This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)(ANSSI-CC-2020/24-R01) ANSSI-CC-2020/24-R01 |
S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software (S3FT9MH_20230713) (ANSSI-CC-2023/20-R01) ANSSI-CC-2023/20-R01 |
|
---|---|---|
name | ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)(ANSSI-CC-2020/24-R01) | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software (S3FT9MH_20230713) (ANSSI-CC-2023/20-R01) |
not_valid_before | 2024-02-27 | 2024-06-12 |
not_valid_after | 2029-02-27 | 2029-06-12 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_24-R01en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_20-R01en.pdf |
manufacturer | STMicroelectronics | Samsung Electronics Co., Ltd. |
manufacturer_web | https://www.st.com/ | https://www.samsung.com |
security_level | EAL5+, AVA_VAN.5, ALC_DVS.2 | ASE_TSS.2, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_24-R01fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_20-R01fr.pdf |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_24-R01fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_20-R01fr.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
state/cert/pdf_hash | d53b57b6ecd834ae8a48e4f39787a4e7d365adfbde218479769781448701f81f | f088070253af639d08e203fd750518d50ba76bc6a262fc0d28528f9376aaff5f |
state/cert/txt_hash | 0b12f39d36ab687c09442f0ff94e75c2a5bcc1910726d0be487f2e4182f9c7a8 | 15d94e553323861d549c9ee1aa9b67efa05c2c9018bb389de3149a80b742211f |
state/report/pdf_hash | 93d29b5d9ac035973a23619aa43da37245059ac3aaffa65c9f4b152c313b8c30 | 4590433e8983cc283ddad35310aba0ab2dbee6a9a24e57dbd84c69a9c8bf06a5 |
state/report/txt_hash | 1f43b7212c3d21cd61bafa1abea9cdbab062fcc74d1e3c07b959cb2ef1f984ab | d5854ded5f274f6b55359db24e979af731a3f0ef61871be4974aed2cf2d84bbb |
state/st/pdf_hash | 1a9de67b35453dc38ac24e8160c094b6c488c1a91ee77e1f8006ca882cd95455 | 05ccbc2fecabd9ff2a684538440a1fa4aa3df1c14887df912bee9b2f5ebde7da |
state/st/txt_hash | 3802b1e10b8f1fe6e298220cbb09460df14bdcc10177a0a95b8c52212815ad8f | 71de58f32789c27859cab420976c9f642aa66ba7f127cb84fcad7d05ffc2c8dc |
heuristics/cert_id | ANSSI-CC-2020/24-R01 | ANSSI-CC-2023/20-R01 |
heuristics/extracted_versions | 2020, 24 | 2023, 16, 20 |
heuristics/scheme_data/cert_id | ANSSI-CC-2020/24-R01 | ANSSI-CC-2023/20-R01 |
heuristics/scheme_data/description | Le produit évalué est « ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM, C04 » développé par STMICROELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont | Le produit évalué est « S3FT9MH/S3FT9MV/S3FT9MG, référence S3FT9MH_20230713 » développé par SAMSUNG ELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité séc |
heuristics/scheme_data/developer | STMICROELECTRONICS | SAMSUNG ELECTRONICS |
heuristics/scheme_data/enhanced/augmented | ALC_DVS.2, AVA_VAN.5 | ASE_TSS.2 |
heuristics/scheme_data/enhanced/category | Micro-circuits | Cartes à puce |
heuristics/scheme_data/enhanced/cert_id | ANSSI-CC-2020/24-R01 | ANSSI-CC-2023/20-R01 |
heuristics/scheme_data/enhanced/cert_link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_24-R01fr.pdf | https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_20-R01fr.pdf |
heuristics/scheme_data/enhanced/certification_date | 27/02/2024 | 12/06/2024 |
heuristics/scheme_data/enhanced/developer | STMICROELECTRONICS | SAMSUNG ELECTRONICS |
heuristics/scheme_data/enhanced/evaluation_facility | THALES / CNES | CEA - LETI |
heuristics/scheme_data/enhanced/expiration_date | 27/02/2029 | 12/06/2029 |
heuristics/scheme_data/enhanced/level | EAL5+ | EAL6+ |
heuristics/scheme_data/enhanced/protection_profile | Security IC Platform Protection Profile, version 1.0 certifié BSI-CC-PP-0035-2007 le 23 août 2007 | Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the security IC”, “TDES”, “AES”, “Hash Functions” “Loader dedicated for usage in secured environment only” “Loader dedicated for usage by authorized users only” |
heuristics/scheme_data/enhanced/report_link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_24-R01fr.pdf | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_20-R01fr.pdf |
heuristics/scheme_data/enhanced/sponsor | STMICROELECTRONICS | SAMSUNG ELECTRONICS |
heuristics/scheme_data/enhanced/target_link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_24-R01en.pdf | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_20-R01en.pdf |
heuristics/scheme_data/expiration_date | 27 Février 2029 | 12 Juin 2029 |
heuristics/scheme_data/level | EAL5+ | EAL6+ |
heuristics/scheme_data/product | ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04) | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software (S3FT9MH_20230713) |
heuristics/scheme_data/sponsor | STMICROELECTRONICS | SAMSUNG ELECTRONICS |
heuristics/scheme_data/url | https://cyber.gouv.fr/produits-certifies/st33g1m2a1-including-optional-cryptographic-library-neslib-and-optional-library | https://cyber.gouv.fr/produits-certifies/s3ft9mhs3ft9mvs3ft9mg-16-bit-risc-microcontroller-smart-card-optional-ce1-2 |
pdf_data/cert_filename | Certificat-CC-2020_24-R01fr.pdf | certificat-CC-2023_20-R01fr.pdf |
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/eval_facility | |
|
pdf_data/cert_metadata |
|
|
pdf_data/cert_metadata//CreationDate | D:20240229102447+01'00' | D:20240704101548+02'00' |
pdf_data/cert_metadata//Keywords | version x.x, révision x | |
pdf_data/cert_metadata//ModDate | D:20240229102448+01'00' | D:20240704101955+02'00' |
pdf_data/cert_metadata/pdf_file_size_bytes | 144907 | 170284 |
pdf_data/report_filename | ANSSI-CC-2020_24-R01fr.pdf | ANSSI-CC-2023_20-R01fr.pdf |
pdf_data/report_keywords/cc_cert_id/FR |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/eval_facility/CESTI/CESTI | 1 | 3 |
