Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SUSE Linux Enterprise Server Version 12
BSI-DSZ-CC-0962-2016
ST33F1M/1M0/896/768/640/512, SC33F1M0/896/768/640/512/384, SM33F1M/1M0/896/768/640/512, SE33F1M/1M0/896/768/640/512, SL33F1M/1M0/896/768/640/512, SP33F1M, With dedicated software revision D, Optional cryptographic library Neslib 3.0 or 3.2, Optional MIFARE DESFireTM EV1
ANSSI-CC-2013/13
name SUSE Linux Enterprise Server Version 12 ST33F1M/1M0/896/768/640/512, SC33F1M0/896/768/640/512/384, SM33F1M/1M0/896/768/640/512, SE33F1M/1M0/896/768/640/512, SL33F1M/1M0/896/768/640/512, SP33F1M, With dedicated software revision D, Optional cryptographic library Neslib 3.0 or 3.2, Optional MIFARE DESFireTM EV1
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme DE FR
not_valid_after 24.02.2021 01.09.2019
not_valid_before 24.02.2016 06.03.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0962a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_13__Rapport.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0962b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SECURITY_TARGET_PUBLIC_ST33F1ME_MIFARE_EV1_SMD_SM33Fxxx_ST_12_001_v01_02.pdf
manufacturer SUSE LLC STMicroelectronics
manufacturer_web https://www.suse.com https://www.st.com/
security_level EAL4+, ALC_FLR.3 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 6bc623917fc5cad1 f36ba0c67c1665ec
heuristics/cert_id BSI-DSZ-CC-0962-2016 ANSSI-CC-2013/13
heuristics/cert_lab BSI THALÈS
heuristics/cpe_matches cpe:2.3:o:suse:suse_linux_enterprise_server:12:-:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* {}
heuristics/related_cves CVE-2015-8778, CVE-2014-9584, CVE-2016-1693, CVE-2015-8779, CVE-2014-7169, CVE-2014-2494, CVE-2016-2799, CVE-2016-3715, CVE-2016-1678, CVE-2020-6428, CVE-2016-1703, CVE-2015-2695, CVE-2014-9761, CVE-2015-4495, CVE-2015-5154, CVE-2018-12116, CVE-2016-2324, CVE-2014-6464, CVE-2014-8160, CVE-2016-1680, CVE-2015-7976, CVE-2015-0382, CVE-2015-8126, CVE-2020-15705, CVE-2016-1690, CVE-2014-4287, CVE-2016-9957, CVE-2015-4000, CVE-2016-1676, CVE-2016-1961, CVE-2016-2793, CVE-2021-45082, CVE-2014-6474, CVE-2016-1694, CVE-2015-5239, CVE-2016-8568, CVE-2016-0651, CVE-2014-6469, CVE-2016-1286, CVE-2015-2697, CVE-2016-1677, CVE-2016-1285, CVE-2016-1974, CVE-2016-1654, CVE-2015-3340, CVE-2016-2802, CVE-2019-18902, CVE-2014-6478, CVE-2020-6424, CVE-2018-19052, CVE-2015-0391, CVE-2016-2792, CVE-2014-6496, CVE-2015-6855, CVE-2014-9854, CVE-2015-4902, CVE-2015-0381, CVE-2020-5504, CVE-2015-4106, CVE-2016-1700, CVE-2016-1698, CVE-2020-15706, CVE-2016-1692, CVE-2014-4260, CVE-2016-2315, CVE-2016-2794, CVE-2016-2790, CVE-2014-3673, CVE-2016-2798, CVE-2011-3172, CVE-2016-0668, CVE-2014-6463, CVE-2016-1685, CVE-2016-1689, CVE-2015-0272, CVE-2015-5006, CVE-2015-2737, CVE-2020-6449, CVE-2016-1699, CVE-2016-2791, CVE-2010-5298, CVE-2014-7815, CVE-2016-1682, CVE-2016-7966, CVE-2015-2590, CVE-2016-8569, CVE-2018-12122, CVE-2016-2796, CVE-2018-16873, CVE-2016-2795, CVE-2021-41817, CVE-2016-5118, CVE-2015-5300, CVE-2015-1283, CVE-2015-0192, CVE-2015-3209, CVE-2016-0264, CVE-2016-1695, CVE-2016-2801, CVE-2018-16874, CVE-2016-1687, CVE-2016-1651, CVE-2016-1697, CVE-2023-29552, CVE-2014-6555, CVE-2016-0718, CVE-2014-6559, CVE-2020-14147, CVE-2020-6426, CVE-2016-1672, CVE-2014-6505, CVE-2020-6429, CVE-2014-9585, CVE-2016-1681, CVE-2016-5325, CVE-2016-1701, CVE-2015-1241, CVE-2014-6551, CVE-2015-2808, CVE-2016-1691, CVE-2015-2696, CVE-2020-6422, CVE-2019-15624, CVE-2014-2978, CVE-2016-1674, CVE-2019-18903, CVE-2014-6564, CVE-2015-7547, CVE-2016-9959, CVE-2016-2800, CVE-2014-6271, CVE-2019-18901, CVE-2021-4166, CVE-2016-5131, CVE-2014-6520, CVE-2015-8776, CVE-2015-0432, CVE-2014-6494, CVE-2014-6568, CVE-2016-1960, CVE-2016-2782, CVE-2020-15707, CVE-2014-3470, CVE-2016-5244, CVE-2016-1688, CVE-2016-3714, CVE-2016-9958, CVE-2016-1653