Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)

CSV information ?

Status active
Valid from 01.02.2024
Valid until 01.02.2029
Scheme 🇫🇷 FR
Manufacturer Samsung Electronics Co., Ltd.
Category Trusted Computing
Security level EAL2+

Heuristics summary ?

Certificate ID: ANSSI-CC-2023/71

Certificate ?

Extracted keywords

Trusted Execution Environments
TEEgris, TEE
Vendor
Samsung

Security level
EAL2
Protection profiles
ANSSI-CC-PP-2014/01-M02
Certificates
ANSSI-CC-2023/71

File metadata

Creation date D:20240215120518+01'00'
Modification date D:20240215120555+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Trusted Execution Environments
TrustZone, TEEgris, TEE
Vendor
Samsung

Security level
EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ALC_FLR
Protection profiles
ANSSI-CC-PP-2014/01-M02
Certificates
ANSSI-CC-2023/71

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20240215115644+01'00'
Modification date D:20240215120554+01'00'
Pages 15
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC, HMAC-SHA-224, HMAC-SHA-384, HMAC-SHA-512, CMAC
Asymmetric Algorithms
ECDH, ECDSA, EdDSA, Diffie-Hellman, DH, DSA
Hash functions
SHA1, SHA-1, SHA-256, SHA256, SHA224, SHA384, SHA512, SHA-224, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Protocols
SSL, TLS, IPsec, VPN
Randomness
TRNG, DRBG, RNG
Block cipher modes
ECB, CTR

JavaCard API constants
ED25519, X25519
Trusted Execution Environments
TrustZone, SE, TEEgris, TEE
Vendor
Samsung, Thales

Security level
EAL 2, EAL 2+, EAL 2 augmented
Claims
O.CA_TA_IDENTIFICATION, O.KEYS_USAGE, O.TEE_ID, O.INITIALISATION, O.INSTANCE_TIME, O.OPERATION, O.RNG, O.RUNTIME_CONFIDENTIALITY, O.RUNTIME_INTEGRITY, O.TA_AUTHENTICITY, O.TA_ISOLATION, O.TEE_DATA_PROTECTION, O.TEE_ISOLATION, O.TRUSTED_STORAGE, O.DEBUG, O.ROLLBACK_PROTECTION, O.TA_PERSISTENT_TIME, O.PERIPHERAL_INITIALISATION, O.INITIALIZATION, O.PROTECTED_COMMUNICATION_CHANNEL, O.PREVENT_RESIDUAL_DATA, O.DATA_ACCESS, O.FUNCTION_ACCESS, O.SAFE_RELEASE, O.CAPTURE, T.ABUSE_FUNCT, T.CLONE, T.FLASH_DUMP, T.IMPERSONATION, T.ROGUE_CODE_EXECUTION, T.PERTURBATION, T.RAM, T.RNG, T.SPY, T.TEE_FIRMWARE_DOWNGRADE, T.STORAGE_CORRUPTION, T.ABUSE_DEBUG, T.ROLLBACK, T.TA_PERSISTENT_TIME_ROLLBACK, T.SHARED_FUNCTION_ACCESS, T.EXTRACT_EXCHANGED_DATA, T.MODIFY_EXCHANGED_DATA, T.INJECT_EXCHANGED_DATA, T.MODIFY_FIRMWARE, T.INJECT_DATA, T.EXTRACT_DATA, T.MODIFY_DATA, T.RESIDUAL, T.CORRUPT_RUNTIME_DATA, T.CORRUPT_SETUP, T.PERIPHERAL_ACCESS, T.ROGUE_CODE_, T.TEE_FIRMWARE_, T.TA_PERSISTENT_TIME_, T.SHARED_FUNCTION_, T.EXTRACT_EXCHANGED_, T.MODIFY_EXCHANGED_, T.INJECT_EXCHANGED_, T.CORRUPT_RUNTIME_, A.PROTECTION_AFTER_DELIVERY, A.TA_MANAGEMENT, A.TA_DEVELOPMENT, A.ROLLBACK, A.TA_DEVELOPMENT_TUI, A.NO_RESIDUAL_DATA, A.PROTECTION_AFTER_, OP.USE_KEY, OP.EXTRACT_KEY, OP.LOAD, OP.STORE, OP.AUTHENTICATE, OP.DEBUG, OP.ACTIVATE, OE.INTEGRATION_CONFIGURATION, OE.SECRETS, OE.PROTECTION_AFTER_DELIVERY, OE.TA_MANAGEMENT, OE.TA_DEVELOPMENT, OE.ROLLBACK, OE.DISABLED_DEBUG, OE.NO_RESIDUAL_DATA, OE.TA_DEVELOPMENT_TUI, OSP.INTEGRATION_CONFIGURATION, OSP.SECRETS, OSP.INTEGRATION_
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.1, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_SAA.1, FAU_GEN.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_COP, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FDP_ITT.1, FDP_IFC, FDP_IFF, FDP_ITT, FDP_ACC, FDP_ACF, FDP_ROL, FDP_IFC.2, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ROL.1, FDP_SDI, FDP_TRP, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.2, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID, FIA_ATD, FIA_USB, FIA_UAU.6, FIA_UAU, FIA_UAU.2, FIA_UID.1, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_MSA.2, FPT_INI, FPT_INI.1, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_INI.1.4, FPT_FLS.1, FPT_ITT, FPT_ITT.1, FPT_FLS.1.1, FPT_TEE.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_STM, FPT_STM.1, FPT_FLS, FTP_TPR, FTP_TRP, FTP_TRP.1
Certification process
out of scope, and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist

Side-channel analysis
side-channels, cold boot
Certification process
out of scope, and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist

Standards
FIPS 180-4, FIPS 197, FIPS 46-3, FIPS 81, FIPS 186-2, FIPS 186-4, FIPS 140-2, PKCS#1, RFC 2119, RFC 1423, RFC 4231, RFC 2202, RFC 7748, RFC 8032

File metadata

Title Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx
Author rosep
Creation date D:20240108141421+01'00'
Modification date D:20240108141421+01'00'
Pages 98
Producer Microsoft: Print To PDF

Heuristics ?

Certificate ID: ANSSI-CC-2023/71

Extracted SARs

ASE_SPD.1, ASE_REQ.2, AVA_VAN.2, ASE_CCL.1, AGD_PRE.1, ALC_CMS.2, ALC_DEL.1, ASE_TSS.1, ATE_COV.1, ADV_FSP.2, ADV_TDS.1, ATE_FUN.1, ASE_OBJ.2, ASE_ECD.1, ADV_ARC.1, ASE_INT.1, AGD_OPE.1, ALC_CMC.2

References ?

No references are available for this certificate.

Updates ?

  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2c613c0d2b9c0e06d38b41b98da13bae012de0200ef3f438d574970a0c3f3a13', 'txt_hash': '0b454786d28451a2c632cb8566953695867656ba000f3f87c39ac858713f2e46'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3335ea97556a238d5e10afb2b1f2be8a6062ca6d0713af20d650f2f213698809', 'txt_hash': '29d46bd6abb7d82fb0cfc4275921552246cefdff76653ae24402a00854962958'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bdc4ae02f7fe264ef28db9879f54f50e9405b087b868e71971b6daf1a2c3a509', 'txt_hash': 'b19a9df8f1ca95c65efeef96f461d512501d96443dc5cdbac700ee32c09b4ca5'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 427132, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/CreationDate': "D:20240215115644+01'00'", '/Creator': 'Microsoft® Word 2019', '/Keywords': '', '/ModDate': "D:20240215120554+01'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://semiconductor.samsung.com/us/processor/showcase/smartphone', 'http://www.sogis.eu/', 'http://www.commoncriteriaportal.org/', 'https://semiconductor.samsung.com/us/processor/mobile-processor/', 'mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1813549, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 98, '/Author': 'rosep', '/CreationDate': "D:20240108141421+01'00'", '/ModDate': "D:20240108141421+01'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 154878, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240215120518+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240215120555+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/71': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2014/01-M02': 2}}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 19}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'TrustZone': 1}, 'other': {'TEEgris': 12, 'TEE': 10}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 6, 'EAL 2+': 1, 'EAL 2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 7, 'ADV_FSP.2': 15, 'ADV_TDS.1': 10, 'ADV_FSP.1': 3}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 9}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 4}, 'AVA': {'AVA_VAN.2': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 12, 'FAU_ARP.1.1': 1, 'FAU_SAR.1': 5, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1': 5, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAA.1': 2, 'FAU_GEN.1': 4}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 48, 'FCS_CKM.1': 17, 'FCS_COP': 68, 'FCS_CKM.4': 23, 'FCS_COP.1': 14, 'FCS_CKM.2': 2}, 'FDP': {'FDP_ITT.1': 4, 'FDP_IFC': 13, 'FDP_IFF': 11, 'FDP_ITT': 11, 'FDP_ACC': 40, 'FDP_ACF': 35, 'FDP_ROL': 7, 'FDP_IFC.2': 2, 'FDP_IFF.1': 8, 'FDP_RIP': 10, 'FDP_RIP.1': 2, 'FDP_ACC.1': 15, 'FDP_ACF.1': 21, 'FDP_SDI.2': 15, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ROL.1': 2, 'FDP_SDI': 6, 'FDP_TRP': 1, 'FDP_IFC.1': 8, 'FDP_ITC.1': 15, 'FDP_ITC.2': 15}, 'FIA': {'FIA_ATD.1': 10, 'FIA_ATD.1.1': 1, 'FIA_UID.2': 8, 'FIA_UID.2.1': 1, 'FIA_USB.1': 9, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID': 8, 'FIA_ATD': 7, 'FIA_USB': 6, 'FIA_UAU.6': 2, 'FIA_UAU': 12, 'FIA_UAU.2': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MSA': 55, 'FMT_SMF.1': 21, 'FMT_SMR.1': 24, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 7, 'FMT_MSA.3': 15, 'FMT_SMF.1.1': 1, 'FMT_SMR': 6, 'FMT_MTD': 5, 'FMT_MTD.1': 1, 'FMT_SMF': 5, 'FMT_MSA.2': 1}, 'FPT': {'FPT_INI': 4, 'FPT_INI.1': 14, 'FPT_INI.1.1': 2, 'FPT_INI.1.2': 2, 'FPT_INI.1.3': 2, 'FPT_INI.1.4': 1, 'FPT_FLS.1': 18, 'FPT_ITT': 6, 'FPT_ITT.1': 2, 'FPT_FLS.1.1': 1, 'FPT_TEE.1': 6, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_STM': 10, 'FPT_STM.1': 2, 'FPT_FLS': 12}, 'FTP': {'FTP_TPR': 1, 'FTP_TRP': 7, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.CA_TA_IDENTIFICATION': 11, 'O.KEYS_USAGE': 4, 'O.TEE_ID': 11, 'O.INITIALISATION': 10, 'O.INSTANCE_TIME': 11, 'O.OPERATION': 8, 'O.RNG': 12, 'O.RUNTIME_CONFIDENTIALITY': 10, 'O.RUNTIME_INTEGRITY': 21, 'O.TA_AUTHENTICITY': 7, 'O.TA_ISOLATION': 15, 'O.TEE_DATA_PROTECTION': 11, 'O.TEE_ISOLATION': 14, 'O.TRUSTED_STORAGE': 9, 'O.DEBUG': 12, 'O.ROLLBACK_PROTECTION': 5, 'O.TA_PERSISTENT_TIME': 12, 'O.PERIPHERAL_INITIALISATION': 3, 'O.INITIALIZATION': 1, 'O.PROTECTED_COMMUNICATION_CHANNEL': 12, 'O.PREVENT_RESIDUAL_DATA': 3, 'O.DATA_ACCESS': 11, 'O.FUNCTION_ACCESS': 4, 'O.SAFE_RELEASE': 11, 'O.CAPTURE': 2}, 'T': {'T.ABUSE_FUNCT': 3, 'T.CLONE': 3, 'T.FLASH_DUMP': 3, 'T.IMPERSONATION': 3, 'T.ROGUE_CODE_EXECUTION': 2, 'T.PERTURBATION': 3, 'T.RAM': 3, 'T.RNG': 3, 'T.SPY': 3, 'T.TEE_FIRMWARE_DOWNGRADE': 2, 'T.STORAGE_CORRUPTION': 3, 'T.ABUSE_DEBUG': 3, 'T.ROLLBACK': 3, 'T.TA_PERSISTENT_TIME_ROLLBACK': 2, 'T.SHARED_FUNCTION_ACCESS': 2, 'T.EXTRACT_EXCHANGED_DATA': 2, 'T.MODIFY_EXCHANGED_DATA': 2, 'T.INJECT_EXCHANGED_DATA': 2, 'T.MODIFY_FIRMWARE': 3, 'T.INJECT_DATA': 3, 'T.EXTRACT_DATA': 3, 'T.MODIFY_DATA': 3, 'T.RESIDUAL': 3, 'T.CORRUPT_RUNTIME_DATA': 2, 'T.CORRUPT_SETUP': 5, 'T.PERIPHERAL_ACCESS': 3, 'T.ROGUE_CODE_': 1, 'T.TEE_FIRMWARE_': 1, 'T.TA_PERSISTENT_TIME_': 1, 'T.SHARED_FUNCTION_': 1, 'T.EXTRACT_EXCHANGED_': 1, 'T.MODIFY_EXCHANGED_': 1, 'T.INJECT_EXCHANGED_': 1, 'T.CORRUPT_RUNTIME_': 1}, 'A': {'A.PROTECTION_AFTER_DELIVERY': 2, 'A.TA_MANAGEMENT': 5, 'A.TA_DEVELOPMENT': 4, 'A.ROLLBACK': 1, 'A.TA_DEVELOPMENT_TUI': 3, 'A.NO_RESIDUAL_DATA': 3, 'A.PROTECTION_AFTER_': 1}, 'OP': {'OP.USE_KEY': 4, 'OP.EXTRACT_KEY': 4, 'OP.LOAD': 3, 'OP.STORE': 4, 'OP.AUTHENTICATE': 2, 'OP.DEBUG': 7, 'OP.ACTIVATE': 1}, 'OE': {'OE.INTEGRATION_CONFIGURATION': 7, 'OE.SECRETS': 2, 'OE.PROTECTION_AFTER_DELIVERY': 7, 'OE.TA_MANAGEMENT': 3, 'OE.TA_DEVELOPMENT': 6, 'OE.ROLLBACK': 1, 'OE.DISABLED_DEBUG': 1, 'OE.NO_RESIDUAL_DATA': 2, 'OE.TA_DEVELOPMENT_TUI': 5}, 'OSP': {'OSP.INTEGRATION_CONFIGURATION': 2, 'OSP.SECRETS': 3, 'OSP.INTEGRATION_': 1}}, 'vendor': {'Samsung': {'Samsung': 140}, 'Thales': {'Thales': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}, 'DES': {'DES': {'DES': 7}, '3DES': {'3DES': 7}}, 'constructions': {'MAC': {'HMAC': 5, 'HMAC-SHA-224': 1, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 13}, 'EdDSA': {'EdDSA': 1}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 5}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1, 'SHA-1': 1}, 'SHA2': {'SHA-256': 2, 'SHA256': 2, 'SHA224': 1, 'SHA384': 1, 'SHA512': 1, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}, 'IPsec': {'IPsec': 2}, 'VPN': {'VPN': 2}}, 'randomness': {'TRNG': {'TRNG': 5}, 'PRNG': {'DRBG': 5}, 'RNG': {'RNG': 29}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CTR': {'CTR': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channels': 1}, 'other': {'cold boot': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'TrustZone': 2}, 'IBM': {'SE': 2}, 'other': {'TEEgris': 126, 'TEE': 594}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 197': 1, 'FIPS 46-3': 1, 'FIPS 81': 1, 'FIPS 186-2': 1, 'FIPS 186-4': 2, 'FIPS 140-2': 1}, 'PKCS': {'PKCS#1': 1}, 'RFC': {'RFC 2119': 3, 'RFC 1423': 1, 'RFC 4231': 1, 'RFC 2202': 1, 'RFC 7748': 1, 'RFC 8032': 1}}, 'javacard_version': {}, 'javacard_api_const': {'curves': {'ED25519': 4, 'X25519': 4}}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/71': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2014/01-M02': 1}}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'other': {'TEEgris': 1, 'TEE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2023_71fr.pdf.
    • The st_filename property was set to ANSSI-cible-CC-2023_71en.pdf.
    • The cert_filename property was set to Certificat-CC-2023_71fr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2023/71.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Samsung TEEgris on Exynos 2200 Version 5.0.0.0', 'url': 'https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000', 'description': 'Le produit Ă©valuĂ© est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » dĂ©veloppĂ© par Samsung Electronics Ltd., Co..\nCe produit, appelĂ© Ă©galement Samsung Secure OS, est l’implĂ©mentation de Samsung d’un TEE (Trusted Execution Environment), basĂ© sur la technologie ARM Trust Zone.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'developer': 'Samsung Electronics Ltd., Co.', 'cert_id': 'ANSSI-CC-2023/71', 'level': 'EAL2+', 'expiration_date': '1 FĂ©vrier 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/71', 'certification_date': '01/02/2024', 'expiration_date': '01/02/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Samsung Electronics Ltd., Co.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': 'GlobalPlatform Technology TEE Protection Profile, rĂ©f. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'AVA_VAN_AP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Trusted Computing",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_71fr.pdf",
  "dgst": "01cb0a033c2b1c55",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2023/71",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0.0.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Samsung Electronics Co., Ltd.",
  "manufacturer_web": "https://www.samsung.com",
  "name": "Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)",
