| name |
Motorola WS5100 Wireless Switch |
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8 |
| category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
NO |
FR |
| status |
archived |
archived |
| not_valid_after |
01.09.2019 |
01.09.2019 |
| not_valid_before |
09.07.2009 |
21.07.2014 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20090709_SERTIT-009_CR_v1_0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014-46%20-%20OriginalSigné.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MOTOROLA_ST-v1.5.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-46en.pdf |
| manufacturer |
Motorola, Inc. |
STMicroelectronics |
| manufacturer_web |
https://www.motorola.com/ |
https://www.st.com/ |
| security_level |
EAL4+, ALC_FLR.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
35a0ae25dbb74530 |
911af0b28d2e5f4e |
| heuristics/cert_id |
SERTIT-009 |
ANSSI-CC-2014/46 |
| heuristics/cert_lab |
[] |
THALES |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AVA_MSU.2, ATE_FUN.1, ADV_RCR.1, ADV_LLD.1, ATE_IND.2, AVA_VLA.2, ATE_DPT.1, AGD_USR.1, ADV_IMP.1, ALC_LCD.1, ALC_FLR.2, ADV_HLD.2, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ADV_SPM.1 |
ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, AGD_PRE.1, ALC_CMS.5, ATE_IND.2, ATE_DPT.3, AVA_VAN.5, ATE_FUN.1, AGD_OPE.1, ATE_COV.2, ALC_CMC.4, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1, ADV_INT.2, ALC_TAT.2, ADV_IMP.1 |
| heuristics/extracted_versions |
- |
3.7, 3.8, 4.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2017/02, ANSSI-CC-2016/22, CRP280 |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2017/73, BSI-DSZ-CC-1131-2020, BSI-DSZ-CC-1111-2019, ANSSI-CC-2017/02, BSI-DSZ-CC-1131-V2-2023, BSI-DSZ-CC-1070-2018, ANSSI-CC-2016/22, ANSSI-CC-2016/31, ANSSI-CC-2019/37, CRP280 |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- category: Other Devices and Systems
- certification_date: 09.07.2009
- developer: Motorola, Inc.
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-009
- certification_date: 09.07.2009
- description: SERTIT-009 C
- developer: Motorola, Inc.
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134617-1607949712/SERTIT/Sertifikater/2009/09/MOTOROLA_ST-v1.5.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134614-1607949708/SERTIT/Sertifikater/2009/09/20090709_SERTIT-009_CR_v1_0.pdf'})]})
- evaluation_facility: Aspect Labs
- level: EAL 4, ALC_FLR.2
- mutual_recognition: CCRA, SOG-IS
- product: HW: WS5100; SW: WS5100-3.0.0.0-022GR
- protection_profile: US Government Wireless Local Area Network (WLAN) Access System Protection Profile for Basic Robustness Environments, Version 1.0, April 2006
- sponsor: Motorola, Inc.
- product: Motorola WS5100 Wireless Switch
- url: https://sertit.no/certified-products/product-archive/motorola-ws5100-wireless-switch
|
|
| heuristics/st_references/directly_referenced_by |
{} |
CRP280, ANSSI-CC-2016/22 |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
CRP280, ANSSI-CC-2016/22 |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
a91e9c889e6f3e47 |
f6d23054061d72ba |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_as_br_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
20090709_SERTIT-009_CR_v1_0.pdf |
ANSSI-CC-2014-46 - OriginalSigné.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL5 Augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: CC version 3.1 révision 4
- cert_id: ANSSI-CC-2014/46
- cert_item: Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8
- cert_item_version: Référence maskset K8H0A, révision interne F, firmware révision 9
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 27
- EAL 4 augmented: 23
- EAL1: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 2
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FCS:
- FCS_BCM_EXP.1: 1
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_CKM_EXP.2: 1
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 1
- FDP:
- FDP_PUD_EXP.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UAU_EXP.5: 1
- FIA_UID.2: 1
- FIA_USB.1: 2
- FMT:
- FMT_MOF.1: 3
- FMT_MSA.2: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 3
- FMT_SMR.1: 1
- FPT:
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM_EXP.1: 1
- FPT_TST_EXP.1: 1
- FPT_TST_EXP.2: 1
- FTA:
- FTA_SSL.3: 1
- FTA_TAB.1: 1
- FTP:
- FTP_ITC_EXP.1: 1
- FTP_TRP.1: 1
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib 4.1: 3
- NesLib v4.1: 3
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- FIPS:
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: ragea
- /CR issue: 1.0
- /CRNumber: 009
- /Company: SERTIT
- /CreationDate: D:20090709131724+02'00'
- /Creator: Acrobat PDFMaker 8.1 for Word
- /Day Month Year: 9 July 2009
- /Developers name: Motorola, Inc.
- /EAL: EAL 4 augmented with ALC_FLR.2
- /ETR date final: 28 May 2009
- /Keywords: ugradert
- /ModDate: D:20090709131731+02'00'
- /Name of EVIT: Aspect Labs, a division of BKP Security, Inc.
- /PP name: US Government Wireless Local Network Access System Protection Profile for Basic Robustness Environments
- /Prod name and version platform: Motorola WS5100 Wireless Switch
- /Producer: Adobe PDF Library 8.0
- /Product name: Motorola WS5100 Wireless Switch
- /Product version: HW: WS5100 SW: WS5100-3.0.0.0-022GR
- /Sponsor name: Motorola, Inc.
- /Title: tittel
- pdf_file_size_bytes: 474373
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: Duquesnoy
- /CreationDate: D:20140721174339+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.010
- /ModDate: D:20140721174339+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8
- /Title: ANSSI-CC-2014/46
- pdf_file_size_bytes: 783296
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
| pdf_data/st_filename |
MOTOROLA_ST-v1.5.pdf |
ANSSI-CC-cible_2014-46en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 9
- EAL4 augmented: 2
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 17
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.1: 1
- ACM_CAP.2: 1
- ACM_CAP.4: 2
- ACM_SCP.1: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.1: 2
- ADO_DEL.2: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_HLD.1: 1
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 6
- ADV_SPM.1: 3
- AGD:
- AGD_ADM.1: 6
- AGD_USR.1: 3
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.2: 8
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 4
- AVA:
- AVA_MSU.1: 2
- AVA_MSU.2: 2
- AVA_SOF.1: 5
- AVA_VLA.1: 3
- AVA_VLA.2: 2
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 23
- FAU_GEN.1.1: 4
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 1
- FAU_STG: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 6
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP.1: 11
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM: 1
- FCS_CKM.1: 16
- FCS_CKM.2: 5
- FCS_CKM.4: 15
- FCS_CKM_EXP.2: 16
- FCS_CKM_EXP.2.1: 1
- FCS_COP: 2
- FCS_COP.1: 3
- FCS_COP_EXP.1: 16
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 23
- FCS_COP_EXP.2.1: 2
- FDP:
- FDP_ACC.1: 1
- FDP_AFC: 1
- FDP_IFC: 1
- FDP_IFC.1: 1
- FDP_PUD: 1
- FDP_PUD_EXP: 2
- FDP_PUD_EXP.1: 8
- FDP_PUD_EXP.1.1: 1
- FDP_PUP_EXP.1: 1
- FDP_RIP.1: 15
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 15
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_UAU: 4
- FIA_UAU.1: 16
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5.1: 1
- FIA_UAU_EXP.5: 14
- FIA_UAU_EXP.5.1: 2
- FIA_UAU_EXP.5.2: 2
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB.1: 14
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF.1: 29
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 15
- FMT_MSA.2.1: 1
- FMT_MTD.1: 33
- FMT_MTD.1.1: 5
- FMT_SMF.1: 34
- FMT_SMF.1.1: 5
- FMT_SMR.1: 24
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 2
- FPT_SEP.1: 12
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_STM_EXP.1: 8
- FPT_STM_EXP.1.1: 1
- FPT_TST.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST_EXP.1: 9
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 8
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC_EXP.1: 17
- FTP_ITC_EXP.1.1: 3
- FTP_ITC_EXP.1.2: 2
- FTP_ITC_EXP.1.3: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.4: 13
- FCS_COP.1: 34
- FCS_RNG: 1
- FCS_RNG.1: 7
- FDP:
- FDP_ACC.1: 42
- FDP_ACC.2: 12
- FDP_ACF.1: 47
- FDP_CKM.2: 1
- FDP_IFC.1: 15
- FDP_ITC.1: 14
- FDP_ITC.2: 13
- FDP_ITT.1: 7
- FDP_RIP.1: 9
- FDP_ROL.1: 9
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FIA:
- FIA_UAU.2: 9
- FIA_UAU.5: 10
- FIA_UID.1: 2
- FIA_UID.2: 11
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 1
- FMT_LIM.1: 18
- FMT_LIM.2: 17
- FMT_MSA.1: 36
- FMT_MSA.2: 1
- FMT_MSA.3: 46
- FMT_MTD.1: 9
- FMT_SMF.1: 27
- FMT_SMR.1: 22
- FPR:
- FPT:
- FPT_FLS.1: 10
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_RPL.1: 10
- FPT_TDC.1: 10
- FPT_TRP.1: 6
- FRU:
- FRU_FLT.2: 9
- FRU_RSA.2: 9
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 6
- FTP_TRP.1.3: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMINISTRATION: 1
- A.NO_EVIL: 1
- A.NO_GENERAL_P: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- O:
- O.ACCESS: 1
- O.ADMIN_GUIDANCE: 6
- O.AUDIT_GENERATION: 4
- O.CONFIGURATION_: 4
- O.CONFIGURATION_IDENTIF: 2
- O.CORRECT_: 3
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 8
- O.CRYPTOGRAPHY_VAL: 1
- O.CRYPTOGRAPHY_VALID: 2
- O.CRYPTOGRAPHY_VALIDA: 2
- O.CRYPTOGRAPHY_VALIDATED: 1
- O.DISPLAY_BANNER: 4
- O.DOCUMENTED_: 2
- O.DOCUMENTED_DESIG: 1
- O.DOCUMENTED_DESIGN: 3
- O.MANAGE: 10
- O.MEDIATE: 6
- O.PARTIAL_: 1
- O.PARTIAL_FUNCTIONA: 1
- O.PARTIAL_FUNCTIONAL_: 2
- O.PARTIAL_FUNCTIONAL_T: 2
- O.RESIDUAL_: 5
- O.RESIDUAL_INFORMATIO: 1
- O.RESIDUAL_INFORMATION: 4
- O.SELF_PROTECTION: 6
- O.TIME_STAMPS: 4
- O.TOE_ACCESS: 10
- O.VULNERABILITY_: 5
- O.VULNERABILITY_ANALYSI: 3
- O.VULNERABILITY_ANALYSIS: 1
- OE:
- OE.ADMIN: 1
- OE.AUDIT_PROTECTION: 4
- OE.AUDIT_REVIEW: 4
- OE.MANAGE: 8
- OE.NO_EVIL: 7
- OE.NO_GENERAL_PURP: 1
- OE.NO_GENERAL_PURPO: 1
- OE.NO_GENERAL_PURPOS: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 3
- OE.PROTECT_MGMT_CO: 1
- OE.PROTECT_MGMT_COM: 1
- OE.PROTECT_MGMT_COMM: 1
- OE.PROTECT_MGMT_COMMS: 1
- OE.RESIDUAL_INFORMA: 1
- OE.RESIDUAL_INFORMATI: 3
- OE.RESIDUAL_INFORMATIO: 2
- OE.RESIDUAL_INFORMATION: 1
- OE.SELF_PROTECTION: 6
- OE.TIME_STAMPS: 4
- OE.TOE_ACCESS: 8
- OE.TOE_NO_BYPASS: 7
- T:
- T.ACCIDENTAL_: 1
- T.ACCIDENTAL_ADMIN_: 2
- T.ACCIDENTAL_CRYPTO_COM: 1
- T.MASQUERADE: 2
- T.POOR_DESIGN: 2
- T.POOR_IMPLEMENTATION: 2
- T.POOR_TEST: 2
- T.RESIDUAL_DATA: 2
- T.SIGNAL_DETECT: 1
- T.TSF_COMPROMISE: 2
- T.UNATTENDED_: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_: 1
- T.UNAUTH_ADMIN_ACCESS: 2
|
|
| pdf_data/st_keywords/vendor |
|
- Infineon:
- Philips:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 26
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 3
- CMAC: 2
- HMAC: 3
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 6
- SHA-256: 9
- SHA-384: 6
- SHA-512: 4
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
- Neslib:
- NESLIB 4.1: 1
- NesLib 4.1: 2
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 9
- malfunction: 4
- physical tampering: 1
- SCA:
- Leak-Inherent: 8
- Physical Probing: 4
- physical probing: 3
- side channel: 6
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- FIPS 140: 1
- FIPS 140-1: 1
- FIPS 140-2: 13
- FIPS PUB 140-2: 1
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 40
- CCMB-2012-09-003: 2
- FIPS:
- FIPS 186-3: 2
- FIPS PUB 140-2: 5
- FIPS PUB 180-4: 5
- FIPS PUB 197: 4
- FIPS PUB 198-1: 2
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 10116: 7
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9797: 1
- ISO/IEC 9797-1: 3
- NIST:
- NIST SP 800-38B: 2
- NIST SP 800-90A: 5
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 31 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded. 32 The TOE optionally: 1
- ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded: 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /Author: User
- /CreationDate: D:20090520174815
- /Creator: Pdf995
- /Keywords:
- /ModDate: D:20090520174815
- /Producer: GPL Ghostscript 8.15
- /Subject:
- /Title:
- pdf_file_size_bytes: 546993
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
- /CreationDate: D:20140630112314Z
- /Creator: FrameMaker 7.2
- /ModDate: D:20140812174800+02'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 640362
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |