| name |
CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12 |
ST31G480 C01 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
FR |
| status |
archived |
archived |
| not_valid_after |
23.10.2025 |
27.09.2024 |
| not_valid_before |
23.10.2020 |
05.10.2017 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C112-CERTIFICATE-v1%20signed.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2017_61-S02.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C112-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_61fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CYSECA%20Security%20Target%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2017_61en.pdf |
| manufacturer |
Pernec Integrated Network Systems Sdn. Bhd. |
STMicroelectronics |
| manufacturer_web |
https://www.pernec.com.my/ |
https://www.st.com/ |
| security_level |
EAL2 |
ALC_TAT.3, ATE_COV.3, ALC_CMC.5, ASE_TSS.2, ADV_INT.3, AVA_VAN.5, ADV_IMP.2, ALC_DVS.2, ADV_TDS.5, EAL5+, ATE_FUN.2, ALC_FLR.1 |
| dgst |
5bbd05b848eb7573 |
f33745c129c16feb |
| heuristics/cert_id |
ISCB-5-RPT-C112-CR-v1 |
ANSSI-CC-2017/61 |
| heuristics/cert_lab |
[] |
SERMA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1 |
| heuristics/extracted_versions |
1.2.0, 1.1.12 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1074-2019, ANSSI-CC-2019/08, BSI-DSZ-CC-1073-2019 |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2016/58 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2019/08, BSI-DSZ-CC-1073-V2-2020, BSI-DSZ-CC-1074-2019, BSI-DSZ-CC-1073-2019, BSI-DSZ-CC-1074-V2-2020 |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2016/58 |
| heuristics/scheme_data |
- cert_no: 2020-007-C112
- certification_date: 23.10.2020
- developer: Pernec Integrated Network Systems Sdn Bhd
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C112
- certification_date: 23.10.2020
- developer: 21, Jalan Setiawangsa 8,Taman Setiawangsa,54200 Kuala Lumpur,Wilayah Persekutuan Kuala Lumpur Tel: 03-4259 6000Email: [email protected]: https://www.pernec.com.my/
- expiration_date: 23.10.2025
- mutual_recognition: CCRA
- product: CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/ISCB-5-RPT-C112-CR-v1.pdf
- scope: The Target of Evaluation (TOE) is CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 (TOE Server) and CYSECA Endpoint Application Control Client v1.1.12 (TOE Client). The TOE is an endpoint application control allows organization to enhance the defences against executing unwanted or malicious application on critical endpoint computer. TOE comprise of server and client components that can be operated in one or more instance. TOE is designed with granular policy, extensive application catalogue as well as, real-time monitoring and defences, CYSECA reduces the risk of threat exposures on client. The TOE is designed for Application control implementation for client and allows only selected files or applications that are allowed/whitelisted to be executed while others are being stopped.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/CYSECA_Security_Target_v1.0.pdf
- type: Other Devices and Systems
- expiration_date: 23.10.2025
- level: EAL2
- product: CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/133
|
|
| heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1074-2019, BSI-DSZ-CC-1073-2019, ANSSI-CC-2019/16 |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1074-2019, BSI-DSZ-CC-1073-2019, ANSSI-CC-2019/16 |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
ISCB-5-CERT-C112-CERTIFICATE-v1 signed.pdf |
certificat ANSSI-CC-2017_61-S02.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 1
- ALC_TAT.3: 1
- ASE:
- ATE:
- ATE_COV.3: 1
- ATE_FUN.2: 1
- AVA:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20201105094524+08'00'
- /Creator: ISCB Printer
- /ModDate: D:20201105125157+08'00'
- /Producer: KONICA MINOLTA bizhub C360i
- /Title: SISCB Print20110509451
- pdf_file_size_bytes: 226462
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: jchuzel
- /CreationDate: D:20210318180428+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210318180428+01'00'
- /Producer: GPL Ghostscript 9.50
- /Title: Microsoft Word - certificat ANSSI-CC-2017_61-S02.docx
- pdf_file_size_bytes: 1913917
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
ISCB-5-RPT-C112-CR-v1.pdf |
anssi-cc-2017_61fr.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/61
- cert_item: ST31G480 C01 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
- cert_item_version: C01
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité au package “Loader dedicated for usage in Secured Environment only
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-3-RPT-C112-CR-v1: 1
- ISCB-5-RPT-C112-CR-v1: 36
|
- FR:
- ANSSI-CC-2016/58: 1
- ANSSI-CC-2017/61: 17
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_INT: 1
- ADV_INT.3: 2
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.5: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 2
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_FLR.1: 3
- ALC_LCD: 1
- ALC_TAT: 1
- ALC_TAT.3: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 2
- ATE:
- ATE_COV: 1
- ATE_COV.3: 2
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.2: 2
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.PHYSICAL: 1
- A.PLATFORM: 1
- A.TIMESTAMP: 1
- A.USER: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib 4.2: 2
- NesLib 4.2.10: 2
- NesLib 5.2: 2
- NesLib 5.2.0: 2
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20201111142929Z00'00'
- /Creator: Word
- /ModDate: D:20201111142929Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
- pdf_file_size_bytes: 789695
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Category: C01
- /Comments: STMicroelectronics
- /Company: SGDSN/ANSSI
- /CreationDate: D:20171006153354+02'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.025
- /ModDate: D:20171009115848+02'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20171006133134
- /Subject:
- /Title:
- pdf_file_size_bytes: 192820
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
| pdf_data/st_filename |
CYSECA Security Target v1.0.pdf |
anssi-cible2017_61en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 8
- BSI-CC-PP-0084-: 3
- BSI-CC-PP-0084-2014: 65
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL5: 14
- EAL5 augmented: 2
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.2: 4
- ASE_REQ.2: 7
- ASE_SPD.1: 4
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 2
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.2: 4
- ADV_INT.3: 4
- ADV_SPM: 1
- ADV_TDS.5: 4
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 4
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 6
- ALC_LCD.1: 1
- ALC_TAT.3: 4
- ASE:
- ASE_CCL: 4
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 22
- ASE_OBJ.2: 1
- ASE_REQ: 52
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 12
- ASE_SPD.1: 1
- ASE_TSS: 14
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 3
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 4
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FIA:
- FIA_ATD: 1
- FIA_ATD.1: 5
- FIA_UAU.1: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 6
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 22
- FCS_CKM.4: 22
- FCS_COP.1: 52
- FCS_RNG: 2
- FCS_RNG.1: 8
- FDP:
- FDP_ACC.1: 61
- FDP_ACC.2: 12
- FDP_ACF.1: 63
- FDP_CKM.2: 1
- FDP_IFC.1: 21
- FDP_ITC.1: 15
- FDP_ITC.2: 24
- FDP_ITT.1: 10
- FDP_RIP.1: 18
- FDP_ROL.1: 9
- FDP_SDC: 2
- FDP_SDC.1: 8
- FDP_SDI.2: 8
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FIA:
- FIA_UAU.2: 18
- FIA_UAU.5: 19
- FIA_UID.1: 14
- FIA_UID.2: 22
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 2
- FMT_LIM.1: 17
- FMT_LIM.2: 18
- FMT_MSA.1: 44
- FMT_MSA.3: 58
- FMT_MTD.1: 18
- FMT_SMF.1: 38
- FMT_SMR.1: 40
- FPR:
- FPT:
- FPT_FLS.1: 17
- FPT_ITT.1: 9
- FPT_PHP.3: 11
- FPT_RPL.1: 22
- FPT_TDC.1: 20
- FPT_TRP.1: 17
- FRU:
- FRU_FLT.2: 13
- FRU_RSA.2: 18
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.3: 5
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 2
- A.PHYSICAL: 4
- A.PLATFORM: 4
- A.TIMESTAMP: 3
- A.USER: 4
- O:
- O.ACCESS: 2
- O.CONFIG: 4
- O.MANAGE: 1
- O.SEC_COM: 1
- O.USER: 5
- OE:
- OE.ADMIN: 1
- OE.PHYSICAL: 1
- OE.PLATFORM: 2
- OE.TIMESTAMP: 1
- OE.TOE_ACCESS: 3
- OE.USER: 3
- T:
- T.AUDIT_COMPROMISE: 2
- T.CONFIG: 4
- T.MASQUERADE: 3
- T.UNAUTHORISED_AC: 1
|
- O:
- O.C: 2
- O.MAC-: 1
- O.RND: 4
- R:
- T:
|
| pdf_data/st_keywords/vendor |
|
- Infineon:
- NXP:
- Philips:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 46
- AES-: 1
- AES-128: 1
- AES-192: 1
- DES:
- 3DES:
- TDEA: 1
- TDES: 10
- Triple-DES: 1
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- Keccak:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 5
- SHA-256: 8
- SHA-384: 5
- SHA-512: 5
- SHA3:
- SHA-3: 1
- SHA3-224: 4
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
- SHAKE:
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
- Neslib:
- NesLib 4.2: 1
- NesLib 4.2.10: 3
- NesLib 5.2: 21
- NesLib 5.2.0: 1
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 13
- malfunction: 6
- physical tampering: 1
- SCA:
- Leak-Inherent: 12
- Physical Probing: 4
- physical probing: 3
- side channel: 9
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 63
- CCMB-2012-09-003: 2
- FIPS:
- FIPS PUB 140-2: 5
- FIPS PUB 180-2: 5
- FIPS PUB 186-4: 4
- FIPS PUB 197: 4
- FIPS PUB 198-1: 3
- FIPS PUB 202: 6
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14888: 2
- ISO/IEC 18092: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38B: 1
- NIST SP 800-56A: 3
- NIST SP 800-67: 3
- NIST SP 800-90: 4
- SP 800-38A: 2
- SP 800-67: 1
- SP 800-90A: 1
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation: 1
- out of Scope: 1
- within the TOE boundary). The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation. In order to comply with the evaluated configuration, the following hardware and: 1
|
- OutOfScope:
- ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib, MIFARE DESFire EV1, and MIFARE Plus X when they are embedded: 1
- The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib, MIFARE DESFire EV1, and MIFARE Plus X when they are embedded: 1
- out of scope: 1
|
| pdf_data/st_metadata |
|
- /CreationDate: D:20170623111915Z
- /Creator: FrameMaker 11.0
- /ModDate: D:20171009115904+02'00'
- /Producer: Acrobat Elements 10.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 1891357
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 127
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |