Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)
ANSSI-CC-2023/71
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 )
ANSSI-CC-2023/36
name Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71) eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 )
category Trusted Computing ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_after 01.02.2029 22.09.2028
not_valid_before 01.02.2024 22.09.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_71fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_36fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_36fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_36en.pdf
manufacturer Samsung Electronics Co., Ltd. THALES DIS FRANCE SA
manufacturer_web https://www.samsung.com https://www.thalesgroup.com/en/europe/france
security_level EAL2+ AVA_VAN.5, EAL5+, ALC_DVS.2
dgst 01cb0a033c2b1c55 a774412def438291
heuristics/cert_id ANSSI-CC-2023/71 ANSSI-CC-2023/36
heuristics/cpe_matches cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars AVA_VAN.2, ASE_TSS.1, ASE_OBJ.2, ASE_CCL.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ALC_DEL.1, ATE_FUN.1, ASE_SPD.1, AGD_OPE.1, ADV_FSP.2, ATE_COV.1, ASE_ECD.1, ASE_REQ.2, ASE_INT.1, ADV_ARC.1, ALC_CMC.2 ATE_DPT.1, ADV_FSP.4, AGD_PRE.1, ADV_TDS.3, ASE_TSS.2, ALC_DVS.2, AVA_VAN.5, ALC_FLR.2, ADV_ARC.1, AGD_OPE.1, ADV_IMP.1
heuristics/extracted_versions 5.0.0.0 3.1, 5.1, 3.1.0.0
heuristics/report_references/directly_referencing {} ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/scheme_data
  • cert_id: ANSSI-CC-2023/71
  • description: Le produit évalué est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » développé par Samsung Electronics Ltd., Co.. Ce produit, appelé également Samsung Secure OS, est l’implémentation de Samsung d’un TEE (Trusted Execution Environment), basé sur la technologie ARM Trust Zone.
  • developer: Samsung Electronics Ltd., Co.
  • enhanced:
    • augmented: AVA_VAN_AP.3
    • category: Divers
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2023/71
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf
    • certification_date: 01/02/2024
    • developer: Samsung Electronics Ltd., Co.
    • evaluation_facility: THALES / CNES
    • expiration_date: 01/02/2029
    • level: EAL2+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: GlobalPlatform Technology TEE Protection Profile, réf. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf
    • sponsor: Samsung Electronics Ltd., Co.
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf
  • expiration_date: 1 Février 2029
  • level: EAL2+
  • product: Samsung TEEgris on Exynos 2200 Version 5.0.0.0
  • sponsor: Samsung Electronics Ltd., Co.
  • url: https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000
  • cert_id: ANSSI-CC-2023/36
  • description: Le produit évalué est « eTravel 3.1 EAC on SAC on MultiApp V5.1, Version 3.1.0.0 » développé par THALES DIS FRANCE SAS. Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile internationale (ICAO). Ce produit permet la vérification de l’authenticité du document de voyage et l’identification de son porteur not
  • developer: THALES DIS FRANCE SAS / THALES DIS DESIGN SERVICES
  • enhanced:
    • augmented: ALC_DVS.2 et AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2023/36
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_36fr_0.pdf
    • certification_date: 22/09/2023
    • developer: THALES DIS FRANCE SAS / THALES DIS DESIGN SERVICES
    • evaluation_facility: CEA - LETI
    • expiration_date: 21/09/2028
    • level: EAL5+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Machine Readable Travel Document with “ICAO Application”, Extended Access Control with PACE, version 1.3.2 ,Certifié BSI-CC-PP-0056-V2-2012-MA-02 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.01,Certifié BSI-CC-PP-0068-V2-2011-MA-01
    • sponsor: THALES DIS FRANCE SAS
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_36-M01en_0.pdf
  • expiration_date: 21 Septembre 2028
  • level: EAL5+
  • product: eTravel 3.1 EAC on SAC on MultiApp V5.1 (Version 3.1.0.0)
  • sponsor: THALES DIS FRANCE SAS
  • url: https://cyber.gouv.fr/produits-certifies/etravel-31-eac-sac-multiapp-v51-version-3100-0
heuristics/st_references/directly_referencing {} ANSSI-CC-2023/01
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2023/01
maintenance_updates
protection_profiles
pdf_data/cert_filename Certificat-CC-2023_71fr.pdf Certificat-CC-2023_36fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/71: 2
  • FR:
    • ANSSI-CC-2023/36: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2014/01-M02: 1
  • BSI:
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 1
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_keywords/crypto_protocol
  • PACE:
    • PACE: 2
pdf_data/cert_keywords/tee_name
  • other:
    • TEE: 1
    • TEEgris: 1
pdf_data/cert_metadata
  • /CreationDate: D:20240215120518+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240215120555+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 154878
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20230929175248+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20230929175422+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 153767
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2023_71fr.pdf ANSSI-CC-2023_36fr.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/71: 2
  • FR:
    • ANSSI-CC-2023/01: 1
    • ANSSI-CC-2023/31: 1
    • ANSSI-CC-2023/36: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2014/01-M02: 2
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 19
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 6
pdf_data/report_keywords/tee_name
  • ARM:
    • TrustZone: 1
  • other:
    • TEE: 10
    • TEEgris: 12
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • ICAO:
    • ICAO: 1
pdf_data/report_metadata
pdf_data/st_filename ANSSI-cible-CC-2023_71en.pdf ANSSI-cible-2023_36en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/01: 1
  • NL:
    • CC-1: 6
    • CC-2: 6
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-2014: 2
    • BSI-PP-0055-2009: 1
    • BSI-PP-0056-V2-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 6
    • EAL 2 augmented: 2
    • EAL 2+: 1
  • EAL:
    • EAL 6+: 1
    • EAL5: 5
    • EAL5 augmented: 1
    • EAL5+: 1
    • EAL6: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 3
    • ADV_FSP.2: 15
    • ADV_TDS.1: 10
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 4
  • AVA:
    • AVA_VAN.2: 7
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 4
    • ALC_FLR.2: 1
  • ASE:
    • ASE_ECD: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.3: 1
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 12
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 4
    • FAU_SAA.1: 2
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM: 48
    • FCS_CKM.1: 17
    • FCS_CKM.2: 2
    • FCS_CKM.4: 23
    • FCS_COP: 68
    • FCS_COP.1: 14
    • FCS_RNG: 3
    • FCS_RNG.1: 10
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 40
    • FDP_ACC.1: 15
    • FDP_ACF: 35
    • FDP_ACF.1: 21
    • FDP_IFC: 13
    • FDP_IFC.1: 8
    • FDP_IFC.2: 2
    • FDP_IFF: 11
    • FDP_IFF.1: 8
    • FDP_ITC.1: 15
    • FDP_ITC.2: 15
    • FDP_ITT: 11
    • FDP_ITT.1: 4
    • FDP_RIP: 10
    • FDP_RIP.1: 2
    • FDP_ROL: 7
    • FDP_ROL.1: 2
    • FDP_SDI: 6
    • FDP_SDI.2: 15
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_TRP: 1
  • FIA:
    • FIA_ATD: 7
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UAU: 12
    • FIA_UAU.2: 1
    • FIA_UAU.6: 2
    • FIA_UID: 8
    • FIA_UID.1: 3
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
    • FIA_USB: 6
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 55
    • FMT_MSA.1: 7
    • FMT_MSA.2: 1
    • FMT_MSA.3: 15
    • FMT_MTD: 5
    • FMT_MTD.1: 1
    • FMT_SMF: 5
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR: 6
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS: 12
    • FPT_FLS.1: 18
    • FPT_FLS.1.1: 1
    • FPT_INI: 4
    • FPT_INI.1: 14
    • FPT_INI.1.1: 2
    • FPT_INI.1.2: 2
    • FPT_INI.1.3: 2
    • FPT_INI.1.4: 1
    • FPT_ITT: 6
    • FPT_ITT.1: 2
    • FPT_STM: 10
    • FPT_STM.1: 2
    • FPT_TEE.1: 6
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FTP:
    • FTP_TPR: 1
    • FTP_TRP: 7
    • FTP_TRP.1: 3
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 49
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 8
    • FCS_CKM.4: 60
    • FCS_CKM.4.1: 1
    • FCS_COP: 83
    • FCS_COP.1: 11
    • FCS_COP.1.1: 7
    • FCS_RND: 7
    • FCS_RND.1: 13
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF: 18
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
    • FDP_ITC.1: 21
    • FDP_ITC.2: 21
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_UCT: 5
    • FDP_UCT.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT: 5
    • FDP_UIT.1: 2
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 18
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 14
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_ATD: 4
    • FIA_ATD.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 63
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 2
    • FIA_UID: 23
    • FIA_UID.1: 7
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 19
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 17
    • FMT_LIM.2.1: 3
    • FMT_MSA: 9
    • FMT_MSA.1: 3
    • FMT_MSA.3: 6
    • FMT_MTD: 52
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_SMF: 7
    • FMT_SMF.1: 48
    • FMT_SMF.1.1: 1
    • FMT_SMR: 35
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 6
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 11
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_RESIDUAL_DATA: 3
    • A.PROTECTION_AFTER_: 1
    • A.PROTECTION_AFTER_DELIVERY: 2
    • A.ROLLBACK: 1
    • A.TA_DEVELOPMENT: 4
    • A.TA_DEVELOPMENT_TUI: 3
    • A.TA_MANAGEMENT: 5
  • O:
    • O.CAPTURE: 2
    • O.CA_TA_IDENTIFICATION: 11
    • O.DATA_ACCESS: 11
    • O.DEBUG: 12
    • O.FUNCTION_ACCESS: 4
    • O.INITIALISATION: 10
    • O.INITIALIZATION: 1
    • O.INSTANCE_TIME: 11
    • O.KEYS_USAGE: 4
    • O.OPERATION: 8
    • O.PERIPHERAL_INITIALISATION: 3
    • O.PREVENT_RESIDUAL_DATA: 3
    • O.PROTECTED_COMMUNICATION_CHANNEL: 12
    • O.RNG: 12
    • O.ROLLBACK_PROTECTION: 5
    • O.RUNTIME_CONFIDENTIALITY: 10
    • O.RUNTIME_INTEGRITY: 21
    • O.SAFE_RELEASE: 11
    • O.TA_AUTHENTICITY: 7
    • O.TA_ISOLATION: 15
    • O.TA_PERSISTENT_TIME: 12
    • O.TEE_DATA_PROTECTION: 11
    • O.TEE_ID: 11
    • O.TEE_ISOLATION: 14
    • O.TRUSTED_STORAGE: 9
  • OE:
    • OE.DISABLED_DEBUG: 1
    • OE.INTEGRATION_CONFIGURATION: 7
    • OE.NO_RESIDUAL_DATA: 2
    • OE.PROTECTION_AFTER_DELIVERY: 7
    • OE.ROLLBACK: 1
    • OE.SECRETS: 2
    • OE.TA_DEVELOPMENT: 6
    • OE.TA_DEVELOPMENT_TUI: 5
    • OE.TA_MANAGEMENT: 3
  • OP:
    • OP.ACTIVATE: 1
    • OP.AUTHENTICATE: 2
    • OP.DEBUG: 7
    • OP.EXTRACT_KEY: 4
    • OP.LOAD: 3
    • OP.STORE: 4
    • OP.USE_KEY: 4
  • OSP:
    • OSP.INTEGRATION_: 1
    • OSP.INTEGRATION_CONFIGURATION: 2
    • OSP.SECRETS: 3
  • T:
    • T.ABUSE_DEBUG: 3
    • T.ABUSE_FUNCT: 3
    • T.CLONE: 3
    • T.CORRUPT_RUNTIME_: 1
    • T.CORRUPT_RUNTIME_DATA: 2
    • T.CORRUPT_SETUP: 5
    • T.EXTRACT_DATA: 3
    • T.EXTRACT_EXCHANGED_: 1
    • T.EXTRACT_EXCHANGED_DATA: 2
    • T.FLASH_DUMP: 3
    • T.IMPERSONATION: 3
    • T.INJECT_DATA: 3
    • T.INJECT_EXCHANGED_: 1
    • T.INJECT_EXCHANGED_DATA: 2
    • T.MODIFY_DATA: 3
    • T.MODIFY_EXCHANGED_: 1
    • T.MODIFY_EXCHANGED_DATA: 2
    • T.MODIFY_FIRMWARE: 3
    • T.PERIPHERAL_ACCESS: 3
    • T.PERTURBATION: 3
    • T.RAM: 3
    • T.RESIDUAL: 3
    • T.RNG: 3
    • T.ROGUE_CODE_: 1
    • T.ROGUE_CODE_EXECUTION: 2
    • T.ROLLBACK: 3
    • T.SHARED_FUNCTION_: 1
    • T.SHARED_FUNCTION_ACCESS: 2
    • T.SPY: 3
    • T.STORAGE_CORRUPTION: 3
    • T.TA_PERSISTENT_TIME_: 1
    • T.TA_PERSISTENT_TIME_ROLLBACK: 2
    • T.TEE_FIRMWARE_: 1
    • T.TEE_FIRMWARE_DOWNGRADE: 2
  • A:
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
  • D:
    • D.ACODE_: 1
    • D.JCS_CODE: 4
    • D.JCS_DATA: 4
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
  • O:
    • O.CONFID-: 1
    • O.CONFID-OS-: 1
    • O.CONFID-OS-UPDATE: 3
    • O.RND: 1
    • O.SECURE_AC_ACTIVATION: 5
    • O.SECURE_LOAD_ACODE: 9
    • O.TOE_IDENTIFICATION: 7
  • OE:
    • OE.BAC-PP: 1
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 4
    • OE.SECURE_ACODE_MANAGEMENT: 4
  • OSP:
    • OSP: 2
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.TOE_IDENTIFICATION: 3
  • T:
    • T.CONFID-OS-UPDATE_LOAD: 3
    • T.FAKE-SGNVER-KEY: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.UNAUTHORISED-TOE-CODE-UPDATE: 1
    • T.UNAUTHORIZED_TOE_CODE_UPDATE: 2
    • T.WRONG-UPDATE-STATE: 3
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 140
  • Thales:
    • Thales: 7
  • Thales:
    • Thales: 34
pdf_data/st_keywords/eval_facility
  • CESTI:
    • CESTI: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • 3DES:
      • 3DES: 7
    • DES:
      • DES: 7
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 5
      • HMAC-SHA-224: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 10
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • TDES: 7
      • Triple-DES: 5
  • constructions:
    • MAC:
      • CMAC: 3
      • KMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 13
    • EdDSA:
      • EdDSA: 1
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 4
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 10
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 1
      • SHA224: 1
      • SHA256: 2
      • SHA384: 1
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 8
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 2
  • PACE:
    • PACE: 116
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RNG: 29
  • TRNG:
    • TRNG: 5
  • RNG:
    • RND: 1
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 4
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • side-channels: 1
  • other:
    • cold boot: 1
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 7
  • SCA:
    • DPA: 2
    • Leak-Inherent: 1
    • Physical Probing: 1
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • IBM:
    • SE: 2
  • other:
    • TEE: 594
    • TEEgris: 126
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 3
    • EF.DG1: 11
    • EF.DG14: 5
    • EF.DG15: 2
    • EF.DG16: 9
    • EF.DG2: 5
    • EF.DG3: 10
    • EF.DG4: 10
    • EF.DG5: 3
    • EF.SOD: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 1
    • FIPS 186-2: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS 81: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 1423: 1
    • RFC 2119: 3
    • RFC 2202: 1
    • RFC 4231: 1
    • RFC 7748: 1
    • RFC 8032: 1
  • BSI:
    • BSI-AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 186-3: 1
    • FIPS 197: 1
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-4: 1
  • NIST:
    • SP 800-67: 1
    • SP 800-90: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 5
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 2
pdf_data/st_keywords/javacard_api_const
  • curves:
    • ED25519: 4
    • X25519: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: rosep
  • /CreationDate: D:20240108141421+01'00'
  • /ModDate: D:20240108141421+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx
  • pdf_file_size_bytes: 1813549
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 98
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different