Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TrustWare 3.0 (v3.0.5)
NSCIB-CC-234008-CR
Cortex M33 r0p4
NSCIB-CC-202003-CR
name TrustWare 3.0 (v3.0.5) Cortex M33 r0p4
category Trusted Computing ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_after 11.10.2024 13.02.2025
not_valid_before 11.10.2019 13.02.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-19-234008.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-20-202003.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-234008-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-202003-CR%20v1.1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TrustWare%203.0%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[M33-STL]%20arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf
manufacturer Samsung Electronics Co., Ltd. Arm Limited
manufacturer_web https://www.samsung.com https://www.arm.com
security_level EAL2+, AVA_TEE.2 EAL6+, ASE_TSS.2, ALC_FLR.1
dgst 455e10571eb0cf1c d9414c80a0ee7958
heuristics/cert_id NSCIB-CC-234008-CR NSCIB-CC-202003-CR
heuristics/extracted_sars ASE_INT.1, AVA_TEE.2, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 3.0.5, 3.0 -
pdf_data/cert_filename Signed certificate CC-19-234008.pdf CC-20-202003.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-19-234008: 1
  • NL:
    • CC-20-202003: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • AVA:
    • AVA_TEE.2: 1
  • ALC:
    • ALC_FLR.1: 1
  • ASE:
    • ASE_TSS.2: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 1
pdf_data/cert_metadata
  • /CreationDate: D:20191011155832+01'00'
  • /Creator: C458-M&S
  • /ModDate: D:20191011155832+01'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S19101115580
  • pdf_file_size_bytes: 184548
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20200213160251+01'00'
  • /Creator: NL-ARN-SAL-C
  • /ModDate: D:20200213160645+01'00'
  • /Producer: KONICA MINOLTA bizhub C300i
  • pdf_file_size_bytes: 173675
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename Certification Report NSCIB-CC-234008-CR.pdf Certification Report NSCIB-CC-202003-CR v1.1.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-234008-CR
    • cert_item: TrustWare 3.0 (v3.0.5
    • cert_lab: Brightsight
    • developer: Samsung Electronics Co., Ltd
  • NL:
    • cert_id: NSCIB-CC-202003-CR
    • cert_item: Cortex M33 r0p4
    • cert_lab: Brightsight
    • developer: Arm Limited
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-234008-CR: 12
  • NL:
    • NSCIB-CC-202003-CR: 13
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 1
    • EAL4+: 2
    • EAL6: 5
    • EAL6 augmented: 3
    • EAL6+: 3
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_TEE.2: 2
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_FLR.1: 2
  • ASE:
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.SECURE_ENVIORNMENT: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA1: 4
    • SHA2:
      • SHA224: 4
      • SHA256: 2
      • SHA384: 4
      • SHA512: 2
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 4
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 4
  • GCM:
    • GCM: 2
  • XTS:
    • XTS: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
    • Reverse engineering: 1
  • other:
    • JIL: 5
    • JIL-AAPS: 2
    • JIL-COMP: 3
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 22
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 46: 1
    • FIPS 81: 1
  • PKCS:
    • PKCS #3: 1
    • PKCS#1: 4
    • PKCS5: 1
  • RFC:
    • RFC 1321: 1
    • RFC 2202: 1
    • RFC 3610: 1
    • RFC 4231: 1
    • RFC 7748: 1
    • RFC 8032: 1
    • RFC1423: 1
pdf_data/report_keywords/javacard_api_const
  • curves:
    • ED25519: 1
    • X25519: 1
pdf_data/report_metadata
pdf_data/st_filename TrustWare 3.0 Security Target v1.0.pdf [M33-STL] arm_cortex_m33_r0p4_security_target_lite_v1.1.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 3
    • EAL2 augmented: 1
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL6: 11
    • EAL6 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.2: 3
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_TEE: 4
    • AVA_TEE.2: 17
    • AVA_VAN: 2
    • AVA_VAN.2: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.5: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR.1: 7
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 8
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 1
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 12
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 2
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 21
    • FCS_COP.1.1: 1
    • FCS_RNG: 3
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 28
    • FDP_ACC.1: 8
    • FDP_ACF: 24
    • FDP_ACF.1: 11
    • FDP_IFC: 17
    • FDP_IFC.1: 5
    • FDP_IFC.2: 2
    • FDP_IFF: 18
    • FDP_IFF.1: 7
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ITT: 9
    • FDP_ITT.1: 2
    • FDP_RIP: 8
    • FDP_RIP.1: 1
    • FDP_ROL: 8
    • FDP_ROL.1: 3
    • FDP_SDI.2: 17
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
    • FIA_USB.1: 10
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 47
    • FMT_MSA.1: 4
    • FMT_MSA.3: 9
    • FMT_SMF: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 1
    • FPT_INI: 3
    • FPT_INI.1: 12
    • FPT_INI.1.1: 2
    • FPT_INI.1.2: 2
    • FPT_INI.1.3: 2
    • FPT_ITT: 11
    • FPT_ITT.1: 1
    • FPT_STM: 1
    • FPT_TEE.1: 7
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FDP:
    • FDP_ACC: 23
    • FDP_ACC.1: 11
    • FDP_ACC.2: 10
    • FDP_ACF: 22
    • FDP_ACF.1: 23
    • FDP_IFC.1: 4
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 10
    • FMT_MSA.3: 15
    • FMT_SMF: 18
    • FMT_SMF.1: 10
    • FMT_SMR.1: 11
  • FPT:
    • FPT_FLS.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROTECTION_AFTER_DELIVERY: 5
    • A.ROLLBACK: 5
    • A.SECURE_INITIALISATION: 1
    • A.SECURE_INITIALIZATION: 4
    • A.SECURE_PLATFORM: 6
    • A.TA_DEVELOPMENT: 5
  • O:
    • O.CA_TA_IDENTIFICATION: 8
    • O.INITIALIZATION: 22
    • O.INSTANCE_TIME: 1
    • O.KEYS_USAGE: 16
    • O.OPERATION: 24
    • O.RNG: 10
    • O.RUNTIME_CONFIDENTIALITY: 21
    • O.RUNTIME_INTEGRITY: 24
    • O.TA_AUTHENTICITY: 15
    • O.TA_ISOLATION: 14
    • O.TEE_DATA_PROTECTION: 18
    • O.TEE_ID: 9
    • O.TEE_ISOLATION: 15
    • O.TRUSTED_STORAGE: 23
  • OE:
    • OE.INITALIZATION: 1
    • OE.INITIALIZATION: 24
    • OE.INSTANCE_TIME: 3
    • OE.INTEGRATION_CONFIGURATION: 9
    • OE.PROTECTION_AFTER_DELIVERY: 9
    • OE.ROLLBACK: 7
    • OE.SECRETS: 5
    • OE.SECURE_HARDWARE_PLATFORM: 1
    • OE.SECURE_PLATFORM: 20
    • OE.TA_DEVELOPMENT: 7
  • OP:
    • OP.EXTRACT_KEY: 4
    • OP.LOAD: 3
    • OP.STORE: 4
    • OP.USE_KEY: 4
  • OSP:
    • OSP.INTEGRATION_CONFIGURATION: 5
    • OSP.SECRETS: 5
  • T:
    • T.ABUSE_FUNCT: 14
    • T.CLONE: 9
    • T.FLASH_DUMP: 4
    • T.IMPERSONATION: 6
    • T.PERTURBATION: 7
    • T.RAM: 8
    • T.RNG: 5
    • T.ROGUE_CODE_EXECUTION: 12
    • T.SPY: 6
    • T.STORAGE_CORRUPTION: 9
    • T.TEE_FIRMWARE_DOWNGRADE: 5
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA1: 4
    • SHA2:
      • SHA-256: 1
      • SHA224: 4
      • SHA256: 2
      • SHA384: 4
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 6
  • MAC:
    • MAC: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 37
  • RNG:
    • RND: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 9
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 4
  • GCM:
    • GCM: 2
  • XTS:
    • XTS: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side-channel: 3
    • side-channels: 1
  • FI:
    • Malfunction: 6
  • SCA:
    • Leak-Inherent: 6
    • Physical Probing: 2
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 1
    • TrustZone: 5
  • other:
    • TEE: 349
  • IBM:
    • SE: 94
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 1
    • FIPS 46: 1
    • FIPS 81: 1
  • PKCS:
    • PKCS #3: 1
    • PKCS#1: 4
    • PKCS5: 1
  • RFC:
    • RFC 1321: 1
    • RFC 2202: 1
    • RFC 3610: 1
    • RFC 4231: 1
    • RFC 7748: 1
    • RFC 8032: 1
    • RFC1423: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/javacard_api_const
  • curves:
    • ED25519: 1
    • X25519: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 205 in [PP84] This refinement in [PP84] is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP84] This refinement in [PP84] is out: 1
    • 240 in [PP84] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE. 241 in [PP84] This refinement refers to downloading of embedded software. This: 1
    • Page 42 of 53 SAR Refinement Description ALC_CMS 199 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery: 1
    • This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP84] It must be checked that the provided implementation: 1
    • This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP84] Guidance documents must not contain security relevant details which are: 1
    • contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP84] The Functional Specification is expected to refer to mechanisms. 218 in: 1
    • is out of scope for the TOE. AVA_VAN 245 in [PP84] The vulnerability analysis shall include a justification for the: 1
    • must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP84] This refinement relates to physical testing. This refinement is out of: 1
    • out of scope: 12
    • to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP84] This refinement refers to features that do not provide functionality but: 1
    • transitions of power save modes if provided by the TOE. 210 in [PP84] This refinement in [PP84] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP84] This: 1
pdf_data/st_metadata
  • /Author: brightsight
  • /CreationDate: D:20190906104654+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20190906104654+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1398540
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different