name |
S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure Libraries including specific IC Dedicated software (Référence : S3FV9RR_20200925)
|
S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure Libraries including specific IC Dedicated software Référence : S3FV9RR_20210407
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2021-03-22
|
2021-07-13
|
not_valid_after |
2026-03-22
|
2026-07-13
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021_09en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021_34en.pdf
|
status |
active
|
active
|
manufacturer |
Samsung Electronics Co., Ltd.
|
Samsung Electronics Co., Ltd.
|
manufacturer_web |
https://www.samsung.com
|
https://www.samsung.com
|
security_level |
ASE_TSS.2, EAL6+ |
ASE_TSS.2, EAL6+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021-09fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021-34fr.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2021_09fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2021_34fr.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
1e6f69e164b69ed2b90cd7c2b31d47e9f69023539d57d9ed7f5e6e2631700935
|
7dc8961e520cc715b48edd291f1b988acf007374e5a59bb8bae37d99dfdf70fb
|
state/cert/txt_hash |
7bf935bd6fc6a237d5d1d9c50355a44e23f52ce256f98a309dc8aee5fc3a5144
|
ac14e795affa4c21fc02eb2a8004f8b6011757df35cc1a4c240fa70a5590f9f5
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
09a58fcbc2e99bf7f59db6ca9deec9eba06860fca2f95101340c5eecdd9b70b7
|
2982541497637caa373e5226337822e7b49c457a391ae129b1bd6b548d6dec10
|
state/report/txt_hash |
e0344b087d4a6342c5eebc61ed89b726b844ba2633716a7d44aa288e963f0925
|
c62ddc16ba08b2cc223174c2f9983b98ea36f3b153774af2ab39681ec1985b27
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
dffde8fc34408eaa9f30074c4cf1001a1f44e7f8842a931494d8d17b06d71b3c
|
d5f3a1738881cf6b7c7f9a13a2ef544015cd8afea3b5b7dbf5baf3b053081a7d
|
state/st/txt_hash |
1af5725cfe0979f52106ff4c872f9af749473be0a8288c23256034a6f8d6bfbc
|
d57fb72ff84c5d49e81f8ca316d764216c47f29dba7a561aa952a6c282460751
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2021/09
|
ANSSI-CC-2021/34
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_CMC.5, ALC_DVS.2, ATE_FUN.2, ATE_DPT.3, ASE_CCL.1, ALC_LCD.1, ALC_CMS.5, ATE_COV.3, AGD_OPE.1, ALC_TAT.3, ADV_INT.3, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ADV_IMP.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_SPD.1, ADV_SPM.1, AVA_VAN.5, ASE_ECD.1, ADV_TDS.5, ASE_TSS.2, ADV_FSP.5 |
ALC_CMC.5, ALC_DVS.2, ATE_FUN.2, ATE_DPT.3, ASE_CCL.1, ALC_LCD.1, ALC_CMS.5, ATE_COV.3, AGD_OPE.1, ALC_TAT.3, ADV_INT.3, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ADV_IMP.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ASE_SPD.1, ADV_SPM.1, AVA_VAN.5, ASE_ECD.1, ADV_TDS.5, ASE_TSS.2, ADV_FSP.5 |
heuristics/extracted_versions |
32 |
32 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2021/34 |
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2020/71 |
ANSSI-CC-2021/09 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2021/34 |
None
|
heuristics/scheme_data |
- product:
S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure Libraries including specific IC Dedicated software (Référence : S3FV9RR_20200925)
- url:
https://cyber.gouv.fr/produits-certifies/s3fv9rrs3fv9rqs3fv9rps3fv9rk-32-bit-risc-microcontroller-smart-card-optional-1
- description:
Le produit évalué est « S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure Libraries including specific IC Dedicated software, Référence : S3FV9RR_20200925 » développé par SAMSUNG ELECTRONICS CO LTD.
Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré
- sponsor:
SAMSUNG ELECTRONICS CO LTD
- developer:
SAMSUNG ELECTRONICS CO LTD
- cert_id:
2021/09
- level: EAL6+
- expiration_date:
22 Mars 2026
- enhanced:
- cert_id:
2021/09
- certification_date:
22/03/2021
- expiration_date:
22/03/2026
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r5
- developer:
SAMSUNG ELECTRONICS CO LTD
- sponsor:
SAMSUNG ELECTRONICS CO LTD
- evaluation_facility:
CEA - LETI
- level:
EAL6+
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages, version 1.0
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ASE_TSS.2
- report_link:
https://cyber.gouv.fr/sites/default/files/2021/03/anssi-cc-2021-09fr.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2021/03/anssi-cible-2021_09en.pdf
|
- product:
S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK
- url:
https://cyber.gouv.fr/produits-certifies/s3fv9rrs3fv9rqs3fv9rps3fv9rk
- description:
Le produit évalué est la famille de microcontrôleurs « S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK, S3FV9RR_20230407 » développés par SAMSUNG ELECTRONICS CO. LTD. La seule différence entre eux est la taille logique de mémoire flash.
Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique po
- sponsor:
SAMSUNG ELECTRONICS CO. LTD
- developer:
SAMSUNG ELECTRONICS CO. LTD
- cert_id:
ANSSI-CC-2023/32
- expiration_date:
3 Juillet 2028
- enhanced:
- cert_id:
ANSSI-CC-2023/32
- certification_date:
04/07/2023
- expiration_date:
03/07/2028
- category:
- cc_version:
- developer:
SAMSUNG ELECTRONICS CO. LTD
- sponsor:
SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility:
CEA - LETI
- level:
- protection_profile:
- mutual_recognition:
- augmented:
ASE_TSS.2
- cert_link:
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_32fr_0.pdf
|
heuristics/scheme_data/cert_id |
2021/09
|
ANSSI-CC-2023/32
|
heuristics/scheme_data/description |
Le produit évalué est « S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure Libraries including specific IC Dedicated software, Référence : S3FV9RR_20200925 » développé par SAMSUNG ELECTRONICS CO LTD.
Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré
|
Le produit évalué est la famille de microcontrôleurs « S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK, S3FV9RR_20230407 » développés par SAMSUNG ELECTRONICS CO. LTD. La seule différence entre eux est la taille logique de mémoire flash.
Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique po
|
heuristics/scheme_data/developer |
SAMSUNG ELECTRONICS CO LTD
|
SAMSUNG ELECTRONICS CO. LTD
|
heuristics/scheme_data/enhanced |
- cert_id:
2021/09
- certification_date:
22/03/2021
- expiration_date:
22/03/2026
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r5
- developer:
SAMSUNG ELECTRONICS CO LTD
- sponsor:
SAMSUNG ELECTRONICS CO LTD
- evaluation_facility:
CEA - LETI
- level:
EAL6+
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages, version 1.0
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ASE_TSS.2
- report_link: https://cyber.gouv.fr/sites/default/files/2021/03/anssi-cc-2021-09fr.pdf
- target_link: https://cyber.gouv.fr/sites/default/files/2021/03/anssi-cible-2021_09en.pdf
|
- cert_id:
ANSSI-CC-2023/32
- certification_date:
04/07/2023
- expiration_date:
03/07/2028
- category:
- cc_version:
- developer:
SAMSUNG ELECTRONICS CO. LTD
- sponsor:
SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility:
CEA - LETI
- level:
- protection_profile:
- mutual_recognition:
- augmented:
ASE_TSS.2
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_32fr_0.pdf
|
heuristics/scheme_data/enhanced/augmented |
ASE_TSS.2
|
ASE_TSS.2
|
heuristics/scheme_data/enhanced/category |
Micro-circuits
|
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
|
heuristics/scheme_data/enhanced/cert_id |
2021/09
|
ANSSI-CC-2023/32
|
heuristics/scheme_data/enhanced/certification_date |
22/03/2021
|
04/07/2023
|
heuristics/scheme_data/enhanced/developer |
SAMSUNG ELECTRONICS CO LTD
|
SAMSUNG ELECTRONICS CO. LTD
|
heuristics/scheme_data/enhanced/evaluation_facility |
CEA - LETI
|
CEA - LETI
|
heuristics/scheme_data/enhanced/expiration_date |
22/03/2026
|
03/07/2028
|
heuristics/scheme_data/enhanced/level |
EAL6+
|
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
|
heuristics/scheme_data/enhanced/protection_profile |
Security IC Platform Protection Profile with Augmentation Packages, version 1.0
|
|
heuristics/scheme_data/enhanced/sponsor |
SAMSUNG ELECTRONICS CO LTD
|
SAMSUNG ELECTRONICS CO. LTD
|
heuristics/scheme_data/expiration_date |
22 Mars 2026
|
3 Juillet 2028
|
heuristics/scheme_data/product |
S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure Libraries including specific IC Dedicated software (Référence : S3FV9RR_20200925)
|
S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK
|
heuristics/scheme_data/sponsor |
SAMSUNG ELECTRONICS CO LTD
|
SAMSUNG ELECTRONICS CO. LTD
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/s3fv9rrs3fv9rqs3fv9rps3fv9rk-32-bit-risc-microcontroller-smart-card-optional-1
|
https://cyber.gouv.fr/produits-certifies/s3fv9rrs3fv9rqs3fv9rps3fv9rk
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat_2021_09fr.pdf
|
certificat_2021_34fr.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 |
1
|
1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/eval_facility/CEA-LETI/CEA - LETI |
1
|
2
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata//Author |
|
|
pdf_data/cert_metadata//CreationDate |
D:20210324154050+01'00'
|
D:20210721175237+02'00'
|
pdf_data/cert_metadata//Creator |
PScript5.dll Version 5.2.2
|
PScript5.dll Version 5.2.2
|
pdf_data/cert_metadata//ModDate |
D:20210324154050+01'00'
|
D:20210721175237+02'00'
|
pdf_data/cert_metadata//Producer |
Acrobat Distiller 11.0 (Windows)
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/cert_metadata//Title |
|
|
pdf_data/cert_metadata/pdf_file_size_bytes |
293750
|
293698
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
2
|
pdf_data/report_filename |
anssi-cc-2021-09fr.pdf
|
anssi-cc-2021-34fr.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-S-0106-2018:
1
- FR:
- ANSSI-CC-2021/09:
2
- ANSSI-CC-2020/71:
2
|
- FR:
- ANSSI-CC-2021/34:
2
- ANSSI-CC-2021/09:
2
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2021/09:
2
- ANSSI-CC-2020/71: 2
|
- ANSSI-CC-2021/34: 2
- ANSSI-CC-2021/09:
2
|
pdf_data/report_keywords/cc_cert_id/FR/ANSSI-CC-2021/09 |
2
|
2
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-2014:
1
- BSI-PP-0084-2014:
1
|
- BSI:
- BSI-CC-PP-0084-2014:
1
- BSI-PP-0084-2014:
1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_TSS.2:
2
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_TSS.2:
2
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 6:
2
- EAL2:
2
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 |
2
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/CEA-LETI/CEA - LETI |
1
|
1
|
pdf_data/report_keywords/eval_facility/CEA-LETI/CEA-LETI |
2
|
1
|
pdf_data/report_keywords/eval_facility/CESTI |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness/TRNG/DTRNG |
14
|
18
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 |
2
|
1
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004: 1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-001 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-002 |
1
|
1
|
pdf_data/report_keywords/standard_id/CC/CCMB-2017-04-003 |
1
|
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
|
|
pdf_data/report_metadata//CreationDate |
D:20210324153858+01'00'
|
D:20210721175115+02'00'
|
pdf_data/report_metadata//Creator |
PScript5.dll Version 5.2.2
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
D:20210324153858+01'00'
|
D:20210721175115+02'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 11.0 (Windows)
|
Acrobat Distiller 11.0 (Windows)
|
pdf_data/report_metadata//Title |
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
280473
|
275608
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
17
|
16
|
pdf_data/st_filename |
anssi-cible-2021_09en.pdf
|
anssi-cible-2021_34en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.RSA:
8
- O.ECC:
2
- O.RND:
6
- O.ECDSA:
5
- O.ECDH:
6
- O.TDES:
7
- O.AES:
5
- O.SHA:
5
- O.MEM_ACCESS:
1
- T:
|
- O:
- O.RSA:
8
- O.ECC:
2
- O.RND:
6
- O.ECDSA:
5
- O.ECDH:
6
- O.TDES:
7
- O.AES:
5
- O.SHA:
5
- O.MEM_ACCESS:
1
- T:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084:
2
- BSI-PP-0084:
1
- BSI-CC-PP-0084-:
1
|
- BSI:
- BSI-CC-PP-0084:
2
- BSI-PP-0084:
1
- BSI-CC-PP-0084-:
1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
2
- ADV_IMP:
1
- ADV_ARC.1:
5
- ADV_FSP.5:
3
- ADV_IMP.2:
1
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_SPM.1:
2
- ADV_FSP.4:
1
- AGD:
- AGD_OPE:
1
- AGD_PRE:
1
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_DVS.2:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_CMS:
2
- ALC_CMC:
1
- ALC_CMC.5:
1
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_CMS.4:
1
- ATE:
- ATE_COV:
1
- ATE_COV.3:
1
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- AVA:
- APE:
- ASE:
- ASE_TSS.2:
11
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
2
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_REQ.1:
1
|
- ADV:
- ADV_ARC:
1
- ADV_FSP:
2
- ADV_IMP:
1
- ADV_ARC.1:
5
- ADV_FSP.5:
3
- ADV_IMP.2:
1
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_SPM.1:
2
- ADV_FSP.4:
1
- AGD:
- AGD_OPE:
1
- AGD_PRE:
1
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_DVS.2:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_CMS:
2
- ALC_CMC:
1
- ALC_CMC.5:
1
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_CMS.4:
1
- ATE:
- ATE_COV:
1
- ATE_COV.3:
1
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- AVA:
- APE:
- ASE:
- ASE_TSS.2:
11
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
2
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_REQ.1:
1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL6+:
1
- EAL6:
5
- EAL 4:
1
- EAL 6:
2
- EAL6 augmented:
1
- EAL 4 augmented:
1
- EAL 6 augmented:
2
|
- EAL:
- EAL6+:
1
- EAL6:
5
- EAL 4:
1
- EAL 6:
2
- EAL6 augmented:
1
- EAL 4 augmented:
1
- EAL 6 augmented:
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS:
8
- FAU_GEN:
2
- FAU_SAS.1:
12
- FAU_SAS.1.1:
2
- FAU_GEN.1:
1
- FCS:
- FCS_RNG:
17
- FCS_RNG.1:
14
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
28
- FCS_COP:
76
- FCS_CKM.1:
36
- FCS_CKM.4:
26
- FCS_CKM:
18
- FCS_CKM.2:
7
- FDP:
- FDP_ACF.1:
18
- FDP_SDC:
4
- FDP_ACC:
11
- FDP_ACF:
15
- FDP_SDC.1:
14
- FDP_SDI:
1
- FDP_SDC.1.1:
2
- FDP_SDI.2:
8
- FDP_SDI.1:
2
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITT.1:
18
- FDP_ITT.1.1:
1
- FDP_ACC.1:
20
- FDP_IFC.1:
23
- FDP_IFC.1.1:
1
- FDP_IFF.1:
3
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
18
- FDP_ITC.2:
18
- FDP_UCT.1:
9
- FDP_UCT.1.1:
1
- FDP_UIT.1:
9
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_IFC:
1
- FDP_ITT:
1
- FIA:
- FIA_API:
6
- FIA_API.1:
12
- FIA_API.1.1:
2
- FMT:
- FMT_LIM:
22
- FMT_LIM.1:
28
- FMT_LIM.2:
32
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
2
- FMT_MSA.3:
16
- FMT_MSA.1:
12
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMR.1:
6
- FMT_MSA.1.1:
1
- FMT_SMF.1:
9
- FMT_SMF.1.1:
1
- FMT_CKM.4:
1
- FMT_MSA:
2
- FMT_SMF:
1
- FPT:
- FPT_FLS.1:
22
- FPT_FLS.1.1:
1
- FPT_PHP.3:
20
- FPT_PHP.3.1:
1
- FPT_PHP:
3
- FPT_ITT.1:
16
- FPT_ITT.1.1:
1
- FPT_FLS:
1
- FPT_ITT:
1
- FRU:
- FRU_FLT.2:
17
- FRU_FLT.1:
1
- FRU_FLT.2.1:
1
- FRU_FLT:
1
- FTP:
- FTP_ITC.1:
13
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
4
|
- FAU:
- FAU_SAS:
8
- FAU_GEN:
2
- FAU_SAS.1:
12
- FAU_SAS.1.1:
2
- FAU_GEN.1:
1
- FCS:
- FCS_RNG:
17
- FCS_RNG.1:
14
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
28
- FCS_COP:
76
- FCS_CKM.1:
36
- FCS_CKM.4:
26
- FCS_CKM:
18
- FCS_CKM.2:
7
- FDP:
- FDP_ACF.1:
18
- FDP_SDC:
4
- FDP_ACC:
11
- FDP_ACF:
15
- FDP_SDC.1:
14
- FDP_SDI:
1
- FDP_SDC.1.1:
2
- FDP_SDI.2:
8
- FDP_SDI.1:
2
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITT.1:
18
- FDP_ITT.1.1:
1
- FDP_ACC.1:
20
- FDP_IFC.1:
23
- FDP_IFC.1.1:
1
- FDP_IFF.1:
3
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
18
- FDP_ITC.2:
18
- FDP_UCT.1:
9
- FDP_UCT.1.1:
1
- FDP_UIT.1:
9
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_IFC:
1
- FDP_ITT:
1
- FIA:
- FIA_API:
6
- FIA_API.1:
12
- FIA_API.1.1:
2
- FMT:
- FMT_LIM:
22
- FMT_LIM.1:
28
- FMT_LIM.2:
32
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
2
- FMT_MSA.3:
16
- FMT_MSA.1:
12
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_SMR.1:
6
- FMT_MSA.1.1:
1
- FMT_SMF.1:
9
- FMT_SMF.1.1:
1
- FMT_CKM.4:
1
- FMT_MSA:
2
- FMT_SMF:
1
- FPT:
- FPT_FLS.1:
22
- FPT_FLS.1.1:
1
- FPT_PHP.3:
20
- FPT_PHP.3.1:
1
- FPT_PHP:
3
- FPT_ITT.1:
16
- FPT_ITT.1.1:
1
- FPT_FLS:
1
- FPT_ITT:
1
- FRU:
- FRU_FLT.2:
17
- FRU_FLT.1:
1
- FRU_FLT.2.1:
1
- FRU_FLT:
1
- FTP:
- FTP_ITC.1:
13
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
4
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-192:
8
- P-224:
8
- P-256:
8
- P-384:
8
- secp192k1:
4
- secp192r1:
4
- secp224k1:
4
- secp224r1:
4
- secp256k1:
4
- secp256r1:
4
- secp384r1:
4
- Brainpool:
- brainpoolP192r1:
4
- brainpoolP192t1:
4
- brainpoolP224r1:
4
- brainpoolP224t1:
4
- brainpoolP256r1:
4
- brainpoolP256t1:
4
- brainpoolP320r1:
4
- brainpoolP320t1:
4
- brainpoolP384r1:
4
- brainpoolP384t1:
4
- brainpoolP512r1:
4
- brainpoolP512t1:
4
- Curve:
- Edwards:
|
- NIST:
- P-192:
8
- P-224:
8
- P-256:
8
- P-384:
8
- secp192k1:
4
- secp192r1:
4
- secp224k1:
4
- secp224r1:
4
- secp256k1:
4
- secp256r1:
4
- secp384r1:
4
- Brainpool:
- brainpoolP192r1:
4
- brainpoolP192t1:
4
- brainpoolP224r1:
4
- brainpoolP224t1:
4
- brainpoolP256r1:
4
- brainpoolP256t1:
4
- brainpoolP320r1:
4
- brainpoolP320t1:
4
- brainpoolP384r1:
4
- brainpoolP384t1:
4
- brainpoolP512r1:
4
- brainpoolP512t1:
4
- Curve:
- Edwards:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA224:
5
- SHA256:
5
- SHA384:
5
- SHA512:
4
- SHA-512:
4
- SHA-224:
2
- SHA-256:
2
- SHA-384:
2
|
- SHA:
- SHA1:
- SHA2:
- SHA224:
5
- SHA256:
5
- SHA384:
5
- SHA512:
4
- SHA-512:
4
- SHA-224:
2
- SHA-256:
2
- SHA-384:
2
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/TRNG/DTRNG |
31
|
35
|
pdf_data/st_keywords/randomness/TRNG/TRNG |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
23
- Physical Probing:
4
- physical probing:
9
- Physical probing:
2
- side-channel:
4
- side channel:
2
- DPA:
8
- SPA:
7
- timing attacks:
1
- timing attack:
2
- FI:
- physical tampering:
3
- Malfunction:
26
- malfunction:
11
- DFA:
4
- other:
|
- SCA:
- Leak-Inherent:
23
- Physical Probing:
4
- physical probing:
9
- Physical probing:
2
- side-channel:
4
- side channel:
2
- DPA:
8
- SPA:
7
- timing attacks:
1
- timing attack:
2
- FI:
- physical tampering:
3
- Malfunction:
26
- malfunction:
11
- DFA:
4
- other:
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS197:
1
- FIPS PUB 180-3:
5
- FIPS 197:
1
- BSI:
- RFC:
- RFC7748:
2
- RFC8032:
4
- RFC 7748:
1
- RFC 8032:
1
- CC:
- CCMB-2017-04-001:
3
- CCMB-2017-04-002:
3
- CCMB-2017-04-003:
3
- CCMB-2017-04-004:
3
|
- FIPS:
- FIPS197:
1
- FIPS PUB 180-3:
5
- FIPS 197:
1
- BSI:
- RFC:
- RFC7748:
2
- RFC8032:
4
- RFC 7748:
1
- RFC 8032:
1
- CC:
- CCMB-2017-04-001:
3
- CCMB-2017-04-002:
3
- CCMB-2017-04-003:
3
- CCMB-2017-04-004:
3
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- DES:
- 3DES:
- Triple-DES:
6
- TDES:
13
- TDEA:
1
- constructions:
|
- AES_competition:
- DES:
- DES:
- 3DES:
- Triple-DES:
6
- TDES:
13
- TDEA:
1
- constructions:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Windows 사용자
|
Windows 사용자
|
pdf_data/st_metadata//CreationDate |
D:20201204075416+09'00'
|
D:20210318163713+09'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//ModDate |
D:20201204075416+09'00'
|
D:20210318163713+09'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Title |
ST_Klallam7_Ver1.1
|
ST_Klallam7_Ver1.1
|
pdf_data/st_metadata/pdf_file_size_bytes |
1546128
|
1539940
|
pdf_data/st_metadata/pdf_hyperlinks |
https://tools.ietf.org/html/rfc7748, https://tools.ietf.org/html/rfc8032, mailto:[email protected] |
https://tools.ietf.org/html/rfc7748, https://tools.ietf.org/html/rfc8032, mailto:[email protected] |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
115
|
115
|
dgst |
1a32a59ae72b4fae
|
3d669e42f7b4a5ad
|