  "not_valid_after": "2029-02-01",
  "not_valid_before": "2024-02-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2023_71fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/71": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2014/01-M02": 1
        }
      },
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "other": {
          "TEE": 1,
          "TEEgris": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240215120518+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240215120555+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 154878,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2023_71fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/71": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2014/01-M02": 2
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "TrustZone": 1
        },
        "other": {
          "TEE": 10,
          "TEEgris": 12
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 19
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240215115644+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "",
      "/ModDate": "D:20240215120554+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 427132,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://semiconductor.samsung.com/us/processor/mobile-processor/",
          "http://www.sogis.eu/",
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]",
          "https://semiconductor.samsung.com/us/processor/showcase/smartphone"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "ANSSI-cible-CC-2023_71en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 13
          },
          "EdDSA": {
            "EdDSA": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 4
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_RESIDUAL_DATA": 3,
          "A.PROTECTION_AFTER_": 1,
          "A.PROTECTION_AFTER_DELIVERY": 2,
          "A.ROLLBACK": 1,
          "A.TA_DEVELOPMENT": 4,
          "A.TA_DEVELOPMENT_TUI": 3,
          "A.TA_MANAGEMENT": 5
        },
        "O": {
          "O.CAPTURE": 2,
          "O.CA_TA_IDENTIFICATION": 11,
          "O.DATA_ACCESS": 11,
          "O.DEBUG": 12,
          "O.FUNCTION_ACCESS": 4,
          "O.INITIALISATION": 10,
          "O.INITIALIZATION": 1,
          "O.INSTANCE_TIME": 11,
          "O.KEYS_USAGE": 4,
          "O.OPERATION": 8,
          "O.PERIPHERAL_INITIALISATION": 3,
          "O.PREVENT_RESIDUAL_DATA": 3,
          "O.PROTECTED_COMMUNICATION_CHANNEL": 12,
          "O.RNG": 12,
          "O.ROLLBACK_PROTECTION": 5,
          "O.RUNTIME_CONFIDENTIALITY": 10,
          "O.RUNTIME_INTEGRITY": 21,
          "O.SAFE_RELEASE": 11,
          "O.TA_AUTHENTICITY": 7,
          "O.TA_ISOLATION": 15,
          "O.TA_PERSISTENT_TIME": 12,
          "O.TEE_DATA_PROTECTION": 11,
          "O.TEE_ID": 11,
          "O.TEE_ISOLATION": 14,
          "O.TRUSTED_STORAGE": 9
        },
        "OE": {
          "OE.DISABLED_DEBUG": 1,
          "OE.INTEGRATION_CONFIGURATION": 7,
          "OE.NO_RESIDUAL_DATA": 2,
          "OE.PROTECTION_AFTER_DELIVERY": 7,
          "OE.ROLLBACK": 1,
          "OE.SECRETS": 2,
          "OE.TA_DEVELOPMENT": 6,
          "OE.TA_DEVELOPMENT_TUI": 5,
          "OE.TA_MANAGEMENT": 3
        },
        "OP": {
          "OP.ACTIVATE": 1,
          "OP.AUTHENTICATE": 2,
