| name |
STMicroelectronics ST33K1M5A and ST33K1M5M B03 |
Canonical Ubuntu Server 18.04.4 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Operating Systems |
| scheme |
NL |
SE |
| status |
active |
archived |
| not_valid_after |
09.09.2029 |
11.12.2025 |
| not_valid_before |
09.09.2024 |
11.12.2020 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300112-02-CERT.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20-%20Ubuntu.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300112-02-CR2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Canonical%20Ubuntu%20Server%2018.04%20LTS.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300112-02-ST_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20-%20Canonical%20Ubuntu%20Server%2018.04%20LTS.pdf |
| manufacturer |
STMicroelectronics |
Canonical Group Limited |
| manufacturer_web |
https://www.st.com/ |
https://www.canonical.com/ |
| security_level |
EAL6+, ALC_FLR.2 |
ALC_FLR.3, EAL2 |
| dgst |
83fc6586c8ac42f5 |
17862668d38c8dbe |
| heuristics/cert_id |
NSCIB-CC-2300112-02-CR |
CSEC2019029 |
| heuristics/cert_lab |
|
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ALC_FLR.2, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_SPM.1, ADV_ARC.1 |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
- |
18.04.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
NSCIB-CC-2300112-03-CR |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
NSCIB-CC-2300112-03-CR |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
cf0f01bcd7be3e9c |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
{} |
| pdf_data/cert_filename |
NSCIB-CC-2300112-02-CERT.pdf |
CCRA - Ubuntu.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- NL:
- NSCIB-2300112-02: 1
- NSCIB-CC-2300112-02: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL7: 1
|
|
| pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author: Gebruiker
- /CreationDate: D:20240923195638+01'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20240923195638+01'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 87790
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20201216100731+01'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20201216100731+01'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 908771
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
NSCIB-CC-2300112-02-CR2.pdf |
Certification Report - Canonical Ubuntu Server 18.04 LTS.pdf |
| pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-2300112-02-CR
- cert_item: ST33K1M5A and ST33K1M5M B03
- cert_lab: SGS Brightsight B.V.
- developer: STMicroelectronics
|
|
| pdf_data/report_keywords/cc_cert_id |
- NL:
- NSCIB-2300112-01: 1
- NSCIB-2300112-02: 1
- NSCIB-CC-2300112-02-CR: 1
- NSCIB-CC-2300112-02-CR2: 11
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 2
|
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ALC:
- ALC_FLR.1: 1
- ALC_FLR.2: 3
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.3: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.AUTHUSER: 1
- A.CONNECT: 1
- A.DETECT: 1
- A.IT: 1
- A.KEYS: 1
- A.MANAGE: 1
- A.PEER: 2
- A.PHYSICAL: 1
- A.TRAINEDUSER: 1
- T:
- T.ACCESS: 6
- T.COMM: 1
- T.IA: 2
- T.INFOFLOW: 1
- T.RESTRICT: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 3
- SGS Brightsight: 3
|
|
| pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
- CVE:
- CVE-2018-20623: 1
- CVE-2019-1549: 1
- CVE-2020-10942: 1
- CVE-2020-24977: 1
- CVE-2020-8648: 1
|
| pdf_data/report_keywords/side_channel_analysis |
- FI:
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 2
- JIL-AM: 1
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 4213: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- following proprietary or non-standard algorithms, protocols and implementations: none, which are out of scope as there are no security claims relating to these. Page: 11/12 of report number: 1
