ST33TPHF2E mode TPM 2.0 TPM Firmware versions 73.08 et 73.09
CSV information ?
Status | archived |
---|---|
Valid from | 24.09.2018 |
Valid until | 24.09.2023 |
Scheme | 🇫🇷 FR |
Manufacturer | STMicroelectronics |
Category | Trusted Computing |
Security level | ALC_FLR.1, EAL4+, AVA_VAN.4 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, HMACAsymmetric Algorithms
ECCHash functions
SHA1, SHA256Schemes
MACRandomness
TRNGLibraries
NesLib 5.1.0Block cipher modes
CTR, CFBVendor
STMicroelectronicsSecurity level
EAL 4, EAL2, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.4, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
ANSSI-CC-PP-2018/03Certificates
ANSSI-CC-2018/41, ANSSI-CC-PP-2018/03, ANSSI-CC-2015/36, ANSSI-CC-2016/43-M01, ANSSI-CC-2016/44-M01, ANSSI-CC-2016/78-M01, ANSSI-CC-2017/39Standards
AIS 31, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Keywords | ANSSI-CC-CER-F-07.026 |
---|---|
Creation date | D:20180927140859+02'00' |
Modification date | D:20181003123248+02'00' |
Pages | 16 |
Creator | Acrobat PDFMaker 11 pour Word |
Producer | Adobe PDF Library 11.0 |
Frontpage
Certificate ID | ANSSI-CC-2018/41 |
---|---|
Certified item | ST33TPHF2E mode TPM 2.0 |
Certification lab | THALES (TCS – CNES) 18 avenue Edouard Belin, BPI 1414, 31401 Toulouse Cedex 9, France |
Developer | STMicroelectronics Green Square Building B, Lambroekstraat, 5, B-1831 Diegem, Belgique Commanditaire STMicroelectronics Green Square Building B, Lambroekstraat,5, B-1831 Diegem, Belgique |
Security target ?
Extracted keywords
Symmetric Algorithms
AES-128, AES, DES, HMACAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA1, SHA-256, SHA256Schemes
MACRandomness
TRNG, PRNG, DRBG, RNGLibraries
NesLib 5.1.0Elliptic Curves
P-256Block cipher modes
ECB, CBC, CTR, CFB, OFBVendor
STMicroelectronicsSecurity level
EAL4, EAL4 augmentedClaims
A.CSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT, ASE_CCL, ASE_SPD, ASE_ECD, ASE_REQ, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCO_NRO.1, FCO_NRO, FCS_RNG.1, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.4.1, FCS_COP, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_UIT, FDP_UIT.1, FDP_ITT.1, FDP_RIP.1, FDP_SDI.1, FDP_ETC, FDP_ITC, FDP_UCT, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.2, FIA_AFL, FIA_UAU.1, FIA_UAU.5, FIA_UAU.6, FIA_USB.1, FIA_MSA, FMT_MSA.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA, FMT_SMF.1, FMT_MSA.4, FMT_MTD, FMT_MOF, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_FLS.1, FPT_PHP.3, FPT_PHP.3.1, FPT_STM.1, FPT_ITT.1, FTP_ITC.1, FTP_TRP.1, FTP_ITCProtection profiles
ANSSI-CC-PP-, ANSSI-CC-PP-2018/03Certificates
ANSSI-CC-PP-2018/03Side-channel analysis
physical probing, side channel, SPA, DPA, timing attacksStandards
FIPS 197, FIPS 180-4, FIPS 198-1, FIPS PUB 186-4, FIPS 186-4, FIPS 140-2, FIPS PUB 140-2, SP 800-38A, SP 800-56A, NIST SP 800-90A, SP 800-17, PKCS#1, AIS 20, AIS20, RFC 3447, RFC 2104, RFC2104, ISO/IEC 15946-5, ISO/IEC 9796-2, ISO/IEC 9797-2, ISO/IEC 10116, ISO/IEC 10118-3, ISO/IEC 14888-3, ISO/IEC 18033-3, ISO/IEC 10116:2006, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-04File metadata
Creation date | D:20180803094620+02'00' |
---|---|
Modification date | D:20181003123157+02'00' |
Pages | 55 |
Creator | PDFCreator 2.4.1.13 |
Producer | PDFCreator 2.4.1.13 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.4Similar certificates
Name | Certificate ID | |
---|---|---|
ST33TPHF2E mode TPM 2.0 TPM Firmware versions 73.08 (0x49 0x08) et 73.09 (0x49 0x09) | ANSSI-CC-2018/41 | Compare |
ST33TPHF2E mode TPM 1.2 TPM Firmware versions 73.08 (0x49 0x08) et 73.09 (0x49 0x09) | ANSSI-CC-2018/39 | Compare |
ST33TPHF2ESPI mode TPM 2.0 TPM Firmware version 73.00 | ANSSI-CC-2016/78 | Compare |
ST33TPHF2ESPI mode TPM 2.0 TPM Firmware versions 47.00 et 47.04 | ANSSI-CC-2016/43 | Compare |
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) | 21.0.03/TSE-CCCS-48 | Compare |
Scheme data ?
