name |
Arista Networks 7280 Series Switches Running EOS 4.28 |
Microcontrôleurs sécurisés SC23Z018, SC23ZD12, SC23ZD08, SC23ZD04, SB23ZD18, SB23ZD12, SB23ZD08 et SB23ZD04 incluant optionnellement la librairie cryptographique NesLib révision 3.1 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
FR |
status |
active |
archived |
not_valid_after |
27.07.2025 |
21.10.2019 |
not_valid_before |
27.07.2023 |
21.10.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11356-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11356-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_60en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11356-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_27_LITE.pdf |
manufacturer |
Arista Networks, Inc. |
STMicroelectronics |
manufacturer_web |
https://www.aristanetworks.com |
https://www.st.com/ |
security_level |
{} |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
29cb0d560737d573 |
f89ed74b6c577fe6 |
heuristics/cert_id |
CCEVS-VR-VID-11356-2023 |
ANSSI-CC-2014/60 |
heuristics/cert_lab |
US |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
AGD_PRE.1, ATE_COV.2, ALC_TAT.2, ALC_CMS.5, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_DPT.3, ATE_IND.2, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, ALC_CMC.4, ADV_IMP.1 |
heuristics/extracted_versions |
4.28 |
3.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2013/61 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2013/61 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
89f2a255423f4a20 |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
st_vid11356-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11356-2023: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230728110457-04'00'
- /ModDate: D:20230728110457-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 180334
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11356-vr.pdf |
ANSSI-CC-2014_60en.pdf |
pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID11356-2023
- cert_item: for the Arista Networks 7280 Series Switches Running EOS 4.28
- cert_lab: US NIAP
|
- FR:
- cc_security_level: EAL5 Augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common criteria version 3.1 revision 4
- cert_id: ANSSI-CC-2014/60
- cert_item: SC23Z018, SC23ZD12, SC23ZD08, SC23ZD04, SB23ZD18, SB23ZD12, SB23ZD08 and SB23ZD04 Secure microcontrollers with optional cryptographic library NesLib revision 3.1
- cert_item_version: /version Maskset reference K390A, internal revision H
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Mutual Recognition Agreements']
- ref_protection_profiles: BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11356-2023: 1
|
- FR:
- ANSSI-CC-2013/61: 2
- ANSSI-CC-2014/60: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 2
- EAL 5 augmented: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECUR: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTI: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONAL: 2
- T.UNAUTHORIZED_ADMIN: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNI: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATIO: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- SERMA: 2
- Serma Technologies: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NESLIB 3.1: 1
- NesLib 3.1: 2
- NesLib v3.1: 1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: ppatin
- /CreationDate: D:20230728110235-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230728110235-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 599643
- pdf_hyperlinks: http://www.securiteam.com/, http://nessus.org/plugins/index.php?view=search, http://cve.mitre.org/cve, https://www.arista.com/, https://www.cvedetails.com/vulnerability-search.php, https://nvd.nist.gov/view/vuln.search, http://www.exploitsearch.net/, https://www.exploit-db.com/, https://www.kb.cert.org/vuls/search/, http://www.zerodayinitiative.com/advisories, https://www.rapid7.com/db/vulnerabilities
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
- /Author: Duquesnoy
- /CreationDate: D:20150209153210+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.014
- /ModDate: D:20150209153210+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: SC23Z018, SC23ZD12, SC23ZD08, SC23ZD04, SB23ZD18, SB23ZD12, SB23ZD08 and SB23ZD04 Secure microcontrollers with optional cryptographic library NesLib revision 3.1
- /Title: ANSSI-CC-2014/60
- pdf_file_size_bytes: 563511
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
st_vid11356-st.pdf |
ANSSI_cible2014_27_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 17
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 5
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.4: 3
- FCS_CKM.4.1: 1
- FCS_COP: 20
- FCS_COP.1: 4
- FCS_COP.1.1: 1
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 6
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHC_EXT.1.2: 1
- FCS_SSHC_EXT.1.3: 1
- FCS_SSHC_EXT.1.4: 1
- FCS_SSHC_EXT.1.5: 1
- FCS_SSHC_EXT.1.6: 1
- FCS_SSHC_EXT.1.7: 1
- FCS_SSHC_EXT.1.8: 1
- FCS_SSHC_EXT.1.9: 1
- FCS_SSHS_EXT.1: 6
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSS_EXT.1: 5
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.1.4: 1
- FCS_TLSS_EXT.2: 7
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 9
- FMT_MOF.1: 2
- FMT_MTD: 8
- FMT_MTD.1: 3
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 4
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 4
|
- FAU:
- FCS:
- FCS_CKM.1: 24
- FCS_CKM.4: 5
- FCS_COP.1: 26
- FCS_RNG: 1
- FCS_RNG.1: 6
- FDP:
- FDP_ACC.1: 1
- FDP_ACC.2: 12
- FDP_ACF.1: 11
- FDP_CKM.2: 1
- FDP_IFC.1: 9
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_ITT.1: 7
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 8
- FMT_LIM.2: 9
- FMT_MSA.1: 6
- FMT_MSA.2: 1
- FMT_MSA.3: 10
- FMT_SMF.1: 10
- FMT_SMR.1: 2
- FPT:
- FPT_FLS.1: 8
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALI: 2
- T.UNAUTHORIZED_ADMIN: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNI: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATIO: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 2
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 14
- DHE: 1
- Diffie-Hellman: 2
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 8
- SHA-384: 3
- SHA-512: 9
- SHA256: 6
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 4
- SHA-256: 3
- SHA-384: 4
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- SSL: 2
- SSL 1.0: 1
- SSL 2.0: 2
- SSL 3.0: 2
- TLS:
- TLS: 76
- TLS 1.0: 2
- TLS 1.1: 2
- TLS 1.2: 4
- TLS1.1: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 2
- P-384: 12
- curve P-384: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
- Neslib:
- NESLIB 3.1: 2
- NesLib 3.1: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 9
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 5
- Leak-Inherent: 8
- Physical Probing: 4
- SPA: 1
- physical probing: 3
- side channel: 5
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 186-4: 10
- ISO:
- ISO/IEC 14888-3: 2
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 2
- NIST:
- NIST SP 800-90: 1
- SP 800-56a: 2
- PKCS:
- RFC:
- RFC 2986: 1
- RFC 3447: 3
- RFC 3526: 6
- RFC 4251: 3
- RFC 4253: 4
- RFC 4346: 1
- RFC 5077: 1
- RFC 5246: 11
- RFC 5280: 3
- RFC 5288: 4
- RFC 6125: 1
- RFC 7919: 7
- X509:
|
- BSI:
- CC:
- CCMB-2012-09-001: 3
- CCMB-2012-09-002: 11
- CCMB-2012-09-003: 2
- FIPS:
- FIPS PUB 140-2: 9
- FIPS PUB 180-1: 3
- FIPS PUB 180-2: 2
- FIPS PUB 186: 3
- FIPS PUB 197: 3
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 10116: 5
- ISO/IEC 10118-: 2
- ISO/IEC 14888: 2
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 5
- ISO/IEC 9797: 1
- ISO/IEC 9797-1: 2
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 33 The Security IC Embedded Software (ES) is in User ROM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib when it is embedded. 34 The SC23Zxxx optionally comprises a: 1
- ES) is in User ROM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib when it is embedded: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: klasoski
- /CreationDate: D:20230719114638-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230719114638-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 972869
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
- /Author: Christiane DROULERS
- /CreationDate: D:20140828154417Z
- /Creator: FrameMaker 7.2
- /ModDate: D:20140828154624Z
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: SMD_SC23Z018_V1_7.book
- pdf_file_size_bytes: 348939
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |