name |
ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)(ANSSI-CC-2020/24-R01) |
ST31G480 B01 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
archived |
not_valid_after |
27.02.2029 |
27.09.2024 |
not_valid_before |
27.02.2024 |
24.08.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_24-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2017_52-S02.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_24-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_52fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_24-R01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_52en.pdf |
manufacturer |
STMicroelectronics |
STMicroelectronics |
manufacturer_web |
https://www.st.com/ |
https://www.st.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
ALC_TAT.3, AVA_VAN.5, ADV_TDS.5, EAL5+, ADV_IMP.2, ALC_CMC.5, ALC_FLR.1, ALC_DVS.2, ATE_FUN.2, ASE_TSS.2, ADV_INT.3 |
dgst |
1d67bb03765a278a |
1dcc5fb51359ef5d |
heuristics/cert_id |
ANSSI-CC-2020/24-R01 |
ANSSI-CC-2017/52 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ADV_IMP.2, ADV_ARC.1, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, ASE_TSS.2, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ASE_ECD.1, ADV_INT.3, ASE_INT.1, AGD_PRE.1, ADV_TDS.5, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2 |
heuristics/extracted_versions |
24, 2020 |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2020/24-R01
- description: Le produit évalué est « ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM, C04 » développé par STMICROELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont
- developer: STMICROELECTRONICS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Micro-circuits
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2020/24-R01
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_24-R01fr.pdf
- certification_date: 2024-02-27
- developer: STMICROELECTRONICS
- evaluation_facility: THALES / CNES
- expiration_date: 2029-02-27
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Security IC Platform Protection Profile, version 1.0 certifié BSI-CC-PP-0035-2007 le 23 août 2007
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_24-R01fr.pdf
- sponsor: STMICROELECTRONICS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_24-R01en.pdf
- expiration_date: 2029-02-27
- level: EAL5+
- product: ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)
- sponsor: STMICROELECTRONICS
- url: https://cyber.gouv.fr/produits-certifies/st33g1m2a1-including-optional-cryptographic-library-neslib-and-optional-library
|
- cert_id: ANSSI-CC-2017/52
- description: Le produit certifié est le microcontrôleur « ST31G480 B01, including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X » développé par STMICROELECTRONICS. Comme décrit dans la cible de sécurité [ST] au paragraphe « TOE overview », ce produit se décline en différentes configurations selon la taille de mémoire non-volatile FLASH, l’activation des
- developer: STMicroelectronics
- enhanced:
- augmented: ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ACL_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2
- category: Micro-circuits
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2017/52
- cert_link: https://cyber.gouv.fr/sites/default/files/2017/08/certificat-anssi-cc-2017_52-s02.pdf
- certification_date: 2017-08-24
- developer: STMicroelectronics
- evaluation_facility: Serma Safety & Security
- level: EAL5+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-CC-PP-0084-2014
- report_link: https://cyber.gouv.fr/sites/default/files/2017/08/anssi-cc-2017_52fr.pdf
- sponsor: STMicroelectronics
- target_link: https://cyber.gouv.fr/sites/default/files/2017/08/anssi-cible-cc-2017_52-m01en.pdf
- level: EAL5+
- product: ST31G480 B01 including optional cryptographic library NESLIB,and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
- sponsor: STMicroelectronics
- url: https://cyber.gouv.fr/produits-certifies/st31g480-b01-including-optional-cryptographic-library-nesliband-optional
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2020_24-R01fr.pdf |
certificat ANSSI-CC-2017_52-S02.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 1
- ALC_TAT.3: 1
- ASE:
- ATE:
- ATE_COV.3: 1
- ATE_FUN.2: 1
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: DUCLOS Charlene
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20240229102447+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20240229102448+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20240229092422
- /Title: ANSSI-CC-2020/24-R01
- pdf_file_size_bytes: 144907
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: jchuzel
- /CreationDate: D:20210318180158+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210318180158+01'00'
- /Producer: GPL Ghostscript 9.50
- /Title: Microsoft Word - certificat ANSSI-CC-2017_52-S02.docx
- pdf_file_size_bytes: 1913718
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2020_24-R01fr.pdf |
anssi-cc-2017_52fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ACL_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/52
- cert_item: ST31G480
- cert_item_version: B01
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité à “Package Authentication of the security IC” “Package Loader dedicated for usage in Secured Environment only” “Package Loader dedicated for usage by authorized users only
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0035-2007: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_INT: 1
- ADV_INT.3: 2
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.5: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 2
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.1: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ALC_TAT.3: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 2
- ATE:
- ATE_COV: 1
- ATE_COV.3: 2
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.2: 2
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib 4.2: 2
- NesLib 4.2.10: 2
