Samsung STRONG_V2P10_LN04LPE of S5E9925 with Specific IC Dedicated Software revision 1.0

CSV information

Status active
Valid from 06.01.2024
Valid until 06.01.2029
Scheme 🇪🇸 ES
Manufacturer Samsung Electronics Co., Ltd.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, ALC_CMC.5, EAL5+, AVA_VAN.5, ALC_TAT.3
Protection profiles

Heuristics summary

Certificate ID: 2021-22-INF-4236

Certificate

Extracted keywords

Vendor
Samsung

Security level
EAL 2, EAL5
Claims
O.E, T.I
Security Assurance Requirements (SAR)
ALC_FLR, ALC_DVS.2, ALC_CMC.5, ALC_TAT.3, AVA_VAN.5
Protection profiles
BSI-CC-PP-0084-2014
Evaluation facilities
Applus Laboratories

File metadata

Pages 2

Certification report

Extracted keywords

Symmetric Algorithms
AES, TDES, HMAC
Asymmetric Algorithms
ECC
Randomness
TRNG, DRBG

Vendor
Samsung

Security level
EAL5, EAL 1, EAL 4, EAL 2, EAL2, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.4, ADV_ARC, AGD_OPE.1, ALC_CMC.5, ALC_DVS.2, ALC_TAT.3, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.5, FCS_COP, FCS_RNG, FDP_ACC.1, FDP_ACF.1, FDP_DAU, FDP_IFC.1, FDP_ITT.1, FDP_SDC, FDP_SDI.2, FDP_UCT.1, FDP_URC, FIA_API.1, FMT_LIM, FMT_MSA.1, FMT_SMF.1, FPT_FLS.1, FPT_PHP.3, FRU_FLT.2, FTP_ITC.1
Protection profiles
BSI-CC-PP-0084-2014
Certificates
2021-22-INF-4236- v1
Evaluation facilities
Applus Laboratories

Side-channel analysis
side-channel, JIL

Standards
FIPS 180-4, FIPS 197, NIST SP 800-90A, BSI-AIS31, AIS31

File metadata

Pages 15

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES, TDEA, HMAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA1, SHA224, SHA256, SHA384, SHA512, SHA-224, SHA-256, SHA-384, SHA-512, SHA2, SHA-3
Schemes
Key Agreement
Protocols
PGP
Randomness
TRNG, DTRNG, DRBG, RND, RNG
Elliptic Curves
P-224, P-256, P-384, secp224k1, secp224r1, secp256k1, secp256r1, secp384r1, brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1
Block cipher modes
ECB, CBC, CTR, GCM

JavaCard API constants
PAD_SYSTEM, X25519
Vendor
Samsung

Security level
EAL5, EAL 5, EAL5 augmented, EAL 5 augmented
Claims
O.RSA, O.ECDSA, O.ECDH, O.RND, O.TDES, O.SHA, O.HMAC, O.AES, O.MEM_ACCESS, T.RND
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.5, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_DVS.1, ALC_CMS.1, ALC_CMS.4, ATE_COV, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN, APE_ECD, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FAU_GEN.1, FCS_RNG, FCS_CKM.5, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.5.1, FCS_COP, FDP_SDC, FDP_URC, FDP_IRA, FDP_ACF, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_URC.1, FDP_URC.1.1, FDP_URC.1.2, FDP_IRA.1, FDP_IRA.1.1, FDP_IRA.1.2, FDP_IRA.1.3, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC, FDP_DAU, FDP_DAU.1, FDP_DAU.2, FDP_IFC, FDP_ITT, FIA_API, FIA_API.1, FIA_API.1.1, FIA_URC, FIA_UID.1, FIA_UID, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_CKM.4, FMT_MSA, FMT_SMF, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_PHP, FPT_ITT.1, FPT_ITT.1.1, FPT_RPL, FPT_RPL.1, FPT_FLS, FPT_ITT, FRU_FLT.2, FRU_FLT.1, FRU_FLT.2.1, FRU_FLT, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084, BSI-PP-0084, BSI-CC-PP-0084-

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side-channel, side channel, SPA, DPA, timing attacks, timing attack, physical tampering, Malfunction, malfunction, DFA, reverse engineering

Standards
FIPS 180-4, FIPS 197, FIPS PUB 180-4, FIPS197, FIPS PUB 198-1, FIPS PUB 202, NIST SP 800-90A, BSI-AIS31, AIS31, RFC7748, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title ST_Lite_S5E9925
Subject ST_Lite_S5E9925
Keywords ST_Lite_S5E9925
Author Samsung
Creation date D:20230906200107+09'00'
Modification date D:20230906200334+09'00'
Pages 120
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

