name |
Qualcomm Secure Processor Unit SPU230 in SDM855 SoC |
Logiciel Mistral IP version 2.1.2 |
category |
Other Devices and Systems |
Boundary Protection Devices and Systems |
scheme |
DE |
FR |
status |
archived |
archived |
not_valid_after |
07.05.2024 |
22.07.2021 |
not_valid_before |
08.05.2019 |
22.07.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_42.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20Lite%202016-42.pdf |
manufacturer |
Qualcomm Technologies Inc. |
Thales Communications & Security |
manufacturer_web |
https://www.qualcomm.com |
https://www.thalescommuninc.com |
security_level |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
EAL3+, AVA_VAN.3, ALC_FLR.3 |
dgst |
2e8cbf6ce18d4c6f |
0ef53661a4c000d4 |
heuristics/cert_id |
BSI-DSZ-CC-1045-2019 |
ANSSI-CC-2016/42 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_TAT.1, ALC_CMS.4, AVA_VAN.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_CMC.4 |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
2.1.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1045-V2-2023 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1045-V2-2023 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
cf0f01bcd7be3e9c |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
{} |
pdf_data/cert_filename |
1045c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200129140240+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Qualcomm, SoC, system on chip, SPU230, hardmacro, secure element, secure processor
- /ModDate: D:20200129140509+01'00'
- /Producer: LibreOffice 6.2
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-1045-2019
- pdf_file_size_bytes: 898760
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1045a_pdf.pdf |
ANSSI-CC-2016_42.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 extended EAL 4 augmented by AVA_VAN.5 and ALC_DVS.2
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1045-2019
- cert_item: Qualcomm Secure Processor Unit SPU230 in SDM855 SoC
- cert_lab: BSI
- developer: Qualcomm Technologies Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 3
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
|
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL3: 2
- EAL4: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 4
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- TSystems:
- T-Systems International: 3
- atsec:
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- SCA:
- Side-channel: 1
- physical probing: 1
- other:
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 1
- AIS 35: 2
- AIS 36: 1
- AIS 37: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- List TOE implementation representation and tools, ALC/SPU_3_1_config_list.txt, April 11th 2019 (confidential document) [11] Guidance documentation for the TOE; Qualcomm SPUI Core, Hana Application Programming: 1
- Qualcomm SPU230 Core Security Target 80-NU430-5-C; Revision C, April 8th , 2019 (confidential document) [7] Evaluation Technical Report, Version 1.2, May 06th 2019, Evaluation Technical Report - Summary: 1
- T-Systems International GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200128144340+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Qualcomm, SoC, system on chip, SPU230, hardmacro, secure element, secure processor
