', 'category': 'Smart cards', 'url': 'https://www.ssi.gouv.fr/certification_cc/etravel-essential-1-3-2-0-pace-eac-and-aa-activated-version-1-0/', 'enhanced': {'id': '2021/63', 'certification_date': '27/12/2021', 'expiration_date': '27/12/2026', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL5+', 'augmentations': 'ALC_DVS.2, AVA_VAN.5', 'protection_profile': 'Machine Readable Travel Document with « ICAO Application », Extended Access Control with PACE, version 1.3.2 Certifié BSI-CC-PP-0056-V2-2012-MA-02 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1 Certifié BSI-CC-PP-0068-V2-2011-MA-01', 'developer': 'THALES DIS FRANCE SAS / THALES DIS FRANCE SAS', 'evaluation_facility': 'CEA - LETI', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « eTravel Essential 1.3-2.0 – PACE, EAC and AA activated, version 1.0 » développé par THALES DIS FRANCE SAS et INFINEON TECHNOLOGIES AG.\nLe produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit est destiné à permettre la vérification de l’authenticité du document de voyage et à identifier son porteur lors d’un contrôle frontalier, à l’aide d’un système d’inspection. Ce microcontrôleur et son logiciel embarqué ont vocation à être insérés dans la couverture des passeports traditionnels, dans une eCover ou dans une eDatapage. Le produit final peut prendre différentes formes, de carte ou de module.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2022/01/anssi-cc-2021-63.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2022/01/anssi-cible-cc-2021_63en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2022/01/certificat-anssi-cc-2021-63.pdf'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 7951b5a824b9599bd3ac6eb9e75004d01e0a52bcf2ad94bca4f2487894da6fa9.
    • The st_txt_hash property was set to 407bd0c78753aa24b72ea3ac21c26dff3d4cbe7d5443dd42745b9d8995ccacb1.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 2089160, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 76, '/Title': 'Security Target eTravel Essential 1.2 - BAC, EAC and AA activated', '/Author': 'MORIN Sophie', '/Keywords': 'Security Target, CC, eTravel', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20220920164516+02'00'", '/ModDate': "D:20220920164516+02'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2020/34-S02': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0056': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1, 'BSI-CC-PP-0055': 1}}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL4': 5, 'EAL6': 1, 'EAL 6+': 1, 'EAL4 augmented': 3, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 5, 'ADV_INT.2': 5, 'ADV_TDS.4': 5, 'ADV_ARC.1': 1, 'ADV_ARC': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1}, 'ALC': {'ALC_CMS.5': 5, 'ALC_TAT.2': 5, 'ALC_DVS.2': 5}, 'ATE': {'ATE_DPT.3': 5}, 'ASE': {'ASE_ECD': 1, 'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_SAS.1': 18, 'FAU_GEN': 1, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 7, 'FCS_CKM': 13, 'FCS_COP': 59, 'FCS_RND.1': 17, 'FCS_RNG.1': 1, 'FCS_CKM.1': 25, 'FCS_RND.1.1': 2, 'FCS_CKM.2': 4, 'FCS_COP.1': 9, 'FCS_CKM.4': 33, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1, 'FCS_RNG': 2}, 'FDP': {'FDP_SDC.1': 5, 'FDP_ACF': 3, 'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC.1': 23, 'FDP_ACF.1': 18, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_UCT.1': 12, 'FDP_IFC.1': 7, 'FDP_UCT.1.1': 1, 'FDP_UIT.1': 13, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITC': 2, 'FDP_ACC': 3, 'FDP_SDI.2': 2, 'FDP_ITT.1': 1}, 'FIA': {'FIA_API': 14, 'FIA_AFL.1': 13, 'FIA_API.1': 8, 'FIA_SOS.2': 1, 'FIA_API.1.1': 1, 'FIA_UAU.5.2': 3, 'FIA_UAU.4': 14, 'FIA_UAU.6': 12, 'FIA_UID.1': 13, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 12, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 13, 'FIA_UAU.5.1': 1, 'FIA_UAU.6.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU': 5}, 'FMT': {'FMT_LIM': 7, 'FMT_LIM.1': 28, 'FMT_LIM.2': 26, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_MSA.3': 4, 'FMT_SMF.1': 32, 'FMT_SMR.1': 25, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1': 1, 'FMT_MTD': 47, 'FMT_MSA.1': 3, 'FMT_SRM.1': 1}, 'FPT': {'FPT_TST': 2, 'FPT_EMS.1': 5, 'FPT_FLS.1': 17, 'FPT_TST.1': 12, 'FPT_PHP.3': 18, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 3}, 'FRU': {'FRU_FLT.2': 2}, 'FTP': {'FTP_ITC.1': 6, 'FTP_TRP.1': 5}}, 'cc_claims': {'OE': {'OE.MRTD_': 2}}, 'vendor': {'Thales': {'Thales': 97}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 2}, '3DES': {'TDES': 1, 'Triple-DES': 8}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 2}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 2, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {'PACE': {'PACE': 9}}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 3, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 1, 'Physical tampering': 1, 'Malfunction': 6, 'malfunction': 5, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 28, 'EF.DG2': 10, 'EF.DG3': 5, 'EF.DG4': 5, 'EF.DG5': 6, 'EF.DG16': 26, 'EF.DG13': 3, 'EF.DG14': 3, 'EF.DG15': 4, 'EF.DG6': 2, 'EF.COM': 9, 'EF.SOD': 9}}, 'standard_id': {'FIPS': {'FIPS180-2': 1, 'FIPS46-3': 3, 'FIPS PUB 46-3': 1, 'FIPS 197': 3, 'FIPS PUB 197': 1, 'FIPS 186-4': 3, 'FIPS PUB 186-4': 1, 'FIPS 180-2': 1, 'FIPS 46-3': 2}, 'NIST': {'SP 800-90': 2}, 'PKCS': {'PKCS#3': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 14443': 4, 'ISO/IEC 7816': 2, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 13}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to anssi-cible-cc-2022_60en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_60en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/certificat-cc-2022_60.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.thalesgroup.com/en/europe/france.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The errors property was set to [].

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/26']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/26']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'MRTD_ICAO_BA_V1.10', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_60.pdf, code: nok'].

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/26']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2021/26']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_60.pdf, code: 408'].
  • 21.12.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name eTravel Essential 1.2 – BAC and AA activated (release ‘0300’) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat-cc-2022_60.pdf",
  "dgst": "37d26b65d2059ce6",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2022/60",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/34",
          "ANSSI-CC-2021/26"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/34",
          "ANSSI-CC-2021/26"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2022/60",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab eTravel Essential 1.2 \u2013 BAC and AA activated, release \u00270300\u0027 \u00bb d\u00e9velopp\u00e9 par THALES DIS.\nLe produit \u00e9valu\u00e9 est de type \u00ab carte \u00e0 puce \u00bb pouvant \u00eatre utilis\u00e9 en modes avec et sans contact. Il impl\u00e9mente les fonctions de document de voyage \u00e9lectronique conform\u00e9ment aux sp\u00e9cifications de l\u2019organisation de l\u2019aviation civile internationale (ICAO). Ce produit est destin\u00e9 \u00e0 perme",
      "developer": "THALES DIS et THALES DIS DESIGN SERVICES",
      "enhanced": {
        "augmented": "ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3, ALC_DVS.2",
        "category": "Cartes \u00e0 puce",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2022/60",
        "certification_date": "12/12/2022",
        "developer": "THALES DIS et THALES DIS DESIGN SERVICES",
        "evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
        "expiration_date": "12/12/2027",
        "level": "EAL4+",
        "mutual_recognition": "CCRA\n                          SOG-IS",
        "protection_profile": "Machine Readable Travel Document with \u00ab ICAO Application \u00bb, Basic Access Control, version 1.10, certifi\u00e9 BSI-CC-PP-0055-2009",
        "sponsor": "THALES DIS"
      },
      "expiration_date": "12 D\u00e9cembre 2027",
      "level": "EAL4+",
      "product": "eTravel Essential 1.2 \u2013 BAC and AA activated (release \u00270300\u0027)",
      "sponsor": "THALES DIS",
      "url": "https://cyber.gouv.fr/produits-certifies/etravel-essential-12-bac-and-aa-activated-release-0300"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "eTravel Essential 1.2 \u2013 BAC and AA activated (release \u20180300\u2019)",
  "not_valid_after": "2027-12-12",
  "not_valid_before": "2022-12-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-cc-2022_60.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2022/60": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055-2009": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.5": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "ALC": {
          "ALC_CMS.5": 1,
          "ALC_DVS.2": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_DPT.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ICAO": {
          "ICAO": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "DUCLOS Charlene",
      "/Category": "-R01",
      "/Comments": "ANSSI-CC-CER-F-14_v14.8",
      "/Company": "SGDSN",
      "/CreationDate": "D:20221216141418+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 22 pour Word",
      "/Keywords": "version x.x, r\u00e9vision x",
      "/ModDate": "D:20221216141419+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 22.3.39",
      "/SourceModified": "D:20221216131404",
      "/Title": "ANSSI-CC-2022/60",
      "pdf_file_size_bytes": 153997,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2022_60.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/34": 1,
          "ANSSI-CC-2020/34-M01": 1,
          "ANSSI-CC-2020/34-S02": 1,
          "ANSSI-CC-2021/26": 2,
          "ANSSI-CC-2022/60": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055-2009": 2,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.5": 2,
          "ADV_INT.2": 2,
          "ADV_TDS.4": 2
        },
        "ALC": {
          "ALC_CMS.5": 2,
          "ALC_DVS.2": 2,
          "ALC_FLR": 1,
          "ALC_TAT.2": 2
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_DPT.3": 2
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL2": 2,
          "EAL6": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {
        "ICFab": {
          "IC Fabricator": 1
        },
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "ICAO": {
          "ICAO": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "qualite@intranet.fr",
      "/Category": "release \u00270300\u0027",
      "/Comments": "ANSSI-CC-CER-F-07_v31.3",
      "/Company": "THALES DIS",
      "/CreationDate": "D:20221216141237+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 22 pour Word",
      "/Keywords": "[ANSSI Crypto] \u003cou [SOG-IS Crypto]\u003e",
      "/ModDate": "D:20221216141239+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 22.3.39",
      "/SourceModified": "D:20221216131226",
      "/Subject": "eTravel Essential 1.2 \u2013 BAC and AA activated",
      "/Title": "ANSSI-CC-2022/60",
      "pdf_file_size_bytes": 400050,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.sogis.eu/",
          "mailto:certification@ssi.gouv.fr",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "anssi-cible-cc-2022_60en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2020/34-S02": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 5,
          "CC-3": 4
        }
      },
      "cc_claims": {
        "OE": {
          "OE.MRTD_": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056": 1,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP.5": 5,
          "ADV_INT.2": 5,
          "ADV_TDS.4": 5
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMS.5": 5,
          "ALC_DVS.2": 5,
          "ALC_TAT.2": 5
        },
        "ASE": {
          "ASE_ECD": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_DPT.3": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL 6+": 1,
          "EAL4": 5,
          "EAL4 augmented": 3,
          "EAL6": 1,
          "EAL6 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 6,
          "FAU_SAS.1": 18,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 13,
          "FCS_CKM.1": 25,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 33,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 59,
          "FCS_COP.1": 9,
          "FCS_COP.1.1": 1,
          "FCS_RND": 7,
          "FCS_RND.1": 17,
          "FCS_RND.1.1": 2,
          "FCS_RNG": 2,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 3,
          "FDP_ACC.1": 23,
          "FDP_ACF": 3,
          "FDP_ACF.1": 18,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 7,
          "FDP_ITC": 2,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 12,
          "FDP_ITT.1": 1,
          "FDP_SDC.1": 5,
          "FDP_SDI.2": 2,
          "FDP_UCT.1": 12,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 13,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 13,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 14,
          "FIA_API.1": 8,
          "FIA_API.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 5,
          "FIA_UAU.1": 12,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 14,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 13,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 3,
          "FIA_UAU.6": 12,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 7,
          "FMT_LIM.1": 28,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 26,
          "FMT_LIM.2.1": 2,
          "FMT_MSA.1": 3,
          "FMT_MSA.3": 4,
          "FMT_MTD": 47,
          "FMT_MTD.1": 1,
          "FMT_SMF.1": 32,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 25,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1,
          "FMT_SRM.1": 1
        },
        "FPT": {
          "FPT_EMS.1": 5,
          "FPT_FLS.1": 17,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 3,
          "FPT_PHP.3": 18,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 2,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 2
        },
        "FTP": {
          "FTP_ITC.1": 6,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 9
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 9,
          "EF.DG1": 28,
          "EF.DG13": 3,
          "EF.DG14": 3,
          "EF.DG15": 4,
          "EF.DG16": 26,
          "EF.DG2": 10,
          "EF.DG3": 5,
          "EF.DG4": 5,
          "EF.DG5": 6,
          "EF.DG6": 2,
          "EF.SOD": 9
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 6,
          "Physical Tampering": 5,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 5,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 2,
          "SPA": 1,
          "physical probing": 3,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 186-4": 3,
          "FIPS 197": 3,
          "FIPS 46-3": 2,
          "FIPS PUB 186-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1,
          "FIPS180-2": 1,
          "FIPS46-3": 3
        },
        "ICAO": {
          "ICAO": 13
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 7816": 2,
          "ISO/IEC 7816-4": 1
        },
        "NIST": {
          "SP 800-90": 2
        },
        "PKCS": {
          "PKCS#3": 1
        },
        "RFC": {
          "RFC3369": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 8
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 97
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "MORIN Sophie",
      "/CreationDate": "D:20220920164516+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "Security Target, CC, eTravel",
      "/ModDate": "D:20220920164516+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "Security Target eTravel Essential 1.2 - BAC, EAC and AA activated",
      "pdf_file_size_bytes": 2089160,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 76
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf",
        "pp_name": "Protection Profile for Machine Readable Travel Document with \u0027ICAO Application\u0027, Basic Acce..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2022_60.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_TDS.4",
      "ALC_CMS.5",
      "EAL4+",
      "ALC_TAT.2",
      "ALC_DVS.2",
      "ADV_INT.2",
      "ADV_FSP.5",
      "ATE_DPT.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2022_60en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9fb2519388875bbe73661b643e48ea905daee086ea64cd0b3155f404bbb426d7",
      "txt_hash": "758416413656c4b365d87695e3717e80801bdfd32f074ace7af3f27a42f287be"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ffa95f41f2609368d5ae0f429698049b5d6ad212ea99476609fe8249af8329d0",
      "txt_hash": "5af61727b8a00184d5599348994457d6981345df847533c4499d246cc8f67051"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7951b5a824b9599bd3ac6eb9e75004d01e0a52bcf2ad94bca4f2487894da6fa9",
      "txt_hash": "407bd0c78753aa24b72ea3ac21c26dff3d4cbe7d5443dd42745b9d8995ccacb1"
    }
  },
  "status": "active"
}