name |
ST31G480 G01 including optional cryptographic library NESLIB (ANSSI-CC-2023/53)
|
ST31G480 A02 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2023-12-28
|
2016-08-26
|
not_valid_after |
2028-12-28
|
2024-09-27
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_53en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_58en.pdf
|
status |
active
|
archived
|
manufacturer |
STMicroelectronics
|
STMicroelectronics S.A.
|
manufacturer_web |
https://www.st.com/
|
https://www.st.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_53fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_58fr.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_53fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2016_58-S03.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2017, 2, 10), 'maintenance_title': 'ANSSI-CC-2016/58-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_58-M01.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2017, 6, 16), 'maintenance_title': 'ST31G480 A04 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2016_58-m02.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2018, 7, 6), 'maintenance_title': 'ST31G480 A05 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2016_58-m03.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2019, 9, 27), 'maintenance_title': 'Reassessment report: ANSSI-CC-2016/58-S03', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_58-S03.pdf', 'maintenance_st_link': None}) |
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
0446cba2f70d9f753ee5675f2520291377ec8884481787d57e25f48b4671595c
|
b97f2fad937d84d2c042ac9d881750adeb9a89999a1dc826150288ca64bab4ec
|
state/cert/txt_hash |
1616e92d535642f50a7c689f9495b250552055681be86f00d717c9b34da07636
|
277dd26d58ae02d5fc9904f0fffb4324a0fd62fe808ffdea774b84d292a18168
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
175a5187f3d4734303e2f8992957b25e679eecae3ca4e23bc88edce2c94edb2a
|
9d4bdbfd6c144cdc9653a014413b813ae782514564d13da91d96529472e8f050
|
state/report/txt_hash |
e1363a83cb2d71d607d909a34484c5a264bc3147579701478d14e27dcc3792e5
|
b31d924e0a40064a7307601e183bdfa9eb11d4a449e7050d10b736ef5d800cb4
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
8fefb6cbd85c37ad14c461f8f15337b4ae693a557000a9e34a93718f4d1023ef
|
82afa4e9f71963a743b7f581922e09abd3b849186f80526938e6d5ba1bab491c
|
state/st/txt_hash |
66a97642f0ffe2415b6839b1cb9bc6ef97d2f91b9a1ed87fe2ba1514bd4a0a76
|
3d9368e095072507daef0605c1cb0d1c7c2efa67643fbe751b0f2a935ba35c72
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2023/53
|
ANSSI-CC-2016/58
|
heuristics/cert_lab |
None
|
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2023, 53 |
- |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2019/17, ANSSI-CC-2017/44, ANSSI-CC-2017/61, ANSSI-CC-2019/16 |
heuristics/report_references/directly_referencing |
None
|
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2019/16, ANSSI-CC-2019/17, BSI-DSZ-CC-1074-V2-2020, ANSSI-CC-2017/44, ANSSI-CC-2019/08, BSI-DSZ-CC-1073-2019, BSI-DSZ-CC-1074-2019, ANSSI-CC-2017/61, BSI-DSZ-CC-1073-V2-2020 |
heuristics/report_references/indirectly_referencing |
None
|
None
|
heuristics/scheme_data |
- product:
ST31G480 G01 including optional cryptographic library NESLIB
- url:
https://cyber.gouv.fr/produits-certifies/st31g480-g01-including-optional-cryptographic-library-neslib
- description:
Le produit évalué est « ST31G480 G01 » développé par STMICROELECTRONICS.
Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applications bancaires, télévisi
- sponsor:
STMICROELECTRONICS
- developer:
STMICROELECTRONICS
- cert_id:
ANSSI-CC-2023/53
- level:
EAL5+
- expiration_date: 28 Décembre 2028
- enhanced:
- cert_id:
ANSSI-CC-2023/53
- certification_date:
28/12/2023
- expiration_date:
28/12/2028
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r5
- developer:
STMICROELECTRONICS
- sponsor:
STMICROELECTRONICS
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages , BSI-CC-PP-0084-2014
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ADV_IMP.2, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ASE_TSS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_53fr.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_53en.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_53fr.pdf
|
- product:
ST31G480 A02 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
- url:
https://cyber.gouv.fr/produits-certifies/st31g480-a02-including-optional-cryptographic-library-neslib-and-optional
- description:
Le produit certifié est le microcontrôleur « ST31G480 A02 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X » développé par STMICROELECTRONICS.
Comme décrit dans la cible de sécurité [ST] au paragraphe « TOE overview », ce produit se décline en différentes configurations selon la taille de mémoire non-volatile FLASH, l’activation des
- sponsor:
STMicroelectronics
- developer:
STMicroelectronics
- cert_id:
2016/58
- level:
EAL5+
- enhanced:
- cert_id:
2016/58
- certification_date:
25/08/2016
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r4
- developer:
STMicroelectronics
- sponsor:
STMicroelectronics
- evaluation_facility:
Serma Safety & Security
- level:
EAL5+
- protection_profile:
Security IC Platform Protection Profile w/ Augmentation Packages, v.1
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ACL_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2
- target_link:
https://cyber.gouv.fr/sites/default/files/2016/08/anssi-cible-cc-2016_58-m03en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2016/08/anssi-cc-2016_58en.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/2016/08/certificat-anssi-cc-2016_58-s03.pdf
|
heuristics/scheme_data/cert_id |
ANSSI-CC-2023/53
|
2016/58
|
heuristics/scheme_data/description |
Le produit évalué est « ST31G480 G01 » développé par STMICROELECTRONICS.
Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applications bancaires, télévisi
|
Le produit certifié est le microcontrôleur « ST31G480 A02 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X » développé par STMICROELECTRONICS.
Comme décrit dans la cible de sécurité [ST] au paragraphe « TOE overview », ce produit se décline en différentes configurations selon la taille de mémoire non-volatile FLASH, l’activation des
|
heuristics/scheme_data/developer |
STMICROELECTRONICS
|
STMicroelectronics
|
heuristics/scheme_data/enhanced |
- cert_id:
ANSSI-CC-2023/53
- certification_date:
28/12/2023
- expiration_date: 28/12/2028
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r5
- developer:
STMICROELECTRONICS
- sponsor:
STMICROELECTRONICS
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages , BSI-CC-PP-0084-2014
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ADV_IMP.2, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ASE_TSS.2, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_53fr.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_53en.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_53fr.pdf
|
- cert_id:
2016/58
- certification_date:
25/08/2016
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r4
- developer:
STMicroelectronics
- sponsor:
STMicroelectronics
- evaluation_facility:
Serma Safety & Security
- level:
EAL5+
- protection_profile:
Security IC Platform Protection Profile w/ Augmentation Packages, v.1
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ACL_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2
- target_link:
https://cyber.gouv.fr/sites/default/files/2016/08/anssi-cible-cc-2016_58-m03en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2016/08/anssi-cc-2016_58en.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/2016/08/certificat-anssi-cc-2016_58-s03.pdf
|
heuristics/scheme_data/enhanced/augmented |
ADV_IMP.2, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ASE_TSS.2, AVA_VAN.5
|
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ACL_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2
|
heuristics/scheme_data/enhanced/category |
Micro-circuits
|
Micro-circuits
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r4
|
heuristics/scheme_data/enhanced/cert_id |
ANSSI-CC-2023/53
|
2016/58
|
heuristics/scheme_data/enhanced/cert_link |
https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_53fr.pdf
|
https://cyber.gouv.fr/sites/default/files/2016/08/certificat-anssi-cc-2016_58-s03.pdf
|
heuristics/scheme_data/enhanced/certification_date |
28/12/2023
|
25/08/2016
|
heuristics/scheme_data/enhanced/developer |
STMICROELECTRONICS
|
STMicroelectronics
|
heuristics/scheme_data/enhanced/evaluation_facility |
SERMA SAFETY & SECURITY
|
Serma Safety & Security
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
CCRA
SOG-IS
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
Security IC Platform Protection Profile with Augmentation Packages , BSI-CC-PP-0084-2014
|
Security IC Platform Protection Profile w/ Augmentation Packages, v.1
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_53fr.pdf
|
https://cyber.gouv.fr/sites/default/files/2016/08/anssi-cc-2016_58en.pdf
|
heuristics/scheme_data/enhanced/sponsor |
STMICROELECTRONICS
|
STMicroelectronics
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_53en.pdf
|
https://cyber.gouv.fr/sites/default/files/2016/08/anssi-cible-cc-2016_58-m03en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
ST31G480 G01 including optional cryptographic library NESLIB
|
ST31G480 A02 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
|
heuristics/scheme_data/sponsor |
STMICROELECTRONICS
|
STMicroelectronics
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/st31g480-g01-including-optional-cryptographic-library-neslib
|
https://cyber.gouv.fr/produits-certifies/st31g480-a02-including-optional-cryptographic-library-neslib-and-optional
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-CC-2023_53fr.pdf
|
certificat ANSSI-CC-2016_58-S03.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_IMP.2:
1
- ADV_TDS.5:
1
- ALC:
- ALC_CMC.5:
1
- ALC_DVS.2:
1
- ALC_FLR.1:
2
- ALC_TAT.3:
1
- AVA:
- ASE:
|
- ADV:
- ADV_IMP.2:
1
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ALC:
- ALC_CMC.5:
1
- ALC_DVS.2:
1
- ALC_FLR.1:
1
- ALC_TAT.3:
1
- ATE:
- ATE_COV.3:
1
- ATE_FUN.2:
1
- AVA:
- ASE:
|
pdf_data/cert_keywords/cc_sar/ADV |
- ADV_IMP.2:
1
- ADV_TDS.5:
1
|
- ADV_IMP.2:
1
- ADV_INT.3: 1
- ADV_TDS.5:
1
|
pdf_data/cert_keywords/cc_sar/ADV/ADV_IMP.2 |
1
|
1
|
pdf_data/cert_keywords/cc_sar/ADV/ADV_TDS.5 |
1
|
1
|
pdf_data/cert_keywords/cc_sar/ALC/ALC_CMC.5 |
1
|
1
|
pdf_data/cert_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
1
|
pdf_data/cert_keywords/cc_sar/ALC/ALC_FLR.1 |
2
|
1
|
pdf_data/cert_keywords/cc_sar/ALC/ALC_TAT.3 |
1
|
1
|
pdf_data/cert_keywords/cc_sar/ASE |
|
|
pdf_data/cert_keywords/cc_sar/AVA |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL5 |
1
|
1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
159144
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /CreationDate:
D:20240105142120+01'00'
- /Creator:
Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate:
D:20240105150219+01'00'
- /Producer:
Adobe PDF Library 23.1.175
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1913028
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Producer:
GPL Ghostscript 9.50
- /CreationDate:
D:20210318180219+01'00'
- /ModDate:
D:20210318180219+01'00'
- /Title: Microsoft Word - certificat ANSSI-CC-2016_58-S03.docx
- /Creator:
PScript5.dll Version 5.2.2
- /Author: jchuzel
- pdf_hyperlinks:
|
pdf_data/cert_metadata//CreationDate |
D:20240105142120+01'00'
|
D:20210318180219+01'00'
|
pdf_data/cert_metadata//Creator |
Acrobat PDFMaker 23 pour Word
|
PScript5.dll Version 5.2.2
|
pdf_data/cert_metadata//ModDate |
D:20240105150219+01'00'
|
D:20210318180219+01'00'
|
pdf_data/cert_metadata//Producer |
Adobe PDF Library 23.1.175
|
GPL Ghostscript 9.50
|
pdf_data/cert_metadata/pdf_file_size_bytes |
159144
|
1913028
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
2
|
pdf_data/report_filename |
ANSSI-CC-2023_53fr.pdf
|
ANSSI-CC-2016_58fr.pdf
|
pdf_data/report_frontpage/FR |
|
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2016/58
- cert_item:
ST31G480 A02 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
- cert_item_version:
A02
- ref_protection_profiles:
Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité à “Package 1: Loader dedicated for usage in Secured Environment only
- cc_version:
Critères Communs version 3.1 révision 4
- cc_security_level:
EAL 5 augmenté ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ACL_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2
- developer:
STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
- cert_lab:
Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0084-2014:
1
- BSI-PP-0084-2014: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084-2014 |
1
|
2
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_IMP.2:
1
- ADV_TDS.5:
1
- ALC:
- ALC_CMC.5:
1
- ALC_DVS.2:
1
- ALC_FLR.1:
2
- ALC_TAT.3:
1
- ALC_FLR:
1
- AVA:
- ASE:
|
- ADV:
- ADV_IMP.2:
2
- ADV_INT.3:
2
- ADV_TDS.5:
2
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_CMC.5:
2
- ALC_FLR.1:
2
- ALC_TAT.3:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_LCD:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.3:
2
- ATE_FUN.2:
2
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_TSS.2:
2
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_IMP.2:
1
- ADV_TDS.5:
1
|
- ADV_IMP.2:
2
- ADV_INT.3: 2
- ADV_TDS.5:
2
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP.2 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.5 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_CMC.5:
1
- ALC_DVS.2: 1
- ALC_FLR.1:
2
- ALC_TAT.3:
1
- ALC_FLR:
1
|
- ALC_CMC.5:
2
- ALC_FLR.1:
2
- ALC_TAT.3:
2
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_LCD: 1
- ALC_TAT: 1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 |
2
|
2
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 |
1
|
2
|
pdf_data/report_keywords/cc_sar/ASE |
|
- ASE_TSS.2:
2
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 |
1
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
1
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
1
|
3
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL 5: 3
- EAL2:
2
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 7: 1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib 4.2:
2
- NesLib 4.2.10:
1
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security:
3
|
pdf_data/report_keywords/eval_facility/Serma |
|
- Serma Safety & Security:
3
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- BSI:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES |
1
|
2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20240105141914+01'00'
|
D:20160826175623+02'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 23 pour Word
|
Microsoft® Word 2010
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
D:20240105150220+01'00'
|
D:20160826175623+02'00'
|
pdf_data/report_metadata//Producer |
Adobe PDF Library 23.1.175
|
Microsoft® Word 2010
|
pdf_data/report_metadata/pdf_file_size_bytes |
347860
|
598814
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
13
|
16
|
pdf_data/st_filename |
ANSSI-cible-CC-2023_53en.pdf
|
ANSSI_cible2016_58en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
5
|
3
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
11
|
2
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.RND:
4
- O.TOE-:
1
- O.C:
2
- T:
- R:
|
|
pdf_data/st_keywords/cc_claims/O |
- O.RND:
4
- O.TOE-: 1
- O.C: 2
|
|
pdf_data/st_keywords/cc_claims/O/O.RND |
4
|
4
|
pdf_data/st_keywords/cc_claims/T |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP- 0084-2014 |
10
|
8
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084- |
2
|
3
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084-2014 |
64
|
65
|
pdf_data/st_keywords/cc_sar/ADO |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP:
4
- ADV_IMP.2:
4
- ADV_TDS.5:
4
- ADV_ARC.1:
2
- ADV_FSP.5:
3
- ADV_INT.2: 1
- ADV_ARC:
2
- ADV_IMP:
1
|
- ADV_FSP:
4
- ADV_IMP.2:
4
- ADV_INT.3: 4
- ADV_TDS.5:
4
- ADV_ARC.1:
2
- ADV_FSP.5:
3
- ADV_SPM: 1
- ADV_ARC:
2
- ADV_IMP:
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC |
2
|
2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
2
|
2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP |
4
|
4
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 |
3
|
3
|
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 |
4
|
4
|
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.5 |
4
|
4
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMC.5:
4
- ALC_DVS.2:
4
- ALC_FLR.1:
6
- ALC_TAT.3:
4
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_DVS:
1
- ALC_CMS:
1
- ALC_CMC:
1
|
- ALC_CMC.5:
4
- ALC_DVS.2:
4
- ALC_FLR.1:
6
- ALC_TAT.3:
4
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_DVS:
1
- ALC_CMS:
1
- ALC_CMC:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL |
4
|
4
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD |
3
|
3
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT |
2
|
2
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
2
|
2
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ |
11
|
22
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ |
33
|
51
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD |
7
|
11
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS |
10
|
13
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.2 |
6
|
6
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV:
3
- ATE_COV.2: 1
- ATE_DPT.3:
1
- ATE_FUN.1: 1
- ATE_IND.2:
1
|
- ATE_COV:
3
- ATE_COV.3: 4
- ATE_FUN.2: 4
- ATE_DPT.3:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV |
3
|
3
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4 |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
15
|
14
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
2
|
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5+ |
1
|
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAR.1:
25
- FAU_SAS.1:
28
- FAU_SAS:
2
- FAU_GEN.1:
8
- FCS:
- FCS_RNG.1:
6
- FCS_COP.1:
35
- FCS_CKM.1:
20
- FCS_RNG:
2
- FCS_CKM.4:
4
- FDP:
- FDP_SDC.1:
8
- FDP_SDI.2:
14
- FDP_ITT.1:
10
- FDP_IFC.1:
17
- FDP_ACC.2:
12
- FDP_ACF.1:
28
- FDP_UCT.1:
16
- FDP_UIT.1:
16
- FDP_ACC.1:
22
- FDP_SDC:
2
- FDP_ACF:
1
- FDP_ITC.1:
3
- FDP_ITC.2:
2
- FDP_CKM.2:
1
- FDP_SMF.1:
2
- FDP_SMR.1:
1
- FIA:
- FIA_API.1:
6
- FIA_UID.1:
16
- FIA_UAU.1:
14
- FIA_API:
2
- FMT:
- FMT_LIM.1:
29
- FMT_LIM.2:
30
- FMT_MSA.3:
26
- FMT_MSA.1:
26
- FMT_SMF.1:
21
- FMT_SMR.1:
17
- FMT_LIM:
2
- FPT:
- FPT_FLS.1:
22
- FPT_PHP.3:
11
- FPT_ITT.1:
9
- FRU:
- FTP:
- FTP_ITC.1:
27
- FTP_TRP.1:
2
|
- FAU:
- FCS:
- FCS_RNG.1:
8
- FCS_COP.1:
45
- FCS_CKM.1:
22
- FCS_CKM.4:
22
- FCS_RNG:
2
- FDP:
- FDP_SDC.1:
8
- FDP_SDI.2:
8
- FDP_ITT.1:
10
- FDP_IFC.1:
21
- FDP_ACC.2:
12
- FDP_ACF.1:
63
- FDP_ACC.1:
61
- FDP_ITC.1:
15
- FDP_ITC.2:
24
- FDP_RIP.1:
18
- FDP_ROL.1:
9
- FDP_SDC:
2
- FDP_CKM.2:
1
- FDP_SMF.1:
2
- FDP_SMR.1:
1
- FIA:
- FIA_UID.1:
14
- FIA_UID.2:
22
- FIA_UAU.2:
18
- FIA_UAU.5:
19
- FMT:
- FMT_LIM.1:
17
- FMT_LIM.2:
18
- FMT_MSA.3:
58
- FMT_MSA.1:
44
- FMT_SMF.1:
38
- FMT_SMR.1:
40
- FMT_MTD.1:
18
- FMT_LIM:
2
- FMT_ITC.1:
1
- FPR:
- FPT:
- FPT_FLS.1:
17
- FPT_PHP.3:
11
- FPT_ITT.1:
9
- FPT_TDC.1:
20
- FPT_RPL.1:
22
- FPT_TRP.1:
17
- FRU:
- FRU_FLT.2:
13
- FRU_RSA.2:
18
- FTP:
- FTP_TRP.1:
11
- FTP_TRP.1.3:
5
- FTP_ITC.1:
2
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAR.1: 25
- FAU_SAS.1:
28
- FAU_SAS:
2
- FAU_GEN.1: 8
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 |
28
|
6
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
20
|
22
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
4
|
22
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
35
|
45
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
6
|
8
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_SDC.1:
8
- FDP_SDI.2:
14
- FDP_ITT.1:
10
- FDP_IFC.1:
17
- FDP_ACC.2:
12
- FDP_ACF.1:
28
- FDP_UCT.1: 16
- FDP_UIT.1: 16
- FDP_ACC.1:
22
- FDP_SDC:
2
- FDP_ACF: 1
- FDP_ITC.1:
3
- FDP_ITC.2:
2
- FDP_CKM.2:
1
- FDP_SMF.1:
2
- FDP_SMR.1:
1
|
- FDP_SDC.1:
8
- FDP_SDI.2:
8
- FDP_ITT.1:
10
- FDP_IFC.1:
21
- FDP_ACC.2:
12
- FDP_ACF.1:
63
- FDP_ACC.1:
61
- FDP_ITC.1:
15
- FDP_ITC.2:
24
- FDP_RIP.1: 18
- FDP_ROL.1: 9
- FDP_SDC:
2
- FDP_CKM.2:
1
- FDP_SMF.1:
2
- FDP_SMR.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
22
|
61
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.2 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
28
|
63
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_CKM.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
17
|
21
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
3
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
2
|
24
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
14
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SMF.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SMR.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API.1: 6
- FIA_UID.1:
16
- FIA_UAU.1: 14
- FIA_API: 2
|
- FIA_UID.1:
14
- FIA_UID.2: 22
- FIA_UAU.2: 18
- FIA_UAU.5: 19
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
16
|
14
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM.1:
29
- FMT_LIM.2:
30
- FMT_MSA.3:
26
- FMT_MSA.1:
26
- FMT_SMF.1:
21
- FMT_SMR.1:
17
- FMT_LIM:
2
|
- FMT_LIM.1:
17
- FMT_LIM.2:
18
- FMT_MSA.3:
58
- FMT_MSA.1:
44
- FMT_SMF.1:
38
- FMT_SMR.1:
40
- FMT_MTD.1: 18
- FMT_LIM:
2
- FMT_ITC.1: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
29
|
17
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
30
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
26
|
44
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
26
|
58
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
21
|
38
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
17
|
40
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS.1:
22
- FPT_PHP.3:
11
- FPT_ITT.1:
9
|
- FPT_FLS.1:
17
- FPT_PHP.3:
11
- FPT_ITT.1:
9
- FPT_TDC.1: 20
- FPT_RPL.1: 22
- FPT_TRP.1: 17
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
22
|
17
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FRU |
|
- FRU_FLT.2:
13
- FRU_RSA.2: 18
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 |
11
|
13
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
27
- FTP_TRP.1:
2
|
- FTP_TRP.1:
11
- FTP_TRP.1.3: 5
- FTP_ITC.1:
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
27
|
2
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
11
|
pdf_data/st_keywords/certification_process/OutOfScope |
- out of scope:
1
- ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib, when it is embedded: 1
- The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib, when it is embedded. 1.6.3 TOE documentation 37 The user guidance: 1
|
- out of scope:
1
- ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, MIFARE DESFire EV1, and MIFARE Plus X when they are embedded: 1
- The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, MIFARE DESFire EV1, and MIFARE Plus X when they are embedded. 40: 1
|
pdf_data/st_keywords/certification_process/OutOfScope/out of scope |
1
|
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
8
|
5
|
pdf_data/st_keywords/cipher_mode/ECB/ECB |
7
|
2
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library/Neslib |
- NesLib 6.2.1:
2
- NesLib :
9
- NesLib 301:
1
- NesLib 302:
1
- NesLib 305:
1
- NesLib 308:
1
- NesLib 312:
1
- NesLib 313:
1
- NesLib 314:
1
- NesLib 316:
1
- NesLib 317:
1
- NesLib 6.2:
2
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224:
5
- SHA-256:
8
- SHA-384:
8
- SHA-512:
7
- SHA-2:
3
- SHA3:
- SHA-3:
4
- SHA3-224:
4
- SHA3-256:
4
- SHA3-384:
4
- SHA3-512:
4
- Keccak:
- SHAKE:
|
- SHA:
- SHA1:
- SHA2:
- SHA-256:
9
- SHA-384:
6
- SHA-512:
6
- SHA-224:
5
|
pdf_data/st_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA-224:
5
- SHA-256:
8
- SHA-384:
8
- SHA-512:
7
- SHA-2:
3
- SHA3:
- SHA-3:
4
- SHA3-224:
4
- SHA3-256:
4
- SHA3-384:
4
- SHA3-512:
4
|
- SHA1:
- SHA2:
- SHA-256:
9
- SHA-384:
6
- SHA-512:
6
- SHA-224:
5
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-224:
5
- SHA-256:
8
- SHA-384:
8
- SHA-512:
7
- SHA-2: 3
|
- SHA-256:
9
- SHA-384:
6
- SHA-512:
6
- SHA-224:
5
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
5
|
5
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
8
|
9
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 |
8
|
6
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 |
7
|
6
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
13
|
13
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
2
|
6
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
14
|
12
|
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing |
4
|
4
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
3
|
3
|
pdf_data/st_keywords/side_channel_analysis/SCA/side channel |
10
|
6
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2017-04-002:
25
- CCMB-2017-04-003:
2
- CCMB-2017-04-001:
2
|
- CCMB-2012-09-002:
63
- CCMB-2012-09-003:
2
- CCMB-2012-09-001:
2
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS PUB 197:
4
- FIPS PUB 186-4:
4
- FIPS PUB 180-2:
5
- FIPS PUB 198-1:
3
- FIPS PUB 202: 6
- FIPS PUB 140-2:
5
|
- FIPS PUB 197:
4
- FIPS PUB 186-4:
4
- FIPS PUB 180-2:
5
- FIPS PUB 198-1:
3
- FIPS PUB 140-2:
5
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 140-2 |
5
|
5
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-2 |
5
|
5
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 186-4 |
4
|
4
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
4
|
4
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 198-1 |
3
|
3
|
pdf_data/st_keywords/standard_id/ISO |
- ISO/IEC 7816-3:
1
- ISO/IEC 14443:
2
- ISO/IEC 18092:
2
- ISO/IEC 9796-2:
3
- ISO/IEC 14888:
2
- ISO/IEC 9796:
1
|
- ISO/IEC 7816-3:
1
- ISO/IEC 14443:
2
- ISO/IEC 18092:
2
- ISO/IEC 9796-2:
3
- ISO/IEC 14888:
2
- ISO/IEC 9796:
1
|
pdf_data/st_keywords/standard_id/NIST |
- NIST SP 800-67:
3
- SP 800-38A:
3
- NIST SP 800-38B:
2
- SP 800-38D: 1
- SP 800-38C: 1
- NIST SP 800-56A:
3
- NIST SP 800-90:
4
- NIST SP 800-38A:
2
- SP 800-67:
1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- SP 800-90A:
1
|
- NIST SP 800-67:
3
- SP 800-38A:
2
- NIST SP 800-56A:
3
- NIST SP 800-90:
4
- NIST SP 800-38A:
2
- SP 800-67:
1
- NIST SP 800-38B:
1
- SP 800-90A:
1
|
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-38A |
2
|
2
|
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-38B |
2
|
1
|
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-56A |
3
|
3
|
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-67 |
3
|
3
|
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-90 |
4
|
4
|
pdf_data/st_keywords/standard_id/NIST/SP 800-38A |
3
|
2
|
pdf_data/st_keywords/standard_id/NIST/SP 800-67 |
1
|
1
|
pdf_data/st_keywords/standard_id/NIST/SP 800-90A |
1
|
1
|
pdf_data/st_keywords/standard_id/PKCS/PKCS #1 |
6
|
8
|
pdf_data/st_keywords/standard_id/PKCS/PKCS1 |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
- AES:
16
- AES-128:
1
- AES-192:
1
- AES-256: 1
|
- AES:
43
- AES-128:
1
- AES-192:
1
- AES-: 1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
16
|
43
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES-128 |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES-192 |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
10
|
4
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
13
|
14
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
- HMAC:
3
- CMAC:
3
- CBC-MAC: 2
|
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC |
3
|
2
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC |
3
|
3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- STMicroelectronics:
- Philips:
|
- NXP:
- Infineon:
- STMicroelectronics:
- Philips:
|
pdf_data/st_keywords/vendor/Infineon |
|
|
pdf_data/st_keywords/vendor/Philips |
|
|
pdf_data/st_keywords/vendor/STMicroelectronics/STMicroelectronics |
28
|
21
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Christiane DROULERS
|
Christiane DROULERS
|
pdf_data/st_metadata//CreationDate |
D:20230905104908Z
|
D:20160613120125Z
|
pdf_data/st_metadata//Creator |
FrameMaker 11.0.2
|
FrameMaker 11.0
|
pdf_data/st_metadata//ModDate |
D:20230905104946+02'00'
|
D:20160613120431+02'00'
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 11.0 (Windows)
|
Acrobat Elements 10.0.0 (Windows)
|
pdf_data/st_metadata//Title |
SMD_ST31G480_VG01_1P.book
|
SMD_ST31G480_VA02_4P.book
|
pdf_data/st_metadata/pdf_file_size_bytes |
662607
|
1856594
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
85
|
124
|
dgst |
3aefd691d84a7592
|
2687d9200bcfc8b0
|