- /ModDate: D:20200129135949+01'00'
- /Producer: LibreOffice 6.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-1045-2019
- pdf_file_size_bytes: 1375836
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2016_42
- pdf_file_size_bytes: 780613
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
1045b_pdf.pdf |
Cible Lite 2016-42.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL4 augmented: 1
|
- EAL:
- EAL3: 4
- EAL3 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ALC:
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.3: 9
- ADV_FSP.4: 3
- ADV_IMP.1: 3
- ADV_TDS.1: 2
- ADV_TDS.2: 3
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.3: 2
- ALC_CMS.1: 1
- ALC_CMS.3: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_FLR.3: 8
- ALC_LCD.1: 4
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 4
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS.1: 4
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 30
- FCS_CKM.1: 7
- FCS_CKM.2: 2
- FCS_CKM.4: 7
- FCS_COP: 17
- FCS_COP.1: 5
- FCS_ITC.1: 5
- FCS_ITC.2: 5
- FCS_RNG.1: 3
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 2
- FDP_ACC.2: 3
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ICT.1: 1
- FDP_IFC.1: 5
- FDP_IFC.1.1: 2
- FDP_IFF.1: 1
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 3
- FDP_ITT.1.1: 1
- FDP_RIP: 10
- FDP_RIP.1: 2
- FDP_SDA: 7
- FDP_SDA.1: 8
- FDP_SDA.1.1: 2
- FDP_SDC.1: 11
- FDP_SDC.1.1: 2
- FDP_SDI: 2
- FDP_SDI.2: 18
- FDP_SDI.2.1: 3
- FDP_SDI.2.2: 3
- FDP_SDR: 7
- FDP_SDR.1: 8
- FDP_SDR.1.1: 2
- FMT:
- FMT_CMT: 2
- FMT_CMT.1: 35
- FMT_CMT.1.1: 7
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MSA: 5
- FMT_MSA.1: 2
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 4
- FRU_FLT.2.1: 1
|
- FAU:
- FAU_GEN: 9
- FAU_GEN.1: 16
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 5
- FAU_GEN.2.1: 2
- FAU_GEN_EXT.3: 13
- FAU_GEN_EXT.3.1: 2
- FAU_SEG.1: 2
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG_EXT.1: 16
- FAU_STG_EXT.1.1: 3
- FAU_STG_EXT.3: 13
- FAU_STG_EXT.3.1: 2
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 29
- FCS_CKM.1.1: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 16
- FCS_CKM_EXT: 50
- FCS_CKM_EXT.4: 15
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.5: 23
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.5.3: 1
- FCS_COP: 96
- FCS_COP.1: 23
- FCS_COP.1.1: 4
- FCS_IPS_EXT: 4
- FCS_IPS_EXT.1: 23
- FCS_IPS_EXT.1.1: 4
- FCS_IPS_EXT.1.2: 3
- FCS_IPS_EXT.1.3: 3
- FCS_IPS_EXT.1.4: 3
- FCS_IPS_EXT.1.5: 3
- FCS_IPS_EXT.1.6: 3
- FCS_IPS_EXT.1.7: 3
- FCS_IPS_EXT.1.8: 4
- FCS_RBG_EXT: 5
- FCS_RBG_EXT.1: 17
- FCS_RBG_EXT.1.1: 3
- FCS_RBG_EXT.1.2: 3
- FDP:
- FDP_ACC.1: 8
- FDP_ETC: 8
- FDP_ETC.2: 4
- FDP_IFC: 35
- FDP_IFC.1: 14
- FDP_IFF: 32
- FDP_IFF.1: 21
- FDP_ITC: 43
- FDP_ITC.1: 32
- FDP_ITC.2: 44
- FDP_RIP.2: 6
- FDP_RIP.2.1: 2
- FDP_UCT: 14
- FDP_UCT.1: 2
- FDP_UIT: 18
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 8
- FIA_AFL.1: 2
- FIA_AFL.1.1: 1
- FIA_PMG_EXT: 10
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 2
- FIA_UAU: 15
- FIA_UAU.1: 4
- FIA_UAU.6: 1
- FIA_UAU.7: 1
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 6
- FIA_UAU_EXT.2: 9
- FIA_UAU_EXT.2.1: 2
- FIA_UIA: 1
- FIA_UIA_EXT: 16
- FIA_UIA_EXT.1: 7
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID: 10
- FIA_UID.1: 4
- FIA_UID.2: 2
- FMT:
- FMT_MDT: 1
- FMT_MOF: 5
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 21
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 52
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SKP_EXT.1: 1
- FMT_SMF.1: 30
- FMT_SMF.1.1: 2
- FMT_SMR: 23
- FMT_SMR.1: 16
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 4
- FPT_APW_EXT.1: 10
- FPT_APW_EXT.1.1: 3
- FPT_APW_EXT.1.2: 3
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_SDP_EXT: 3
- FPT_SDP_EXT.1: 5
- FPT_SDP_EXT.1.1: 1
- FPT_SDP_EXT.2: 10
- FPT_SDP_EXT.2.1: 2
- FPT_SDP_EXT.2.2: 2
- FPT_SIE_EXT: 9
- FPT_SIE_EXT.1: 6
- FPT_SIE_EXT.1.1: 1
- FPT_SIE_EXT.2: 4
- FPT_SIE_EXT.2.1: 1
- FPT_SKP_EXT: 4
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 3
- FPT_STM.1: 19
- FPT_STM.1.1: 2
- FPT_TDC: 8
- FPT_TDC.1: 5
- FPT_TST.1: 6
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 20
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 6
- FTA_SSL.1: 2
- FTA_SSL.3.1: 1
- FTA_SSL.4: 1
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 6
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 2
- FTA_TAB: 7
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 14
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 1
- FTP_TRP.1: 7
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 3
- O.KDF: 5
- O.RND: 1
- O.SHA: 4
- T:
- T.AUTH-APPLI-DATA: 3
- T.AUTH-TSF-DATA: 3
- T.CONFID-APPLI-DATA: 5
- T.CONFID-TSF-CODE: 3
- T.CONFID-TSF-DATA: 4
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 3
- T.INTEG-APPLI-DATA: 5
- T.INTEG-TSF-CODE: 3
- T.INTEG-TSF-DATA: 3
- T.RBP-APPLI-DATA: 3
- T.RBP-TSF-DATA: 3
- T.RND: 1
|
- A:
- A.ACCESS_CONTROL_MANAGEMENT_DEVICES: 3
- A.ALARM: 3
- A.AUDIT: 3
- A.CEC_CRYPTO_REGULATION: 3
- A.CONFIGURATION_CONTROL: 3
- A.KEY_TRANSPORTATION: 3
- A.NO_GENERAL_PURPOSE: 4
- A.PHYSICAL: 1
- A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES: 3
- A.PHYSICAL_ENVIRONMENT_TOE: 3
- A.POLICIES_CONTINUITY: 3
- A.SECURED_MANAGEMENT_DEVICES: 3
- A.SGC_TO_FRONT-END: 3
- A.STAND_ALONE_CEC: 3
- A.SW_PROTECTION: 3
- A.TRUSTED_ADMIN: 4
- A.TRUSTED_NETWORKS: 4
- D:
- D.APPLICATIVE_DATA: 7
- D.AUDIT: 3
- D.AUTHENTICATION_DATA: 11
- D.CONFIG_PARAM: 22
- D.CRYPTO_KEY: 4
- D.CRYPTO_KEYS: 18
- D.CRYPTO_KEYS_PROTECTION_PWD: 3
- D.SECURITY_POLICIES: 23
- D.SOFTWARE: 4
- D.SOFTWARES: 3
- D.SUPERVISION_DATA: 3
- D.SWUPDATE_PUBLICKEYS: 5
- D.TIME_BASE: 8
- D.TOPOLOGIC_INFO: 5
- O:
- O.AUDIT: 12
- O.AUDIT_PROTECTION: 6
- O.AUTHENTICATION_FAILURE: 4
- O.CRYPTOPERIOD: 4
- O.CRYPTO_REGULATION: 7
- O.DATA_ERASURE: 6
- O.DISPLAY_BANNER: 6
- O.FLOW_PARTITIONING: 5
- O.KEYS_INJECTION: 5
- O.LED: 1
- O.LOCAL_DATA_PROTECTION: 11
- O.MANAGEMENT: 7
- O.POL_ENFORCEMENT: 6
- O.POL_VIEW: 7
- O.PROTECTED_COMMUNICATIONS: 11
- O.RESIDUAL_INFORMATION_CLEAR: 6
- O.ROLES: 4
- O.SELF_TEST: 7
- O.SESSION_LOCK: 6
- O.SOFTWARE_UPDATES: 5
- O.SUPERVISION: 5
- O.SUPERVISION_IMPACT: 4
- O.SYSTEM_MONITORING: 1
- O.TIME_BASE: 5
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 1
- O.VIEW: 5
- O.VISUAL: 1
- O.VISUAL_ALARMS: 5
- OE:
- OE.ACCESS_CONTROL_CEC: 3
- OE.ACCESS_CONTROL_FPD: 3
- OE.ACCESS_CONTROL_NTP_SERVER: 2
- OE.ACCESS_CONTROL_SF: 2
- OE.ACCESS_CONTROL_SGC: 3
- OE.ACCESS_CONTROL_SGL: 2
- OE.ALARM: 3
- OE.AUDIT_ANALYSIS: 2
- OE.AUDIT_MNGT: 3
- OE.AUDIT_RECORD_SGC: 5
- OE.CEC_CRYPTO_REGULATION: 6
- OE.DISPLAY_BANNER_SGC: 3
- OE.KEYS_TRANSPORTATION: 1
- OE.KEY_TRANSPORTATION: 2
- OE.LINUX_GUIDANCE: 3
- OE.NO_GENERAL_PURPOSE: 1
- OE.NTP_SERVER_LOCATION: 2
- OE.PHYSICAL: 1
- OE.PHYSICAL_ENVIRONMENT_CEC: 3
- OE.PHYSICAL_ENVIRONMENT_FPD: 3
- OE.PHYSICAL_ENVIRONMENT_NTP_SERVER: 2
- OE.PHYSICAL_ENVIRONMENT_SF: 2
- OE.PHYSICAL_ENVIRONMENT_SGC: 3
- OE.PHYSICAL_ENVIRONMENT_SGL: 2
- OE.PHYSICAL_ENVIRONMENT_TOE: 3
- OE.POLICIES_CONTINUITY: 3
- OE.SECURED_CEC: 3
- OE.SECURED_FPD: 2
- OE.SECURED_NTP_SERVER: 3
- OE.SECURED_SGC: 3
- OE.SECURED_SGL: 2
- OE.SGC_TO_FRONT-END: 3
- OE.SGL_CONNECTION: 4
- OE.STAND_ALONE_CEC: 3
- OE.SW_PROTECTION: 3
- OE.SW_UPDATE_KEY: 3
- OE.TOE_INTEGRITY: 8
- OE.TOE_TRANSPORTATION: 3
- OE.TRUSTED_ADMIN: 6
- OE.TRUSTED_NETWORKS: 5
- R:
- R.ADMINISTRATOR: 13
- R.OPERATOR: 6
- R.SGC: 8
- R.SGL: 1
- T:
- T.ADMIN_ERROR: 4
- T.RESIDUAL_DATA: 3
- T.TIME_BASE: 3
- T.TSF_FAILURE: 4
- T.UNAUTHORISED_ACCESS: 3
- T.UNAUTHORISED_UPDATE: 3
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
- T.UNDETECTED_ACTIONS: 4
- T.USER_DATA_REUSE: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 2
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 3
- SHA-512: 4
|
- SHA:
- SHA2:
- SHA-256: 2
- SHA-384: 2
- SHA512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 2
- Key exchange: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 71
- IKEv1: 8
- IKEv2: 27
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- fault injection: 2
- malfunction: 3
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- Side-channel: 1
- physical probing: 4
- side channels: 1
- side-channel: 2
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 1
- FIPS 197: 5
- FIPS 198-1: 2
- FIPS PUB 180-4: 3
- FIPS PUB 186-4: 1
- FIPS PUB 197: 3
- FIPS PUB 198-1: 2
- NIST:
- NIST SP 800-108: 3
- NIST SP 800-38A: 2
- NIST SP 800-38B: 2
- NIST SP 800-38C: 1
- NIST SP 800-90A: 1
- PKCS:
- RFC:
|
- FIPS:
- FIPS 180-3: 4
- FIPS 186-4: 1
- FIPS 197: 4
- FIPS 198-1: 2
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- SP 800-107: 1
- RFC:
- RFC 1042: 1
- RFC 1213: 1
- RFC 2408: 1
- RFC 2409: 1
- RFC 3566: 4
- RFC 3602: 3
- RFC 4106: 1
- RFC 4109: 1
- RFC 4303: 2
- RFC 4868: 3
- RFC 5639: 1
- RFC 5903: 1
- RFC 5996: 4
- RFC 894: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: QTI
- /CreationDate: D:20190503125434-07'00'
- /Creator: Microsoft® Word for Office 365
- /Keywords: integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230
- /ModDate: D:20190503125649-07'00'
- /Producer: Microsoft® Word for Office 365
- /Subject: 80-NU430-6 Rev. B
- /Title: Qualcomm® Secure Processing Unit SPU230 Core Security Target Lite
- pdf_file_size_bytes: 723737
- pdf_hyperlinks: https://createpoint.qti.qualcomm.com/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.3
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.04
- /Subject:
- /Title:
- pdf_file_size_bytes: 942738
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 128
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |