Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11)
ANSSI-CC-2024/11
MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03)
ANSSI-CC-2024/03
name NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03)
category Trusted Computing ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_before 2024-04-17 2024-04-15
not_valid_after 2029-04-17 2029-04-15
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_03en.pdf
manufacturer Nuvoton Technology STMicroelectronics
manufacturer_web None https://www.st.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_11fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_03fr.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_11fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_03fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile PC Client Specific Trusted Platform Module Specification Family 2.0; Level 0; Revi...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})})
state/cert/pdf_hash 6da74cbe0fad8225af6034b8ddf24a76e3790ff192965be6c893285718e6647b 34dc82d2224a8b1e18f8cf6057612e32e012140f37a2c53459489f6ba8a53584
state/cert/txt_hash b040dbeaff64bb3f5d13035d3569862d66a5664cd51ee1ed459aadf009186daa 9b7a0707f4a3523c1c31aecc847c85344a8eb8df3d2fa7dae0467f3160940559
state/report/pdf_hash 940c6a00ea01d9ecb7ad80569b8c406054e035e78b6c5a1e9a7cb4e80e53a2ac d62c0198281061164d95c9b66d8804d151cb4c6fc3762b64b8eab5792989e9b9
state/report/txt_hash caf118fd959f9baa9875ecbe2e16f3bff3883d9ddd2f9c98c7dceb808f6709e3 796cad73221581b1a2a0d5f82726ba941ae3ba4d4bd3cd9f6ee2ee39298f7ed5
state/st/pdf_hash 5430b2f86679586b37ed0794f7f7ae2b908a294efc3b8b6ecfd9748cf3ecad3e 54cbeec187b94bf16e63f1340275f829066ab13b0445dee89fc8adf0ad8eedd1
state/st/txt_hash bc034291da17c7fbd1cafd1223e1f9c9106e96a768eb8d88c7a4ff0e9e89ab17 ef385f87cd6f0e8f30f06ce7a19a994011da63d4601a00ea514cbbec81bd53bb
heuristics/cert_id ANSSI-CC-2024/11 ANSSI-CC-2024/03
heuristics/extracted_versions 1.59, 2.0, 1.4.2.2 1.0.2
heuristics/report_references/directly_referencing None ANSSI-CC-2022/21
heuristics/report_references/indirectly_referencing None ANSSI-CC-2022/21
heuristics/scheme_data/cert_id ANSSI-CC-2024/11 ANSSI-CC-2024/03
heuristics/scheme_data/description Le produit évalué est « NPCT7xx TPM2.0 rev 1.59, configuration version 1.4.2.2 » développé par NUVOTON TECHNOLOGY CORPORATION. Ce produit est un TPM (Trusted Platform Module). Il est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM2.0. Le produit évalué est « MIFARE Plus EV2 on ST31N600 A01, Version 1.0.2 » développé par STMICROELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés
heuristics/scheme_data/developer NUVOTON TECHNOLOGY CORPORATION STMICROELECTRONICS
heuristics/scheme_data/enhanced
  • cert_id: ANSSI-CC-2024/11
  • certification_date: 17/04/2024
  • expiration_date: 17/04/2029
  • category: Micro-circuits
  • cc_version: Critères Communs version 3.1r5
  • developer: NUVOTON TECHNOLOGY CORPORATION
  • sponsor: NUVOTON TECHNOLOGY CORPORATION
  • evaluation_facility: SERMA SAFETY & SECURITY
  • level: EAL4+
  • protection_profile: Protection Profile PC Client Specific TPM PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021 certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021.
  • mutual_recognition: CCRA SOG-IS
  • augmented: ALC_FLR.1, AVA_VAN.4, ALC_DVS.2
  • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_11fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2024_11en%201.4.2.2.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_11fr.pdf
  • cert_id: ANSSI-CC-2024/03
  • certification_date: 15/04/2024
  • expiration_date: 15/04/2029
  • category: Micro-circuits
  • cc_version: Critères Communs version 3.1r5
  • developer: STMICROELECTRONICS
  • sponsor: STMICROELECTRONICS
  • evaluation_facility: THALES / CNES
  • level: EAL5+
  • protection_profile: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only”
  • mutual_recognition: CCRA SOG-IS
  • augmented: ALC_DVS.2, ALC_FLR.1, AVA_VAN.