Product | NFC FLYBUY PLATINUM V3 version R9.32.4 avec services DESFIRE sur composant SM33F1ME | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/nfc-flybuy-platinum-v3-version-r9324-avec-services-desfire-sur-composant | |
Description | Le produit certifié est la plateforme (U)SIM Java Card intitulée « NFC FLYBUY PLATINUM V3 version R9.32.4 avec services DESFIRE sur composant SM33F1ME » dont la version du système d'exploitation natif est 079424 et la version du « Card Manager1 » en Java Card est GOP Ref V11.3. Cette plateforme est développée par Oberthur Technologies et embarquée sur le microcontrôleur SM33F1ME développé et f | |
Sponsor | Oberthur Technologies | |
Developer | Oberthur Technologies / STMicroelectronics | |
Cert Id | ANSSI-CC-2014/35 | |
Level | EAL4+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2014/35 | |
Certification Date | 18.09.2014 | |
Category | Cartes Ă puce | |
Cc Version | Critères Communs version 3.1r4 | |
Developer | Oberthur Technologies / STMicroelectronics | |
Sponsor | Oberthur Technologies | |
Evaluation Facility | THALES (TCS - CNES) | |
Level | EAL4+ | |
Protection Profile | PP JCS-O, PP (U)SIM | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-35en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-35fr.pdf |
References ?
No references are available for this certificate.
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'NFC FLYBUY PLATINUM V3 version R9.32.4 avec services DESFIRE sur composant SM33F1ME', 'url': 'https://cyber.gouv.fr/produits-certifies/nfc-flybuy-platinum-v3-version-r9324-avec-services-desfire-sur-composant', 'description': 'Le produit certifié est la plateforme (U)SIM Java Card intitulée « NFC FLYBUY PLATINUM V3 version R9.32.4 avec services DESFIRE sur composant SM33F1ME » dont la version du système d'exploitation natif est 079424 et la version du « Card Manager1 » en Java Card est GOP Ref V11.3. Cette plateforme est développée par Oberthur Technologies et embarquée sur le microcontrôleur SM33F1ME développé et f', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies / STMicroelectronics', 'cert_id': 'ANSSI-CC-2014/35', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2014/35', 'certification_date': '2014-09-18', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Oberthur Technologies / STMicroelectronics', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES (TCS - CNES)', 'level': 'EAL4+', 'protection_profile': 'PP JCS-O, PP (U)SIM', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-35en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-35fr.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
18.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'NFC FLYBUY PLATINUM V3 version R9.32.4 avec services DESFIRE sur composant SM33F1ME', 'url': 'https://cyber.gouv.fr/produits-certifies/nfc-flybuy-platinum-v3-version-r9324-avec-services-desfire-sur-composant', 'description': 'Le produit certifié est la plateforme (U)SIM Java Card intitulée « NFC FLYBUY PLATINUM V3 version R9.32.4 avec services DESFIRE sur composant SM33F1ME » dont la version du système d'exploitation natif est 079424 et la version du « Card Manager1 » en Java Card est GOP Ref V11.3. Cette plateforme est développée par Oberthur Technologies et embarquée sur le microcontrôleur SM33F1ME développé et f', 'sponsor': 'Oberthur Technologies', 'developer': 'Oberthur Technologies / STMicroelectronics', 'cert_id': 'ANSSI-CC-2014/35', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2014/35', 'certification_date': '2014-09-18', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Oberthur Technologies / STMicroelectronics', 'sponsor': 'Oberthur Technologies', 'evaluation_facility': 'THALES (TCS - CNES)', 'protection_profile': 'PP JCS-O, PP (U)SIM', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-35fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-35en.pdf'}}}
data.
- The scheme_data property was updated, with the
-
09.11.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'FR': {'__insert__': {'ANSSI-CC-PP-2018/03': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'FR': {'ANSSI-CC-PP-2018/03': 2}}}
data.
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'ST33TPHF2X & ST33GTPMA, ST33TPHF2X with TPM Firmware 1.256, 1.257 & 2.256, ST33GTPMA with TPM Firmware 3.256 & 6.256', 'url': 'https://cyber.gouv.fr/produits-certifies/st33tphf2x-st33gtpma-st33tphf2x-tpm-firmware-1256-1257-2256-st33gtpma-tpm', 'description': 'Le ST33TPHF2X correspond à une gamme de Trusted Platform Modules. Cette gamme de produits est destinée à apporter des services de sécurité (démarrage sécurisé, génération et stockage de clés cryptographiques, génération de signature et certificats, calcul de haché et génération de nombre aléatoire) aux marchés des PC, serveurs et imprimantes. Ces TPM se déclinent sur une plateforme matérielle ST33', 'sponsor': 'ProtonWorld Intl, filiale de STMicroelectronics NV', 'developer': 'STMicroelectronics', 'cert_id': 'ANSSI-CC-2019/37', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2019/37', 'certification_date': '2019-10-18', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'STMicroelectronics', 'sponsor': 'ProtonWorld Intl, filiale de STMicroelectronics NV', 'evaluation_facility': 'Thales/CNES', 'level': 'EAL4+', 'protection_profile': 'PC Client Specific Trusted Platform Module, Family 2.0, Level 0, Revision 1.38, version 1.1', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_FLR.1 et AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2019/10/anssi-cc-2019_37fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2019/10/anssi-cible-cc-2019_37en.pdf'}}
.
- The report_keywords property was updated, with the
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '87eca384777d14af604f86b556ca96daf173a396505fea4878162650e7f8f89e', 'txt_hash': 'aaac5f7b51a97e126e99de34e8196ab7e44e11c69cb2c34544a8d601ce58cd24'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '93e0fa9c70b59fd9e5dfd9f4154a3a53dd1bf187348a00cec61b9e59c3fe6ee6', 'txt_hash': '5ee94663a3e68ca9d8f80e7fc6dae3f1e061fe43a0adac8370697cfa010b583a'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 334203, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/Comments': 'ST Microelectronics', '/Company': 'SGDSN/ANSSI', '/CreationDate': "D:20180927140859+02'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/Keywords': 'ANSSI-CC-CER-F-07.026', '/ModDate': "D:20181003123248+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20180927120855', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/', 'http://www.commoncriteriaportal.org/', 'http://www.sogis.org/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 645169, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 55, '/CreationDate': "D:20180803094620+02'00'", '/Creator': 'PDFCreator 2.4.1.13', '/Keywords': '', '/ModDate': "D:20181003123157+02'00'", '/Producer': 'PDFCreator 2.4.1.13', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2018/41', 'cert_item': 'ST33TPHF2E mode TPM 2.0', 'cert_item_version': 'Hardware ST33HTPH révision A/C (Externe/Interne), TPM Firmware versions 73.08 et 73.09', 'ref_protection_profiles': 'PP-TPM] PC Client Specific Trusted Platform Module (TPM Library specification Family 2.0 Level 0, Revision 1.38, Version 1.1', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 4 augmenté ALC_FLR.1, AVA_VAN.4', 'developer': 'STMicroelectronics Green Square Building B, Lambroekstraat, 5, B-1831 Diegem, Belgique Commanditaire STMicroelectronics Green Square Building B, Lambroekstraat,5, B-1831 Diegem, Belgique', 'cert_lab': 'THALES (TCS – CNES) 18 avenue Edouard Belin, BPI 1414, 31401 Toulouse Cedex 9, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2018/41': 17, 'ANSSI-CC-2015/36': 1, 'ANSSI-CC-2016/43-M01': 1, 'ANSSI-CC-2016/44-M01': 1, 'ANSSI-CC-2016/78-M01': 1, 'ANSSI-CC-2017/39': 1}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2018/03': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL2': 2, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.4': 4, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 2}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1}, 'SHA2': {'SHA256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}}, 'cipher_mode': {'CTR': {'CTR': 1}, 'CFB': {'CFB': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib 5.1.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-': 1, 'ANSSI-CC-PP-2018/03': 2}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 3}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_ECD': 2, 'ASE_REQ': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCO': {'FCO_NRO.1': 1, 'FCO_NRO': 6}, 'FCS': {'FCS_RNG.1': 9, 'FCS_CKM': 32, 'FCS_CKM.2': 6, 'FCS_COP.1': 14, 'FCS_CKM.4': 18, 'FCS_CKM.1': 15, 'FCS_CKM.4.1': 1, 'FCS_COP': 42, 'FCS_RNG': 2, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2}, 'FDP': {'FDP_ACF.1': 17, 'FDP_ACC.1': 10, 'FDP_IFC.1': 5, 'FDP_ITC.1': 9, 'FDP_ITC.2': 9, 'FDP_ACC': 23, 'FDP_ACC.2': 2, 'FDP_ACF': 25, 'FDP_UIT': 8, 'FDP_UIT.1': 2, 'FDP_ITT.1': 3, 'FDP_RIP.1': 2, 'FDP_SDI.1': 3, 'FDP_ETC': 6, 'FDP_ITC': 6, 'FDP_UCT': 6}, 'FIA': {'FIA_UID.1': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.2': 3, 'FIA_AFL': 6, 'FIA_UAU.1': 3, 'FIA_UAU.5': 3, 'FIA_UAU.6': 3, 'FIA_USB.1': 3, 'FIA_MSA': 1}, 'FMT': {'FMT_MSA.2': 4, 'FMT_MSA.1': 5, 'FMT_SMR.1': 8, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 7, 'FMT_MSA': 55, 'FMT_SMF.1': 5, 'FMT_MSA.4': 1, 'FMT_MTD': 6, 'FMT_MOF': 3}, 'FPT': {'FPT_TST.1': 6, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 7, 'FPT_FLS.1': 1, 'FPT_PHP.3': 4, 'FPT_PHP.3.1': 1, 'FPT_STM.1': 3, 'FPT_ITT.1': 3}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1, 'FTP_ITC': 3}}, 'cc_claims': {'A': {'A.C': 2}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 10}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-128': 1, 'AES': 11}}, 'DES': {'DES': {'DES': 2}}, 'constructions': {'MAC': {'HMAC': 19}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 2}, 'ECC': {'ECC': 19}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6, 'SHA1': 1}, 'SHA2': {'SHA-256': 5, 'SHA256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 4}, 'PRNG': {'PRNG': 1, 'DRBG': 6}, 'RNG': {'RNG': 15}}, 'cipher_mode': {'ECB': {'ECB': 3}, 'CBC': {'CBC': 2}, 'CTR': {'CTR': 3}, 'CFB': {'CFB': 4}, 'OFB': {'OFB': 2}}, 'ecc_curve': {'NIST': {'P-256': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib 5.1.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'side channel': 1, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 3, 'FIPS 180-4': 4, 'FIPS 198-1': 4, 'FIPS PUB 186-4': 1, 'FIPS 186-4': 2, 'FIPS 140-2': 2, 'FIPS PUB 140-2': 1}, 'NIST': {'SP 800-38A': 3, 'SP 800-56A': 3, 'NIST SP 800-90A': 2, 'SP 800-17': 1}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS 20': 3, 'AIS20': 1}, 'RFC': {'RFC 3447': 7, 'RFC 2104': 1, 'RFC2104': 1}, 'ISO': {'ISO/IEC 15946-5': 3, 'ISO/IEC 9796-2': 2, 'ISO/IEC 9797-2': 2, 'ISO/IEC 10116': 2, 'ISO/IEC 10118-3': 2, 'ISO/IEC 14888-3': 2, 'ISO/IEC 18033-3': 2, 'ISO/IEC 10116:2006': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-04': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2018_41fr.pdf
. - The st_filename property was set to
anssi-cible-cc-2018_41en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['THALES']
. - The cert_id property was set to
ANSSI-CC-2018/41
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added. - The scheme_data property was set to
{'product': 'ST33TPHF2ESPI mode TPM 2.0 - TPM Firmware version 73.00', 'url': 'https://cyber.gouv.fr/produits-certifies/st33tphf2espi-mode-tpm-20-tpm-firmware-version-7300', 'description': 'Le produit certifié est le composant « ST33TPHF2ESPI mode TPM 2.0, hardware ST33HTPH révision A en externe et C en interne, TPM firmware version 73.00 » développé par la société STMICROELECTRONICS.\n\nCe produit est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM 2.0.\n\n ', 'sponsor': 'STMicroelectronics', 'developer': 'STMicroelectronics', 'cert_id': '2016/78', 'level': 'EAL4+', 'enhanced': {'cert_id': '2016/78', 'certification_date': '13/12/2016', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'STMicroelectronics', 'sponsor': 'STMicroelectronics', 'evaluation_facility': 'THALES (TCS – CNES)', 'level': 'EAL4+', 'protection_profile': 'PP-TPM', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.1, AVA_VAN.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/12/anssi_cible2016_78en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/12/anssi-cc-2016_78.pdf'}}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_41fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_41en.pdf
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name ST33TPHF2E mode TPM 2.0 TPM Firmware versions 73.08 et 73.09 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Trusted Computing",
"cert_link": null,
"dgst": "9319b186cf3ec4c2",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2018/41",
"cert_lab": [
"THALES"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"73.08",
"73.09",
"2.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2014/35",
"description": "Le produit certifi\u00e9 est la plateforme (U)SIM Java Card intitul\u00e9e \u00ab NFC FLYBUY PLATINUM V3 version R9.32.4 avec services DESFIRE sur composant SM33F1ME \u00bb dont la version du syst\u00e8me d\u0026#39;exploitation natif est 079424 et la version du \u00ab Card Manager1 \u00bb en Java Card est GOP Ref V11.3. Cette plateforme est d\u00e9velopp\u00e9e par Oberthur Technologies et embarqu\u00e9e sur le microcontr\u00f4leur SM33F1ME d\u00e9velopp\u00e9 et f",
"developer": "Oberthur Technologies / STMicroelectronics",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "ANSSI-CC-2014/35",
"certification_date": "2014-09-18",
"developer": "Oberthur Technologies / STMicroelectronics",
"evaluation_facility": "THALES (TCS - CNES)",
"level": "EAL4+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "PP JCS-O, PP (U)SIM",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2014-35fr.pdf",
"sponsor": "Oberthur Technologies",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-35en.pdf"
},
"level": "EAL4+",
"product": "NFC FLYBUY PLATINUM V3 version R9.32.4 avec services DESFIRE sur composant SM33F1ME",
"sponsor": "Oberthur Technologies",
"url": "https://cyber.gouv.fr/produits-certifies/nfc-flybuy-platinum-v3-version-r9324-avec-services-desfire-sur-composant"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "STMicroelectronics",
"manufacturer_web": "https://www.st.com/",
"name": "ST33TPHF2E mode TPM 2.0 TPM Firmware versions 73.08 et 73.09",
"not_valid_after": "2023-09-24",
"not_valid_before": "2018-09-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "anssi-cc-2018_41fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 4 augment\u00e9 ALC_FLR.1, AVA_VAN.4",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2018/41",
"cert_item": "ST33TPHF2E mode TPM 2.0",
"cert_item_version": "Hardware ST33HTPH r\u00e9vision A/C (Externe/Interne), TPM Firmware versions 73.08 et 73.09",
"cert_lab": "THALES (TCS \u2013 CNES) 18 avenue Edouard Belin, BPI 1414, 31401 Toulouse Cedex 9, France",
"developer": "STMicroelectronics Green Square Building B, Lambroekstraat, 5, B-1831 Diegem, Belgique Commanditaire STMicroelectronics Green Square Building B, Lambroekstraat,5, B-1831 Diegem, Belgique",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur (.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "PP-TPM] PC Client Specific Trusted Platform Module (TPM Library specification Family 2.0 Level 0, Revision 1.38, Version 1.1"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2015/36": 1,
"ANSSI-CC-2016/43-M01": 1,
"ANSSI-CC-2016/44-M01": 1,
"ANSSI-CC-2016/78-M01": 1,
"ANSSI-CC-2017/39": 1,
"ANSSI-CC-2018/41": 17,
"ANSSI-CC-PP-2018/03": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2018/03": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_FLR": 2,
"ALC_FLR.1": 2,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NesLib 5.1.0": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 1
},
"SHA2": {
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 2
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STMicroelectronics": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Comments": "ST Microelectronics",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20180927140859+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 pour Word",
"/Keywords": "ANSSI-CC-CER-F-07.026",
"/ModDate": "D:20181003123248+02\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20180927120855",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 334203,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.sogis.org/",
"http://www.ssi.gouv.fr/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "anssi-cible-cc-2018_41en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 19
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2018/03": 2
}
},
"cc_claims": {
"A": {
"A.C": 2
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-": 1,
"ANSSI-CC-PP-2018/03": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.1": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL": 2,
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT": 2,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 2,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 3
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.1": 1
},
"FCS": {
"FCS_CKM": 32,
"FCS_CKM.1": 15,
"FCS_CKM.2": 6,
"FCS_CKM.4": 18,
"FCS_CKM.4.1": 1,
"FCS_COP": 42,
"FCS_COP.1": 14,
"FCS_RNG": 2,
"FCS_RNG.1": 9,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 23,
"FDP_ACC.1": 10,
"FDP_ACC.2": 2,
"FDP_ACF": 25,
"FDP_ACF.1": 17,
"FDP_ETC": 6,
"FDP_IFC.1": 5,
"FDP_ITC": 6,
"FDP_ITC.1": 9,
"FDP_ITC.2": 9,
"FDP_ITT.1": 3,
"FDP_RIP.1": 2,
"FDP_SDI.1": 3,
"FDP_UCT": 6,
"FDP_UIT": 8,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 6,
"FIA_MSA": 1,
"FIA_SOS.2": 3,
"FIA_UAU.1": 3,
"FIA_UAU.5": 3,
"FIA_UAU.6": 3,
"FIA_UID.1": 4,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MOF": 3,
"FMT_MSA": 55,
"FMT_MSA.1": 5,
"FMT_MSA.2": 4,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 7,
"FMT_MSA.4": 1,
"FMT_MTD": 6,
"FMT_SMF.1": 5,
"FMT_SMR.1": 8
},
"FPT": {
"FPT_FLS": 7,
"FPT_FLS.1": 1,
"FPT_ITT.1": 3,
"FPT_PHP.3": 4,
"FPT_PHP.3.1": 1,
"FPT_STM.1": 3,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 3,
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CFB": {
"CFB": 4
},
"CTR": {
"CTR": 3
},
"ECB": {
"ECB": 3
},
"OFB": {
"OFB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NesLib 5.1.0": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 6,
"SHA1": 1
},
"SHA2": {
"SHA-256": 5,
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 6,
"PRNG": 1
},
"RNG": {
"RNG": 15
},
"TRNG": {
"TRNG": 4
}
},
"side_channel_analysis": {
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 2,
"side channel": 1,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 3,
"AIS20": 1
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-04": 1
},
"FIPS": {
"FIPS 140-2": 2,
"FIPS 180-4": 4,
"FIPS 186-4": 2,
"FIPS 197": 3,
"FIPS 198-1": 4,
"FIPS PUB 140-2": 1,
"FIPS PUB 186-4": 1
},
"ISO": {
"ISO/IEC 10116": 2,
"ISO/IEC 10116:2006": 1,
"ISO/IEC 10118-3": 2,
"ISO/IEC 14888-3": 2,
"ISO/IEC 15946-5": 3,
"ISO/IEC 18033-3": 2,
"ISO/IEC 9796-2": 2,
"ISO/IEC 9797-2": 2
},
"NIST": {
"NIST SP 800-90A": 2,
"SP 800-17": 1,
"SP 800-38A": 3,
"SP 800-56A": 3
},
"PKCS": {
"PKCS#1": 2
},
"RFC": {
"RFC 2104": 1,
"RFC 3447": 7,
"RFC2104": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11,
"AES-128": 1
}
},
"DES": {
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"HMAC": 19
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STMicroelectronics": 10
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20180803094620+02\u002700\u0027",
"/Creator": "PDFCreator 2.4.1.13",
"/Keywords": "",
"/ModDate": "D:20181003123157+02\u002700\u0027",
"/Producer": "PDFCreator 2.4.1.13",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 645169,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 55
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_03-pp.pdf",
"pp_name": "ANSSI-CC-PP-2018/03 \u00ab PC Client Specific TPM \u00bb (TPM Library specification Famil..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_41fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"AVA_VAN.4",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_41en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "87eca384777d14af604f86b556ca96daf173a396505fea4878162650e7f8f89e",
"txt_hash": "aaac5f7b51a97e126e99de34e8196ab7e44e11c69cb2c34544a8d601ce58cd24"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "93e0fa9c70b59fd9e5dfd9f4154a3a53dd1bf187348a00cec61b9e59c3fe6ee6",
"txt_hash": "5ee94663a3e68ca9d8f80e7fc6dae3f1e061fe43a0adac8370697cfa010b583a"
}
},
"status": "archived"
}