name |
ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)(ANSSI-CC-2020/24-R01) |
Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Codes SAAAAR : 091121, 094223 et 094742 (ANSSI-CC-2020/26-R01) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
27.02.2029 |
13.11.2028 |
not_valid_before |
27.02.2024 |
13.11.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_24-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_26-R01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_24-R01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_26-R01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_24-R01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_26-R01en.pdf |
manufacturer |
STMicroelectronics |
Idemia |
manufacturer_web |
https://www.st.com/ |
https://www.idemia.com |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
1d67bb03765a278a |
b5afd5804b5658b9 |
heuristics/cert_id |
ANSSI-CC-2020/24-R01 |
ANSSI-CC-2020/26-R01 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ADV_ARC.1, ALC_TAT.2, ASE_SPD.1, ASE_REQ.2, ADV_IMP.1, ASE_TSS.2, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2 |
heuristics/extracted_versions |
24, 2020 |
8.2 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2020/53-R01, ANSSI-CC-2020/52-R01, ANSSI-CC-2020/51-R01, ANSSI-CC-2020/50-R01 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1059-V5-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/53-R01, ANSSI-CC-2020/52-R01, ANSSI-CC-2020/51-R01, ANSSI-CC-2020/50-R01 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-V5-2022, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V4-2021, BSI-DSZ-CC-1059-V2-2019 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2020/24-R01
- description: Le produit évalué est « ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM, C04 » développé par STMICROELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont
- developer: STMICROELECTRONICS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Micro-circuits
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2020/24-R01
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_24-R01fr.pdf
- certification_date: 2024-02-27
- developer: STMICROELECTRONICS
- evaluation_facility: THALES / CNES
- expiration_date: 2029-02-27
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Security IC Platform Protection Profile, version 1.0 certifié BSI-CC-PP-0035-2007 le 23 août 2007
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_24-R01fr.pdf
- sponsor: STMICROELECTRONICS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_24-R01en.pdf
- expiration_date: 2029-02-27
- level: EAL5+
- product: ST33G1M2A1 including optional cryptographic library NesLib and optional library SFM (C04)
- sponsor: STMICROELECTRONICS
- url: https://cyber.gouv.fr/produits-certifies/st33g1m2a1-including-optional-cryptographic-library-neslib-and-optional-library
|
- cert_id: ANSSI-CC-2020/26-R01
- description: Le produit évalué est la « Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145, Codes SAAAAR : 091121, 094223 et 094742 » développé par IDEMIA embarquée sur le microcontrôleur NXP P60D145 développé et fabriqué par NXP SEMICONDUCTORS GMBH.
- developer: IDEMIA / NXP SEMICONDUCTORS GMBH
- enhanced:
- augmented: (ALC_DVS.2, AVA_VAN.5)
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2020/26-R01
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_26-R01.pdf
- certification_date: 2023-11-13
- developer: IDEMIA / NXP SEMICONDUCTORS GMBH
- evaluation_facility: CEA - LETI
- expiration_date: 2028-11-13
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Java Card System Protection Profile Open Configuration, version 3.0
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_26-R01fr.pdf
- sponsor: IDEMIA
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_26-R01en.pdf
- expiration_date: 2028-11-13
- level: EAL5+
- product: Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Codes SAAAAR : 091121, 094223 et 094742
- sponsor: IDEMIA
- url: https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v82-masquee-sur-le-composant-nxp-p60d145-codes-saaaar
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1059-V5-2022 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1059-V5-2022 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2020_24-R01fr.pdf |
Certificat-CC-2020_26-R01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: DUCLOS Charlene
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20240229102447+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20240229102448+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20240229092422
- /Title: ANSSI-CC-2020/24-R01
- pdf_file_size_bytes: 144907
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author:
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20231129172408+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20231129172409+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20231129162401
- /Title: ANSSI-CC-2020/26-R01
- pdf_file_size_bytes: 167307
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2020_24-R01fr.pdf |
ANSSI-CC-2020_26-R01fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1059-V5-2022: 2
- FR:
- ANSSI-CC-2020/26-R01: 2
- ANSSI-CC-PP-2010/03-M01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0035-2007: 1
- BSI-PP-0035-2007: 1
- BSI-PP-0084-2014: 1
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 2
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- AGD:
- AGD_ALP: 4
- AGD_OPE: 3
- AGD_PRE: 2
- ALC:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Idemia:
- NXP:
- NXP: 13
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-CC-2020_24-R01en.pdf |
ANSSI-cible-CC-2020_26-R01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1059: 1
- BSI-DSZ-CC-1059-: 1
- BSI-DSZ-CC-1059-V5-2022: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03_M01: 1
- BSI:
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 17
|
- EAL:
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 4
- EAL6: 1
|
pdf_data/st_keywords/cc_sar |
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 8
- ADV_IMP.1: 9
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 10
- AGD_PRE: 12
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 11
- ALC_FLR.1: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.4: 4
- FCS_COP.1: 37
- FCS_RNG: 1
- FCS_RNG.1: 7
- FDP:
- FDP_ACC.1: 27
- FDP_ACC.2: 13
- FDP_ACF.1: 38
- FDP_CKM.2: 1
- FDP_IFC.1: 16
- FDP_ITC.1: 14
- FDP_ITC.2: 2
- FDP_ITT.1: 11
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 1
- FMT_LIM.1: 20
- FMT_LIM.2: 19
- FMT_MSA.1: 28
- FMT_MSA.2: 1
- FMT_MSA.3: 38
- FMT_SMF.1: 18
- FMT_SMR.1: 10
- FPT:
- FPT_FLS.1: 12
- FPT_ITT.1: 10
- FPT_PHP.3: 12
- FRU:
|
- FAU:
- FAU_ARP.1: 20
- FAU_ARP.1.1: 1
- FAU_GEN.1: 2
- FAU_SAA.1: 3
- FAU_STG.2: 10
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCO:
- FCS:
- FCS_CKM: 23
- FCS_CKM.1: 23
- FCS_CKM.1.1: 1
- FCS_CKM.2: 12
- FCS_CKM.2.1: 1
- FCS_CKM.3: 10
- FCS_CKM.3.1: 1
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 29
- FCS_COP.1: 16
- FCS_COP.1.1: 1
- FCS_RNG: 11
- FCS_RNG.1: 4
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 84
- FDP_ACC.1: 24
- FDP_ACC.2: 13
- FDP_ACF: 69
- FDP_ACF.1: 34
- FDP_IFC: 31
- FDP_IFC.1: 21
- FDP_IFC.2: 2
- FDP_IFF: 24
- FDP_IFF.1: 16
- FDP_ITC: 28
- FDP_ITC.1: 10
- FDP_ITC.2: 16
- FDP_RIP: 151
- FDP_RIP.1: 10
- FDP_ROL: 17
- FDP_ROL.1: 5
- FDP_SDI.2: 12
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 13
- FDP_UCT.1: 1
- FDP_UIT: 19
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 49
- FIA_AFL.1: 10
- FIA_ATD: 20
- FIA_ATD.1: 3
- FIA_UAU: 66
- FIA_UAU.1: 11
- FIA_UAU.4: 2
- FIA_UAU.7: 2
- FIA_UID: 37
- FIA_UID.1: 16
- FIA_UID.2: 1
- FIA_USB: 10
- FIA_USB.1: 3
- FMT:
- FMT_MOF: 12
- FMT_MOF.1: 1
- FMT_MSA: 219
- FMT_MSA.1: 20
- FMT_MSA.2: 4
- FMT_MSA.3: 27
- FMT_MTD: 51
- FMT_MTD.1: 5
- FMT_MTD.2: 2
- FMT_MTD.3: 1
- FMT_SMF: 73
- FMT_SMF.1: 32
- FMT_SMF.1.1: 1
- FMT_SMR: 69
- FMT_SMR.1: 57
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 6
- FPR:
- FPR_UNO: 29
- FPR_UNO.1: 17
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 57
- FPT_FLS.1: 21
- FPT_FLS.1.1: 2
- FPT_PHP: 9
- FPT_PHP.3: 1
- FPT_RCV: 39
- FPT_RCV.3: 11
- FPT_RCV.4: 1
- FPT_TDC: 9
- FPT_TDC.1: 12
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 28
- FTP_ITC.1: 10
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 5
- A.DELETION: 3
- A.VERIFICATION: 5
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.ARRAY: 6
- D.BIO: 12
- D.CONFIG: 4
- D.CRYPTO: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.JCS_KEYS: 7
- D.NB_REMAINTRYGLB: 1
- D.PIN: 9
- D.SEC_DATA: 7
- D.SENSITIVE_DATA: 2
- O:
- O.ALARM: 21
- O.APPI: 1
- O.APPLET: 15
- O.BIO-: 8
- O.BIO-MNGT: 17
- O.CARD_MANAGEMENT: 51
- O.CIPHER: 19
- O.CODE_PKG: 20
- O.COIPKG: 1
- O.DELETION: 15
- O.FIREWALL: 65
- O.GLOBAL_ARRAYS_CONFID: 18
- O.GLOBAL_ARRAYS_INTEG: 11
- O.INSTALL: 18
