Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)
CSV information ?
Status | active |
---|---|
Valid from | 01.02.2024 |
Valid until | 01.02.2029 |
Scheme | 🇫🇷 FR |
Manufacturer | Samsung Electronics Co., Ltd. |
Category | Trusted Computing |
Security level | EAL2+ |
Heuristics summary ?
Certificate ?
Extracted keywords
Trusted Execution Environments
TEEgris, TEEVendor
SamsungSecurity level
EAL2Protection profiles
ANSSI-CC-PP-2014/01-M02Certificates
ANSSI-CC-2023/71File metadata
Creation date | D:20240215120518+01'00' |
---|---|
Modification date | D:20240215120555+01'00' |
Pages | 2 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESTrusted Execution Environments
TrustZone, TEEgris, TEEVendor
SamsungSecurity level
EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ALC_FLRProtection profiles
ANSSI-CC-PP-2014/01-M02Certificates
ANSSI-CC-2023/71Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20240215115644+01'00' |
---|---|
Modification date | D:20240215120554+01'00' |
Pages | 15 |
Creator | Microsoft® Word 2019 |
Producer | Microsoft® Word 2019 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, HMAC, HMAC-SHA-224, HMAC-SHA-384, HMAC-SHA-512, CMACAsymmetric Algorithms
ECDH, ECDSA, EdDSA, Diffie-Hellman, DH, DSAHash functions
SHA1, SHA-1, SHA-256, SHA256, SHA224, SHA384, SHA512, SHA-224, SHA-384, SHA-512Schemes
MAC, Key AgreementProtocols
SSL, TLS, IPsec, VPNRandomness
TRNG, DRBG, RNGBlock cipher modes
ECB, CTRJavaCard API constants
ED25519, X25519Trusted Execution Environments
TrustZone, SE, TEEgris, TEEVendor
Samsung, ThalesSecurity level
EAL 2, EAL 2+, EAL 2 augmentedClaims
O.CA_TA_IDENTIFICATION, O.KEYS_USAGE, O.TEE_ID, O.INITIALISATION, O.INSTANCE_TIME, O.OPERATION, O.RNG, O.RUNTIME_CONFIDENTIALITY, O.RUNTIME_INTEGRITY, O.TA_AUTHENTICITY, O.TA_ISOLATION, O.TEE_DATA_PROTECTION, O.TEE_ISOLATION, O.TRUSTED_STORAGE, O.DEBUG, O.ROLLBACK_PROTECTION, O.TA_PERSISTENT_TIME, O.PERIPHERAL_INITIALISATION, O.INITIALIZATION, O.PROTECTED_COMMUNICATION_CHANNEL, O.PREVENT_RESIDUAL_DATA, O.DATA_ACCESS, O.FUNCTION_ACCESS, O.SAFE_RELEASE, O.CAPTURE, T.ABUSE_FUNCT, T.CLONE, T.FLASH_DUMP, T.IMPERSONATION, T.ROGUE_CODE_EXECUTION, T.PERTURBATION, T.RAM, T.RNG, T.SPY, T.TEE_FIRMWARE_DOWNGRADE, T.STORAGE_CORRUPTION, T.ABUSE_DEBUG, T.ROLLBACK, T.TA_PERSISTENT_TIME_ROLLBACK, T.SHARED_FUNCTION_ACCESS, T.EXTRACT_EXCHANGED_DATA, T.MODIFY_EXCHANGED_DATA, T.INJECT_EXCHANGED_DATA, T.MODIFY_FIRMWARE, T.INJECT_DATA, T.EXTRACT_DATA, T.MODIFY_DATA, T.RESIDUAL, T.CORRUPT_RUNTIME_DATA, T.CORRUPT_SETUP, T.PERIPHERAL_ACCESS, T.ROGUE_CODE_, T.TEE_FIRMWARE_, T.TA_PERSISTENT_TIME_, T.SHARED_FUNCTION_, T.EXTRACT_EXCHANGED_, T.MODIFY_EXCHANGED_, T.INJECT_EXCHANGED_, T.CORRUPT_RUNTIME_, A.PROTECTION_AFTER_DELIVERY, A.TA_MANAGEMENT, A.TA_DEVELOPMENT, A.ROLLBACK, A.TA_DEVELOPMENT_TUI, A.NO_RESIDUAL_DATA, A.PROTECTION_AFTER_, OP.USE_KEY, OP.EXTRACT_KEY, OP.LOAD, OP.STORE, OP.AUTHENTICATE, OP.DEBUG, OP.ACTIVATE, OE.INTEGRATION_CONFIGURATION, OE.SECRETS, OE.PROTECTION_AFTER_DELIVERY, OE.TA_MANAGEMENT, OE.TA_DEVELOPMENT, OE.ROLLBACK, OE.DISABLED_DEBUG, OE.NO_RESIDUAL_DATA, OE.TA_DEVELOPMENT_TUI, OSP.INTEGRATION_CONFIGURATION, OSP.SECRETS, OSP.INTEGRATION_Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.1, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_SAA.1, FAU_GEN.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_COP, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FDP_ITT.1, FDP_IFC, FDP_IFF, FDP_ITT, FDP_ACC, FDP_ACF, FDP_ROL, FDP_IFC.2, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ROL.1, FDP_SDI, FDP_TRP, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.2, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID, FIA_ATD, FIA_USB, FIA_UAU.6, FIA_UAU, FIA_UAU.2, FIA_UID.1, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_MSA.2, FPT_INI, FPT_INI.1, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_INI.1.4, FPT_FLS.1, FPT_ITT, FPT_ITT.1, FPT_FLS.1.1, FPT_TEE.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_STM, FPT_STM.1, FPT_FLS, FTP_TPR, FTP_TRP, FTP_TRP.1Certification process
out of scope, and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy existSide-channel analysis
side-channels, cold bootCertification process
out of scope, and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy existStandards
FIPS 180-4, FIPS 197, FIPS 46-3, FIPS 81, FIPS 186-2, FIPS 186-4, FIPS 140-2, PKCS#1, RFC 2119, RFC 1423, RFC 4231, RFC 2202, RFC 7748, RFC 8032File metadata
Title | Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx |
---|---|
Author | rosep |
Creation date | D:20240108141421+01'00' |
Modification date | D:20240108141421+01'00' |
Pages | 98 |
Producer | Microsoft: Print To PDF |
Heuristics ?
Extracted SARs
ASE_CCL.1, AVA_VAN.2, ASE_ECD.1, ASE_OBJ.2, ADV_TDS.1, ADV_ARC.1, ALC_CMS.2, ALC_CMC.2, ASE_SPD.1, ALC_DEL.1, ATE_COV.1, AGD_OPE.1, ASE_INT.1, ASE_TSS.1, ATE_FUN.1, ADV_FSP.2, ASE_REQ.2, AGD_PRE.1CPE matches
References ?
No references are available for this certificate.
Updates ?
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2c613c0d2b9c0e06d38b41b98da13bae012de0200ef3f438d574970a0c3f3a13', 'txt_hash': '0b454786d28451a2c632cb8566953695867656ba000f3f87c39ac858713f2e46'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3335ea97556a238d5e10afb2b1f2be8a6062ca6d0713af20d650f2f213698809', 'txt_hash': '29d46bd6abb7d82fb0cfc4275921552246cefdff76653ae24402a00854962958'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bdc4ae02f7fe264ef28db9879f54f50e9405b087b868e71971b6daf1a2c3a509', 'txt_hash': 'b19a9df8f1ca95c65efeef96f461d512501d96443dc5cdbac700ee32c09b4ca5'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 427132, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/CreationDate': "D:20240215115644+01'00'", '/Creator': 'Microsoft® Word 2019', '/Keywords': '', '/ModDate': "D:20240215120554+01'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'https://semiconductor.samsung.com/us/processor/mobile-processor/', 'http://www.sogis.eu/', 'https://semiconductor.samsung.com/us/processor/showcase/smartphone', 'mailto:[email protected]', 'http://www.commoncriteriaportal.org/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1813549, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 98, '/Author': 'rosep', '/CreationDate': "D:20240108141421+01'00'", '/ModDate': "D:20240108141421+01'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 154878, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240215120518+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240215120555+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2023/71': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2014/01-M02': 2}}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 19}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'TrustZone': 1}, 'other': {'TEEgris': 12, 'TEE': 10}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 6, 'EAL 2+': 1, 'EAL 2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 7, 'ADV_FSP.2': 15, 'ADV_TDS.1': 10, 'ADV_FSP.1': 3}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 9}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 4}, 'AVA': {'AVA_VAN.2': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 12, 'FAU_ARP.1.1': 1, 'FAU_SAR.1': 5, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1': 5, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAA.1': 2, 'FAU_GEN.1': 4}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 48, 'FCS_CKM.1': 17, 'FCS_COP': 68, 'FCS_CKM.4': 23, 'FCS_COP.1': 14, 'FCS_CKM.2': 2}, 'FDP': {'FDP_ITT.1': 4, 'FDP_IFC': 13, 'FDP_IFF': 11, 'FDP_ITT': 11, 'FDP_ACC': 40, 'FDP_ACF': 35, 'FDP_ROL': 7, 'FDP_IFC.2': 2, 'FDP_IFF.1': 8, 'FDP_RIP': 10, 'FDP_RIP.1': 2, 'FDP_ACC.1': 15, 'FDP_ACF.1': 21, 'FDP_SDI.2': 15, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ROL.1': 2, 'FDP_SDI': 6, 'FDP_TRP': 1, 'FDP_IFC.1': 8, 'FDP_ITC.1': 15, 'FDP_ITC.2': 15}, 'FIA': {'FIA_ATD.1': 10, 'FIA_ATD.1.1': 1, 'FIA_UID.2': 8, 'FIA_UID.2.1': 1, 'FIA_USB.1': 9, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID': 8, 'FIA_ATD': 7, 'FIA_USB': 6, 'FIA_UAU.6': 2, 'FIA_UAU': 12, 'FIA_UAU.2': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MSA': 55, 'FMT_SMF.1': 21, 'FMT_SMR.1': 24, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 7, 'FMT_MSA.3': 15, 'FMT_SMF.1.1': 1, 'FMT_SMR': 6, 'FMT_MTD': 5, 'FMT_MTD.1': 1, 'FMT_SMF': 5, 'FMT_MSA.2': 1}, 'FPT': {'FPT_INI': 4, 'FPT_INI.1': 14, 'FPT_INI.1.1': 2, 'FPT_INI.1.2': 2, 'FPT_INI.1.3': 2, 'FPT_INI.1.4': 1, 'FPT_FLS.1': 18, 'FPT_ITT': 6, 'FPT_ITT.1': 2, 'FPT_FLS.1.1': 1, 'FPT_TEE.1': 6, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_STM': 10, 'FPT_STM.1': 2, 'FPT_FLS': 12}, 'FTP': {'FTP_TPR': 1, 'FTP_TRP': 7, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.CA_TA_IDENTIFICATION': 11, 'O.KEYS_USAGE': 4, 'O.TEE_ID': 11, 'O.INITIALISATION': 10, 'O.INSTANCE_TIME': 11, 'O.OPERATION': 8, 'O.RNG': 12, 'O.RUNTIME_CONFIDENTIALITY': 10, 'O.RUNTIME_INTEGRITY': 21, 'O.TA_AUTHENTICITY': 7, 'O.TA_ISOLATION': 15, 'O.TEE_DATA_PROTECTION': 11, 'O.TEE_ISOLATION': 14, 'O.TRUSTED_STORAGE': 9, 'O.DEBUG': 12, 'O.ROLLBACK_PROTECTION': 5, 'O.TA_PERSISTENT_TIME': 12, 'O.PERIPHERAL_INITIALISATION': 3, 'O.INITIALIZATION': 1, 'O.PROTECTED_COMMUNICATION_CHANNEL': 12, 'O.PREVENT_RESIDUAL_DATA': 3, 'O.DATA_ACCESS': 11, 'O.FUNCTION_ACCESS': 4, 'O.SAFE_RELEASE': 11, 'O.CAPTURE': 2}, 'T': {'T.ABUSE_FUNCT': 3, 'T.CLONE': 3, 'T.FLASH_DUMP': 3, 'T.IMPERSONATION': 3, 'T.ROGUE_CODE_EXECUTION': 2, 'T.PERTURBATION': 3, 'T.RAM': 3, 'T.RNG': 3, 'T.SPY': 3, 'T.TEE_FIRMWARE_DOWNGRADE': 2, 'T.STORAGE_CORRUPTION': 3, 'T.ABUSE_DEBUG': 3, 'T.ROLLBACK': 3, 'T.TA_PERSISTENT_TIME_ROLLBACK': 2, 'T.SHARED_FUNCTION_ACCESS': 2, 'T.EXTRACT_EXCHANGED_DATA': 2, 'T.MODIFY_EXCHANGED_DATA': 2, 'T.INJECT_EXCHANGED_DATA': 2, 'T.MODIFY_FIRMWARE': 3, 'T.INJECT_DATA': 3, 'T.EXTRACT_DATA': 3, 'T.MODIFY_DATA': 3, 'T.RESIDUAL': 3, 'T.CORRUPT_RUNTIME_DATA': 2, 'T.CORRUPT_SETUP': 5, 'T.PERIPHERAL_ACCESS': 3, 'T.ROGUE_CODE_': 1, 'T.TEE_FIRMWARE_': 1, 'T.TA_PERSISTENT_TIME_': 1, 'T.SHARED_FUNCTION_': 1, 'T.EXTRACT_EXCHANGED_': 1, 'T.MODIFY_EXCHANGED_': 1, 'T.INJECT_EXCHANGED_': 1, 'T.CORRUPT_RUNTIME_': 1}, 'A': {'A.PROTECTION_AFTER_DELIVERY': 2, 'A.TA_MANAGEMENT': 5, 'A.TA_DEVELOPMENT': 4, 'A.ROLLBACK': 1, 'A.TA_DEVELOPMENT_TUI': 3, 'A.NO_RESIDUAL_DATA': 3, 'A.PROTECTION_AFTER_': 1}, 'OP': {'OP.USE_KEY': 4, 'OP.EXTRACT_KEY': 4, 'OP.LOAD': 3, 'OP.STORE': 4, 'OP.AUTHENTICATE': 2, 'OP.DEBUG': 7, 'OP.ACTIVATE': 1}, 'OE': {'OE.INTEGRATION_CONFIGURATION': 7, 'OE.SECRETS': 2, 'OE.PROTECTION_AFTER_DELIVERY': 7, 'OE.TA_MANAGEMENT': 3, 'OE.TA_DEVELOPMENT': 6, 'OE.ROLLBACK': 1, 'OE.DISABLED_DEBUG': 1, 'OE.NO_RESIDUAL_DATA': 2, 'OE.TA_DEVELOPMENT_TUI': 5}, 'OSP': {'OSP.INTEGRATION_CONFIGURATION': 2, 'OSP.SECRETS': 3, 'OSP.INTEGRATION_': 1}}, 'vendor': {'Samsung': {'Samsung': 140}, 'Thales': {'Thales': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}, 'DES': {'DES': {'DES': 7}, '3DES': {'3DES': 7}}, 'constructions': {'MAC': {'HMAC': 5, 'HMAC-SHA-224': 1, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 13}, 'EdDSA': {'EdDSA': 1}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 5}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1, 'SHA-1': 1}, 'SHA2': {'SHA-256': 2, 'SHA256': 2, 'SHA224': 1, 'SHA384': 1, 'SHA512': 1, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}, 'IPsec': {'IPsec': 2}, 'VPN': {'VPN': 2}}, 'randomness': {'TRNG': {'TRNG': 5}, 'PRNG': {'DRBG': 5}, 'RNG': {'RNG': 29}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CTR': {'CTR': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channels': 1}, 'other': {'cold boot': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'TrustZone': 2}, 'IBM': {'SE': 2}, 'other': {'TEEgris': 126, 'TEE': 594}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 197': 1, 'FIPS 46-3': 1, 'FIPS 81': 1, 'FIPS 186-2': 1, 'FIPS 186-4': 2, 'FIPS 140-2': 1}, 'PKCS': {'PKCS#1': 1}, 'RFC': {'RFC 2119': 3, 'RFC 1423': 1, 'RFC 4231': 1, 'RFC 2202': 1, 'RFC 7748': 1, 'RFC 8032': 1}}, 'javacard_version': {}, 'javacard_api_const': {'curves': {'ED25519': 4, 'X25519': 4}}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2023/71': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2014/01-M02': 1}}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'other': {'TEEgris': 1, 'TEE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2023_71fr.pdf
. - The st_filename property was set to
ANSSI-cible-CC-2023_71en.pdf
. - The cert_filename property was set to
Certificat-CC-2023_71fr.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2023/71
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Samsung TEEgris on Exynos 2200 Version 5.0.0.0', 'url': 'https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000', 'description': 'Le produit évalué est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » développé par Samsung Electronics Ltd., Co..\nCe produit, appelé également Samsung Secure OS, est l’implémentation de Samsung d’un TEE (Trusted Execution Environment), basé sur la technologie ARM Trust Zone.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'developer': 'Samsung Electronics Ltd., Co.', 'cert_id': 'ANSSI-CC-2023/71', 'level': 'EAL2+', 'expiration_date': '1 Février 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/71', 'certification_date': '01/02/2024', 'expiration_date': '01/02/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Samsung Electronics Ltd., Co.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': 'GlobalPlatform Technology TEE Protection Profile, réf. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'AVA_VAN_AP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf'}}
.
- The scheme_data property was set to
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Trusted Computing",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_71fr.pdf",
"dgst": "01cb0a033c2b1c55",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2023/71",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0.0.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)",
"not_valid_after": "2029-02-01",
"not_valid_before": "2024-02-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certificat-CC-2023_71fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/71": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2014/01-M02": 1
}
},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"other": {
"TEE": 1,
"TEEgris": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20240215120518+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20240215120555+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 154878,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2023_71fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/71": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2014/01-M02": 2
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"ARM": {
"TrustZone": 1
},
"other": {
"TEE": 10,
"TEEgris": 12
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 19
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20240215115644+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/Keywords": "",
"/ModDate": "D:20240215120554+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"pdf_file_size_bytes": 427132,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://semiconductor.samsung.com/us/processor/mobile-processor/",
"http://www.sogis.eu/",
"http://www.ssi.gouv.fr/",
"mailto:[email protected]",
"https://semiconductor.samsung.com/us/processor/showcase/smartphone"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "ANSSI-cible-CC-2023_71en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 13
},
"EdDSA": {
"EdDSA": 1
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 4
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_RESIDUAL_DATA": 3,
"A.PROTECTION_AFTER_": 1,
"A.PROTECTION_AFTER_DELIVERY": 2,
"A.ROLLBACK": 1,
"A.TA_DEVELOPMENT": 4,
"A.TA_DEVELOPMENT_TUI": 3,
"A.TA_MANAGEMENT": 5
},
"O": {
"O.CAPTURE": 2,
"O.CA_TA_IDENTIFICATION": 11,
"O.DATA_ACCESS": 11,
"O.DEBUG": 12,
"O.FUNCTION_ACCESS": 4,
"O.INITIALISATION": 10,
"O.INITIALIZATION": 1,
"O.INSTANCE_TIME": 11,
"O.KEYS_USAGE": 4,
"O.OPERATION": 8,
"O.PERIPHERAL_INITIALISATION": 3,
"O.PREVENT_RESIDUAL_DATA": 3,
"O.PROTECTED_COMMUNICATION_CHANNEL": 12,
"O.RNG": 12,
"O.ROLLBACK_PROTECTION": 5,
"O.RUNTIME_CONFIDENTIALITY": 10,
"O.RUNTIME_INTEGRITY": 21,
"O.SAFE_RELEASE": 11,
"O.TA_AUTHENTICITY": 7,
"O.TA_ISOLATION": 15,
"O.TA_PERSISTENT_TIME": 12,
"O.TEE_DATA_PROTECTION": 11,
"O.TEE_ID": 11,
"O.TEE_ISOLATION": 14,
"O.TRUSTED_STORAGE": 9
},
"OE": {
"OE.DISABLED_DEBUG": 1,
"OE.INTEGRATION_CONFIGURATION": 7,
"OE.NO_RESIDUAL_DATA": 2,
"OE.PROTECTION_AFTER_DELIVERY": 7,
"OE.ROLLBACK": 1,
"OE.SECRETS": 2,
"OE.TA_DEVELOPMENT": 6,
"OE.TA_DEVELOPMENT_TUI": 5,
"OE.TA_MANAGEMENT": 3
},
"OP": {
"OP.ACTIVATE": 1,
"OP.AUTHENTICATE": 2,
"OP.DEBUG": 7,
"OP.EXTRACT_KEY": 4,
"OP.LOAD": 3,
"OP.STORE": 4,
"OP.USE_KEY": 4
},
"OSP": {
"OSP.INTEGRATION_": 1,
"OSP.INTEGRATION_CONFIGURATION": 2,
"OSP.SECRETS": 3
},
"T": {
"T.ABUSE_DEBUG": 3,
"T.ABUSE_FUNCT": 3,
"T.CLONE": 3,
"T.CORRUPT_RUNTIME_": 1,
"T.CORRUPT_RUNTIME_DATA": 2,
"T.CORRUPT_SETUP": 5,
"T.EXTRACT_DATA": 3,
"T.EXTRACT_EXCHANGED_": 1,
"T.EXTRACT_EXCHANGED_DATA": 2,
"T.FLASH_DUMP": 3,
"T.IMPERSONATION": 3,
"T.INJECT_DATA": 3,
"T.INJECT_EXCHANGED_": 1,
"T.INJECT_EXCHANGED_DATA": 2,
"T.MODIFY_DATA": 3,
"T.MODIFY_EXCHANGED_": 1,
"T.MODIFY_EXCHANGED_DATA": 2,
"T.MODIFY_FIRMWARE": 3,
"T.PERIPHERAL_ACCESS": 3,
"T.PERTURBATION": 3,
"T.RAM": 3,
"T.RESIDUAL": 3,
"T.RNG": 3,
"T.ROGUE_CODE_": 1,
"T.ROGUE_CODE_EXECUTION": 2,
"T.ROLLBACK": 3,
"T.SHARED_FUNCTION_": 1,
"T.SHARED_FUNCTION_ACCESS": 2,
"T.SPY": 3,
"T.STORAGE_CORRUPTION": 3,
"T.TA_PERSISTENT_TIME_": 1,
"T.TA_PERSISTENT_TIME_ROLLBACK": 2,
"T.TEE_FIRMWARE_": 1,
"T.TEE_FIRMWARE_DOWNGRADE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 7,
"ADV_FSP.1": 3,
"ADV_FSP.2": 15,
"ADV_TDS.1": 10
},
"AGD": {
"AGD_OPE.1": 10,
"AGD_PRE.1": 9
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 4
},
"AVA": {
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 6,
"EAL 2 augmented": 2,
"EAL 2+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 12,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 4,
"FAU_SAA.1": 2,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 5,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_CKM": 48,
"FCS_CKM.1": 17,
"FCS_CKM.2": 2,
"FCS_CKM.4": 23,
"FCS_COP": 68,
"FCS_COP.1": 14,
"FCS_RNG": 3,
"FCS_RNG.1": 10,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 40,
"FDP_ACC.1": 15,
"FDP_ACF": 35,
"FDP_ACF.1": 21,
"FDP_IFC": 13,
"FDP_IFC.1": 8,
"FDP_IFC.2": 2,
"FDP_IFF": 11,
"FDP_IFF.1": 8,
"FDP_ITC.1": 15,
"FDP_ITC.2": 15,
"FDP_ITT": 11,
"FDP_ITT.1": 4,
"FDP_RIP": 10,
"FDP_RIP.1": 2,
"FDP_ROL": 7,
"FDP_ROL.1": 2,
"FDP_SDI": 6,
"FDP_SDI.2": 15,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_TRP": 1
},
"FIA": {
"FIA_ATD": 7,
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_UAU": 12,
"FIA_UAU.2": 1,
"FIA_UAU.6": 2,
"FIA_UID": 8,
"FIA_UID.1": 3,
"FIA_UID.2": 8,
"FIA_UID.2.1": 1,
"FIA_USB": 6,
"FIA_USB.1": 9,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 55,
"FMT_MSA.1": 7,
"FMT_MSA.2": 1,
"FMT_MSA.3": 15,
"FMT_MTD": 5,
"FMT_MTD.1": 1,
"FMT_SMF": 5,
"FMT_SMF.1": 21,
"FMT_SMF.1.1": 1,
"FMT_SMR": 6,
"FMT_SMR.1": 24,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS": 12,
"FPT_FLS.1": 18,
"FPT_FLS.1.1": 1,
"FPT_INI": 4,
"FPT_INI.1": 14,
"FPT_INI.1.1": 2,
"FPT_INI.1.2": 2,
"FPT_INI.1.3": 2,
"FPT_INI.1.4": 1,
"FPT_ITT": 6,
"FPT_ITT.1": 2,
"FPT_STM": 10,
"FPT_STM.1": 2,
"FPT_TEE.1": 6,
"FPT_TEE.1.1": 1,
"FPT_TEE.1.2": 1
},
"FTP": {
"FTP_TPR": 1,
"FTP_TRP": 7,
"FTP_TRP.1": 3
}
},
"certification_process": {
"OutOfScope": {
"and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 2
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1,
"SHA1": 1
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 2,
"SHA-384": 1,
"SHA-512": 1,
"SHA224": 1,
"SHA256": 2,
"SHA384": 1,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"ED25519": 4,
"X25519": 4
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 5
},
"RNG": {
"RNG": 29
},
"TRNG": {
"TRNG": 5
}
},
"side_channel_analysis": {
"SCA": {
"side-channels": 1
},
"other": {
"cold boot": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 180-4": 1,
"FIPS 186-2": 1,
"FIPS 186-4": 2,
"FIPS 197": 1,
"FIPS 46-3": 1,
"FIPS 81": 1
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 1423": 1,
"RFC 2119": 3,
"RFC 2202": 1,
"RFC 4231": 1,
"RFC 7748": 1,
"RFC 8032": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11
}
},
"DES": {
"3DES": {
"3DES": 7
},
"DES": {
"DES": 7
}
},
"constructions": {
"MAC": {
"CMAC": 3,
"HMAC": 5,
"HMAC-SHA-224": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"ARM": {
"TrustZone": 2
},
"IBM": {
"SE": 2
},
"other": {
"TEE": 594,
"TEEgris": 126
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 140
},
"Thales": {
"Thales": 7
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "rosep",
"/CreationDate": "D:20240108141421+01\u002700\u0027",
"/ModDate": "D:20240108141421+01\u002700\u0027",
"/Producer": "Microsoft: Print To PDF",
"/Title": "Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx",
"pdf_file_size_bytes": 1813549,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 98
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bdc4ae02f7fe264ef28db9879f54f50e9405b087b868e71971b6daf1a2c3a509",
"txt_hash": "b19a9df8f1ca95c65efeef96f461d512501d96443dc5cdbac700ee32c09b4ca5"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2c613c0d2b9c0e06d38b41b98da13bae012de0200ef3f438d574970a0c3f3a13",
"txt_hash": "0b454786d28451a2c632cb8566953695867656ba000f3f87c39ac858713f2e46"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3335ea97556a238d5e10afb2b1f2be8a6062ca6d0713af20d650f2f213698809",
"txt_hash": "29d46bd6abb7d82fb0cfc4275921552246cefdff76653ae24402a00854962958"
}
},
"status": "active"
}