pdf_data/report_keywords/randomness | |
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/vendor | |
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//CreationDate | D:20240313091847+01'00' | D:20240704101716+02'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2019 | Acrobat PDFMaker 23 pour Word |
pdf_data/report_metadata//Keywords | [ANSSI Crypto] | |
pdf_data/report_metadata//ModDate | D:20240313093451+01'00' | D:20240704101955+02'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2019 | Adobe PDF Library 23.1.175 |
pdf_data/report_metadata/pdf_file_size_bytes | 303755 | 351101 |
pdf_data/st_filename | ANSSI-cible-CC-2020_24-R01en.pdf | ANSSI-cible-CC-2023_20-R01en.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 5 | 33 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 3 | 10 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 4 | 15 |
pdf_data/st_keywords/asymmetric_crypto/FF |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 9 | 3 |
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 4 | 6 |
pdf_data/st_keywords/cc_claims/T/T.RND | 3 | 5 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 1 | 5 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 4 | 2 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 4 | 2 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV | 3 | 1 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 4 | 5 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 1 | 8 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 7 | 12 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 21 | 41 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 4 | 19 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 37 | 21 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 1 | 20 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 7 | 16 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 27 | 19 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 38 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 16 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 14 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 2 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 11 | 18 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 1 | 22 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 20 | 28 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 19 | 32 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 28 | 12 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 38 | 15 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 18 | 9 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 10 | 6 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 12 | 22 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 10 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 12 | 21 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 12 | 17 |
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC | 10 | 1 |
pdf_data/st_keywords/cipher_mode/ECB/ECB | 9 | 3 |
pdf_data/st_keywords/cplc_data | |
|
pdf_data/st_keywords/crypto_engine | |
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol | |
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 | 17 | 1 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 | 5 | 4 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 | 8 | 4 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 | 7 | 4 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 | 5 | 3 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 7 | 11 |
pdf_data/st_keywords/randomness/RNG/RNG | 6 | 17 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 3 | 1 |
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 13 | 26 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 2 | 13 |
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering | 1 | 3 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 12 | 23 |
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing | 3 | 9 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 9 | 2 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 3 | 11 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 | 2 | 3 |
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 | 19 | 3 |
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-003 | 2 | 3 |
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/NIST |
|
|
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-38A | 3 | 2 |
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-67 | 3 | 2 |
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 17 | 36 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 11 | 22 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 10 | 11 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC | 4 | 2 |
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata//Author | Christiane DROULERS | Windows 사용자 |
pdf_data/st_metadata//CreationDate | D:20231010161508Z | D:20240216140822+09'00' |
pdf_data/st_metadata//Creator | FrameMaker 11.0.2 | Microsoft® Word 2016 |
pdf_data/st_metadata//ModDate | D:20231010162338+02'00' | D:20240216140822+09'00' |
pdf_data/st_metadata//Producer | Acrobat Distiller 11.0 (Windows) | Microsoft® Word 2016 |
pdf_data/st_metadata//Title | SMD_ST33G1M2A1_C04_2P.book | ST_Klallam7_Ver1.1 |
pdf_data/st_metadata/pdf_file_size_bytes | 690903 | 1314726 |
pdf_data/st_metadata/pdf_hyperlinks | https://tools.ietf.org/html/draft-irtf-cfrg-eddsa-08, http://ed25519.cr.yp.to/eddsa-20150704.pdf, http://www.st.com, http://ed25519.cr.yp.to/ed25519-20110926.pdf | http://www.ecc-brainpool.org/, mailto:[email protected] |
pdf_data/st_metadata/pdf_number_of_pages | 76 | 113 |
dgst | 1d67bb03765a278a | 8b2474d1fb17fd2f |