- O.JAVAOBJE: 1
- O.JAVAOBJECT: 47
- O.KEY-MNGT: 26
- O.LOAD: 16
- O.NATIVE: 13
- O.OBJ-DELETION: 8
- O.OPERATE: 37
- O.PATCH_LOADING: 26
- O.PIN-: 2
- O.PIN-MNGT: 28
- O.REALLOCATION: 16
- O.REMOTE_MTHD: 1
- O.REMOTE_OBJ: 1
- O.RESIDENT_APPLICATION: 23
- O.RESOURCES: 24
- O.ROR: 1
- O.SCP: 54
- O.SECURE_COMPARE: 10
- O.SID: 33
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 8
- OE.CARD_MANAGEMENT: 3
- OE.CODE-: 3
- OE.CODE-EVIDENCE: 18
- OE.SCP: 6
- OE.VERIFICATION: 38
- OP:
- OP.ARRAY_ACCESS: 9
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.FLOW: 3
- OP.IMPORT_KEY: 2
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.LOCAL_STACK_ACCESS: 2
- OP.OPERAND_STACK_ACCESS: 2
- OP.PUT: 6
- OP.RET_RORD: 1
- OP.STATIC_FIELD: 3
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.CONFID-APPLI-DATA: 18
- T.CONFID-JCS-: 8
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 5
- T.CONFIGURATION: 5
- T.CONF_DATA_APPLET: 5
- T.DELETION: 6
- T.EXE-CODE: 9
- T.INSTALL: 6
- T.INTEG-: 2
- T.INTEG-APPLI-: 13
- T.INTEG-APPLI-CODE: 9
- T.INTEG-APPLI-DATA: 15
- T.INTEG-JCS-: 7
- T.INTEG-JCS-CODE: 6
- T.INTEG-JCS-DATA: 5
- T.NATIVE: 6
- T.OBJ-DELETION: 4
- T.PATCH_LOADING: 5
- T.PHYSICAL: 4
- T.RESOURCES: 8
- T.SID: 18
|
pdf_data/st_keywords/vendor |
- Infineon:
- Philips:
- STMicroelectronics:
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 17
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 4
- HMAC: 4
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- Keccak:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-224: 5
- SHA-256: 8
- SHA-384: 7
- SHA-512: 5
- SHA3:
- SHA-3: 6
- SHA3-224: 4
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
- SHAKE:
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 3
- SHA-384: 1
- SHA-512: 2
- SHA3:
- SHA-3: 3
- SHA3-224: 1
- SHA3-256: 1
- SHA3-384: 2
- SHA3-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
- Neslib:
- NesLib : 9
- NesLib 281: 1
- NesLib 282: 1
- NesLib 285: 1
- NesLib 289: 1
- NesLib 293: 1
- NesLib 295: 1
- NesLib 296: 1
- NesLib 298: 1
- NesLib 299: 1
- NesLib 6.3: 2
- NesLib 6.3.4: 3
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 12
- Physical Probing: 4
- Side channel: 1
- physical probing: 3
- side channel: 9
|
- FI:
- fault injection: 1
- malfunction: 2
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 19
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 186-4: 4
- FIPS PUB 140-2: 5
- FIPS PUB 180-2: 5
- FIPS PUB 197: 4
- FIPS PUB 198-1: 2
- FIPS PUB 202: 6
- ISO:
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 3
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 3
- NIST SP 800-67: 3
- NIST SP 800-90: 4
- SP 800-38A: 2
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-67: 1
- SP 800-90A: 1
- PKCS:
|
- BSI:
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 4
- FIPS PUB 202: 3
- FIPS PUB 46-3: 4
- FIPS PUB 81: 6
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 7816-6: 1
- ISO/IEC 9796-1: 2
- ISO/IEC 9797: 8
- ISO/IEC 9797-1: 1
- NIST:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.oberthurcs.javacard: 2
- java:
- javacard:
- javacard.crypto: 1
- javacard.framework: 4
- javacard.security: 4
- javacardx:
- javacardx.biometry: 1
- javacardx.crypto: 2
- javacardx.framework.util: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 35 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and SFM when they are embedded. 36 The user guidance documentation: 1
- ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and SFM when they are embedded: 1
- out of scope: 1
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /Author: Sarra MESTIRI
- /CreationDate: D:20230921101753+02'00'
- /Creator: Microsoft® Word pour Microsoft 365
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_ContentBits: 0
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled: true
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Method: Standard
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name: 431684b1-a5da-4051-9fb4-5631703e02d5
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate: 2022-04-05T13:53:14Z
- /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
- /ModDate: D:20230921101753+02'00'
- /Producer: Microsoft® Word pour Microsoft 365
- /Subject: ST cosmo V8
- /Title: Security Target ERATO
- pdf_file_size_bytes: 2792989
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 206
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |