name |
Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71) |
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) |
category |
Trusted Computing |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
01.02.2029 |
09.02.2029 |
not_valid_before |
01.02.2024 |
09.02.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_71fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_57fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_57fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_57en.pdf |
manufacturer |
Samsung Electronics Co., Ltd. |
THALES DIS FRANCE SA |
manufacturer_web |
https://www.samsung.com |
https://www.thalesgroup.com/en/europe/france |
security_level |
EAL2+ |
AVA_VAN.5, EAL5+, ALC_DVS.2 |
dgst |
01cb0a033c2b1c55 |
cecfb5207379a342 |
heuristics/cert_id |
ANSSI-CC-2023/71 |
ANSSI-CC-2023/57 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:* |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_VAN.2, ASE_TSS.1, ASE_OBJ.2, ASE_CCL.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ALC_DEL.1, ATE_FUN.1, ASE_SPD.1, AGD_OPE.1, ADV_FSP.2, ATE_COV.1, ASE_ECD.1, ASE_REQ.2, ASE_INT.1, ADV_ARC.1, ALC_CMC.2 |
AVA_VAN.5, ALC_DVS.2 |
heuristics/extracted_versions |
5.0.0.0 |
1.1, 4.4.2, 1.1.1, 4.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2023/30, ANSSI-CC-2023/20 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2023/30, ANSSI-CC-2023/20 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/71
- description: Le produit évalué est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » développé par Samsung Electronics Ltd., Co..
Ce produit, appelé également Samsung Secure OS, est l’implémentation de Samsung d’un TEE (Trusted Execution Environment), basé sur la technologie ARM Trust Zone.
- developer: Samsung Electronics Ltd., Co.
- enhanced:
- augmented: AVA_VAN_AP.3
- category: Divers
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/71
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf
- certification_date: 01/02/2024
- developer: Samsung Electronics Ltd., Co.
- evaluation_facility: THALES / CNES
- expiration_date: 01/02/2029
- level: EAL2+
- mutual_recognition: CCRA
SOG-IS
- protection_profile: GlobalPlatform Technology TEE Protection Profile, réf. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf
- sponsor: Samsung Electronics Ltd., Co.
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf
- expiration_date: 1 Février 2029
- level: EAL2+
- product: Samsung TEEgris on Exynos 2200 Version 5.0.0.0
- sponsor: Samsung Electronics Ltd., Co.
- url: https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000
|
- cert_id: ANSSI-CC-2023/57
- description: Le produit évalué est la « IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1, version IAS 4.4.2.A, version MOC Server 1.1.1A » développé par THALES DIS FRANCE SAS.
Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD1).
- developer: THALES DIS FRANCE SAS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/57
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_57fr.pdf
- certification_date: 09/02/2024
- developer: THALES DIS FRANCE SAS
- evaluation_facility: SERMA SAFETY & SECURITY
- expiration_date: 09/02/2029
- level: EAL5+
- mutual_recognition: CCRA
SOG-IS
- protection_profile: Protection profiles for secure signature creation device:
Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 ;
Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ;
Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1,
BSI-CC-PP-0071-2012-MA-01 ;
Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1,
BSI-CC-PP-0072-2012-MA-01 ;
Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4,
BSI-CC-PP-0076-2013-MA-01.
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_57fr.pdf
- sponsor: THALES DIS FRANCE SAS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_57en.pdf
- expiration_date: 9 Février 2029
- level: EAL5+
- product: IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A
- sponsor: THALES DIS FRANCE SAS
- url: https://cyber.gouv.fr/produits-certifies/ias-classic-v442-moc-server-11-multiapp-v41-version-ias-442a-version-moc-server
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2023/20 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2023/20 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2023_71fr.pdf |
Certificat-CC-2023_57fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-2014/01-M02: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20240215120518+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240215120555+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 154878
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author:
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20240215115407+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20240215115408+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20240215105356
- /Title: ANSSI-CC-2023/57
- pdf_file_size_bytes: 122264
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2023_71fr.pdf |
ANSSI-CC-2023_57fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2023/20: 1
- ANSSI-CC-2023/30: 1
- ANSSI-CC-2023/57: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-2014/01-M02: 2
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- AGD:
- AGD_CPS: 2
- AGD_OPE: 1
- AGD_USE: 1
- ALC:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-CC-2023_71en.pdf |
ANSSI-cible-CC-2023_57en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- other:
- PP-SSCD: 6
- PP-SSCD-: 1
- PP-SSCD-KG: 41
- PP-SSCD-KI: 30
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 6
- EAL 2 augmented: 2
- EAL 2+: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 3
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 3
- ADV_FSP.2: 15
- ADV_TDS.1: 10
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 9
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 5
- ATE_FUN.1: 4
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 12
- FAU_ARP.1.1: 1
- FAU_GEN.1: 4
- FAU_SAA.1: 2
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM: 48
- FCS_CKM.1: 17
- FCS_CKM.2: 2
- FCS_CKM.4: 23
- FCS_COP: 68
- FCS_COP.1: 14
- FCS_RNG: 3
- FCS_RNG.1: 10
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 40
- FDP_ACC.1: 15
- FDP_ACF: 35
- FDP_ACF.1: 21
- FDP_IFC: 13
- FDP_IFC.1: 8
- FDP_IFC.2: 2
- FDP_IFF: 11
- FDP_IFF.1: 8
- FDP_ITC.1: 15
- FDP_ITC.2: 15
- FDP_ITT: 11
- FDP_ITT.1: 4
- FDP_RIP: 10
- FDP_RIP.1: 2
- FDP_ROL: 7
- FDP_ROL.1: 2
- FDP_SDI: 6
- FDP_SDI.2: 15
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_TRP: 1
- FIA:
- FIA_ATD: 7
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UAU: 12
- FIA_UAU.2: 1
- FIA_UAU.6: 2
- FIA_UID: 8
- FIA_UID.1: 3
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FIA_USB: 6
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 55
- FMT_MSA.1: 7
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 5
- FMT_MTD.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR: 6
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS: 12
- FPT_FLS.1: 18
- FPT_FLS.1.1: 1
- FPT_INI: 4
- FPT_INI.1: 14
- FPT_INI.1.1: 2
- FPT_INI.1.2: 2
- FPT_INI.1.3: 2
- FPT_INI.1.4: 1
- FPT_ITT: 6
- FPT_ITT.1: 2
- FPT_STM: 10
- FPT_STM.1: 2
- FPT_TEE.1: 6
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FTP:
- FTP_TPR: 1
- FTP_TRP: 7
- FTP_TRP.1: 3
|
- FCS:
- FCS_CKM: 47
- FCS_CKM.1: 13
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 12
- FCS_CKM.4.1: 2
- FCS_COP: 26
- FCS_COP.1: 6
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 44
- FDP_ACC.1: 28
- FDP_ACC.1.1: 4
- FDP_ACF: 32
- FDP_ACF.1: 10
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_AFC: 1
- FDP_DAU: 10
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC.1: 18
- FDP_ITC: 11
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_RIP: 2
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI: 17
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 9
- FDP_UCT.1.1: 1
- FDP_UIT: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 17
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 5
- FIA_API.1: 14
- FIA_API.1.1: 2
- FIA_UAU: 20
- FIA_UAU.1: 7
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 20
- FIA_UID.1: 10
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 62
- FMT_MSA.1: 7
- FMT_MSA.1.1: 3
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 3
- FMT_MSA.4.1: 2
- FMT_MTD: 16
- FMT_MTD.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 36
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 13
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ICT: 2
- FTP_ITC: 38
- FTP_ITC.1: 4
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_RESIDUAL_DATA: 3
- A.PROTECTION_AFTER_: 1
- A.PROTECTION_AFTER_DELIVERY: 2
- A.ROLLBACK: 1
- A.TA_DEVELOPMENT: 4
- A.TA_DEVELOPMENT_TUI: 3
- A.TA_MANAGEMENT: 5
- O:
- O.CAPTURE: 2
- O.CA_TA_IDENTIFICATION: 11
- O.DATA_ACCESS: 11
- O.DEBUG: 12
- O.FUNCTION_ACCESS: 4
- O.INITIALISATION: 10
- O.INITIALIZATION: 1
- O.INSTANCE_TIME: 11
- O.KEYS_USAGE: 4
- O.OPERATION: 8
- O.PERIPHERAL_INITIALISATION: 3
- O.PREVENT_RESIDUAL_DATA: 3
- O.PROTECTED_COMMUNICATION_CHANNEL: 12
- O.RNG: 12
- O.ROLLBACK_PROTECTION: 5
- O.RUNTIME_CONFIDENTIALITY: 10
- O.RUNTIME_INTEGRITY: 21
- O.SAFE_RELEASE: 11
- O.TA_AUTHENTICITY: 7
- O.TA_ISOLATION: 15
- O.TA_PERSISTENT_TIME: 12
- O.TEE_DATA_PROTECTION: 11
- O.TEE_ID: 11
- O.TEE_ISOLATION: 14
- O.TRUSTED_STORAGE: 9
- OE:
- OE.DISABLED_DEBUG: 1
- OE.INTEGRATION_CONFIGURATION: 7
- OE.NO_RESIDUAL_DATA: 2
- OE.PROTECTION_AFTER_DELIVERY: 7
- OE.ROLLBACK: 1
- OE.SECRETS: 2
- OE.TA_DEVELOPMENT: 6
- OE.TA_DEVELOPMENT_TUI: 5
- OE.TA_MANAGEMENT: 3
- OP:
- OP.ACTIVATE: 1
- OP.AUTHENTICATE: 2
- OP.DEBUG: 7
- OP.EXTRACT_KEY: 4
- OP.LOAD: 3
- OP.STORE: 4
- OP.USE_KEY: 4
- OSP:
- OSP.INTEGRATION_: 1
- OSP.INTEGRATION_CONFIGURATION: 2
- OSP.SECRETS: 3
- T:
- T.ABUSE_DEBUG: 3
- T.ABUSE_FUNCT: 3
- T.CLONE: 3
- T.CORRUPT_RUNTIME_: 1
- T.CORRUPT_RUNTIME_DATA: 2
- T.CORRUPT_SETUP: 5
- T.EXTRACT_DATA: 3
- T.EXTRACT_EXCHANGED_: 1
- T.EXTRACT_EXCHANGED_DATA: 2
- T.FLASH_DUMP: 3
- T.IMPERSONATION: 3
- T.INJECT_DATA: 3
- T.INJECT_EXCHANGED_: 1
- T.INJECT_EXCHANGED_DATA: 2
- T.MODIFY_DATA: 3
- T.MODIFY_EXCHANGED_: 1
- T.MODIFY_EXCHANGED_DATA: 2
- T.MODIFY_FIRMWARE: 3
- T.PERIPHERAL_ACCESS: 3
- T.PERTURBATION: 3
- T.RAM: 3
- T.RESIDUAL: 3
- T.RNG: 3
- T.ROGUE_CODE_: 1
- T.ROGUE_CODE_EXECUTION: 2
- T.ROLLBACK: 3
- T.SHARED_FUNCTION_: 1
- T.SHARED_FUNCTION_ACCESS: 2
- T.SPY: 3
- T.STORAGE_CORRUPTION: 3
- T.TA_PERSISTENT_TIME_: 1
- T.TA_PERSISTENT_TIME_ROLLBACK: 2
- T.TEE_FIRMWARE_: 1
- T.TEE_FIRMWARE_DOWNGRADE: 2
|
- A:
- A.APPLET: 2
- A.CGA: 3
- A.CSP: 4
- A.SCA: 3
- A.VERIFICATION: 2
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 1
- OE.HI_VAD: 2
- OE.VERIFICATION: 4
|
pdf_data/st_keywords/vendor |
|
- Gemalto:
- Samsung:
- Thales:
- Thales: 12
- Thales Group: 62
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- CMAC: 3
- HMAC: 5
- HMAC-SHA-224: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
- SHA224: 1
- SHA256: 2
- SHA384: 1
- SHA512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 1
- fault injection: 1
- physical tampering: 4
- SCA:
- DPA: 1
- Leak-Inherent: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 1
- FIPS 186-2: 1
- FIPS 186-4: 2
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS 81: 1
- PKCS:
- RFC:
- RFC 1423: 1
- RFC 2119: 3
- RFC 2202: 1
- RFC 4231: 1
- RFC 7748: 1
- RFC 8032: 1
|
- CC:
- CCMB-2012-04-003: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- FIPS:
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist: 1
- out of scope: 1
|
- OutOfScope:
- by authorized users. The functionalities of IAS Classic V4.4.2 other than the ones from SSCD are out of scope of the TOE perimeter. MOC Server application provides biometric authentication of the signatory: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: rosep
- /CreationDate: D:20240108141421+01'00'
- /ModDate: D:20240108141421+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx
- pdf_file_size_bytes: 1813549
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 98
|
- /Author: D1418852
- /CreationDate: D:20230928155442+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: 16-03-2018
- /ModDate: D:20230928155442+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: 1.1
- /Title: MultiApp V4.1: IAS EN Core & Extensions Security Target
- pdf_file_size_bytes: 1252729
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |