STMicroelectronics ST23YR48B and ST23YR80B Secure Microcontrollers
CSV information ?
Status | archived |
---|---|
Valid from | 01.02.2010 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | STMicroelectronics |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL6+, ALC_FLR.1 |
Protection profiles | |
Maintenance updates | Rapport de maintenance ANSSI-CC-2010/01-M01 (08.07.2010) Certification report |
Rapport de maintenance ANSSI-CC-2010/01-M02 (29.08.2012) Certification report | |
ANSSI-CC-2010/01-M04 (13.12.2016) Certification report | |
Rapport de maintenance ANSSI-CC-2010/01-M03 (26.02.2013) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESRandomness
TRNGVendor
STMicroelectronics, STMSecurity level
EAL 6, EAL4, EAL6+, EAL6, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, EAL 6 augmented, EAL6 augmented, ITSEC E6 andSecurity Assurance Requirements (SAR)
ADO_DEL, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-PP-0035-2007Certificates
DCSSI-2009/50, ANSSI-CC-2010/01, ANSSI-CC-2010/02Evaluation facilities
Serma TechnologiesSide-channel analysis
Physical tamperingStandards
AIS31, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003File metadata
Creation date | D:20100827160924+02'00' |
---|---|
Modification date | D:20100827160924+02'00' |
Pages | 16 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Frontpage
Certificate ID | ANSSI-CC-2010/01 |
---|---|
Certified item | ST23YR48B and ST23YR80B Secure Microcontrollers |
Certification lab | Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected] |
Developer | STMicroelectronics Smartcard IC division, 190 Avenue Célestin Coq, 13106 Rousset Cedex, France Sponsor STMicroelectronics Smartcard IC division, 190 Avenue Célestin Coq, 13106 Rousset Cedex, France |
References
Outgoing- ANSSI-CC-2009/50 - archived - STMicroelectronics ST23YR48A and ST23YR80A Secure Microcontroller
- ANSSI-CC-2010/02 - archived - STMicroelectronics SA23YR48/80B and SB23YR48/80B Secure Microcontrollers, including the cryptographic library Neslib v2.0 or v3.0, in SA or SB configuration
- ANSSI-CC-2011/50 - archived - ID OneTM ePass v2.2 en configuration EAC et AA sur composants STMicroelectronics ST23YR80/48B
- ANSSI-CC-2011/49 - archived - ID OneTM ePass v2.2 en configuration BAC et AA sur composants STMicroelectronics ST23YR80/48B
- ANSSI-CC-2011/74 - archived - ID OneTM ePass v2.2 en configuration BAP et AA sur composants STMicroelectronics ST23YR80/48B
- ANSSI-CC-2011/75 - archived - ID OneTM ePass v2.2 en configuration EAP et AA sur composants STMicroelectronics ST23YR80/48B
- ANSSI-CC-2010/02 - archived - STMicroelectronics SA23YR48/80B and SB23YR48/80B Secure Microcontrollers, including the cryptographic library Neslib v2.0 or v3.0, in SA or SB configuration
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, CBC-MACHash functions
SHA-1, SHA-2Randomness
TRNG, RNDBlock cipher modes
ECB, CBCVendor
Infineon Technologies, STMicroelectronics, PhilipsSecurity level
EAL6, EAL 6, EAL4, EAL 6 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADO_DEL, ADV_FSP, ADV_SPM, ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_ARC, ADV_IMP, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_DVS, ALC_CMS, ALC_CMC, ATE_COV, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5, AVA_VANSecurity Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FCS_RNG.1, FCS_COP.1, FCS_RNG, FCS_CKM.1, FCS_CKM.4, FDP_ITT.1, FDP_IFC.1, FDP_ACC.2, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_LIM, FMT_MSA.2, FMT_SMF.1, FMT_SMR.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2Protection profiles
BSI-PP-0035Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, Physical tampering, physical tampering, Malfunction, malfunction, fault injectionStandards
