Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)
ANSSI-CC-2023/71
MultiApp V5.0 Platform (configuration 1 : 5.0.1 version 2a et configuration 2 : 5.0.1 version 2b) (ANSSI-CC-2025/42)
ANSSI-CC-2025/42
name Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71) MultiApp V5.0 Platform (configuration 1 : 5.0.1 version 2a et configuration 2 : 5.0.1 version 2b) (ANSSI-CC-2025/42)
category Trusted Computing ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_after 01.02.2029 01.12.2030
not_valid_before 01.02.2024 01.12.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_71fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-42-certificat.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-42-rapport.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025-42-cible.pdf
manufacturer Samsung Electronics Co., Ltd. THALES DIS FRANCE SA
manufacturer_web https://www.samsung.com https://www.thalesgroup.com/en/europe/france
security_level EAL2+ EAL6+, ALC_FLR.1
dgst 01cb0a033c2b1c55 da810f38d3629ce7
heuristics/cert_id ANSSI-CC-2023/71 ANSSI-CC-2025/42
heuristics/cpe_matches cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ADV_FSP.2, ASE_CCL.1, AGD_PRE.1, ATE_FUN.1, ASE_OBJ.2, ATE_COV.1, ASE_SPD.1, ALC_CMC.2, AGD_OPE.1, ALC_CMS.2, ASE_INT.1, AVA_VAN.2, ASE_ECD.1, ALC_DEL.1, ASE_TSS.1, ASE_REQ.2, ADV_TDS.1, ADV_ARC.1 ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_SPM.1, ADV_ARC.1
heuristics/extracted_versions 5.0.0.0 5.0.1, 5.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2025/46
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-V5-2024
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2025/46
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022, BSI-DSZ-CC-1107-V5-2024, BSI-DSZ-CC-1107-V4-2023
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V5-2024
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V5-2024
heuristics/protection_profiles {} 7f886b64878b68c1
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf
pdf_data/cert_filename Certificat-CC-2023_71fr.pdf ANSSI-CC-2025-42-certificat.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/71: 2
    • ANSSI-CC-PP-2014/01-M02: 1
  • FR:
    • ANSSI-CC-2025/42: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2014/01-M02: 1
  • BSI:
    • BSI-PP-099-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
  • EAL:
    • EAL2: 1
    • EAL6: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 1
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
pdf_data/cert_keywords/tee_name
  • other:
    • TEE: 1
    • TEEgris: 1
pdf_data/cert_metadata
  • /CreationDate: D:20240215120518+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240215120555+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 154878
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20251126120544+01'00'
  • /Creator: Acrobat PDFMaker 25 pour Word
  • /ModDate: D:20251202070142-08'00'
  • /Producer: PDFKit.NET 12.3.757.0 DMV10
  • pdf_file_size_bytes: 302417
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2023_71fr.pdf ANSSI-CC-2025-42-rapport.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/71: 2
    • ANSSI-CC-PP-2014/01-M02: 2
  • DE:
    • BSI-DSZ-CC-1107-V5-2024: 1
  • FR:
    • ANSSI-CC-2025/42: 3
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2014/01-M02: 2
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL2: 2
    • EAL6: 1
    • EAL6+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_PRE: 2
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 2
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 19
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 5
pdf_data/report_keywords/tee_name
  • ARM:
    • TrustZone: 1
  • other:
    • TEE: 10
    • TEEgris: 12
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
pdf_data/st_filename ANSSI-cible-CC-2023_71en.pdf ANSSI-CC-2025-42-cible.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-V5-2024: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0099-V2-2020: 1
    • BSI-PP- 0055-2009: 1
    • BSI-PP-0056-V2-MA-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 6
    • EAL 2 augmented: 2
    • EAL 2+: 1
  • EAL:
    • EAL 6+: 1
    • EAL6: 31
    • EAL6 augmented: 1
    • EAL6+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 3
    • ADV_FSP.2: 15
    • ADV_TDS.1: 10
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 4
  • AVA:
    • AVA_VAN.2: 7
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 8
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP: 1
    • ADV_IMP.1: 6
    • ADV_IMP.2: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 7
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 7
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 12
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 4
    • FAU_SAA.1: 2
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM: 48
    • FCS_CKM.1: 17
    • FCS_CKM.2: 2
    • FCS_CKM.4: 23
    • FCS_COP: 68
    • FCS_COP.1: 14
    • FCS_RNG: 3
    • FCS_RNG.1: 10
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 40
    • FDP_ACC.1: 15
    • FDP_ACF: 35
    • FDP_ACF.1: 21
    • FDP_IFC: 13
    • FDP_IFC.1: 8
    • FDP_IFC.2: 2
    • FDP_IFF: 11
    • FDP_IFF.1: 8
    • FDP_ITC.1: 15
    • FDP_ITC.2: 15
    • FDP_ITT: 11
    • FDP_ITT.1: 4
    • FDP_RIP: 10
    • FDP_RIP.1: 2
    • FDP_ROL: 7
    • FDP_ROL.1: 2
    • FDP_SDI: 6
    • FDP_SDI.2: 15
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_TRP: 1
  • FIA:
    • FIA_ATD: 7
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UAU: 12
    • FIA_UAU.2: 1
    • FIA_UAU.6: 2
    • FIA_UID: 8
    • FIA_UID.1: 3
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
    • FIA_USB: 6
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 55
    • FMT_MSA.1: 7
    • FMT_MSA.2: 1
    • FMT_MSA.3: 15
    • FMT_MTD: 5
    • FMT_MTD.1: 1
    • FMT_SMF: 5
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR: 6
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS: 12
    • FPT_FLS.1: 18
    • FPT_FLS.1.1: 1
    • FPT_INI: 4
    • FPT_INI.1: 14
    • FPT_INI.1.1: 2
    • FPT_INI.1.2: 2
    • FPT_INI.1.3: 2
    • FPT_INI.1.4: 1
    • FPT_ITT: 6
    • FPT_ITT.1: 2
    • FPT_STM: 10
    • FPT_STM.1: 2
    • FPT_TEE.1: 6
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FTP:
    • FTP_TPR: 1
    • FTP_TRP: 7
    • FTP_TRP.1: 3
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 61
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 27
    • FCS_CKM.4.1: 2
    • FCS_CMK.4: 2
    • FCS_COP: 66
    • FCS_COP.1: 31
    • FCS_COP.1.1: 5
    • FCS_RNG: 26
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 20
    • FDP_ACC.2: 6
    • FDP_ACF: 39
    • FDP_ACF.1: 25
    • FDP_IFC: 24
    • FDP_IFC.1: 14
    • FDP_IFC.2: 2
    • FDP_IFF: 16
    • FDP_IFF.1: 14
    • FDP_ITC: 11
    • FDP_ITC.1: 12
    • FDP_ITC.2: 17
    • FDP_ITT.1: 2
    • FDP_RIP: 97
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 13
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 8
    • FDP_SDI.2: 4
    • FDP_UCT.1: 2
    • FDP_UIT: 6
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 23
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 1
    • FIA_API.1: 2
    • FIA_ATD: 12
    • FIA_ATD.1: 3
    • FIA_UAU: 64
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 42
    • FIA_UID.1: 18
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 38
    • FMT_LIM.1: 17
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 3
    • FMT_MSA: 96
    • FMT_MSA.1: 13
    • FMT_MSA.2: 2
    • FMT_MSA.3: 21
    • FMT_MTD: 57
    • FMT_MTD.1: 13
    • FMT_MTD.3: 1
    • FMT_SMF: 78
    • FMT_SMF.1: 29
    • FMT_SMF.1.1: 2
    • FMT_SMR: 88
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 47
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 2
    • FPT_ITT: 6
    • FPT_ITT.1: 2
    • FPT_PHP: 7
    • FPT_PHP.3: 17
    • FPT_PHP.3.1: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 8
    • FPT_TST.1: 15
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_RESIDUAL_DATA: 3
    • A.PROTECTION_AFTER_: 1
    • A.PROTECTION_AFTER_DELIVERY: 2
    • A.ROLLBACK: 1
    • A.TA_DEVELOPMENT: 4
    • A.TA_DEVELOPMENT_TUI: 3
    • A.TA_MANAGEMENT: 5
  • O:
    • O.CAPTURE: 2
    • O.CA_TA_IDENTIFICATION: 11
    • O.DATA_ACCESS: 11
    • O.DEBUG: 12
    • O.FUNCTION_ACCESS: 4
    • O.INITIALISATION: 10
    • O.INITIALIZATION: 1
    • O.INSTANCE_TIME: 11
    • O.KEYS_USAGE: 4
    • O.OPERATION: 8
    • O.PERIPHERAL_INITIALISATION: 3
    • O.PREVENT_RESIDUAL_DATA: 3
    • O.PROTECTED_COMMUNICATION_CHANNEL: 12
    • O.RNG: 12
    • O.ROLLBACK_PROTECTION: 5
    • O.RUNTIME_CONFIDENTIALITY: 10
    • O.RUNTIME_INTEGRITY: 21
    • O.SAFE_RELEASE: 11
    • O.TA_AUTHENTICITY: 7
    • O.TA_ISOLATION: 15
    • O.TA_PERSISTENT_TIME: 12
    • O.TEE_DATA_PROTECTION: 11
    • O.TEE_ID: 11
    • O.TEE_ISOLATION: 14
    • O.TRUSTED_STORAGE: 9
  • OE:
    • OE.DISABLED_DEBUG: 1
    • OE.INTEGRATION_CONFIGURATION: 7
    • OE.NO_RESIDUAL_DATA: 2
    • OE.PROTECTION_AFTER_DELIVERY: 7
    • OE.ROLLBACK: 1
    • OE.SECRETS: 2
    • OE.TA_DEVELOPMENT: 6
    • OE.TA_DEVELOPMENT_TUI: 5
    • OE.TA_MANAGEMENT: 3
  • OP:
    • OP.ACTIVATE: 1
    • OP.AUTHENTICATE: 2
    • OP.DEBUG: 7
    • OP.EXTRACT_KEY: 4
    • OP.LOAD: 3
    • OP.STORE: 4
    • OP.USE_KEY: 4
  • OSP:
    • OSP.INTEGRATION_: 1
    • OSP.INTEGRATION_CONFIGURATION: 2
    • OSP.SECRETS: 3
  • T:
    • T.ABUSE_DEBUG: 3
    • T.ABUSE_FUNCT: 3
    • T.CLONE: 3
    • T.CORRUPT_RUNTIME_: 1
    • T.CORRUPT_RUNTIME_DATA: 2
    • T.CORRUPT_SETUP: 5
    • T.EXTRACT_DATA: 3
    • T.EXTRACT_EXCHANGED_: 1
    • T.EXTRACT_EXCHANGED_DATA: 2
    • T.FLASH_DUMP: 3
    • T.IMPERSONATION: 3
    • T.INJECT_DATA: 3
    • T.INJECT_EXCHANGED_: 1
    • T.INJECT_EXCHANGED_DATA: 2
    • T.MODIFY_DATA: 3
    • T.MODIFY_EXCHANGED_: 1
    • T.MODIFY_EXCHANGED_DATA: 2
    • T.MODIFY_FIRMWARE: 3
    • T.PERIPHERAL_ACCESS: 3
    • T.PERTURBATION: 3
    • T.RAM: 3
    • T.RESIDUAL: 3
    • T.RNG: 3
    • T.ROGUE_CODE_: 1
    • T.ROGUE_CODE_EXECUTION: 2
    • T.ROLLBACK: 3
    • T.SHARED_FUNCTION_: 1
    • T.SHARED_FUNCTION_ACCESS: 2
    • T.SPY: 3
    • T.STORAGE_CORRUPTION: 3
    • T.TA_PERSISTENT_TIME_: 1
    • T.TA_PERSISTENT_TIME_ROLLBACK: 2
    • T.TEE_FIRMWARE_: 1
    • T.TEE_FIRMWARE_DOWNGRADE: 2
  • A:
    • A.CAP_FILE: 3
    • A.DELETION: 3
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
    • A.VERIFICATION: 3
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.APP_KEYS: 1
    • D.CRYPTO: 5
    • D.JCS_CODE: 6
    • D.JCS_DATA: 8
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 15
    • O.APPLET: 28
    • O.ARRAY_VIEWS_CONFID: 7
    • O.ARRAY_VIEWS_INTEG: 3
    • O.CARD-MANAGEMENT: 1
    • O.CARD_MANAGEMENT: 17
    • O.CIPHER: 10
    • O.CODE_CAP_FILE: 23
    • O.CONFID-OS-UPDATE: 3
    • O.DELETION: 4
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 7
    • O.JAVAOBJECT: 68
    • O.KEY-MNGT: 6
    • O.LOAD: 11
    • O.NATIVE: 11
    • O.OBJ-DELETION: 4
    • O.OBJ_DELETION: 4
    • O.OPERATE: 15
    • O.PIN-MNGT: 6
    • O.PIN_MNGT: 4
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 2
    • O.RNG: 10
    • O.SCP: 31
    • O.SECURE_AC_ACTIVATION: 4
    • O.SECURE_LOAD_ACODE: 9
    • O.SID: 13
    • O.TDES: 1
    • O.TOE_IDENTIFICATION: 6
    • O.TRANSACTION: 6
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 10
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 2
    • OE.SCP: 2
    • OE.SECURE_ACODE_MANAGEMENT: 2
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 3
    • OP.ARRAY_T_ASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_CAP_FILE: 4
    • OP.DELETE_CAP_FILE_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.RNG: 3
    • OSP.TOE_IDENTIFICATION: 3
    • OSP.VERIFICATION: 3
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-OS-UPDATE_LOAD: 3
    • T.DELETION: 3
    • T.EXE-CODE: 6
    • T.FAKE-SGNVER-KEY: 3
    • T.INSTALL: 3
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 6
    • T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
    • T.WRONG-UPDATE-STATE: 3
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 140
  • Thales:
    • Thales: 7
  • Gemalto:
    • Gemalto: 8
  • Infineon:
    • Infineon: 18
  • Thales:
    • Thales: 42
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • 3DES:
      • 3DES: 7
    • DES:
      • DES: 7
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 5
      • HMAC-SHA-224: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 29
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 3
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 3
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 5
    • ECDSA:
      • ECDSA: 13
    • EdDSA:
      • EdDSA: 1
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 4
  • ECC:
    • ECC:
      • ECC: 13
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 14
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 1
      • SHA224: 1
      • SHA256: 2
      • SHA384: 1
      • SHA512: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA2: 1
      • SHA224: 1
    • SHA3:
      • SHA3: 2
      • SHA3-384: 1
      • SHA3-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 6
    • Key agreement: 2
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 2
  • PACE:
    • PACE: 158
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RNG: 29
  • TRNG:
    • TRNG: 5
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 2
    • RNG: 36
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • side-channels: 1
  • other:
    • cold boot: 1
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • IBM:
    • SE: 2
  • other:
    • TEE: 594
    • TEEgris: 126
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
    • EF.DG3: 1
    • EF.DG4: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 1
    • FIPS 186-2: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS 81: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 1423: 1
    • RFC 2119: 3
    • RFC 2202: 1
    • RFC 4231: 1
    • RFC 7748: 1
    • RFC 8032: 1
  • BSI:
    • AIS20: 1
    • AIS31: 6
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 5
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 5
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 8
pdf_data/st_keywords/javacard_api_const
  • curves:
    • ED25519: 4
    • X25519: 4
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist: 1
    • out of scope: 1
  • OutOfScope:
    • 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5.0: JCS Security Target ST Ref: 1
    • Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5.0: JCS: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 4
    • the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
pdf_data/st_metadata
  • /Author: rosep
  • /CreationDate: D:20240108141421+01'00'
  • /ModDate: D:20240108141421+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx
  • pdf_file_size_bytes: 1813549
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 98
  • /Author: OHAYON Franck
  • /CreationDate: D:20250916171850+02'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20250916171850+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: MultiApp V5.0: JCS Security Target LITE
  • pdf_file_size_bytes: 3884938
  • pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 141
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different