, CVE-2021-41819, CVE-2016-2797, CVE-2002-20001, CVE-2015-8567, CVE-2014-6530, CVE-2016-1964, CVE-2016-2806, CVE-2019-18897, CVE-2016-7099, CVE-2015-0374, CVE-2016-0642, CVE-2015-5041, CVE-2014-4258, CVE-2014-6495, CVE-2016-3718, CVE-2016-1656, CVE-2015-2738, CVE-2014-9116, CVE-2016-1702, CVE-2016-1652, CVE-2014-0198, CVE-2016-1977, CVE-2014-0221, CVE-2016-1659, CVE-2016-1683, CVE-2016-1655, CVE-2016-1679, CVE-2014-6507, CVE-2016-1675, CVE-2015-2734, CVE-2016-1602, CVE-2014-2977, CVE-2014-6484, CVE-2020-8013, CVE-2014-4207, CVE-2016-1673, CVE-2016-1686, CVE-2016-2178, CVE-2020-6427, CVE-2016-3427, CVE-2016-2807, CVE-2016-1696 {}
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 AGD_PRE.1, ATE_COV.2, ALC_TAT.2, ALC_CMS.5, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ATE_DPT.3, ATE_IND.2, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, ALC_CMC.4, ADV_IMP.1
heuristics/extracted_versions 12 3.2, 3.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2013/60, ANSSI-CC-2014/81, ANSSI-CC-2013/45
heuristics/report_references/directly_referencing BSI-DSZ-CC-0852-2013 ANSSI-CC-2012/79
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2016/60, ANSSI-CC-2014/81, ANSSI-CC-2013/60, ANSSI-CC-2019/38, ANSSI-CC-2013/45
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0852-2013, BSI-DSZ-CC-0787-2013 ANSSI-CC-2010/50, ANSSI-CC-2010/49, ANSSI-CC-2012/79, ANSSI-CC-2011/07
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2013/60, ANSSI-CC-2014/81
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2013/60, ANSSI-CC-2014/81
heuristics/protection_profiles 70cdc8b0cf910af7 f6d23054061d72ba
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/report_filename 0962a_pdf.pdf ANSSI-CC-2013_13__Rapport.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3 SOGIS Recognition Agreement
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0962-2016
    • cert_item: SUSE Linux Enterprise Server Version 12
    • cert_lab: BSI
    • developer: SUSE LLC
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Operating System Protection Profile, Version 2.0, 01 June 2010, BSI-CC-PP-0067-2010, OSPP Extended Packages: Advanced Management, Advanced Audit, and Virtualization all Version 2.0, 28 May 2010
  • FR:
    • cc_security_level: EAL5 AugmentĂŠ ALC_DVS.2 et AVA_VAN.5
    • cc_version: CC version 3.1 rĂŠvision 3
    • cert_id: ANSSI-CC-2013/13
    • cert_item: ST33F1M/1M0/896/768/640/512, SC33F1M0/896/768/640/512/384, SM33F1M/1M0/896/768/640/512, SE33F1M/1M0/896/768/640/512, SL33F1M/1M0/896/768/640/512, SP33F1M, With dedicated software revision D, Optional cryptographic library Neslib 3.0 or 3.2, Optional MIFARE DESFireTM EV1
    • cert_item_version: Version maskset K8C0A, revision externe E, revision interne G
    • cert_lab: Thalès (TCS-CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France
    • developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
    • match_rules: ['RĂŠfĂŠrence du rapport de certification(.+)Nom du produit(.+)RĂŠfĂŠrence/version du produit(.+)ConformitĂŠ Ă  un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)DĂŠveloppeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0852-2013: 3
    • BSI-DSZ-CC-0962-2016: 24
  • FR:
    • ANSSI-CC-2012/79: 3
    • ANSSI-CC-2013/13: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0067-2010: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 10
    • EAL 4 augmented: 3
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL4+: 1
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 ElevĂŠ: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RNG.1: 2
  • FTP:
    • FTP_ITC.1: 2
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 14
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 1
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 20
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • DH: 8
    • DSA:
      • DSA: 3
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/report_keywords/hash_function
  • PBKDF:
    • PBKDF2: 4
  • SHA:
    • SHA1:
      • SHA-1: 8
      • SHA1: 1
    • SHA2:
      • SHA-2: 1
      • SHA-256: 8
      • SHA-384: 8
      • SHA-512: 6
      • SHA256: 1
pdf_data/report_keywords/crypto_scheme
  • AEAD:
    • AEAD: 1
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 8
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv1: 2
    • IKEv2: 15
  • IPsec:
    • IPsec: 16
  • SSH:
    • SSH: 19
    • SSHv2: 2
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
  • TRNG:
    • TRNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 11
  • CCM:
    • CCM: 3
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 2
pdf_data/report_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 1
  • NIST:
    • NIST P-256: 1
    • NIST P-384: 1
    • NIST P-521: 1
    • P-256: 13
    • P-384: 13
    • P-521: 13
    • secp192r1: 1
    • secp224r1: 1
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/report_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 2
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NesLib 3.0: 1
    • NesLib 3.2: 1
    • NesLib v3.0: 1
    • NesLib v3.2: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2015-5157: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • FIPS:
    • FIPS 186-4: 6
    • FIPS180-3: 2
    • FIPS180-4: 14
    • FIPS186-4: 7
    • FIPS197: 4
    • FIPS198-1: 4
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • SP 800-38A: 2
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 4253: 1
    • RFC 5996: 1
    • RFC2104: 2
    • RFC2404: 2
    • RFC2409: 2
    • RFC2451: 1
    • RFC2898: 1
    • RFC3280: 1
    • RFC3447: 6
    • RFC3526: 4
    • RFC3602: 1
    • RFC3686: 1
    • RFC4106: 2
    • RFC4109: 1
    • RFC4251: 3
    • RFC4252: 5
    • RFC4253: 10
    • RFC4301: 1
    • RFC4303: 2
    • RFC4304: 1
    • RFC4307: 4
    • RFC4309: 2
    • RFC4344: 2
    • RFC4419: 1
    • RFC4595: 1
    • RFC4754: 1
    • RFC4868: 3
    • RFC5077: 1
    • RFC5114: 7
    • RFC5116: 4
    • RFC5280: 1
    • RFC5282: 5
    • RFC5639: 1
    • RFC5647: 2
    • RFC5656: 2
    • RFC5903: 3
    • RFC5930: 1
    • RFC5996: 9
    • RFC6668: 1
    • RFC6954: 2
    • RFC6989: 1
    • RFC7296: 1
    • RFC7427: 2
  • X509:
    • X.509: 2
  • BSI:
    • AIS 31: 2
    • AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Version 3, Date 2016-02-18, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Operating System Protection Profile, Version 2.0, 01 June 2010, BSI-CC-PP-0067-2010, OSPP: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • the TOE, Version n/a, Date 2016-02-18, MASTER CM List, File name “sles12-cmlist-master-v1.zip”, (confidential document) [10] Guidance documentation for the TOE, Version 1.14, Date February 17, 2016, Common Criteria: 1
pdf_data/report_metadata
  • /Author: Hubert PUJOL
  • /Company: SGDSN/ANSSI
  • /CreationDate: D:20130311134142+01'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /Keywords: CER/F/07.5
  • /ModDate: D:20130311134208+01'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /SourceModified: D:20130311124044
  • /Subject: Nom du produit
  • /Title: ANSSI-CC-2010/xx
  • pdf_file_size_bytes: 200550
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename 0962b_pdf.pdf SECURITY_TARGET_PUBLIC_ST33F1ME_MIFARE_EV1_SMD_SM33Fxxx_ST_12_001_v01_02.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0962: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 70
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 3
    • EAL4 augmented: 1
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 2
    • EAL4: 1
    • EAL5: 17
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 18
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV: 3
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 9
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 8
    • FAU_STG.3.1: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 50
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 24
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 16
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 26
    • FCS_COP.1.1: 2
    • FCS_RNG: 2
    • FCS_RNG.1: 52
    • FCS_RNG.1.1: 5
    • FCS_RNG.1.2: 6
  • FDP:
    • FDP_ACC.1: 38
    • FDP_ACC.1.1: 3
    • FDP_ACC.2: 19
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 41
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 5
    • FDP_CDP: 5
    • FDP_CDP.1: 14
    • FDP_CDP.1.1: 2
    • FDP_ETC.2: 8
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 14
    • FDP_IFC.2: 20
    • FDP_IFC.2.1: 2
    • FDP_IFC.2.2: 2
    • FDP_IFF.1: 29
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC.1: 5
    • FDP_ITC.2: 23
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_RIP.2: 13
    • FDP_RIP.2.1: 1
    • FDP_RIP.3: 13
    • FDP_RIP.3.1: 1
    • FDP_UCT: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 20
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
    • FIA_USB.2: 7
    • FIA_USB.2.1: 1
    • FIA_USB.2.2: 1
    • FIA_USB.2.3: 1
    • FIA_USB.2.4: 1
  • FMT:
    • FMT_MSA.1: 48
    • FMT_MSA.1.1: 5
    • FMT_MSA.3: 51
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MSA.4: 6
    • FMT_MSA.4.1: 1
    • FMT_MTD.1: 142
    • FMT_MTD.1.1: 21
    • FMT_REV.1: 15
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 34
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 43
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 22
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 2
  • FTA:
    • FTA_SSL.1: 7
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 7
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 6
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.4: 14
    • FCS_COP.1: 38
    • FCS_RNG: 1
    • FCS_RNG.1: 7
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.2: 12
    • FDP_ACF.1: 35
    • FDP_CKM.2: 1
    • FDP_IFC.1: 15
    • FDP_ITC.1: 15
    • FDP_ITC.2: 15
    • FDP_ITT.1: 7
    • FDP_ROL.1: 9
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
  • FIA:
    • FIA_UAU.2: 9
    • FIA_UAU.5: 10
    • FIA_UID.1: 2
    • FIA_UID.2: 11
  • FMT:
    • FMT_ITC.1: 1
    • FMT_LIM: 1
    • FMT_LIM.1: 18
    • FMT_LIM.2: 17
    • FMT_MSA.1: 32
    • FMT_MSA.2: 1
    • FMT_MSA.3: 33
    • FMT_MTD.1: 10
    • FMT_SMF.1: 27
    • FMT_SMR.1: 18
  • FPR:
    • FPR_UNL.1: 9
  • FPT:
    • FPT_FLS.1: 9
    • FPT_ITT.1: 6
    • FPT_PHP.3: 7
    • FPT_RPL.1: 10
    • FPT_TDC.1: 10
    • FPT_TRP.1: 6
    • FPT_TST.1: 9
  • FRU:
    • FRU_FLT.2: 9
    • FRU_RSA.2: 9
  • FTP:
    • FTP_ITC.1: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHUSER: 3
    • A.CONNECT: 5
    • A.DETECT: 3
    • A.IT: 2
    • A.KEYS: 3
    • A.MANAGE: 5
    • A.PEER: 6
    • A.PHYSICAL: 4
    • A.TRAINEDUSER: 3
  • O:
    • O.ANALYZE_AUDIT: 5
    • O.AUDITING: 15
    • O.COMP: 31
    • O.CP: 18
    • O.CRYPTO: 18
    • O.DISCRETIONARY: 11
    • O.MANAGE: 26
    • O.NETWORK: 13
    • O.REMOTE_AUDIT: 8
    • O.ROLE: 17
    • O.SUBJECT: 11
    • O.TRUSTED_CHANNEL: 5
  • OE:
    • OE.ADMIN: 6
    • OE.INFO_PROTECT: 9
    • OE.INSTALL: 4
    • OE.IT: 3
    • OE.MAINTENANCE: 3
    • OE.PHYSICAL: 3
    • OE.RECOVER: 4
    • OE.REMOTE: 4
    • OE.TRUSTED: 5
  • T:
    • T.ACCESS: 24
    • T.COMM: 4
    • T.IA: 6
    • T.INFOFLOW: 4
    • T.RESTRICT: 3
    • T.ROLE: 6
    • T.UNOBSERVED_AUDIT: 4
  • O:
    • O.RND: 3
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 9
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 124
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
      • AES-256: 2
      • AES128: 1
      • AES256: 1
  • DES:
    • 3DES:
      • TDES: 3
      • Triple-DES: 1
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 14