FIPS PUB 46-3, FIPS PUB 140-2, FIPS PUB 180-1, FIPS PUB 180-2, FIPS PUB 186, FIPS PUB 197, PKCS #1, BSI-AIS31, ISO/IEC 9797-1, ISO/IEC 9796-2, ISO/IEC 10116, ISO/IEC 10118-, ISO/IEC 14888, ISO/IEC 9796, ISO/IEC 9797, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2006-09-001File metadata
Creation date | D:20100827163847+02'00' |
---|---|
Modification date | D:20100827163847+02'00' |
Pages | 48 |
Producer | Acrobat Distiller 6.0 (Windows) |
References
Incoming- ANSSI-CC-2011/50 - archived - ID OneTM ePass v2.2 en configuration EAC et AA sur composants STMicroelectronics ST23YR80/48B
- ANSSI-CC-2011/49 - archived - ID OneTM ePass v2.2 en configuration BAC et AA sur composants STMicroelectronics ST23YR80/48B
- ANSSI-CC-2011/74 - archived - ID OneTM ePass v2.2 en configuration BAP et AA sur composants STMicroelectronics ST23YR80/48B
- ANSSI-CC-2013/09 - archived - JavaCard platform for smart card ID-One Cosmo V7.1-s on component ST23YL80C (Standard)
- ANSSI-CC-2011/75 - archived - ID OneTM ePass v2.2 en configuration EAP et AA sur composants STMicroelectronics ST23YR80/48B
Heuristics ?
Extracted SARs
ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ADV_ARC.1, ADV_IMP.2, ATE_FUN.2, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ADV_INT.3, ADV_SPM.1, AGD_PRE.1, ADV_TDS.5, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1Scheme data ?
Product | Microcontrôleurs sécurisés ST23YR48B et ST23YR80B | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-st23yr48b-et-st23yr80b | |
Description | Les produits certifiés sont les microcontrôleurs sécurisés ST23YR48 et ST23YR80 en révision B (logiciel dédié ANC, maskset K2M0BFB), développés par STMicroelectronics. La seule différence entre les produits ST23YR48B et ST23YR80B réside dans la taille (logique) de la mémoire EEPROM attribuée (48 Ko ou 80 Ko), sachant que la mémoire est toujours physiquement d'une taille de 80 Ko. Le micr | |
Sponsor | STMicroelectronics | |
Developer | STMicroelectronics | |
Cert Id | ANSSI-CC-2010/01 | |
Level | EAL6+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2010/01 | |
Certification Date | 01.02.2010 | |
Category | Micro-circuits | |
Cc Version | Critères Communs version 3.1 | |
Developer | STMicroelectronics | |
Sponsor | STMicroelectronics | |
Evaluation Facility | Serma Technologies | |
Level | EAL6+ | |
Protection Profile | BSI-PP-0035-2007 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_FLR.1 | |
Target Link | https://cyber.gouv.fr/sites/default/files/2010/02/anssi_cible2010_01-m04en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2010-01en.pdf |
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Microcontrôleurs sécurisés ST23YR48B et ST23YR80B', 'url': 'https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-st23yr48b-et-st23yr80b', 'description': 'Les produits certifiés sont les microcontrôleurs sécurisés ST23YR48 et ST23YR80 en révision B (logiciel dédié ANC, maskset K2M0BFB), développés par STMicroelectronics. La seule différence entre les produits ST23YR48B et ST23YR80B réside dans la taille (logique) de la mémoire EEPROM attribuée (48 Ko ou 80 Ko), sachant que la mémoire est toujours physiquement d'une taille de 80 Ko. Le micr', 'sponsor': 'STMicroelectronics', 'developer': 'STMicroelectronics', 'cert_id': 'ANSSI-CC-2010/01', 'level': 'EAL6+', 'enhanced': {'cert_id': 'ANSSI-CC-2010/01', 'certification_date': '2010-02-01', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1', 'developer': 'STMicroelectronics', 'sponsor': 'STMicroelectronics', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL6+', 'protection_profile': 'BSI-PP-0035-2007', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_FLR.1', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2010/02/anssi_cible2010_01-m04en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2010-01en.pdf'}}
.
- The scheme_data property was set to
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_V1.0', 'PKISKPP']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b7ada8d28113cebca7b98fd686349e385d0d62c70c4f46fa811ec47e5249f582', 'txt_hash': '24cb29a8d801c458630bbdb60c2637985025c0b3d03814ad73b1e6117db3a783'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8762a49ae9716ce93d3bb849c6644efa6ba0bf64fb57abf8c1bae32b8c11d441', 'txt_hash': 'c94ed60a386cf7c1e505fbe43a248f1d72aaed84edf6ac7737eeef3d8175312c'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 112117, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20100827160924+02'00'", '/Author': '', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20100827160924+02'00'", '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 534977, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 48, '/CreationDate': "D:20100827163847+02'00'", '/Keywords': '', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/ModDate': "D:20100827163847+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Recognition arrangements'], 'cert_id': 'ANSSI-CC-2010/01', 'cert_item': 'ST23YR48B and ST23YR80B Secure Microcontrollers', 'cert_item_version': 'ST23YR48/80 Revision B (dedicated software ANC, K2M0BFB mask set', 'ref_protection_profiles': 'BSI-PP-0035-2007 version 1.0', 'cc_version': 'Common Criteria version 3.1', 'cc_security_level': 'EAL 6 augmented ALC_FLR.1', 'developer': 'STMicroelectronics Smartcard IC division, 190 Avenue Célestin Coq, 13106 Rousset Cedex, France Sponsor STMicroelectronics Smartcard IC division, 190 Avenue Célestin Coq, 13106 Rousset Cedex, France', 'cert_lab': 'Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'DCSSI-2009/50': 1, 'ANSSI-CC-2010/01': 17, 'ANSSI-CC-2010/02': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035-2007': 2}}, 'cc_security_level': {'EAL': {'EAL 6': 1, 'EAL4': 3, 'EAL6+': 1, 'EAL6': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1, 'EAL 6 augmented': 1, 'EAL6 augmented': 1}, 'ITSEC': {'ITSEC E6 and': 1}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 1, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 21, 'STM': 12}}, 'eval_facility': {'Serma': {'Serma Technologies': 3}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'Physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS31': 6}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 54}}, 'cc_security_level': {'EAL': {'EAL6': 22, 'EAL 6': 2, 'EAL4': 1, 'EAL 6 augmented': 2}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_FSP': 3, 'ADV_SPM': 4, 'ADV_ARC.1': 1, 'ADV_FSP.5': 3, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 3, 'ADV_TDS.5': 1, 'ADV_ARC': 2, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 5, 'FAU_SAS': 1}, 'FCS': {'FCS_RNG.1': 5, 'FCS_COP.1': 12, 'FCS_RNG': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_ITT.1': 7, 'FDP_IFC.1': 9, 'FDP_ACC.2': 9, 'FDP_ACF.1': 10, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1, 'FDP_ACC.1': 1}, 'FMT': {'FMT_LIM.1': 7, 'FMT_LIM.2': 8, 'FMT_MSA.3': 9, 'FMT_MSA.1': 11, 'FMT_LIM': 1, 'FMT_MSA.2': 2, 'FMT_SMF.1': 4, 'FMT_SMR.1': 2}, 'FPT': {'FPT_FLS.1': 7, 'FPT_PHP.3': 6, 'FPT_ITT.1': 6}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3}, 'T': {'T.RND': 3}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 10}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 16}, '3DES': {'3DES': 4}}, 'constructions': {'MAC': {'CBC-MAC': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RND': 6}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 8, 'Physical Probing': 4, 'physical probing': 2, 'side channel': 1}, 'FI': {'Physical tampering': 2, 'physical tampering': 1, 'Malfunction': 9, 'malfunction': 1, 'fault injection': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-1': 1, 'FIPS PUB 180-2': 1, 'FIPS PUB 186': 1, 'FIPS PUB 197': 1}, 'PKCS': {'PKCS #1': 2}, 'BSI': {'BSI-AIS31': 3}, 'ISO': {'ISO/IEC 9797-1': 2, 'ISO/IEC 9796-2': 1, 'ISO/IEC 10116': 3, 'ISO/IEC 10118-': 1, 'ISO/IEC 14888': 2, 'ISO/IEC 9796': 1, 'ISO/IEC 9797': 1}, 'CC': {'CCMB-2007-09-002': 9, 'CCMB-2007-09-003': 2, 'CCMB-2006-09-001': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC_2010-01en.pdf
. - The st_filename property was set to
ANSSI-CC-cible_2010-01en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['SERMA']
. - The cert_id property was set to
ANSSI-CC-2010/01
. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/74', 'ANSSI-CC-2011/50', 'ANSSI-CC-2013/09', 'ANSSI-CC-2011/49', 'ANSSI-CC-2011/75', 'ANSSI-CC-2013/16']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/74', 'ANSSI-CC-2011/50', 'ANSSI-CC-2013/09', 'ANSSI-CC-2011/49', 'ANSSI-CC-2011/75', 'ANSSI-CC-2013/16']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/74', 'ANSSI-CC-2010/02', 'ANSSI-CC-2011/50', 'ANSSI-CC-2011/49', 'ANSSI-CC-2011/75', 'ANSSI-CC-2013/16']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2010/20', 'ANSSI-CC-2012/77', 'ANSSI-CC-2010/33', 'ANSSI-CC-2010/30', 'ANSSI-CC-2010/21', 'BSI-DSZ-CC-0671-2011', 'ANSSI-CC-2012/68', 'ANSSI-CC-2010/02', 'ANSSI-CC-2011/59', 'ANSSI-CC-2011/61', 'ANSSI-CC-2013/05', 'ANSSI-CC-2013/16', 'KECS-ISIS-0419-2012', 'ANSSI-CC-2010/34', 'ANSSI-CC-2010/56', 'ANSSI-CC-2014/93', 'ANSSI-CC-2010/19', 'ANSSI-CC-2010/29', 'Certificate Number: 2012/83', 'ANSSI-CC-2010/18', 'ANSSI-CC-2015/17', 'ANSSI-CC-2011/74', 'ANSSI-CC-2010/17', 'ANSSI-CC-2012/69', 'BSI-DSZ-CC-0877-2013', 'ANSSI-CC-2010/01', 'ANSSI-CC-2016/07', 'ANSSI-CC-2014/74', 'ANSSI-CC-2010/28', 'ANSSI-CC-2010/57', 'ANSSI-CC-2011/62', 'ANSSI-CC-2015/16', 'ANSSI-CC-2012/82', 'ANSSI-CC-2014/26', 'ANSSI-CC-2015/07', 'NSCIB-CC-11-32973-CR', 'ANSSI-CC-2010/22', 'ANSSI-CC-2011/50', 'ANSSI-CC-2010/32', 'BSI-DSZ-CC-0664-2011', 'ANSSI-CC-2011/49', 'ANSSI-CC-2011/75', 'NSCIB-CC-09-26151-CR', 'ANSSI-CC-2014/73', 'ANSSI-CC-2014/92', 'ANSSI-CC-2010/35', 'ANSSI-CC-2010/31', 'ANSSI-CC-2013/04', 'ANSSI-CC-2019/05', 'ANSSI-CC-2010/60', 'ANSSI-CC-2012/83', 'ANSSI-CC-2011/58', 'ANSSI-CC-2013/54', 'ANSSI-CC-2014/25', 'ANSSI-CC-2011/63']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/50', 'ANSSI-CC-2010/02']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/05', 'ANSSI-CC-2009/26', 'ANSSI-CC-2009/28', 'ANSSI-CC-2009/50', 'ANSSI-CC-2009/06', 'ANSSI-CC-2009/62', 'ANSSI-CC-2010/02', 'ANSSI-CC-2009/51', 'ANSSI-CC-2010/01']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-01en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-01en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/49', 'ANSSI-CC-2011/74', 'ANSSI-CC-2013/16']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/49', 'ANSSI-CC-2011/74', 'ANSSI-CC-2013/16']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2011/49', 'ANSSI-CC-2011/74']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2014/74', 'NSCIB-CC-09-26151-CR', 'ANSSI-CC-2010/19', 'ANSSI-CC-2010/29', 'ANSSI-CC-2013/54', 'ANSSI-CC-2014/73', 'ANSSI-CC-2015/07', 'ANSSI-CC-2012/77', 'ANSSI-CC-2012/82', 'ANSSI-CC-2010/21', 'ANSSI-CC-2011/74', 'ANSSI-CC-2011/61', 'ANSSI-CC-2011/49']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2009/28']}}}
data.
- The st_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name STMicroelectronics ST23YR48B and ST23YR80B Secure Microcontrollers was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "c6d03d215edc6e7e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2010/01",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2011/75",
"ANSSI-CC-2011/49",
"ANSSI-CC-2010/02",
"ANSSI-CC-2011/74",
"ANSSI-CC-2011/50",
"ANSSI-CC-2013/16"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2009/50",
"ANSSI-CC-2010/02"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/07",
"ANSSI-CC-2013/54",
"ANSSI-CC-2012/77",
"ANSSI-CC-2010/33",
"ANSSI-CC-2010/19",
"KECS-ISIS-0419-2012",
"ANSSI-CC-2012/69",
"ANSSI-CC-2011/58",
"ANSSI-CC-2010/02",
"ANSSI-CC-2015/17",
"ANSSI-CC-2011/74",
"ANSSI-CC-2011/63",
"ANSSI-CC-2011/59",
"ANSSI-CC-2010/18",
"ANSSI-CC-2012/83",
"ANSSI-CC-2011/62",
"ANSSI-CC-2010/30",
"ANSSI-CC-2014/73",
"ANSSI-CC-2014/93",
"ANSSI-CC-2010/60",
"ANSSI-CC-2015/16",
"ANSSI-CC-2010/56",
"ANSSI-CC-2011/50",
"ANSSI-CC-2010/21",
"NSCIB-CC-11-32973-CR",
"ANSSI-CC-2012/82",
"ANSSI-CC-2010/01",
"BSI-DSZ-CC-0877-2013",
"ANSSI-CC-2010/22",
"ANSSI-CC-2011/75",
"BSI-DSZ-CC-0664-2011",
"ANSSI-CC-2014/92",
"ANSSI-CC-2010/20",
"NSCIB-CC-09-26151-CR",
"ANSSI-CC-2013/04",
"ANSSI-CC-2012/68",
"ANSSI-CC-2010/28",
"ANSSI-CC-2013/16",
"ANSSI-CC-2014/25",
"ANSSI-CC-2010/32",
"ANSSI-CC-2010/57",
"ANSSI-CC-2010/29",
"ANSSI-CC-2010/31",
"ANSSI-CC-2014/74",
"ANSSI-CC-2011/49",
"ANSSI-CC-2010/17",
"ANSSI-CC-2014/26",
"ANSSI-CC-2010/34",
"ANSSI-CC-2010/35",
"ANSSI-CC-2013/05",
"BSI-DSZ-CC-0671-2011",
"Certificate Number: 2012/83",
"ANSSI-CC-2011/61",
"ANSSI-CC-2019/05",
"ANSSI-CC-2015/07"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2010/01",
"ANSSI-CC-2009/50",
"ANSSI-CC-2009/05",
"ANSSI-CC-2009/06",
"ANSSI-CC-2010/02",
"ANSSI-CC-2009/28",
"ANSSI-CC-2009/51",
"ANSSI-CC-2009/62",
"ANSSI-CC-2009/26"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2010/01",
"description": "Les produits certifi\u00e9s sont les microcontr\u00f4leurs s\u00e9curis\u00e9s ST23YR48 et ST23YR80 en r\u00e9vision B (logiciel d\u00e9di\u00e9 ANC, maskset K2M0BFB), d\u00e9velopp\u00e9s par STMicroelectronics. La seule diff\u00e9rence entre les produits ST23YR48B et ST23YR80B r\u00e9side dans la taille (logique) de la m\u00e9moire EEPROM attribu\u00e9e (48 Ko ou 80 Ko), sachant que la m\u00e9moire est toujours physiquement d\u0026#39;une taille de 80 Ko. Le micr",
"developer": "STMicroelectronics",
"enhanced": {
"augmented": "ALC_FLR.1",
"category": "Micro-circuits",
"cc_version": "Crit\u00e8res Communs version 3.1",
"cert_id": "ANSSI-CC-2010/01",
"certification_date": "2010-02-01",
"developer": "STMicroelectronics",
"evaluation_facility": "Serma Technologies",
"level": "EAL6+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "BSI-PP-0035-2007",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2010-01en.pdf",
"sponsor": "STMicroelectronics",
"target_link": "https://cyber.gouv.fr/sites/default/files/2010/02/anssi_cible2010_01-m04en.pdf"
},
"level": "EAL6+",
"product": "Microcontr\u00f4leurs s\u00e9curis\u00e9s ST23YR48B et ST23YR80B",
"sponsor": "STMicroelectronics",
"url": "https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-st23yr48b-et-st23yr80b"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2011/75",
"ANSSI-CC-2011/49",
"ANSSI-CC-2011/74",
"ANSSI-CC-2011/50",
"ANSSI-CC-2013/16",
"ANSSI-CC-2013/09"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2011/75",
"ANSSI-CC-2011/49",
"ANSSI-CC-2011/74",
"ANSSI-CC-2011/50",
"ANSSI-CC-2013/16",
"ANSSI-CC-2013/09"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-12-13",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2010_01-M04.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2010/01-M04"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2013-02-26",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2010_01-M03.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2010/01-M03"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2012-08-29",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2010_01-M02-fr.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2010/01-M02"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2010-07-08",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2010_01-M01-fr.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2010/01-M01"
}
]
},
"manufacturer": "STMicroelectronics",
"manufacturer_web": "https://www.st.com/",
"name": "STMicroelectronics ST23YR48B and ST23YR80B Secure Microcontrollers",
"not_valid_after": "2019-09-01",
"not_valid_before": "2010-02-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC_2010-01en.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 6 augmented ALC_FLR.1",
"cc_version": "Common Criteria version 3.1",
"cert_id": "ANSSI-CC-2010/01",
"cert_item": "ST23YR48B and ST23YR80B Secure Microcontrollers",
"cert_item_version": "ST23YR48/80 Revision B (dedicated software ANC, K2M0BFB mask set",
"cert_lab": "Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]",
"developer": "STMicroelectronics Smartcard IC division, 190 Avenue C\u00e9lestin Coq, 13106 Rousset Cedex, France Sponsor STMicroelectronics Smartcard IC division, 190 Avenue C\u00e9lestin Coq, 13106 Rousset Cedex, France",
"match_rules": [
"Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Recognition arrangements"
],
"ref_protection_profiles": "BSI-PP-0035-2007 version 1.0"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2010/01": 17,
"ANSSI-CC-2010/02": 1,
"DCSSI-2009/50": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035-2007": 2
}
},
"cc_sar": {
"ADO": {
"ADO_DEL": 1
},
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DVS": 1,
"ALC_FLR": 2,
"ALC_FLR.1": 1,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 1,
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL 7": 1,
"EAL4": 3,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 and": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Physical tampering": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 6
},
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-002": 1,
"CCMB-2007-09-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STM": 12,
"STMicroelectronics": 21
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "D:20100827160924+02\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20100827160924+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 112117,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "ANSSI-CC-cible_2010-01en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 3
},
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 54
}
},
"cc_sar": {
"ADO": {
"ADO_DEL": 1
},
"ADV": {
"ADV_ARC": 2,
"ADV_ARC.1": 1,
"ADV_FSP": 3,
"ADV_FSP.5": 3,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 4,
"ADV_SPM.1": 3,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 1,
"ALC_FLR.1": 3,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ATE": {
"ATE_COV": 3,
"ATE_COV.3": 1,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 2,
"EAL 6 augmented": 2,
"EAL4": 1,
"EAL6": 22
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 1,
"FAU_SAS.1": 5
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 12,
"FCS_RNG": 1,
"FCS_RNG.1": 5
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACC.2": 9,
"FDP_ACF.1": 10,
"FDP_IFC.1": 9,
"FDP_ITC.1": 1,
"FDP_ITC.2": 1,
"FDP_ITT.1": 7
},
"FMT": {
"FMT_LIM": 1,
"FMT_LIM.1": 7,
"FMT_LIM.2": 8,
"FMT_MSA.1": 11,
"FMT_MSA.2": 2,
"FMT_MSA.3": 9,
"FMT_SMF.1": 4,
"FMT_SMR.1": 2
},
"FPT": {
"FPT_FLS.1": 7,
"FPT_ITT.1": 6,
"FPT_PHP.3": 6
},
"FRU": {
"FRU_FLT.2": 7
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 6
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 9,
"Physical tampering": 2,
"fault injection": 2,
"malfunction": 1,
"physical tampering": 1
},
"SCA": {
"Leak-Inherent": 8,
"Physical Probing": 4,
"physical probing": 2,
"side channel": 1
}
},
"standard_id": {
"BSI": {
"BSI-AIS31": 3
},
"CC": {
"CCMB-2006-09-001": 3,
"CCMB-2007-09-002": 9,
"CCMB-2007-09-003": 2
},
"FIPS": {
"FIPS PUB 140-2": 1,
"FIPS PUB 180-1": 1,
"FIPS PUB 180-2": 1,
"FIPS PUB 186": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 2
},
"ISO": {
"ISO/IEC 10116": 3,
"ISO/IEC 10118-": 1,
"ISO/IEC 14888": 2,
"ISO/IEC 9796": 1,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9797": 1,
"ISO/IEC 9797-1": 2
},
"PKCS": {
"PKCS #1": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3DES": 4
},
"DES": {
"DES": 16
}
},
"constructions": {
"MAC": {
"CBC-MAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
},
"Philips": {
"Philips": 1
},
"STMicroelectronics": {
"STMicroelectronics": 10
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20100827163847+02\u002700\u0027",
"/Keywords": "",
"/ModDate": "D:20100827163847+02\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"pdf_file_size_bytes": 534977,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.st.com"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 48
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"PKISKPP",
"SECURITY_IC_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf",
"pp_name": "Security IC Platform Protection Profile, Version 1.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-01en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-01en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b7ada8d28113cebca7b98fd686349e385d0d62c70c4f46fa811ec47e5249f582",
"txt_hash": "24cb29a8d801c458630bbdb60c2637985025c0b3d03814ad73b1e6117db3a783"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8762a49ae9716ce93d3bb849c6644efa6ba0bf64fb57abf8c1bae32b8c11d441",
"txt_hash": "c94ed60a386cf7c1e505fbe43a248f1d72aaed84edf6ac7737eeef3d8175312c"
}
},
"status": "archived"
}