          "OP.DEBUG": 7,
          "OP.EXTRACT_KEY": 4,
          "OP.LOAD": 3,
          "OP.STORE": 4,
          "OP.USE_KEY": 4
        },
        "OSP": {
          "OSP.INTEGRATION_": 1,
          "OSP.INTEGRATION_CONFIGURATION": 2,
          "OSP.SECRETS": 3
        },
        "T": {
          "T.ABUSE_DEBUG": 3,
          "T.ABUSE_FUNCT": 3,
          "T.CLONE": 3,
          "T.CORRUPT_RUNTIME_": 1,
          "T.CORRUPT_RUNTIME_DATA": 2,
          "T.CORRUPT_SETUP": 5,
          "T.EXTRACT_DATA": 3,
          "T.EXTRACT_EXCHANGED_": 1,
          "T.EXTRACT_EXCHANGED_DATA": 2,
          "T.FLASH_DUMP": 3,
          "T.IMPERSONATION": 3,
          "T.INJECT_DATA": 3,
          "T.INJECT_EXCHANGED_": 1,
          "T.INJECT_EXCHANGED_DATA": 2,
          "T.MODIFY_DATA": 3,
          "T.MODIFY_EXCHANGED_": 1,
          "T.MODIFY_EXCHANGED_DATA": 2,
          "T.MODIFY_FIRMWARE": 3,
          "T.PERIPHERAL_ACCESS": 3,
          "T.PERTURBATION": 3,
          "T.RAM": 3,
          "T.RESIDUAL": 3,
          "T.RNG": 3,
          "T.ROGUE_CODE_": 1,
          "T.ROGUE_CODE_EXECUTION": 2,
          "T.ROLLBACK": 3,
          "T.SHARED_FUNCTION_": 1,
          "T.SHARED_FUNCTION_ACCESS": 2,
          "T.SPY": 3,
          "T.STORAGE_CORRUPTION": 3,
          "T.TA_PERSISTENT_TIME_": 1,
          "T.TA_PERSISTENT_TIME_ROLLBACK": 2,
          "T.TEE_FIRMWARE_": 1,
          "T.TEE_FIRMWARE_DOWNGRADE": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 7,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 15,
          "ADV_TDS.1": 10
        },
        "AGD": {
          "AGD_OPE.1": 10,
          "AGD_PRE.1": 9
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 5,
          "ATE_FUN.1": 4
        },
        "AVA": {
          "AVA_VAN.2": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 6,
          "EAL 2 augmented": 2,
          "EAL 2+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 12,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 4,
          "FAU_SAA.1": 2,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_CKM": 48,
          "FCS_CKM.1": 17,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 23,
          "FCS_COP": 68,
          "FCS_COP.1": 14,
          "FCS_RNG": 3,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 40,
          "FDP_ACC.1": 15,
          "FDP_ACF": 35,
          "FDP_ACF.1": 21,
          "FDP_IFC": 13,
          "FDP_IFC.1": 8,
          "FDP_IFC.2": 2,
          "FDP_IFF": 11,
          "FDP_IFF.1": 8,
          "FDP_ITC.1": 15,
          "FDP_ITC.2": 15,
          "FDP_ITT": 11,
          "FDP_ITT.1": 4,
          "FDP_RIP": 10,
          "FDP_RIP.1": 2,
          "FDP_ROL": 7,
          "FDP_ROL.1": 2,
          "FDP_SDI": 6,
          "FDP_SDI.2": 15,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_TRP": 1
        },
        "FIA": {
          "FIA_ATD": 7,
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 12,
          "FIA_UAU.2": 1,
          "FIA_UAU.6": 2,
          "FIA_UID": 8,
          "FIA_UID.1": 3,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1,
          "FIA_USB": 6,
          "FIA_USB.1": 9,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA": 55,
          "FMT_MSA.1": 7,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 15,
          "FMT_MTD": 5,
          "FMT_MTD.1": 1,
          "FMT_SMF": 5,
          "FMT_SMF.1": 21,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 6,
          "FMT_SMR.1": 24,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS": 12,
          "FPT_FLS.1": 18,
          "FPT_FLS.1.1": 1,
          "FPT_INI": 4,
          "FPT_INI.1": 14,
          "FPT_INI.1.1": 2,
          "FPT_INI.1.2": 2,
          "FPT_INI.1.3": 2,
          "FPT_INI.1.4": 1,
          "FPT_ITT": 6,
          "FPT_ITT.1": 2,
          "FPT_STM": 10,
          "FPT_STM.1": 2,
          "FPT_TEE.1": 6,
          "FPT_TEE.1.1": 1,
          "FPT_TEE.1.2": 1
        },
        "FTP": {
          "FTP_TPR": 1,
          "FTP_TRP": 7,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 2
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 2,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA224": 1,
            "SHA256": 2,
            "SHA384": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "ED25519": 4,
          "X25519": 4
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 5
        },
        "RNG": {
          "RNG": 29
        },
        "TRNG": {
          "TRNG": 5
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "side-channels": 1
        },
        "other": {
          "cold boot": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-4": 1,
          "FIPS 186-2": 1,
          "FIPS 186-4": 2,
          "FIPS 197": 1,
          "FIPS 46-3": 1,
          "FIPS 81": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 1423": 1,
          "RFC 2119": 3,
          "RFC 2202": 1,
          "RFC 4231": 1,
          "RFC 7748": 1,
          "RFC 8032": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11
          }
        },
        "DES": {
          "3DES": {
            "3DES": 7
          },
          "DES": {
            "DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3,
            "HMAC": 5,
            "HMAC-SHA-224": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "TrustZone": 2
        },
        "IBM": {
          "SE": 2
        },
        "other": {
          "TEE": 594,
          "TEEgris": 126
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 140
        },
        "Thales": {
          "Thales": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "rosep",
      "/CreationDate": "D:20240108141421+01\u002700\u0027",
      "/ModDate": "D:20240108141421+01\u002700\u0027",
      "/Producer": "Microsoft: Print To PDF",
      "/Title": "Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx",
      "pdf_file_size_bytes": 1813549,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 98
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bdc4ae02f7fe264ef28db9879f54f50e9405b087b868e71971b6daf1a2c3a509",
      "txt_hash": "b19a9df8f1ca95c65efeef96f461d512501d96443dc5cdbac700ee32c09b4ca5"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2c613c0d2b9c0e06d38b41b98da13bae012de0200ef3f438d574970a0c3f3a13",
      "txt_hash": "0b454786d28451a2c632cb8566953695867656ba000f3f87c39ac858713f2e46"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3335ea97556a238d5e10afb2b1f2be8a6062ca6d0713af20d650f2f213698809",
      "txt_hash": "29d46bd6abb7d82fb0cfc4275921552246cefdff76653ae24402a00854962958"
    }
  },
  "status": "active"
}