  • AES_competition:
    • AES:
      • AES: 20
  • DES:
    • 3DES:
      • 3DES: 5
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CBC-MAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDSA:
      • ECDSA: 20
  • FF:
    • DH:
      • Diffie-Hellman: 21
    • DSA:
      • DSA: 19
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 12
      • SHA1: 1
    • SHA2:
      • SHA-2: 3
      • SHA-256: 6
      • SHA-384: 5
      • SHA-512: 5
      • SHA256: 1
      • SHA384: 1
      • SHA512: 1
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-2: 1
      • SHA-224: 5
      • SHA-256: 5
      • SHA-384: 5
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 6
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 21
    • IKEv1: 1
    • IKEv2: 19
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 60
    • SSHv2: 8
  • TLS:
    • SSL:
      • SSL: 11
    • TLS:
      • TLS: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RNG: 19
  • RNG:
    • RND: 6
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 6
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 7
  • XTS:
    • XTS: 3
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 2
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 1
    • brainpoolP256r1: 1
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
  • NIST:
    • P-256: 1
    • P-384: 1
    • P-521: 1
    • curve P-256: 1
    • curve P-384: 1
    • curve P-521: 1
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 6
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
  • libgcrypt:
    • libgcrypt: 3
  • Neslib:
    • NESLIB 3.0: 1
    • NesLib 3.0: 1
    • NesLib 3.2: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 9
    • malfunction: 4
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 8
    • Physical Probing: 4
    • SPA: 1
    • physical probing: 3
    • side channel: 6
    • timing attacks: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
  • FIPS:
    • FIPS 140-2: 20
    • FIPS 186-4: 1
    • FIPS PUB 186-3: 2
    • FIPS PUB 186-4: 6
    • FIPS180-4: 2
    • FIPS197: 2
  • RFC:
    • RFC 2460: 1
    • RFC 3484: 1
    • RFC 3542: 1
    • RFC 4213: 1
    • RFC 4252: 4
    • RFC 4253: 3
    • RFC 768: 1
    • RFC 791: 2
    • RFC 792: 1
    • RFC 793: 1
    • RFC2409: 2
    • RFC3526: 4
    • RFC3602: 3
    • RFC4106: 4
    • RFC4252: 6
    • RFC4253: 14
    • RFC4301: 4
    • RFC4303: 5
    • RFC4306: 2
    • RFC4307: 7
    • RFC4309: 4
    • RFC4419: 3
    • RFC4753: 2
    • RFC5114: 3
    • RFC5647: 2
    • RFC5656: 4
    • RFC5996: 5
    • RFC6668: 2
    • RFC6954: 3
  • BSI:
    • AIS31: 3
    • BSI-AIS31: 3
  • CC:
    • CCMB-2009-07-001: 3
    • CCMB-2009-07-002: 38
    • CCMB-2009-07-003: 2
  • FIPS:
    • FIPS PUB 140-2: 7
    • FIPS PUB 180-1: 4
    • FIPS PUB 180-2: 3
    • FIPS PUB 186: 2
    • FIPS PUB 197: 4
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 10116: 5
    • ISO/IEC 10118-: 2
    • ISO/IEC 14888: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796: 1
    • ISO/IEC 9796-2: 4
    • ISO/IEC 9797: 1
    • ISO/IEC 9797-1: 3
  • PKCS:
    • PKCS #1: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
    • PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
    • as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
    • out of scope: 3
  • OutOfScope:
    • 37 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded. 38 The TOE optionally: 1
    • ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Christiane DROULERS
  • /CreationDate: D:20121218105558Z
  • /Creator: FrameMaker 7.2
  • /ModDate: D:20130225202953+01'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: SMD_SM33Fxxx_V1_2.book
  • pdf_file_size_bytes: 821982
  • pdf_hyperlinks: http://www.st.com
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 87
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different