- NesLib 5.2: 2
- NesLib 5.2.0: 2
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20170825170053+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.025
- /ModDate: D:20170825181544+02'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 516867
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
ANSSI-cible-CC-2020_24-R01en.pdf |
anssi-cible-cc-2017_52en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 11
- BSI-CC-PP-0084-: 3
- BSI-CC-PP-0084-2014: 77
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 17
|
- EAL:
- EAL4: 1
- EAL5: 15
- EAL5 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 2
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.2: 4
- ADV_INT.3: 4
- ADV_SPM: 1
- ADV_TDS.5: 4
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 4
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 6
- ALC_LCD.1: 1
- ALC_TAT.3: 4
- ASE:
- ASE_CCL: 4
- ASE_CCL.1: 1
- ASE_ECD: 3
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 26
- ASE_OBJ.2: 1
- ASE_REQ: 60
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 13
- ASE_SPD.1: 1
- ASE_TSS: 15
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 3
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 4
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.4: 4
- FCS_COP.1: 37
- FCS_RNG: 1
- FCS_RNG.1: 7
- FDP:
- FDP_ACC.1: 27
- FDP_ACC.2: 13
- FDP_ACF.1: 38
- FDP_CKM.2: 1
- FDP_IFC.1: 16
- FDP_ITC.1: 14
- FDP_ITC.2: 2
- FDP_ITT.1: 11
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 1
- FMT_LIM.1: 20
- FMT_LIM.2: 19
- FMT_MSA.1: 28
- FMT_MSA.2: 1
- FMT_MSA.3: 38
- FMT_SMF.1: 18
- FMT_SMR.1: 10
- FPT:
- FPT_FLS.1: 12
- FPT_ITT.1: 10
- FPT_PHP.3: 12
- FRU:
|
- FAU:
- FAU_GEN.1: 8
- FAU_SAR.1: 25
- FAU_SAS: 2
- FAU_SAS.1: 28
- FCS:
- FCS_CKM.1: 22
- FCS_CKM.4: 22
- FCS_COP.1: 52
- FCS_RNG: 2
- FCS_RNG.1: 8
- FDP:
- FDP_ACC.1: 68
- FDP_ACC.2: 12
- FDP_ACF: 1
- FDP_ACF.1: 67
- FDP_CKM.2: 1
- FDP_IFC.1: 22
- FDP_ITC.1: 5
- FDP_ITC.2: 24
- FDP_ITT.1: 10
- FDP_RIP.1: 18
- FDP_ROL.1: 9
- FDP_SDC: 2
- FDP_SDC.1: 8
- FDP_SDI.2: 14
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FDP_UCT.1: 16
- FDP_UIT.1: 16
- FIA:
- FIA_API: 2
- FIA_API.1: 6
- FIA_UAU.1: 14
- FIA_UAU.2: 18
- FIA_UAU.5: 19
- FIA_UID.1: 20
- FIA_UID.2: 22
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 29
- FMT_LIM.2: 30
- FMT_MSA.1: 50
- FMT_MSA.3: 63
- FMT_MTD.1: 18
- FMT_SMF.1: 43
- FMT_SMR.1: 45
- FPR:
- FPT:
- FPT_FLS.1: 28
- FPT_ITT.1: 9
- FPT_PHP.3: 11
- FPT_RPL.1: 22
- FPT_TDC.1: 20
- FPT_TRP.1: 17
- FRU:
- FRU_FLT.2: 13
- FRU_RSA.2: 18
- FTP:
- FTP_ITC.1: 29
- FTP_TRP.1: 13
- FTP_TRP.1.3: 5
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.C: 2
- O.MAC-: 1
- O.RND: 4
- O.TOE-: 1
- R:
- T:
|
pdf_data/st_keywords/vendor |
- Infineon:
- Philips:
- STMicroelectronics:
|
- Infineon:
- NXP:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 17
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 4
- HMAC: 4
|
- AES_competition:
- AES:
- AES: 46
- AES-: 1
- AES-128: 1
- AES-192: 1
- DES:
- 3DES:
- TDEA: 1
- TDES: 11
- Triple-DES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- Keccak:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-224: 5
- SHA-256: 8
- SHA-384: 7
- SHA-512: 5
- SHA3:
- SHA-3: 6
- SHA3-224: 4
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
- SHAKE:
|
- Keccak:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 5
- SHA-256: 8
- SHA-384: 5
- SHA-512: 5
- SHA3:
- SHA-3: 1
- SHA3-224: 4
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
- SHAKE:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
- Neslib:
- NesLib : 9
- NesLib 281: 1
- NesLib 282: 1
- NesLib 285: 1
- NesLib 289: 1
- NesLib 293: 1
- NesLib 295: 1
- NesLib 296: 1
- NesLib 298: 1
- NesLib 299: 1
- NesLib 6.3: 2
- NesLib 6.3.4: 3
|
- Neslib:
- NesLib 4.2: 2
- NesLib 4.2.10: 2
- NesLib 5.2: 21
- NesLib 5.2.0: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 12
- Physical Probing: 4
- Side channel: 1
- physical probing: 3
- side channel: 9
|
- FI:
- Malfunction: 13
- malfunction: 6
- physical tampering: 1
- SCA:
- Leak-Inherent: 14
- Physical Probing: 4
- physical probing: 3
- side channel: 10
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 19
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 186-4: 4
- FIPS PUB 140-2: 5
- FIPS PUB 180-2: 5
- FIPS PUB 197: 4
- FIPS PUB 198-1: 2
- FIPS PUB 202: 6
- ISO:
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 3
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 3
- NIST SP 800-67: 3
- NIST SP 800-90: 4
- SP 800-38A: 2
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-67: 1
- SP 800-90A: 1
- PKCS:
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 67
- CCMB-2012-09-003: 2
- FIPS:
- FIPS PUB 140-2: 5
- FIPS PUB 180-2: 5
- FIPS PUB 186-4: 4
- FIPS PUB 197: 4
- FIPS PUB 198-1: 3
- FIPS PUB 202: 6
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14888: 2
- ISO/IEC 18092: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38B: 1
- NIST SP 800-56A: 3
- NIST SP 800-67: 3
- NIST SP 800-90: 4
- SP 800-38A: 2
- SP 800-67: 1
- SP 800-90A: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 35 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and SFM when they are embedded. 36 The user guidance documentation: 1
- ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and SFM when they are embedded: 1
- out of scope: 1
|
- OutOfScope:
- ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib, MIFARE DESFire EV1, and MIFARE Plus X when they are embedded: 1
- The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib, MIFARE DESFire EV1, and MIFARE Plus X when they are embedded: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20170622172449Z
- /Creator: FrameMaker 11.0
- /ModDate: D:20170825181529+02'00'
- /Producer: Acrobat Elements 10.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 1360284
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 141
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |