name |
Qualcomm Secure Processor Unit SPU230 in SDM855 SoC |
vinCERTcore, versión 4.0.5.5733 |
category |
Other Devices and Systems |
Products for Digital Signatures |
scheme |
DE |
ES |
status |
archived |
archived |
not_valid_after |
07.05.2024 |
24.04.2023 |
not_valid_before |
08.05.2019 |
24.04.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-CCRA.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-INF-2264%20v2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1045b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-ST-v1.12.pdf |
manufacturer |
Qualcomm Technologies Inc. |
Víntegris, SL. |
manufacturer_web |
https://www.qualcomm.com |
https://www.vintegris.com/ |
security_level |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
EAL4+, ALC_FLR.2 |
dgst |
2e8cbf6ce18d4c6f |
1c5f79388b3fab19 |
heuristics/cert_id |
BSI-DSZ-CC-1045-2019 |
2016-01-INF-2264 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_TAT.1, ALC_CMS.4, AVA_VAN.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_CMC.4 |
ASE_INT.1, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
4.0.5.5733 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1045-V2-2023 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1045-V2-2023 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
cf0f01bcd7be3e9c |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
{} |
pdf_data/cert_filename |
1045c_pdf.pdf |
2016-01-CCRA.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200129140240+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Qualcomm, SoC, system on chip, SPU230, hardmacro, secure element, secure processor
- /ModDate: D:20200129140509+01'00'
- /Producer: LibreOffice 6.2
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-1045-2019
- pdf_file_size_bytes: 898760
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20180404121729+02'00'
- pdf_file_size_bytes: 746055
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
1045a_pdf.pdf |
2016-01-INF-2264 v2.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 extended EAL 4 augmented by AVA_VAN.5 and ALC_DVS.2
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1045-2019
- cert_item: Qualcomm Secure Processor Unit SPU230 in SDM855 SoC
- cert_lab: BSI
- developer: Qualcomm Technologies Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 3
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL 4+: 2
- EAL4: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_SAR.3: 1
- FCS:
- FDP:
- FDP_ACC: 2
- FDP_ACF: 2
- FDP_ETC.1: 1
- FDP_ETC.2: 1
- FDP_ITC.2: 1
- FDP_ROL.1: 1
- FDP_UIT: 2
- FIA:
- FIA_AFL.1: 1
- FIA_UAU.1: 1
- FIA_UAU.6: 1
- FIA_USB.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA: 1
- FMT_MSA.3: 1
- FMT_SMR.2: 1
- FPT:
- FTA:
- FTA_SSL.3: 1
- FTA_TSE.1: 1
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- TSystems:
- T-Systems International: 3
- atsec:
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- SCA:
- Side-channel: 1
- physical probing: 1
- other:
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 1
- AIS 35: 2
- AIS 36: 1
- AIS 37: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- List TOE implementation representation and tools, ALC/SPU_3_1_config_list.txt, April 11th 2019 (confidential document) [11] Guidance documentation for the TOE; Qualcomm SPUI Core, Hana Application Programming: 1
- Qualcomm SPU230 Core Security Target 80-NU430-5-C; Revision C, April 8th , 2019 (confidential document) [7] Evaluation Technical Report, Version 1.2, May 06th 2019, Evaluation Technical Report - Summary: 1
- T-Systems International GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
- OutOfScope:
- are stored in vinCERTcore. Digital signatures are always performed remotely in the vinCERTcore HSM (out of scope of evaluation). Password protected key usage is also supported. The vinCERTagent and the vinCERTweb: 1
- factor and second factor authentication mechanisms. Both vinCERTweb and vinCERTagent connects (out of scope of ST) to this subsystem to allow end-user authentication to the TOE. HSM subsystem is responsible: 1
- out of scope: 4
- to manage the certificate creation flow in the system using the external vinCERTweb product (out of scope of evaluation) and storing them in the HSM. The operative can be performed in two different ways: •: 1
- using the related functionalities on vinCERTweb. It’s required a vinCERTagent software (out of scope of evaluation) installed for digital signature purposes. This agent is compatible with CSP and: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200128144340+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Qualcomm, SoC, system on chip, SPU230, hardmacro, secure element, secure processor
- /ModDate: D:20200129135949+01'00'
- /Producer: LibreOffice 6.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-1045-2019
- pdf_file_size_bytes: 1375836
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /Author: .
- /CreationDate: D:20180322165059+01'00'
- /Creator: PDFCreator Version 1.3.2
- /Keywords:
- /ModDate: D:20180322165059+01'00'
- /Producer: GPL Ghostscript 9.05
- /Subject:
- /Title: 2016-01-INF-2264 v2
- pdf_file_size_bytes: 1304805
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
1045b_pdf.pdf |
2016-01-ST-v1.12.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL4 augmented: 1
|
- EAL:
- EAL 4: 1
- EAL 4+: 3
- EAL4: 7
- EAL4 augmented: 4
- EAL4+: 4
|
pdf_data/st_keywords/cc_sar |
- ALC:
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS.1: 4
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 30
- FCS_CKM.1: 7
- FCS_CKM.2: 2
- FCS_CKM.4: 7
- FCS_COP: 17
- FCS_COP.1: 5
- FCS_ITC.1: 5
- FCS_ITC.2: 5
- FCS_RNG.1: 3
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 2
- FDP_ACC.2: 3
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ICT.1: 1
- FDP_IFC.1: 5
- FDP_IFC.1.1: 2
- FDP_IFF.1: 1
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 3
- FDP_ITT.1.1: 1
- FDP_RIP: 10
- FDP_RIP.1: 2
- FDP_SDA: 7
- FDP_SDA.1: 8
- FDP_SDA.1.1: 2
- FDP_SDC.1: 11
- FDP_SDC.1.1: 2
- FDP_SDI: 2
- FDP_SDI.2: 18
- FDP_SDI.2.1: 3
- FDP_SDI.2.2: 3
- FDP_SDR: 7
- FDP_SDR.1: 8
- FDP_SDR.1.1: 2
- FMT:
- FMT_CMT: 2
- FMT_CMT.1: 35
- FMT_CMT.1.1: 7
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MSA: 5
- FMT_MSA.1: 2
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 4
- FRU_FLT.2.1: 1
|
- FAU:
- FAU_ARP: 1
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAA: 1
- FAU_SAA.1: 6
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_STG: 1
- FAU_STG.2: 4
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 6
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 51
- FDP_ACC.1: 10
- FDP_ACF: 52
- FDP_ACF.1: 13
- FDP_ETC: 1
- FDP_ETC.1: 22
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 21
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_ITC: 1
- FDP_ITC.1: 17
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 29
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP: 1
- FDP_RIP.1: 11
- FDP_ROL: 1
- FDP_ROL.1: 4
- FDP_ROL.1.2: 1
- FDP_SDI: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 5
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 22
- FMT_MSA.1: 3
- FMT_MSA.3: 17
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 3
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 11
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC: 1
- FPT_TDC.1: 28
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL: 3
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_TSE: 1
- FTA_TSE.1: 16
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 20
- FTP_ITC.1.1: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 3
- O.KDF: 5
- O.RND: 1
- O.SHA: 4
- T:
- T.AUTH-APPLI-DATA: 3
- T.AUTH-TSF-DATA: 3
- T.CONFID-APPLI-DATA: 5
- T.CONFID-TSF-CODE: 3
- T.CONFID-TSF-DATA: 4
- T.INTEG-: 1
- T.INTEG-APPLI-CODE: 3
- T.INTEG-APPLI-DATA: 5
- T.INTEG-TSF-CODE: 3
- T.INTEG-TSF-DATA: 3
- T.RBP-APPLI-DATA: 3
- T.RBP-TSF-DATA: 3
- T.RND: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 3
- SHA-512: 4
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 3
- fault injection: 2
- malfunction: 3
- SCA:
- Leak-Inherent: 3
- Physical Probing: 2
- Side-channel: 1
- physical probing: 4
- side channels: 1
- side-channel: 2
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 1
- FIPS 197: 5
- FIPS 198-1: 2
- FIPS PUB 180-4: 3
- FIPS PUB 186-4: 1
- FIPS PUB 197: 3
- FIPS PUB 198-1: 2
- NIST:
- NIST SP 800-108: 3
- NIST SP 800-38A: 2
- NIST SP 800-38B: 2
- NIST SP 800-38C: 1
- NIST SP 800-90A: 1
- PKCS:
- RFC:
|
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 140-2: 4
- ISO:
- PKCS:
- PKCS #12: 1
- PKCS#11: 1
- PKCS#12: 6
- PKCS#5: 1
- RFC:
- RFC2986: 1
- RFC5246: 1
- RFC7292: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- are stored in vinCERTcore. Digital signatures are always performed remotely in the vinCERTcore HSM (out of scope of evaluation). Password protected key usage is also supported. The vinCERTagent and the: 1
- factor and second factor authentication mechanisms. Both vinCERTweb and vinCERTagent connects (out of scope of ST) to this subsystem to allow end-user authentication to the TOE. HSM subsystem is responsible: 1
- out of scope: 4
- to manage the certificate creation flowin the system using the external vinCERTweb product (out of scope of evaluation) and storing them in the HSM. The operative can be performed in two different ways: 1
- using the related functionalities on vinCERTweb. It's required a vinCERTagent software (out of scope of evaluation) installed for digital signature purposes. This agent is compatible with CSP and: 1
|
pdf_data/st_metadata |
- /Author: QTI
- /CreationDate: D:20190503125434-07'00'
- /Creator: Microsoft® Word for Office 365
- /Keywords: integrated secure element, PP0084, Qualcomm, secure processing unit, secure subsystem, SDM855, SoC, SPU230
- /ModDate: D:20190503125649-07'00'
- /Producer: Microsoft® Word for Office 365
- /Subject: 80-NU430-6 Rev. B
- /Title: Qualcomm® Secure Processing Unit SPU230 Core Security Target Lite
- pdf_file_size_bytes: 723737
- pdf_hyperlinks: https://createpoint.qti.qualcomm.com/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /CreationDate: D:20180305120726+01'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20180305120726+01'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 15342857
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 97
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
True |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |