ST31H320 A01 including optional cryptographic library NESLIB

CSV information ?

Status archived
Valid from 28.12.2015
Valid until 28.12.2020
Scheme 🇫🇷 FR
Manufacturer STMicroelectronics
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_INT.3, ALC_CMC.5, AVA_VAN.5, ALC_DVS.2, ATE_COV.3, ADV_IMP.2, ADV_TDS.5, ALC_TAT.3, ATE_FUN.2, EAL5+, ALC_FLR.1
Maintenance updates ANSSI-CC-2015/59-M01 (20.04.2016) Certification report

Heuristics summary ?

Certificate ?

Certification report ?

Security target ?

Heuristics ?

No heuristics are available for this certificate.

Extracted SARs

ALC_DVS.2, ATE_FUN.2, ALC_FLR.1, AVA_VAN.5, ALC_CMC.5, ADV_INT.3, ADV_IMP.2, ADV_TDS.5, ALC_TAT.3, ATE_COV.3

Scheme data ?

Product ST31H320 A01 including optional cryptographic library NESLIB
Url https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib
Description Le produit certifié est le microcontôleur sécurisé « ST31H320 A01 including optionalcryptographic library NESLIB » développé par STMICROELECTRONICS. Comme décrit dans la cible de sécurité [ST] au paragraphe « TOE overview », ce produit sedécline en différentes configurations selon la taille de mémoire non volatile FLASH etl’activation du coprocesseur cryptographique NesCrypt. Ces configurati
Sponsor STMicroelectronics
Developer STMicroelectronics
Cert Id 2015/59
Level EAL5+
Enhanced
Cert Id 2015/59
Certification Date 28/12/2015
Category Micro-circuits
Cc Version Critères Communs version 3.1r4
Developer STMicroelectronics
Sponsor STMicroelectronics
Evaluation Facility Serma Technologies
Level EAL5+
Protection Profile BSI-CC-PP-0084-2014
Mutual Recognition SOG-IS CCRA
Augmented ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5
Target Link https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf

References ?

No references are available for this certificate as its ID was not successfully extracted.

Updates ?

  • 08.07.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values discarded.
  • 11.06.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bd30ad5fa652dba174ee2c11bff22be59db9418a46b2e1db42555b011ce264eb', 'txt_hash': '617d674733e5106acaf983c5af447d8163656ac421f0c4cf7295d12f15bbdfe7'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8f252458d69fce752b249d8b257fdd59f7e3614e36640666270c3a6a8bd11516', 'txt_hash': '25a18b3b82f1711bd1d9963aa7f660e7b127c67e027ad32a72d6c40df783cac7'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 186044, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/Producer': 'GPL Ghostscript 9.02', '/CreationDate': '', '/ModDate': '', '/Title': 'ANSSI-CC-2015_59en', '/Creator': 'PDFCreator Version 1.2.1', '/Author': '', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 956228, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/Author': 'Christiane DROULERS', '/CreationDate': 'D:20151215093653Z', '/Creator': 'FrameMaker 11.0', '/ModDate': "D:20151215094303+01'00'", '/Producer': 'Acrobat Elements 10.0.0 (Windows)', '/Title': 'SMD_ST31H320_VA01_5P.book', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Mutual Recognition Agreements'], 'cert_id': 'ANSSI-CC-2015/59', 'cert_item': 'ST31H320 A01 including optional cryptographic library NESLIB', 'cert_item_version': '/version A01', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certified by the BSI under reference BSI-CC-PP-0084-2014 o, 19 February 2014 with “Package 1: Loader dedicated for usage in Secured Environment only', 'cc_version': 'Common criteria version 3.1 revision 4', 'cc_security_level': 'EAL 5 augmented ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5', 'developer': 'STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France', 'cert_lab': 'Serma Technologies 14 rue GalilĂ©e, CS 10055, 33615 Pessac Cedex, France'}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2015/59': 16}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 2}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1, 'EAL 5 augmented': 2}, 'ITSEC': {'ITSEC E6 High': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_TDS.5': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.5': 2, 'ALC_DVS.2': 2, 'ALC_FLR.1': 2, 'ALC_TAT.3': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_FUN.2': 2, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 16}}, 'eval_facility': {'Serma': {'Serma Technologies': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'DRBG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v4.2': 1, 'NesLib 4.2.10': 2, 'NesLib 4.2': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'Physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 2, 'AIS31': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 53, 'BSI-CC-PP- 0084-2014': 8, 'BSI-CC-PP-0084-': 2}}, 'cc_security_level': {'EAL': {'EAL5': 14, 'EAL5+': 1, 'EAL4': 1, 'EAL6+': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_FSP': 4, 'ADV_IMP.2': 4, 'ADV_INT.3': 4, 'ADV_TDS.5': 4, 'ADV_ARC.1': 1, 'ADV_FSP.5': 3, 'ADV_SPM': 1, 'ADV_ARC': 2, 'ADV_IMP': 1, 'ADV_SPM.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.5': 4, 'ALC_DVS.2': 4, 'ALC_FLR.1': 4, 'ALC_TAT.3': 4, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.3': 4, 'ATE_FUN.2': 4, 'ATE_DPT.3': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 4, 'ASE_ECD': 4, 'ASE_SPD': 7, 'ASE_OBJ': 7, 'ASE_REQ': 23, 'ASE_TSS': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 6, 'FAU_SAS': 2}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP.1': 28, 'FCS_CKM.1': 20, 'FCS_RNG': 2, 'FCS_CKM.4': 4}, 'FDP': {'FDP_SDC.1': 8, 'FDP_SDI.2': 8, 'FDP_ITT.1': 10, 'FDP_IFC.1': 16, 'FDP_ACC.2': 12, 'FDP_ACF.1': 24, 'FDP_ACC.1': 17, 'FDP_ITC.1': 13, 'FDP_SDC': 2, 'FDP_ITC.2': 2, 'FDP_CKM.2': 1, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_UID.1': 10}, 'FMT': {'FMT_LIM.1': 17, 'FMT_LIM.2': 18, 'FMT_MSA.3': 22, 'FMT_MSA.1': 21, 'FMT_SMF.1': 16, 'FMT_SMR.1': 13, 'FMT_LIM': 2, 'FMT_ITC.1': 1}, 'FPT': {'FPT_FLS.1': 11, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 11}}, 'cc_claims': {'O': {'O.RND': 4}, 'T': {'T.RND': 3}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 20}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12, 'AES-128': 1, 'AES-192': 1, 'AES-': 1}}, 'DES': {'DES': {'DES': 6}, '3DES': {'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-256': 9, 'SHA-384': 6, 'SHA-512': 6, 'SHA-224': 5}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 10}, 'RNG': {'RND': 7, 'RNG': 6}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib 4.2': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 4, 'physical probing': 3, 'side channel': 6}, 'FI': {'physical tampering': 1, 'Malfunction': 13, 'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 4, 'FIPS PUB 186-4': 4, 'FIPS PUB 180-2': 5, 'FIPS PUB 198-1': 3, 'FIPS PUB 140-2': 5}, 'NIST': {'NIST SP 800-67': 3, 'SP 800-38A': 2, 'NIST SP 800-56A': 3, 'NIST SP 800-90': 4, 'NIST SP 800-38A': 2, 'SP 800-67': 1, 'NIST SP 800-38B': 1, 'SP 800-90A': 1}, 'PKCS': {'PKCS1': 1, 'PKCS #1': 8}, 'BSI': {'AIS31': 3}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 9796-2': 3, 'ISO/IEC 14888': 2, 'ISO/IEC 9796': 1}, 'CC': {'CCMB-2012-09-002': 20, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded': 1, 'The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific': 1}}}.
    • The report_filename property was set to ANSSI-CC-2015_59en.pdf.
    • The st_filename property was set to ANSSI_cible2015_59en.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['SERMA'].
    • The cert_id property was set to ANSSI-CC-2015/59.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23', 'BSI-DSZ-CC-1037-2018']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23', 'BSI-DSZ-CC-1037-2018']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/60', 'ANSSI-CC-2017/23']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/60', 'ANSSI-CC-2017/10', 'BSI-DSZ-CC-1037-2018', 'ANSSI-CC-2017/23']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 09.06.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'ST31H320 A01 including optional cryptographic library NESLIB', 'url': 'https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib', 'description': 'Le produit certifiĂ© est le microcontĂ´leur sĂ©curisĂ© « ST31H320 A01 including optionalcryptographic library NESLIB » dĂ©veloppĂ© par STMICROELECTRONICS.\n\nComme dĂ©crit dans la cible de sĂ©curitĂ© [ST] au paragraphe « TOE overview », ce produit sedĂ©cline en diffĂ©rentes configurations selon la taille de mĂ©moire non volatile FLASH etl’activation du coprocesseur cryptographique NesCrypt. Ces configurati', 'sponsor': 'STMicroelectronics', 'developer': 'STMicroelectronics', 'cert_id': '2015/59', 'level': 'EAL5+', 'enhanced': {'cert_id': '2015/59', 'certification_date': '28/12/2015', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'STMicroelectronics', 'sponsor': 'STMicroelectronics', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf'}}.
  • 09.06.2024 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is https://www.st.com/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': None}]}.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 03.06.2024 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'SECURITY_IC_AUGP_V1.0', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values discarded.
  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bd30ad5fa652dba174ee2c11bff22be59db9418a46b2e1db42555b011ce264eb', 'txt_hash': '617d674733e5106acaf983c5af447d8163656ac421f0c4cf7295d12f15bbdfe7'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8f252458d69fce752b249d8b257fdd59f7e3614e36640666270c3a6a8bd11516', 'txt_hash': '25a18b3b82f1711bd1d9963aa7f660e7b127c67e027ad32a72d6c40df783cac7'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Mutual Recognition Agreements'], 'cert_id': 'ANSSI-CC-2015/59', 'cert_item': 'ST31H320 A01 including optional cryptographic library NESLIB', 'cert_item_version': '/version A01', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certified by the BSI under reference BSI-CC-PP-0084-2014 o, 19 February 2014 with “Package 1: Loader dedicated for usage in Secured Environment only', 'cc_version': 'Common criteria version 3.1 revision 4', 'cc_security_level': 'EAL 5 augmented ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5', 'developer': 'STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France', 'cert_lab': 'Serma Technologies 14 rue GalilĂ©e, CS 10055, 33615 Pessac Cedex, France'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2015/59': 16}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2015/59': 32}}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 21, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 5': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 3, '3 3 3': 1, '1 1 3': 1, '2 2 3': 1}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2015/59': 16}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'2-2-1': 1}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'ST31H320 A01 including optional cryptographic library NESLIB', 'url': 'https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib', 'description': 'Le produit certifiĂ© est le microcontĂ´leur sĂ©curisĂ© « ST31H320 A01 including optionalcryptographic library NESLIB » dĂ©veloppĂ© par STMICROELECTRONICS.\n\nComme dĂ©crit dans la cible de sĂ©curitĂ© [ST] au paragraphe « TOE overview », ce produit sedĂ©cline en diffĂ©rentes configurations selon la taille de mĂ©moire non volatile FLASH etl’activation du coprocesseur cryptographique NesCrypt. Ces configurati', 'sponsor': 'STMicroelectronics', 'developer': 'STMicroelectronics', 'cert_id': '2015/59', 'level': 'EAL5+', 'enhanced': {'cert_id': '2015/59', 'certification_date': '28/12/2015', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'STMicroelectronics', 'sponsor': 'STMicroelectronics', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf'}}.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2016-04-20', 'maintenance_title': 'ANSSI-CC-2015/59-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2015_59-M01.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 8f252458d69fce752b249d8b257fdd59f7e3614e36640666270c3a6a8bd11516.
    • The st_txt_hash property was set to 25a18b3b82f1711bd1d9963aa7f660e7b127c67e027ad32a72d6c40df783cac7.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 956228, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/Author': 'Christiane DROULERS', '/CreationDate': 'D:20151215093653Z', '/Creator': 'FrameMaker 11.0', '/ModDate': "D:20151215094303+01'00'", '/Producer': 'Acrobat Elements 10.0.0 (Windows)', '/Title': 'SMD_ST31H320_VA01_5P.book', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 53, 'BSI-CC-PP- 0084-2014': 8, 'BSI-CC-PP-0084-': 2}}, 'cc_security_level': {'EAL': {'EAL5': 14, 'EAL5+': 1, 'EAL4': 1, 'EAL6+': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_FSP': 4, 'ADV_IMP.2': 4, 'ADV_INT.3': 4, 'ADV_TDS.5': 4, 'ADV_ARC.1': 1, 'ADV_FSP.5': 3, 'ADV_SPM': 1, 'ADV_ARC': 2, 'ADV_IMP': 1, 'ADV_SPM.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.5': 4, 'ALC_DVS.2': 4, 'ALC_FLR.1': 4, 'ALC_TAT.3': 4, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.3': 4, 'ATE_FUN.2': 4, 'ATE_DPT.3': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 4, 'ASE_ECD': 4, 'ASE_SPD': 7, 'ASE_OBJ': 7, 'ASE_REQ': 23, 'ASE_TSS': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 6, 'FAU_SAS': 2}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP.1': 28, 'FCS_CKM.1': 20, 'FCS_RNG': 2, 'FCS_CKM.4': 4}, 'FDP': {'FDP_SDC.1': 8, 'FDP_SDI.2': 8, 'FDP_ITT.1': 10, 'FDP_IFC.1': 16, 'FDP_ACC.2': 12, 'FDP_ACF.1': 24, 'FDP_ACC.1': 17, 'FDP_ITC.1': 13, 'FDP_SDC': 2, 'FDP_ITC.2': 2, 'FDP_CKM.2': 1, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_UID.1': 10}, 'FMT': {'FMT_LIM.1': 17, 'FMT_LIM.2': 18, 'FMT_MSA.3': 22, 'FMT_MSA.1': 21, 'FMT_SMF.1': 16, 'FMT_SMR.1': 13, 'FMT_LIM': 2, 'FMT_ITC.1': 1}, 'FPT': {'FPT_FLS.1': 11, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 11}}, 'cc_claims': {'O': {'O.RND': 4}, 'T': {'T.RND': 3}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 20}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12, 'AES-128': 1, 'AES-192': 1, 'AES-': 1}}, 'DES': {'DES': {'DES': 6}, '3DES': {'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-256': 9, 'SHA-384': 6, 'SHA-512': 6, 'SHA-224': 5}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 10}, 'RNG': {'RND': 7, 'RNG': 6}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib 4.2': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 4, 'physical probing': 3, 'side channel': 6}, 'FI': {'physical tampering': 1, 'Malfunction': 13, 'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 4, 'FIPS PUB 186-4': 4, 'FIPS PUB 180-2': 5, 'FIPS PUB 198-1': 3, 'FIPS PUB 140-2': 5}, 'NIST': {'NIST SP 800-67': 3, 'SP 800-38A': 2, 'NIST SP 800-56A': 3, 'NIST SP 800-90': 4, 'NIST SP 800-38A': 2, 'SP 800-67': 1, 'NIST SP 800-38B': 1, 'SP 800-90A': 1}, 'PKCS': {'PKCS1': 1, 'PKCS #1': 8}, 'BSI': {'AIS31': 3}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 9796-2': 3, 'ISO/IEC 14888': 2, 'ISO/IEC 9796': 1}, 'CC': {'CCMB-2012-09-002': 20, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded': 1, 'The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific': 1}}}.
    • The st_filename property was set to ANSSI_cible2015_59en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/ANSSI_cible2015_59en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23']}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2015_59en.pdf, code: 408'].

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0', 'JAVA_OC']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'ANSSI-CC-2015_59en.pdf', 'st_filename': 'ANSSI_cible2015_59en.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}, '__delete__': ['EAL 2', 'EAL 4', 'EAL 6', 'EAL 5+']}}}, 'vendor': {'__update__': {'STMicroelectronics': {'__delete__': ['STM']}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'randomness': {'__delete__': ['RNG']}, 'tee_name': {}, 'standard_id': {'__update__': {'BSI': {'__update__': {'AIS31': 2}}, 'CC': {'__insert__': {'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_protection_profile_id': {'__update__': {'BSI': {'__update__': {'BSI-CC-PP-0084-2014': 53}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 3}}, 'AVA': {'__update__': {'AVA_VAN.5': 4}}}}, 'cc_sfr': {'__update__': {'FCS': {'__update__': {'FCS_CKM.1': 20, 'FCS_CKM.4': 4}}, 'FDP': {'__update__': {'FDP_ACC.1': 17}, '__delete__': ['FDP_IFF.1']}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 12}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 6}, '__delete__': ['DEA']}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 9}}}}}, '__delete__': ['scrypt']}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'__update__': {'PRNG': {'__update__': {'DRBG': 10}}, 'RNG': {'__update__': {'RNG': 6}, '__delete__': ['RBG']}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 3}, '__delete__': ['SPA']}, 'FI': {'__update__': {'Malfunction': 13, 'malfunction': 2}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS PUB 197': 4, 'FIPS PUB 186-4': 4, 'FIPS PUB 198-1': 3, 'FIPS PUB 140-2': 5}}, 'NIST': {'__insert__': {'SP 800-38A': 2, 'SP 800-67': 1, 'SP 800-90A': 1}, '__update__': {'NIST SP 800-38A': 2, 'NIST SP 800-90': 4}, '__delete__': ['NIST SP 800-90A']}, 'BSI': {'__update__': {'AIS31': 3}}, 'ISO': {'__update__': {'ISO/IEC 9796': 1, 'ISO/IEC 14888': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded': 1, 'The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific': 1}, '__delete__': ['(ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded', '7 The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific']}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0', 'JAVA_OC']}}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2016-04-20', 'maintenance_title': 'ANSSI-CC-2015/59-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2015_59-M01.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2015/59': 32}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 2}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL7': 1, 'EAL2': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 5+': 1, 'EAL 5 augmented': 2}, 'ITSEC': {'ITSEC E6 High': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_TDS.5': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.5': 2, 'ALC_DVS.2': 2, 'ALC_FLR.1': 2, 'ALC_TAT.3': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_FUN.2': 2, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 16, 'STM': 1}}, 'eval_facility': {'Serma': {'Serma Technologies': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 7}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 1, 'RBG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v4.2': 1, 'NesLib 4.2.10': 2, 'NesLib 4.2': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'Physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 2, 'AIS31': 5}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 66, 'BSI-CC-PP- 0084-2014': 8, 'BSI-CC-PP-0084-': 2}}, 'cc_security_level': {'EAL': {'EAL5': 14, 'EAL5+': 1, 'EAL4': 1, 'EAL6+': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_FSP': 4, 'ADV_IMP.2': 4, 'ADV_INT.3': 4, 'ADV_TDS.5': 4, 'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_SPM': 1, 'ADV_ARC': 2, 'ADV_IMP': 1, 'ADV_SPM.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.5': 4, 'ALC_DVS.2': 4, 'ALC_FLR.1': 4, 'ALC_TAT.3': 4, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.3': 4, 'ATE_FUN.2': 4, 'ATE_DPT.3': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 4, 'ASE_ECD': 4, 'ASE_SPD': 7, 'ASE_OBJ': 7, 'ASE_REQ': 23, 'ASE_TSS': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 6, 'FAU_SAS': 2}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP.1': 28, 'FCS_CKM.1': 19, 'FCS_RNG': 2, 'FCS_CKM.4': 5}, 'FDP': {'FDP_SDC.1': 8, 'FDP_SDI.2': 8, 'FDP_ITT.1': 10, 'FDP_IFC.1': 16, 'FDP_ACC.2': 12, 'FDP_ACF.1': 24, 'FDP_ACC.1': 18, 'FDP_ITC.1': 13, 'FDP_SDC': 2, 'FDP_IFF.1': 1, 'FDP_ITC.2': 2, 'FDP_CKM.2': 1, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_UID.1': 10}, 'FMT': {'FMT_LIM.1': 17, 'FMT_LIM.2': 18, 'FMT_MSA.3': 22, 'FMT_MSA.1': 21, 'FMT_SMF.1': 16, 'FMT_SMR.1': 13, 'FMT_LIM': 2, 'FMT_ITC.1': 1}, 'FPT': {'FPT_FLS.1': 11, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 11}}, 'cc_claims': {'O': {'O.RND': 4}, 'T': {'T.RND': 3}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 20}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13, 'AES-128': 1, 'AES-192': 1, 'AES-': 1}}, 'DES': {'DES': {'DES': 15, 'DEA': 1}, '3DES': {'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'DH': 3, 'Diffie-Hellman': 2}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-256': 8, 'SHA-384': 6, 'SHA-512': 6, 'SHA-224': 5}}, 'scrypt': {'scrypt': 4}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 13}, 'RNG': {'RNG': 9, 'RND': 7, 'RBG': 13}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib 4.2': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 4, 'physical probing': 1, 'side channel': 6, 'SPA': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 15, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 7}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 5, 'FIPS PUB 186-4': 6, 'FIPS PUB 180-2': 5, 'FIPS PUB 198-1': 4, 'FIPS PUB 140-2': 6}, 'NIST': {'NIST SP 800-67': 3, 'NIST SP 800-38A': 3, 'NIST SP 800-56A': 3, 'NIST SP 800-90': 3, 'NIST SP 800-38B': 1, 'NIST SP 800-90A': 1}, 'PKCS': {'PKCS1': 1, 'PKCS #1': 8}, 'BSI': {'AIS31': 9}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 9796-2': 3, 'ISO/IEC 9796': 2, 'ISO/IEC 14888': 4}, 'CC': {'CCMB-2012-09-002': 20, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '(ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded': 1, '7 The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'bd30ad5fa652dba174ee2c11bff22be59db9418a46b2e1db42555b011ce264eb', 'st_pdf_hash': '8f252458d69fce752b249d8b257fdd59f7e3614e36640666270c3a6a8bd11516', 'report_txt_hash': '617d674733e5106acaf983c5af447d8163656ac421f0c4cf7295d12f15bbdfe7', 'st_txt_hash': '25a18b3b82f1711bd1d9963aa7f660e7b127c67e027ad32a72d6c40df783cac7'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 1, 'DES': 7}, 'rules_asymmetric_crypto': {'ECC': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'TRNG': 1, 'DRBG': 1, 'RNG': 1, 'RBG': 1}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'Physical tampering': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 13, 'AES-128': 1, 'AES-192': 1, 'AES-': 1, 'DES': 11, 'TDES': 4, 'TDEA': 1, 'HMAC': 3}, 'rules_asymmetric_crypto': {'ECDH': 3, 'ECDSA': 4, 'ECC': 3, 'DH': 3, 'Diffie-Hellman': 2, 'DSA': 5}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 14, 'SHA-256': 8, 'SHA-384': 6, 'SHA-512': 6, 'SHA-224': 5, 'scrypt': 4}, 'rules_crypto_schemes': {'PACE': 2, 'MAC': 4}, 'rules_randomness': {'TRNG': 2, 'DRBG': 13, 'RNG': 9, 'RND': 7, 'RBG': 13}, 'rules_tee': {'SE': 7}, 'rules_side_channels': {'Malfunction': 15, 'malfunction': 1, 'Leak-Inherent': 12, 'Physical Probing': 4, 'physical probing': 1, 'physical tampering': 1, 'side channel': 6}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23', 'ANSSI-CC-2017/10', 'BSI-DSZ-CC-1037-2018']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23', 'ANSSI-CC-2017/10', 'BSI-DSZ-CC-1037-2018']}, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23', 'ANSSI-CC-2017/10', 'ANSSI-CC-2017/60']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23', 'ANSSI-CC-2017/10', 'ANSSI-CC-2017/60', 'BSI-DSZ-CC-1037-2018']}, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/60', 'ANSSI-CC-2017/23']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0', 'JAVA_OC']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ST31H320 A01 including optional cryptographic library NESLIB was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "36fbd23e279b08ca",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "2015/59",
      "description": "Le produit certifi\u00e9 est le microcont\u00f4leur s\u00e9curis\u00e9 \u00ab ST31H320 A01 including optionalcryptographic library NESLIB \u00bb d\u00e9velopp\u00e9 par STMICROELECTRONICS.\n\nComme d\u00e9crit dans la cible de s\u00e9curit\u00e9 [ST] au paragraphe \u00ab TOE overview \u00bb, ce produit sed\u00e9cline en diff\u00e9rentes configurations selon la taille de m\u00e9moire non volatile FLASH etl\u2019activation du coprocesseur cryptographique NesCrypt. Ces configurati",
      "developer": "STMicroelectronics",
      "enhanced": {
        "augmented": "ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 3.1r4",
        "cert_id": "2015/59",
        "certification_date": "28/12/2015",
        "developer": "STMicroelectronics",
        "evaluation_facility": "Serma Technologies",
        "level": "EAL5+",
        "mutual_recognition": "SOG-IS\n                          CCRA",
        "protection_profile": "BSI-CC-PP-0084-2014",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf",
        "sponsor": "STMicroelectronics",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf"
      },
      "level": "EAL5+",
      "product": "ST31H320 A01 including optional cryptographic library NESLIB",
      "sponsor": "STMicroelectronics",
      "url": "https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-04-20",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2015_59-M01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2015/59-M01"
      }
    ]
  },
  "manufacturer": "STMicroelectronics",
  "manufacturer_web": "https://www.st.com/",
  "name": "ST31H320 A01 including optional cryptographic library NESLIB",
  "not_valid_after": "2020-12-28",
  "not_valid_before": "2015-12-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": null,
    "report_frontpage": null,
    "report_keywords": null,
    "report_metadata": null,
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2015_59en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ADV_IMP.2",
      "ALC_FLR.1",
      "ATE_FUN.2",
      "ALC_TAT.3",
      "ADV_TDS.5",
      "AVA_VAN.5",
      "ALC_DVS.2",
      "ADV_INT.3",
      "ALC_CMC.5",
      "ATE_COV.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI_cible2015_59en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "archived"
}