Microcontrôleur sécurisé ST23YS64C

CSV information ?

Status archived
Valid from 01.10.2012
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer STMicroelectronics
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, AVA_VAN.5, EAL5+

Heuristics summary ?

Certificate ID: ANSSI-CC-2012/65

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Randomness
TRNG

Vendor
STMicroelectronics, STM

Security level
EAL 5, EAL4, EAL5, EAL7, EAL 1, EAL 3, EAL 7, EAL 5 augmented, EAL5 augmented, ITSEC E6 High
Security Assurance Requirements (SAR)
ADO_DEL, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
ANSSI-CC-2012/65, ANSSI-CC-2009/37, ANSSI-CC-2009/37-M01, ANSSI-CC-2009/37-M02
Evaluation facilities
Serma Technologies

Side-channel analysis
Physical tampering

Standards
AIS 31, AIS31, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title ANSSI-CC-2012/65
Subject Secure microcontroller ST23YS64C
Keywords ANSSI-CC-CER-F-07EN.008
Author aa
Creation date D:20150323180009+01'00'
Modification date D:20150323180009+01'00'
Pages 18
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Frontpage

Certificate ID ANSSI-CC-2012/65
Certified item Secure microcontroller ST23YS64C
Certification lab Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France
Developer STMicroelectronics Smartcard IC division, 190 Avenue Célestin Coq, 13106 Rousset Cedex, France Sponsor STMicroelectronics Smartcard IC division, 190 Avenue Célestin Coq, 13106 Rousset Cedex, France

References

Outgoing
  • ANSSI-CC-2009/37 - archived - STMicroelectronics ST23YL80C Secure Microcontroller

Security target ?

Extracted keywords

Symmetric Algorithms
DES, DEA, 3DES
Asymmetric Algorithms
ECC
Randomness
TRNG, RND
Block cipher modes
CBC

Vendor
Infineon Technologies, STMicroelectronics, Philips

Security level
EAL5, EAL 5, EAL4, EAL 5 augmented
Claims
O.RND, T.RND
Security Assurance Requirements (SAR)
ADO_DEL, ADV_FSP, ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_ARC, ADV_IMP, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DVS, ALC_CMS, ALC_CMC, ATE_COV, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FCS_RNG.1, FCS_COP.1, FCS_RNG, FCS_CKM.1, FCS_CKM.4, FDP_ITT.1, FDP_IFC.1, FDP_ACC.2, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_LIM, FMT_MSA.2, FMT_SMF.1, FMT_SMR.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2
Protection profiles
BSI-PP-0035

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, SPA, Physical tampering, physical tampering, Malfunction, malfunction, fault injection

Standards
FIPS PUB 186, BSI-AIS31, ISO/IEC 9797:1994, ISO/IEC 10116:1997, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-001

File metadata

Title SMD_ST23YS64_V_1_0.book
Author Christiane DROULERS
Creation date D:20110909125550Z
Modification date D:20110909125550Z
Pages 47
Creator FrameMaker 7.2
Producer Acrobat Distiller 6.0 (Windows)

Heuristics ?

Certificate ID: ANSSI-CC-2012/65

Extracted SARs

ALC_CMS.5, AVA_VAN.5, ADV_IMP.1, ATE_COV.2, ADV_ARC.1, ADV_TDS.4, ADV_FSP.5, ALC_LCD.1, ALC_DEL.1, ALC_DVS.2, AGD_OPE.1, ALC_TAT.2, ADV_INT.2, ALC_CMC.4, ATE_IND.2, ATE_FUN.1, AGD_PRE.1, ATE_DPT.3

References ?

Updates ?

  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '605ac5fbf0d68b997e513b2d4144efc6af2b72f6bf0b7c629f7d99c49aa24004', 'txt_hash': '4d6d1923d24873e972e7dc81e16ff09894c1e970fdd775f516e9d54530347001'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '627f2712b9eea0be72e0b47c7d3884daf14336be667f576f687cc5b2c242ed1e', 'txt_hash': 'b7242212a5a48984d923abc539f64781c52db86febcca51ce2955482191a04ee'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 588159, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Title': 'ANSSI-CC-2012/65', '/Author': 'aa', '/Subject': 'Secure microcontroller ST23YS64C', '/Keywords': 'ANSSI-CC-CER-F-07EN.008', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20150323180009+01'00'", '/ModDate': "D:20150323180009+01'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'mailto:[email protected]']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 575949, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 47, '/ModDate': 'D:20110909125550Z', '/CreationDate': 'D:20110909125550Z', '/Title': 'SMD_ST23YS64_V_1_0.book', '/Creator': 'FrameMaker 7.2', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'Christiane DROULERS', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Mutual Recognition Agreements'], 'cert_id': 'ANSSI-CC-2012/65', 'cert_item': 'Secure microcontroller ST23YS64C', 'cert_item_version': 'ST23YS64 external revision C, dedicated software AIC, maskset K2K0CIA', 'ref_protection_profiles': 'PP0035]: Security IC Platform Protection Profile, Version 1.0', 'cc_version': 'Common Criteria version 3.1 revision 3', 'cc_security_level': 'EAL 5 augmented ALC_DVS.2, AVA_VAN.5', 'developer': 'STMicroelectronics Smartcard IC division, 190 Avenue Célestin Coq, 13106 Rousset Cedex, France Sponsor STMicroelectronics Smartcard IC division, 190 Avenue Célestin Coq, 13106 Rousset Cedex, France', 'cert_lab': 'Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France'}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2012/65': 19, 'ANSSI-CC-2009/37': 2, 'ANSSI-CC-2009/37-M01': 1, 'ANSSI-CC-2009/37-M02': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL4': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1, 'EAL 5 augmented': 2, 'EAL5 augmented': 1}, 'ITSEC': {'ITSEC E6 High': 1}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 20, 'STM': 14}}, 'eval_facility': {'Serma': {'Serma Technologies': 3}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'Physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 2, 'AIS31': 4}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 54}}, 'cc_security_level': {'EAL': {'EAL5': 17, 'EAL 5': 2, 'EAL4': 1, 'EAL 5 augmented': 2}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_FSP': 3, 'ADV_ARC.1': 1, 'ADV_FSP.5': 3, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_ARC': 2, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 5, 'FAU_SAS': 1}, 'FCS': {'FCS_RNG.1': 5, 'FCS_COP.1': 12, 'FCS_RNG': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_ITT.1': 7, 'FDP_IFC.1': 9, 'FDP_ACC.2': 9, 'FDP_ACF.1': 10, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.1': 1}, 'FMT': {'FMT_LIM.1': 7, 'FMT_LIM.2': 8, 'FMT_MSA.3': 9, 'FMT_MSA.1': 12, 'FMT_LIM': 1, 'FMT_MSA.2': 2, 'FMT_SMF.1': 4, 'FMT_SMR.1': 2}, 'FPT': {'FPT_FLS.1': 7, 'FPT_PHP.3': 6, 'FPT_ITT.1': 6}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3}, 'T': {'T.RND': 3}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 9}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 17, 'DEA': 1}, '3DES': {'3DES': 3}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RND': 6}}, 'cipher_mode': {'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 8, 'Physical Probing': 4, 'physical probing': 2, 'side channel': 1, 'DPA': 3, 'SPA': 2}, 'FI': {'Physical tampering': 2, 'physical tampering': 1, 'Malfunction': 9, 'malfunction': 1, 'fault injection': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186': 1}, 'BSI': {'BSI-AIS31': 3}, 'ISO': {'ISO/IEC 9797:1994': 2, 'ISO/IEC 10116:1997': 1}, 'CC': {'CCMB-2009-07-002': 9, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2012_65_EN.pdf.
    • The st_filename property was set to anssi-cible2012_65en.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['SERMA'].
    • The cert_id property was set to ANSSI-CC-2012/65.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/37']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/37']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_65_EN.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2012_65en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}]} values discarded.
    • The scheme_data property was set to {'product': 'Microcontrôleur sécurisé ST23YS64C', 'url': 'https://cyber.gouv.fr/produits-certifies/microcontroleur-securise-st23ys64c', 'description': "Le produit certifié est le « Microcontrôleur sécurisé ST23YS64C » (logiciel dédié AIC, maskset K2K0CIA), développé par STMicroelectronics.\nLa partie matérielle et les logiciels dédiés sont identiques à ceux du produit ST23YL80C, certifié sous la référence ANSSI-CC-2009/37 et maintenu sous les références ANSSI-CC-2009/37-M01 et ANSSI-CC-2009/37-M02.\nLe microcontrôleur seul n'est pas un produit ut", 'sponsor': 'STMicroelectronics', 'developer': 'STMicroelectronics', 'cert_id': '2012/65', 'level': 'EAL5+', 'enhanced': {'cert_id': '2012/65', 'certification_date': '01/10/2012', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'STMicroelectronics', 'sponsor': 'STMicroelectronics', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': '[PP0035] : Security IC Platform Protection Profile, Version 1.0', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-65en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2012/10/ANSSI-CC-2012_65_EN.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Microcontrôleur sécurisé ST23YS64C was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "0422e4a0cec519a3",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2012/65",
    "cert_lab": [
      "SERMA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/37"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2009/37"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "STMicroelectronics",
  "manufacturer_web": "https://www.st.com/",
  "name": "Microcontr\u00f4leur s\u00e9curis\u00e9 ST23YS64C",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2012-10-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC-2012_65_EN.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augmented ALC_DVS.2, AVA_VAN.5",
        "cc_version": "Common Criteria version 3.1 revision 3",
        "cert_id": "ANSSI-CC-2012/65",
        "cert_item": "Secure microcontroller ST23YS64C",
        "cert_item_version": "ST23YS64 external revision C, dedicated software AIC, maskset K2K0CIA",
        "cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France",
        "developer": "STMicroelectronics Smartcard IC division, 190 Avenue C\u00e9lestin Coq, 13106 Rousset Cedex, France Sponsor STMicroelectronics Smartcard IC division, 190 Avenue C\u00e9lestin Coq, 13106 Rousset Cedex, France",
        "match_rules": [
          "Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Mutual Recognition Agreements"
        ],
        "ref_protection_profiles": "PP0035]: Security IC Platform Protection Profile, Version 1.0"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2009/37": 2,
          "ANSSI-CC-2009/37-M01": 1,
          "ANSSI-CC-2009/37-M02": 1,
          "ANSSI-CC-2012/65": 19
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADO": {
          "ADO_DEL": 1
        },
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 1,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 5 augmented": 2,
          "EAL 7": 1,
          "EAL4": 2,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 High": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Technologies": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Physical tampering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 2,
          "AIS31": 4
        },
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STM": 14,
          "STMicroelectronics": 20
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "aa",
      "/CreationDate": "D:20150323180009+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/Keywords": "ANSSI-CC-CER-F-07EN.008",
      "/ModDate": "D:20150323180009+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Subject": "Secure microcontroller ST23YS64C",
      "/Title": "ANSSI-CC-2012/65",
      "pdf_file_size_bytes": 588159,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "anssi-cible2012_65en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.RND": 3
        },
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 54
        }
      },
      "cc_sar": {
        "ADO": {
          "ADO_DEL": 1
        },
        "ADV": {
          "ADV_ARC": 2,
          "ADV_ARC.1": 1,
          "ADV_FSP": 3,
          "ADV_FSP.5": 3,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_COV": 3,
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 2,
          "EAL 5 augmented": 2,
          "EAL4": 1,
          "EAL5": 17
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 1,
          "FAU_SAS.1": 5
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.4": 1,
          "FCS_COP.1": 12,
          "FCS_RNG": 1,
          "FCS_RNG.1": 5
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACC.2": 9,
          "FDP_ACF.1": 10,
          "FDP_IFC.1": 9,
          "FDP_ITC.1": 1,
          "FDP_ITC.2": 1,
          "FDP_ITT.1": 7
        },
        "FMT": {
          "FMT_LIM": 1,
          "FMT_LIM.1": 7,
          "FMT_LIM.2": 8,
          "FMT_MSA.1": 12,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 9,
          "FMT_SMF.1": 4,
          "FMT_SMR.1": 2
        },
        "FPT": {
          "FPT_FLS.1": 7,
          "FPT_ITT.1": 6,
          "FPT_PHP.3": 6
        },
        "FRU": {
          "FRU_FLT.2": 7
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 6
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 9,
          "Physical tampering": 2,
          "fault injection": 2,
          "malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 3,
          "Leak-Inherent": 8,
          "Physical Probing": 4,
          "SPA": 2,
          "physical probing": 2,
          "side channel": 1
        }
      },
      "standard_id": {
        "BSI": {
          "BSI-AIS31": 3
        },
        "CC": {
          "CCMB-2009-07-001": 2,
          "CCMB-2009-07-002": 9,
          "CCMB-2009-07-003": 2
        },
        "FIPS": {
          "FIPS PUB 186": 1
        },
        "ISO": {
          "ISO/IEC 10116:1997": 1,
          "ISO/IEC 9797:1994": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 3
          },
          "DES": {
            "DEA": 1,
            "DES": 17
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        },
        "Philips": {
          "Philips": 1
        },
        "STMicroelectronics": {
          "STMicroelectronics": 9
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Christiane DROULERS",
      "/CreationDate": "D:20110909125550Z",
      "/Creator": "FrameMaker 7.2",
      "/ModDate": "D:20110909125550Z",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "SMD_ST23YS64_V_1_0.book",
      "pdf_file_size_bytes": 575949,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.st.com"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 47
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf",
        "pp_name": "Security IC Platform Protection Profile, Version 1.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_65_EN.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL5+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2012_65en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "605ac5fbf0d68b997e513b2d4144efc6af2b72f6bf0b7c629f7d99c49aa24004",
      "txt_hash": "4d6d1923d24873e972e7dc81e16ff09894c1e970fdd775f516e9d54530347001"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "627f2712b9eea0be72e0b47c7d3884daf14336be667f576f687cc5b2c242ed1e",
      "txt_hash": "b7242212a5a48984d923abc539f64781c52db86febcca51ce2955482191a04ee"
    }
  },
  "status": "archived"
}