2021-22-INF-4236

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data

Product Samsung STRONG_V2P10_LN04LPE of S5E9925 with Specific IC Dedicated Software revision 1.0
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/1004-samsung-strong-v2p10-ln04lpe-of-s5e9925-with-specific-ic-dedicated-software-revision-1-0
Category Smart Cards and similiar devices
Manufacturer Samsung Electronics Co., Ltd
Certification Date 06.01.2024
Enhanced
Description The Target of Evaluation (TOE), the STRONGV2P10_LN04LPE secure subsystem featuring the TORNADO-H cryptographic coprocessor, is a Hard macro instantiated within an SOC which is composed of a processing unit, security components, hardware circuit for testing purpose during the manufacturing process and volatile and non-volatile memories (hardware). The TOE also includes any IC Designer/Manufacturer proprietary IC Dedicated Software as long as it physically exists in an STRONGV2P10_LN04LPE after being delivered by the IC Manufacturer. Such software (also known as IC bootloader/firmware) is used for providing additional services to facilitate the usage of the hardware and/or to provide additional services, a random number generation library and a random number generator. All other software is called Security IC Embedded Software and is not part of the TOE. The SoC S5E9925 is necessary to operate the STRONGV2P10_LN04LPE but it is not TOE hardware. The Security IC Embedded Software is initially stored in encrypted form in external NVM (Flash). Regarding the public key cryptographic libraries, the user has the possibility to tailor this IC Dedicated Software part of the TOE during the manufacturing process by deselecting the public key cryptographic libraries. Hence the TOE can be delivered with or without the functionality of the public key cryptographic libraries what is resulting in two TOE configurations. This is considered in this Security Target and corresponding notes (indicated by “optional”) are added where required. If the user decides not to use the public key cryptographic libraries, the library is not delivered to the user and the accompanying RSA and Elliptic Curve cryptographic mechanisms are not provided by the TOE.
Category Smart Cards and similiar devices
Manufacturer Samsung Electronics Co., Ltd
Type Product
Evaluation Facility Applus Laboratories
Status Certified
Certification Date 06.01.2024
Cc Version Common Criteria 3.1 release 5
Level EAL5 + ALC_DVS.2 + ALC_CMC.5 +ALC_TAT.3 + AVA_VAN.5
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1924
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1925
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1926

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-22_Certificado.pdf",
  "dgst": "c7b4494573f822b4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2021-22-INF-4236",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "cf0f01bcd7be3e9c"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Smart Cards and similiar devices",
      "certification_date": "2024-01-06",
      "enhanced": {
        "category": "Smart Cards and similiar devices",
        "cc_version": "Common Criteria 3.1 release 5",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1925",
        "certification_date": "2024-01-06",
        "description": "The Target of Evaluation (TOE), the STRONGV2P10_LN04LPE secure subsystem featuring the TORNADO-H cryptographic coprocessor, is a Hard macro instantiated within an SOC which is composed of a processing unit, security components, hardware circuit for testing purpose during the manufacturing process and volatile and non-volatile memories (hardware). The TOE also includes any IC Designer/Manufacturer proprietary IC Dedicated Software as long as it physically exists in an STRONGV2P10_LN04LPE after being delivered by the IC Manufacturer. Such software (also known as IC bootloader/firmware) is used for providing additional services to facilitate the usage of the hardware and/or to provide additional services, a random number generation library and a random number generator. All other software is called Security IC Embedded Software and is not part of the TOE. The SoC S5E9925 is necessary to operate the STRONGV2P10_LN04LPE but it is not TOE hardware. The Security IC Embedded Software is initially stored in encrypted form in external NVM (Flash). Regarding the public key cryptographic libraries, the user has the possibility to tailor this IC Dedicated Software part of the TOE during the manufacturing process by deselecting the public key cryptographic libraries. Hence the TOE can be delivered with or without the functionality of the public key cryptographic libraries what is resulting in two TOE configurations. This is considered in this Security Target and corresponding notes (indicated by \u201coptional\u201d) are added where required. If the user decides not to use the public key cryptographic libraries, the library is not delivered to the user and the accompanying RSA and Elliptic Curve cryptographic mechanisms are not provided by the TOE.",
        "evaluation_facility": "Applus Laboratories",
        "level": "EAL5 + ALC_DVS.2 + ALC_CMC.5 +ALC_TAT.3 + AVA_VAN.5",
        "manufacturer": "Samsung Electronics Co., Ltd",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1926",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1924",
        "type": "Product"
      },
      "manufacturer": "Samsung Electronics Co., Ltd",
      "product": "Samsung STRONG_V2P10_LN04LPE of S5E9925 with Specific IC Dedicated Software revision 1.0",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1004-samsung-strong-v2p10-ln04lpe-of-s5e9925-with-specific-ic-dedicated-software-revision-1-0"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Samsung Electronics Co., Ltd.",
  "manufacturer_web": "https://www.samsung.com",
  "name": "Samsung STRONG_V2P10_LN04LPE of S5E9925 with Specific IC Dedicated Software revision 1.0",
  "not_valid_after": "2029-01-06",
  "not_valid_before": "2024-01-06",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2021-22_Certificado.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.E": 1
        },
        "T": {
          "T.I": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_TAT.3": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 902791,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2021-22_INF-4236.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          }
        }
      },
      "cc_cert_id": {
        "ES": {
          "2021-22-INF-4236- v1": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.5": 7,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 6,
          "ALC_FLR": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 6
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL5": 6
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.5": 1,
          "FCS_COP": 8,
          "FCS_RNG": 2
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_DAU": 1,
          "FDP_IFC.1": 1,
          "FDP_ITT.1": 1,
          "FDP_SDC": 1,
          "FDP_SDI.2": 1,
          "FDP_UCT.1": 1,
          "FDP_URC": 1
        },
        "FIA": {
          "FIA_API.1": 1
        },
        "FMT": {
          "FMT_LIM": 4,
          "FMT_MSA.1": 1,
          "FMT_SMF.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_PHP.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 3
        },
        "TRNG": {
          "TRNG": 11
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "side-channel": 1
        },
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1,
          "BSI-AIS31": 4
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 197": 2
        },
        "NIST": {
          "NIST SP 800-90A": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 9
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "",
      "/Subject": "",
      "/Title": "",
      "/Trapped": "",
      "pdf_file_size_bytes": 436484,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.sogis.eu/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "2021-22 ST_Lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 16
          },
          "ECDH": {
            "ECDH": 19
          },
          "ECDSA": {
            "ECDSA": 28
          }
        },
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 5
          },
          "DSA": {
            "DSA": 6
          }
        },
        "RSA": {
          "RSA-CRT": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AES": 6,
          "O.ECDH": 7,
          "O.ECDSA": 7,
          "O.HMAC": 8,
          "O.MEM_ACCESS": 1,
          "O.RND": 6,
          "O.RSA": 7,
          "O.SHA": 7,
          "O.TDES": 7
        },
        "T": {
          "T.RND": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084": 1,
          "BSI-CC-PP-0084-": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 5,
          "ADV_FSP": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 3,
          "ADV_IMP": 1,
          "ADV_IMP.1": 2,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.5": 9,
          "ALC_CMS": 2,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 8,
          "ALC_LCD.1": 2,
          "ALC_TAT.3": 8
        },
        "APE": {
          "APE_ECD": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 11
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL5": 6,
          "EAL5 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 4,
          "FAU_GEN.1": 1,
          "FAU_SAS": 9,
          "FAU_SAS.1": 12,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 16,
          "FCS_CKM.1": 35,
          "FCS_CKM.2": 6,
          "FCS_CKM.4": 29,
          "FCS_CKM.5": 18,
          "FCS_CKM.5.1": 2,
          "FCS_COP": 93,
          "FCS_COP.1": 30,
          "FCS_RNG": 23,
          "FCS_RNG.1": 12,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC": 8,
          "FDP_ACC.1": 19,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 11,
          "FDP_ACF.1": 19,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_DAU": 7,
          "FDP_DAU.1": 1,
          "FDP_DAU.2": 2,
          "FDP_IFC": 1,
          "FDP_IFC.1": 23,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 3,
          "FDP_IRA": 15,
          "FDP_IRA.1": 5,
          "FDP_IRA.1.1": 1,
          "FDP_IRA.1.2": 1,
          "FDP_IRA.1.3": 1,
          "FDP_ITC.1": 20,
          "FDP_ITC.2": 20,
          "FDP_ITT": 1,
          "FDP_ITT.1": 18,
          "FDP_ITT.1.1": 1,
          "FDP_SDC": 13,
          "FDP_SDC.1": 15,
          "FDP_SDC.1.1": 2,
          "FDP_SDI": 9,
          "FDP_SDI.1": 3,
          "FDP_SDI.2": 10,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT.1": 9,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 9,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1,
          "FDP_URC": 13,
          "FDP_URC.1": 6,
          "FDP_URC.1.1": 1,
          "FDP_URC.1.2": 1
        },
        "FIA": {
          "FIA_API": 7,
          "FIA_API.1": 12,
          "FIA_API.1.1": 2,
          "FIA_UID": 7,
          "FIA_UID.1": 5,
          "FIA_URC": 1
        },
        "FMT": {
          "FMT_CKM.4": 1,
          "FMT_LIM": 83,
          "FMT_LIM.1": 12,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 11,
          "FMT_LIM.2.1": 1,
          "FMT_MSA": 2,
          "FMT_MSA.1": 12,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 16,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 9,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 6
        },
        "FPT": {
          "FPT_FLS": 1,
          "FPT_FLS.1": 21,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_ITT.1": 16,
          "FPT_ITT.1.1": 1,
          "FPT_PHP": 2,
          "FPT_PHP.3": 20,
          "FPT_PHP.3.1": 1,
          "FPT_RPL": 7,
          "FPT_RPL.1": 3
        },
        "FRU": {
          "FRU_FLT": 1,
          "FRU_FLT.1": 1,
          "FRU_FLT.2": 16,
          "FRU_FLT.2.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 13,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 9
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PGP": {
          "PGP": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP224r1": 8,
          "brainpoolP224t1": 8,
          "brainpoolP256r1": 4,
          "brainpoolP256t1": 8,
          "brainpoolP320r1": 8,
          "brainpoolP320t1": 8,
          "brainpoolP384r1": 4,
          "brainpoolP384t1": 8,
          "brainpoolP512r1": 4,
          "brainpoolP512t1": 8
        },
        "NIST": {
          "P-224": 18,
          "P-256": 8,
          "P-384": 8,
          "secp224k1": 8,
          "secp224r1": 8,
          "secp256k1": 8,
          "secp256r1": 8,
          "secp384r1": 8
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA1": 3
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 2,
            "SHA-384": 2,
            "SHA-512": 2,
            "SHA2": 6,
            "SHA224": 8,
            "SHA256": 6,
            "SHA384": 6,
            "SHA512": 5
          },
          "SHA3": {
            "SHA-3": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "X25519": 14
        },
        "misc": {
          "PAD_SYSTEM": 1
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 8
        },
        "RNG": {
          "RND": 11,
          "RNG": 11
        },
        "TRNG": {
          "DTRNG": 1,
          "TRNG": 18
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 4,
          "Malfunction": 26,
          "malfunction": 10,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 7,
          "Leak-Inherent": 21,
          "Physical Probing": 4,
          "Physical probing": 2,
          "SPA": 6,
          "physical probing": 9,
          "side channel": 2,
          "side-channel": 2,
          "timing attack": 1,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1,
          "BSI-AIS31": 5
        },
        "CC": {
          "CCMB-2017-04-001": 6,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 180-4": 4,
          "FIPS 197": 2,
          "FIPS PUB 180-4": 6,
          "FIPS PUB 198-1": 2,
          "FIPS PUB 202": 1,
          "FIPS197": 1
        },
        "NIST": {
          "NIST SP 800-90A": 2
        },
        "RFC": {
          "RFC7748": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 35
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 17,
            "Triple-DES": 6
          },
          "DES": {
            "DES": 10
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 23
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 19
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Samsung",
      "/CreationDate": "D:20230906200107+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "ST_Lite_S5E9925",
      "/ModDate": "D:20230906200334+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "ST_Lite_S5E9925",
      "/Title": "ST_Lite_S5E9925",
      "pdf_file_size_bytes": 1816676,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/uploads/2015/01/RGS_v-2-0_B1.pdf"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 120
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-22_INF-4236.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_TAT.3",
      "AVA_VAN.5",
      "ALC_CMC.5",
      "ALC_DVS.2",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-22%20ST_Lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7b1980bf139fa7ba19fd121d734d12f87f7f0f3a9c80a0f479be92288760c001",
      "txt_hash": "c11b2a91733a21fad7e01cb557aa2df888a1bbfe2d06b5a2274576edd5e40d39"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ae12c3a1809c38ef092d075f5928c1520cf5e75d353b53e96afd167f1ebcf198",
      "txt_hash": "d8fecab47f9aac6241ea5dcc0a9a79066a03c94f5a6fe67ba4dfc6ca195cf5cb"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "10d35fa04c066d9e2c33ee9c7626cf6347a74d74b34a0591355b5b23c42b10bf",
      "txt_hash": "f99c0ae4825e4e8aaa9152e5edc935b3898d846c671b91e9e43f005c15bf9ab3"
    }
  },
  "status": "active"
}