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_03fr.pdf
heuristics/scheme_data/enhanced/augmented ALC_FLR.1, AVA_VAN.4, ALC_DVS.2 ALC_DVS.2, ALC_FLR.1, AVA_VAN.
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2024/11 ANSSI-CC-2024/03
heuristics/scheme_data/enhanced/cert_link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_11fr.pdf https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_03fr.pdf
heuristics/scheme_data/enhanced/certification_date 17/04/2024 15/04/2024
heuristics/scheme_data/enhanced/developer NUVOTON TECHNOLOGY CORPORATION STMICROELECTRONICS
heuristics/scheme_data/enhanced/evaluation_facility SERMA SAFETY & SECURITY THALES / CNES
heuristics/scheme_data/enhanced/expiration_date 17/04/2029 15/04/2029
heuristics/scheme_data/enhanced/level EAL4+ EAL5+
heuristics/scheme_data/enhanced/protection_profile Protection Profile PC Client Specific TPM PP PCCS TPM F2.0 L0 r1.59 V1.3, certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021 certifié ANSSI-CC-PP-2021/02 le 30 novembre 2021. Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only”
heuristics/scheme_data/enhanced/sponsor NUVOTON TECHNOLOGY CORPORATION STMICROELECTRONICS
heuristics/scheme_data/expiration_date 17 Avril 2029 15 Avril 2029
heuristics/scheme_data/level EAL4+ EAL5+
heuristics/scheme_data/product NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2)
heuristics/scheme_data/sponsor NUVOTON TECHNOLOGY CORPORATION STMICROELECTRONICS
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/npct7xx-tpm20-rev-159-configuration-version-1422 https://cyber.gouv.fr/produits-certifies/mifare-plus-ev2-st31n600-a01-version-102
pdf_data/cert_filename Certificat-CC-2024_11fr.pdf Certificat-CC-2024_03fr.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2024/11: 2
  • ANSSI-CC-2024/03: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2021/02: 1
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_sar/ALC/ALC_FLR.1 2 1
pdf_data/cert_keywords/cc_sar/AVA
  • AVA_VAN.4: 1
  • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_security_level/EAL
  • EAL4: 1
  • EAL2: 1
  • EAL5: 1
  • EAL2: 1
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_metadata//CreationDate D:20240424100246+02'00' D:20240419102056+02'00'
pdf_data/cert_metadata//ModDate D:20240424100716+02'00' D:20240419102224+02'00'
pdf_data/cert_metadata/pdf_file_size_bytes 149374 149588
pdf_data/report_filename ANSSI-CC-2024_11fr.pdf ANSSI-CC-2024_03fr.pdf
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2024/11: 2
  • ANSSI-CC-2024/03: 2
  • ANSSI-CC-2022/21: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2021/02: 3
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.4: 1
  • AVA_VAN: 1
  • AVA_VAN.5: 1
  • AVA_VAN: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL4: 1
  • EAL2: 2
  • EAL7: 1
  • EAL5: 1
  • EAL2: 2
  • EAL7: 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • SERMA: 1
  • CESTI:
    • CESTI: 1
  • CESTI:
    • CESTI: 1
pdf_data/report_metadata//CreationDate D:20240424100335+02'00' D:20240419102137+02'00'
pdf_data/report_metadata//ModDate D:20240424100715+02'00' D:20240419102224+02'00'
pdf_data/report_metadata/pdf_file_size_bytes 336748 365853
pdf_data/report_metadata/pdf_number_of_pages 11 14
pdf_data/st_filename ANSSI-cible-CC-2024_11en 1.4.2.2.pdf ANSSI-Cible-CC-2024_03en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 4096: 1
    • RSA 2048: 2
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 24
pdf_data/st_keywords/cc_claims
  • O:
    • O.C: 9
    • O.DAC: 5
  • R:
    • R.O: 9
  • O:
    • O.RND: 6
    • O.MAC: 13
    • O.LEAK-INHERENT: 6
    • O.PHYS-PROBING: 5
    • O.MALFUNCTION: 6
    • O.PHYS-MANIPULATION: 5
    • O.LEAK-FORCED: 3
    • O.PHYS-: 1
    • O.ABUSE-FUNC: 3
    • O.LEAK-: 2
    • O.IDENTIFICATION: 3
    • O.ADD-FUNCTIONS: 3
    • O.MEM-ACCESS: 3
  • T:
    • T.RND: 3
  • OE:
    • OE.RESP-APPL: 3
    • OE.PROCESS-SEC-IC: 3
    • OE.LIM-BLOCK-LOADER: 3
    • OE.LOADER-USAGE: 3
pdf_data/st_keywords/cc_claims/O
  • O.C: 9
  • O.DAC: 5
  • O.RND: 6
  • O.MAC: 13
  • O.LEAK-INHERENT: 6
  • O.PHYS-PROBING: 5
  • O.MALFUNCTION: 6
  • O.PHYS-MANIPULATION: 5
  • O.LEAK-FORCED: 3
  • O.PHYS-: 1
  • O.ABUSE-FUNC: 3
  • O.LEAK-: 2
  • O.IDENTIFICATION: 3
  • O.ADD-FUNCTIONS: 3
  • O.MEM-ACCESS: 3
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2021/02: 1
  • BSI:
    • BSI-CC-PP-0084-2014: 64
    • BSI-CC-PP- 0084-2014: 11
    • BSI-CC-PP-0084-: 1
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 3
    • ALC_DVS.2: 4
    • ALC_DVS.1: 1
  • AVA:
    • AVA_VAN.4: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
  • ALC:
    • ALC_DVS.2: 6
    • ALC_FLR.1: 9
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
    • ALC_DVS: 1
    • ALC_CMS: 1
    • ALC_CMC: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
    • ATE_COV: 1
  • AVA:
    • AVA_VAN.5: 6
    • AVA_VAN: 1
  • ASE:
    • ASE_INT: 2
    • ASE_CCL: 4
    • ASE_ECD: 3
    • ASE_SPD: 5
    • ASE_OBJ: 12
    • ASE_REQ: 15
    • ASE_TSS: 6
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 3
  • ALC_DVS.2: 4
  • ALC_DVS.1: 1
  • ALC_DVS.2: 6
  • ALC_FLR.1: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_DVS: 1
  • ALC_CMS: 1
  • ALC_CMC: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 4 6
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.1 3 9
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.4: 3
  • AVA_VAN.5: 6
  • AVA_VAN: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 4: 1
  • EAL4: 2
  • EAL 4 augmented: 1
  • EAL4 augmented: 1
  • EAL5: 19
  • EAL6: 2
  • EAL4: 1
  • EAL5 augmented: 3
  • EAL6 augmented: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL4 2 1
pdf_data/st_keywords/cc_sfr
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.1: 6
  • FCS:
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_CKM: 12
    • FCS_CKM.2: 4
    • FCS_COP.1: 11
    • FCS_CKM.4: 14
    • FCS_CKM.1: 12
    • FCS_CKM.4.1: 1
    • FCS_COP: 21
  • FDP:
    • FDP_ACC.1: 35
    • FDP_IFC.1: 20
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_ITC.1: 11
    • FDP_ITC.2: 13
    • FDP_ITT.1: 3
    • FDP_ITT.1.1: 1
    • FDP_ACC: 21
    • FDP_ACF.1: 35
    • FDP_ACC.2: 2
    • FDP_ACF: 23
    • FDP_UIT: 9
    • FDP_UIT.1: 4
    • FDP_SDI.1: 3
    • FDP_SDI.1.1: 1
    • FDP_ETC: 6
    • FDP_ETC.2: 4
    • FDP_ITC: 6
    • FDP_UCT: 7
    • FDP_UCT.1: 2
    • FDP_ETC.1: 2
  • FIA:
    • FIA_UID.1: 7
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_AFL: 12
    • FIA_UAU.1: 7
    • FIA_AFL.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 3
    • FIA_UAU.6.1: 1
    • FIA_USB.1: 3
    • FIA_ATD.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 4
    • FMT_MSA.1: 15
    • FMT_MSA.2.1: 1
    • FMT_MSA: 51
    • FMT_MSA.4: 3
    • FMT_MTD: 6
    • FMT_MTD.1: 2
    • FMT_MSA.3: 22
    • FMT_MOF: 3
    • FMT_MOF.1: 1
  • FPT:
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_FLS: 7
    • FPT_FLS.1: 2
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_ITT.1: 3
    • FPT_ITT.1.1: 1
    • FPT_TDC.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 5
    • FTP_ITC: 3
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 13
    • FAU_SAR.1: 11
    • FAU_GEN.1: 2
  • FCS:
    • FCS_COP.1: 25
    • FCS_CKM.1: 22
    • FCS_CKM.4: 15
    • FCS_RNG: 1
    • FCS_RNG.1: 6
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC.1: 36
    • FDP_ACF.1: 26
    • FDP_ITC.2: 13
    • FDP_SDC: 1
    • FDP_SDC.1: 7
    • FDP_SDI.2: 10
    • FDP_ITT.1: 9
    • FDP_IFC.1: 18
    • FDP_UCT.1: 8
    • FDP_UIT.1: 8
    • FDP_ITC.1: 3
    • FDP_CKM.2: 1
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
    • FDP_COP.1: 1
    • FDP_ACC.2: 2
  • FIA:
    • FIA_UID.2: 11
    • FIA_UAU.2: 9
    • FIA_UAU.3: 11
    • FIA_UAU.5: 8
    • FIA_API: 1
    • FIA_API.1: 4
    • FIA_UID.1: 12
    • FIA_UAU.1: 8
  • FMT:
    • FMT_SMR.1: 23
    • FMT_MSA.3: 25
    • FMT_MSA.1: 25
    • FMT_SMF.1: 26
    • FMT_MTD.1: 9
    • FMT_LIM: 1
    • FMT_LIM.1: 20
    • FMT_LIM.2: 20
  • FPR:
    • FPR_UNL.1: 9
  • FPT:
    • FPT_TDC.1: 10
    • FPT_RPL.1: 11
    • FPT_FLS.1: 15
    • FPT_PHP.3: 9
    • FPT_ITT.1: 9
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_TRP.1: 17
    • FTP_ITC.1: 18
    • FTP_TRP.1.3: 3
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 4
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM: 12
  • FCS_CKM.2: 4
  • FCS_COP.1: 11
  • FCS_CKM.4: 14
  • FCS_CKM.1: 12
  • FCS_CKM.4.1: 1
  • FCS_COP: 21
  • FCS_COP.1: 25
  • FCS_CKM.1: 22
  • FCS_CKM.4: 15
  • FCS_RNG: 1
  • FCS_RNG.1: 6
  • FCS_CKM.2: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 12 22
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 4 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 14 15
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 11 25
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 4 6
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 35
  • FDP_IFC.1: 20
  • FDP_RIP.1: 3
  • FDP_RIP.1.1: 1
  • FDP_ITC.1: 11
  • FDP_ITC.2: 13
  • FDP_ITT.1: 3
  • FDP_ITT.1.1: 1
  • FDP_ACC: 21
  • FDP_ACF.1: 35
  • FDP_ACC.2: 2
  • FDP_ACF: 23
  • FDP_UIT: 9
  • FDP_UIT.1: 4
  • FDP_SDI.1: 3
  • FDP_SDI.1.1: 1
  • FDP_ETC: 6
  • FDP_ETC.2: 4
  • FDP_ITC: 6
  • FDP_UCT: 7
  • FDP_UCT.1: 2
  • FDP_ETC.1: 2
  • FDP_ACC.1: 36
  • FDP_ACF.1: 26
  • FDP_ITC.2: 13
  • FDP_SDC: 1
  • FDP_SDC.1: 7
  • FDP_SDI.2: 10
  • FDP_ITT.1: 9
  • FDP_IFC.1: 18
  • FDP_UCT.1: 8
  • FDP_UIT.1: 8
  • FDP_ITC.1: 3
  • FDP_CKM.2: 1
  • FDP_SMF.1: 2
  • FDP_SMR.1: 1
  • FDP_COP.1: 1
  • FDP_ACC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 35 36
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 35 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 20 18
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 11 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 3 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 2 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 4 8
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 7
  • FIA_SOS.2: 3
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_AFL: 12
  • FIA_UAU.1: 7
  • FIA_AFL.1: 8
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.5: 3
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 3
  • FIA_UAU.6.1: 1
  • FIA_USB.1: 3
  • FIA_ATD.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_SOS.1: 1
  • FIA_UID.2: 11
  • FIA_UAU.2: 9
  • FIA_UAU.3: 11
  • FIA_UAU.5: 8
  • FIA_API: 1
  • FIA_API.1: 4
  • FIA_UID.1: 12
  • FIA_UAU.1: 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 7 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 3 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 7 12
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR.1: 21
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 13
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 4
  • FMT_MSA.1: 15
  • FMT_MSA.2.1: 1
  • FMT_MSA: 51
  • FMT_MSA.4: 3
  • FMT_MTD: 6
  • FMT_MTD.1: 2
  • FMT_MSA.3: 22
  • FMT_MOF: 3
  • FMT_MOF.1: 1
  • FMT_SMR.1: 23
  • FMT_MSA.3: 25
  • FMT_MSA.1: 25
  • FMT_SMF.1: 26
  • FMT_MTD.1: 9
  • FMT_LIM: 1
  • FMT_LIM.1: 20
  • FMT_LIM.2: 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 15 25
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 25
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 2 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 13 26
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 21 23
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 2
  • FPT_STM.1.1: 1
  • FPT_TST.1: 5
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FLS: 7
  • FPT_FLS.1: 2
  • FPT_PHP.3: 3
  • FPT_PHP.3.1: 1
  • FPT_ITT.1: 3
  • FPT_ITT.1.1: 1
  • FPT_TDC.1: 1
  • FPT_TDC.1: 10
  • FPT_RPL.1: 11
  • FPT_FLS.1: 15
  • FPT_PHP.3: 9
  • FPT_ITT.1: 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 2 15
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 3 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 3 9
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 1 10
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 5
  • FTP_TRP.1: 5
  • FTP_ITC: 3
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 17
  • FTP_ITC.1: 18
  • FTP_TRP.1.3: 3
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 5 18
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 5 17
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • Target for composition 12/74 SMD_MFPEV2_ST31N600_ST_22_002 Virtual Card Architecture are also out of scope. Personalization and Originality Check are in scope. • Security level 1 (SL1): Different: 1
    • Level. Proximity Check, Virtual Card Architecture, data access of sectors in SL3 or SL1SL3Mix, are out of scope. • Security level 3 (SL3): The card user can access the data and value blocks in the TOE after an: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 2
  • CFB:
    • CFB: 2
  • OFB:
    • OFB: 2
  • CBC:
    • CBC: 7
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 32
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 3
    • NIST P-384: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 7
      • SHA-384: 8
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RNG: 17
    • RBG: 1
  • TRNG:
    • TRNG: 1
  • RNG:
    • RND: 9
pdf_data/st_keywords/randomness/RNG
  • RNG: 17
  • RBG: 1
  • RND: 9
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
  • FI:
    • Physical Tampering: 2
    • physical tampering: 2
    • malfunction: 2
    • Malfunction: 2
  • SCA:
    • Leak-Inherent: 7
    • Physical Probing: 4
    • side-channel: 1
  • FI:
    • Malfunction: 7
  • other:
    • JIL: 28
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical Tampering: 2
  • physical tampering: 2
  • malfunction: 2
  • Malfunction: 2
  • Malfunction: 7
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 2 7
pdf_data/st_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • Leak-Inherent: 7
  • Physical Probing: 4
  • side-channel: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS140-2: 2
    • FIPS 186-3: 4
    • FIPS 140-2: 3
    • FIPS 180-4: 1
    • FIPS 198-1: 2
    • FIPS186-4: 2
    • FIPS180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS198-1: 1
    • FIPS 197: 2
    • FIPS 180-1: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS #1: 1
  • BSI:
    • AIS31: 1
  • RFC:
    • RFC 3447: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 14888-3: 1
    • ISO/IEC 9797-2: 1
    • ISO/IEC 18033-3: 1
    • ISO/IEC 15946-1: 1
    • ISO/IEC 10116:2006: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 3
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38B: 4
    • NIST SP 800-67: 1
    • SP 800-67: 1
  • CC:
    • CCMB-2017-04-002: 30
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-001: 2
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 1 2
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 1 30
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-003 1 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS140-2: 2
  • FIPS 186-3: 4
  • FIPS 140-2: 3
  • FIPS 180-4: 1
  • FIPS 198-1: 2
  • FIPS186-4: 2
  • FIPS180-4: 1
  • FIPS PUB 186-4: 1
  • FIPS198-1: 1
  • FIPS 197: 2
  • FIPS 180-1: 1
  • FIPS 197: 3
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 2 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
      • AES-: 1
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 31
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • TDES: 7
      • TDEA: 1
  • constructions:
    • MAC:
      • CMAC: 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES: 9
  • AES-: 1
  • AES-256: 2
  • AES: 24
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 9 24
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 31
  • CMAC: 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • NXP:
    • NXP: 1
  • STMicroelectronics:
    • STMicroelectronics: 11
pdf_data/st_metadata
  • pdf_file_size_bytes: 2855895
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
  • /Author: Karsten Grans
  • /CreationDate: D:20240314162754+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20240314162754+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: Security Target
  • /Title: Developer Document
  • pdf_hyperlinks: https://www.trustedcomputinggroup.org/home, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States, http://www.rsa.com/
  • pdf_file_size_bytes: 1996053
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
  • /Author: feixbeno
  • /CreationDate: D:20240305180700Z
  • /Creator: FrameMaker 17.0.1
  • /CreatorTool: FrameMaker 17.0.1
  • /ModDate: D:20240305182758+01'00'
  • /Producer: Adobe PDF Library 17.0
  • /Title: SMD_MFP_ST31N600_V01_1P.pdf
  • /Trapped: /False
  • pdf_hyperlinks: http://www.st.com
pdf_data/st_metadata//Author Karsten Grans feixbeno
pdf_data/st_metadata//CreationDate D:20240314162754+02'00' D:20240305180700Z
pdf_data/st_metadata//Creator Microsoft® Word 2016 FrameMaker 17.0.1
pdf_data/st_metadata//ModDate D:20240314162754+02'00' D:20240305182758+01'00'
pdf_data/st_metadata//Producer Microsoft® Word 2016 Adobe PDF Library 17.0
pdf_data/st_metadata//Title Developer Document SMD_MFP_ST31N600_V01_1P.pdf
pdf_data/st_metadata/pdf_file_size_bytes 2855895 1996053
pdf_data/st_metadata/pdf_hyperlinks https://www.trustedcomputinggroup.org/home, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23FDP_UCT_1_FW, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FMT_MSA_2_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FPT_FLS_1_States, file:///C:/Users/manu/Desktop/audit/TPM1%202bis_ST_Nuvoton_v0%2072.docx%23sfr_FDP_ACF_1_States, http://www.rsa.com/ http://www.st.com
pdf_data/st_metadata/pdf_number_of_pages 90 73
dgst 5d96ca8577702d78 d2f309e22cf72396