- out of scope: 1
|
- OutOfScope:
- out of scope: 1
- revealed some residual vulnerabilities. Re- sidual vulnerabilities are vulnerabilities that are out of scope because they require a higher attack potential than the actual EAL is designed to protect from. The: 1
|
| pdf_data/report_metadata |
|
- /Author: Jerry Johansson
- /CreationDate: D:20201211132819+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20201211132819+01'00'
- /Producer: Microsoft® Word 2016
- /Subject: 20FMV108-30:1
- /Title: Certification Report - Canonical Ubuntu Server 18.04 LTS
- pdf_file_size_bytes: 454103
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
| pdf_data/st_filename |
NSCIB-CC-2300112-02-ST_lite.pdf |
ST - Canonical Ubuntu Server 18.04 LTS.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0084-2014: 10
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 63
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL6: 23
- EAL6 augmented: 2
- EAL6+: 1
|
- EAL:
- EAL2: 4
- EAL2 augmented: 1
- EAL4: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_SPM: 4
- ADV_SPM.1: 3
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 4
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 12
- ASE_OBJ.2: 1
- ASE_REQ: 31
- ASE_REQ.2: 1
- ASE_SPD: 9
- ASE_SPD.1: 1
- ASE_TSS: 7
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.3: 1
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.3: 5
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_SAR.1: 26
- FAU_SAS: 2
- FAU_SAS.1: 26
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 4
- FCS_COP.1: 17
- FCS_RNG: 2
- FCS_RNG.1: 6
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.2: 14
- FDP_ACF.1: 31
- FDP_IFC.1: 17
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_ITT.1: 10
- FDP_SDC: 2
- FDP_SDC.1: 6
- FDP_SDI.2: 13
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FDP_UCT.1: 16
- FDP_UIT.1: 16
- FIA:
- FIA_API: 2
- FIA_API.1: 6
- FIA_UAU.1: 14
- FIA_UID.1: 16
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 29
- FMT_LIM.2: 30
- FMT_MSA.1: 28
- FMT_MSA.3: 28
- FMT_SMF.1: 25
- FMT_SMR.1: 17
- FPT:
- FPT_FLS.1: 24
- FPT_ITT.1: 9
- FPT_PHP.3: 11
- FRU:
- FTP:
- FTP_ITC.1: 28
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 44
- FCS_CKM.1.1: 4
- FCS_CKM.2: 14
- FCS_CKM.2.1: 1
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COP.1: 28
- FCS_COP.1.1: 6
- FCS_RNG: 2
- FCS_RNG.1: 35
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 5
- FDP:
- FDP_ACC.1: 38
- FDP_ACC.1.1: 3
- FDP_ACC.2: 19
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 42
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 5
- FDP_CDP: 5
- FDP_CDP.1: 14
- FDP_CDP.1.1: 2
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 14
- FDP_IFC.2: 20
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF.1: 26
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 22
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 2
- FDP_ITC.2.3: 2
- FDP_ITC.2.4: 2
- FDP_ITC.2.5: 2
- FDP_RIP.2: 13
- FDP_RIP.2.1: 1
- FDP_UCT: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 19
- FIA_ATD.1.1: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 50
- FMT_MSA.1.1: 5
- FMT_MSA.3: 51
- FMT_MSA.3.1: 7
- FMT_MSA.3.2: 7
- FMT_MSA.4: 6
- FMT_MSA.4.1: 1
- FMT_MTD.1: 91
- FMT_MTD.1.1: 13
- FMT_REV.1: 15
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 25
- FMT_SMF.1.1: 1
- FMT_SMR.1: 35
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TDC.1: 22
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FTA:
- FTA_SSL.1: 7
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 7
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
- O:
- O.C: 4
- O.RND: 4
- O.TOE-: 1
- R:
- T:
|
- A:
- A.AUTHUSER: 3
- A.CONNECT: 5
- A.DETECT: 3
- A.IT: 3
- A.KEYS: 2
- A.MANAGE: 5
- A.PEER: 6
- A.PHYSICAL: 4
- A.TRAINEDUSER: 3
- O:
- O.AUDITING: 14
- O.COMP: 31
- O.CP: 17
- O.CRYPTO: 16
- O.DISCRETIONARY: 10
- O.MANAGE: 26
- O.NETWORK: 12
- O.SUBJECT: 10
- O.TRUSTED_CHANNEL: 5
- OE:
- OE.ADMIN: 6
- OE.INFO_PROTECT: 9
- OE.INSTALL: 4
- OE.IT: 4
- OE.MAINTENANCE: 3
- OE.PHYSICAL: 3
- OE.RECOVER: 4
- OE.REMOTE: 4
- OE.TRUSTED: 5
- T:
- T.ACCESS: 24
- T.COMM: 4
- T.IA: 6
- T.INFOFLOW: 4
- T.RESTRICT: 3
|
| pdf_data/st_keywords/vendor |
- Infineon:
- Philips:
- STMicroelectronics:
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 14
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
- miscellaneous:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 1
- SHA-256: 4
- SHA-384: 4
- SHA-512: 5
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- Edwards:
- NIST:
- P-256: 1
- P-384: 1
- P-521: 1
- curve P-256: 1
- curve P-384: 1
- curve P-521: 1
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 14
- Physical Probing: 4
- physical probing: 3
- side channel: 2
- other:
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 22
- CCMB-2017-04-003: 2
- FIPS:
- ISO:
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-67: 3
- SP 800-38A: 2
- SP 800-67: 1
- PKCS:
|
- BSI:
- FIPS:
- FIPS 140-2: 9
- FIPS 180-4: 6
- FIPS 186-4: 1
- FIPS 186-5: 1
- FIPS 197: 6
- FIPS 198-1: 2
- FIPS 46-3: 1
- FIPS PUB 186-4: 4
- FIPS PUB 186-5: 2
- FIPS180-4: 2
- FIPS197: 2
- PKCS:
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 3542: 1
- RFC 4213: 1
- RFC 4252: 4
- RFC 4253: 3
- RFC 768: 1
- RFC 791: 2
- RFC 792: 1
- RFC 793: 1
- RFC3526: 2
- RFC4252: 6
- RFC4253: 13
- RFC4419: 3
- RFC5647: 2
- RFC5656: 4
- RFC6668: 2
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- ES) is in User NVM. 45 Note: The ES is not part of the TOE and is out of scope of the evaluation: 1
- ISO13239, IEEE 802.3, etc..) which is out of scope of this evaluation: 1
- Security IC Embedded Software (ES) is in User NVM. 45 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 46 The user guidance documentation, part of the TOE: 1
- The TOE also provides a 16- and 32-bit CRC calculation block (ISO13239, IEEE 802.3, etc..) which is out of scope of this evaluation. 41 Figure 1 provides an overview of the ST33K1M5A and ST33K1M5M B03: 1
- out of scope: 2
|
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
- out of scope: 3
|
| pdf_data/st_metadata |
- /Author: feixbeno
- /CreationDate: D:20240822172325Z
- /Creator: FrameMaker 17.0.1
- /CreatorTool: FrameMaker 17.0.1
- /ModDate: D:20240822172354+02'00'
- /Producer: Adobe PDF Library 17.0
- /Title: SMD_ST33K1M5AM_ST_21_002_VB03_1P.pdf
- /Trapped: /False
- pdf_file_size_bytes: 1579749
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 84
|
- /Author: Stephan Mueller (generated by CCTool version 2.8.4.38)
- /CreationDate: D:20201202091938Z
- /Creator: Unknown
- /Keywords: Security Target, Common Criteria, Linux Distribution
- /ModDate: D:20201211165724+01'00'
- /Producer: XEP 4.18 build 20100322
- /Subject: Ubuntu
- /Title: Security Target for Ubuntu 18.04 LTS (version 1.0 as of 2020-12-02)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 1153848
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc5647.txt, https://tools.ietf.org/id/draft-ietf-curdle-ssh-ed25519-02.txt, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf, http://tools.ietf.org/html/rfc6668, http://tools.ietf.org/html/rfc5656, http://tools.ietf.org/html/rfc3526, http://tools.ietf.org/html/rfc4252, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5-draft.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf, http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf, http://tools.ietf.org/html/rfc4253, http://tools.ietf.org/html/rfc4419
- pdf_is_encrypted: False
- pdf_number_of_pages: 113
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |