name |
ST33TPHF2E mode TPM 2.0 TPM Firmware versions 73.08 et 73.09
|
ST33TPHF2E mode TPM 2.0 TPM Firmware versions 73.08 (0x49 0x08) et 73.09 (0x49 0x09)
|
category |
Trusted Computing
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2018-09-24
|
2018-09-24
|
not_valid_after |
2023-09-24
|
2018-09-24
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_41en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_41en.pdf
|
status |
archived
|
archived
|
manufacturer |
STMicroelectronics
|
STMicroelectronics
|
manufacturer_web |
https://www.st.com/
|
https://www.st.com/
|
security_level |
ALC_FLR.1, AVA_VAN.4, EAL4+ |
ALC_FLR.1, AVA_VAN.4, EAL4+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_41fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_41fr.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'ANSSI-CC-PP-2018/03 « PC Client Specific TPM » (TPM Library specification Famil...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_03-pp.pdf', 'pp_ids': None}) |
|
maintenance_updates |
|
|
state |
- _type:
sec_certs.sample.cc.CCCertificate.InternalState
- report:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
False
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
87eca384777d14af604f86b556ca96daf173a396505fea4878162650e7f8f89e
- txt_hash:
aaac5f7b51a97e126e99de34e8196ab7e44e11c69cb2c34544a8d601ce58cd24
- st:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
False
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
93e0fa9c70b59fd9e5dfd9f4154a3a53dd1bf187348a00cec61b9e59c3fe6ee6
- txt_hash:
5ee94663a3e68ca9d8f80e7fc6dae3f1e061fe43a0adac8370697cfa010b583a
- cert:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.InternalState
- report:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
False
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
87eca384777d14af604f86b556ca96daf173a396505fea4878162650e7f8f89e
- txt_hash:
aaac5f7b51a97e126e99de34e8196ab7e44e11c69cb2c34544a8d601ce58cd24
- st:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
True
- convert_garbage:
False
- convert_ok:
True
- extract_ok:
True
- pdf_hash:
93e0fa9c70b59fd9e5dfd9f4154a3a53dd1bf187348a00cec61b9e59c3fe6ee6
- txt_hash:
5ee94663a3e68ca9d8f80e7fc6dae3f1e061fe43a0adac8370697cfa010b583a
- cert:
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2018/41
|
ANSSI-CC-2018/41
|
heuristics/cert_lab |
THALES |
THALES |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_TAT.1, ADV_TDS.3, ALC_DVS.1, ALC_FLR.1, ALC_CMC.4, ASE_CCL.1, ASE_TSS.1, ATE_COV.2, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4, ATE_DPT.1, AGD_OPE.1, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, AVA_VAN.4, ADV_IMP.1, ASE_INT.1, ASE_REQ.2, ADV_ARC.1, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, ADV_FSP.4 |
ALC_TAT.1, ADV_TDS.3, ALC_DVS.1, ALC_FLR.1, ALC_CMC.4, ASE_CCL.1, ASE_TSS.1, ATE_COV.2, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4, ATE_DPT.1, AGD_OPE.1, ASE_OBJ.2, ATE_IND.2, ALC_DEL.1, AVA_VAN.4, ADV_IMP.1, ASE_INT.1, ASE_REQ.2, ADV_ARC.1, AGD_PRE.1, ASE_ECD.1, ASE_SPD.1, ADV_FSP.4 |
heuristics/extracted_versions |
2.0, 73.08, 73.09 |
2.0, 73.08, 73.09 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2019/37, ANSSI-CC-2019/45, ANSSI-CC-2019/46, ANSSI-CC-2019/44 |
heuristics/report_references/directly_referencing |
None
|
ANSSI-CC-2015/36, ANSSI-CC-2017/39 |
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2019/37, ANSSI-CC-2019/45, ANSSI-CC-2019/46, ANSSI-CC-2019/44 |
heuristics/report_references/indirectly_referencing |
None
|
ANSSI-CC-2015/36, ANSSI-CC-2016/33, ANSSI-CC-2017/39, ANSSI-CC-2016/43, ANSSI-CC-2016/78, ANSSI-CC-2015/80, ANSSI-CC-2016/44 |
heuristics/scheme_data |
None
|
- product:
ST33TPHF2E mode TPM 2.0 TPM Firmware versions 73.08 (0x49 0x08) et 73.09 (0x49 0x09)
- url:
https://cyber.gouv.fr/produits-certifies/st33tphf2e-mode-tpm-20-tpm-firmware-versions-7308-0x49-0x08-et-7309-0x49-0x09
- description:
Le produit évalué est le composant « ST33TPHF2E mode TPM 2.0, hardware ST33HTPH révision A en externe et C en interne, TPM firmware versions 73.08 et 73.09 » développé par la société STMicroelectronics.
- sponsor:
STMicroelectronics
- developer:
STMicroelectronics
- cert_id:
2018/41
- level:
EAL4+
- enhanced:
- cert_id:
2018/41
- certification_date:
24/09/2018
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r5
- developer:
STMicroelectronics
- sponsor:
STMicroelectronics
- evaluation_facility:
THALES (TCS-CNES)
- level:
EAL4+
- protection_profile:
PP-TPM
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_FLR.1, AVA_VAN.4
- report_link:
https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cc-2018_41fr.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2018/10/anssi-cible-cc-2018_41en.pdf
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data |
- _type:
sec_certs.sample.cc.CCCertificate.PdfData
- report_metadata:
- pdf_file_size_bytes:
334203
- pdf_is_encrypted:
False
- pdf_number_of_pages:
16
- /Comments:
ST Microelectronics
- /Company:
SGDSN/ANSSI
- /CreationDate:
D:20180927140859+02'00'
- /Creator:
Acrobat PDFMaker 11 pour Word
- /Keywords:
ANSSI-CC-CER-F-07.026
- /ModDate:
D:20181003123248+02'00'
- /Producer:
Adobe PDF Library 11.0
- /SourceModified:
D:20180927120855
- /Subject:
- /Title:
- pdf_hyperlinks:
mailto:[email protected], http://www.sogis.org/, http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/
- st_metadata:
- pdf_file_size_bytes:
645169
- pdf_is_encrypted:
False
- pdf_number_of_pages:
55
- /CreationDate:
D:20180803094620+02'00'
- /Creator:
PDFCreator 2.4.1.13
- /Keywords:
- /ModDate:
D:20181003123157+02'00'
- /Producer:
PDFCreator 2.4.1.13
- /Subject:
- /Title:
- pdf_hyperlinks:
- cert_metadata:
None
- report_frontpage:
- FR:
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2018/41
- cert_item:
ST33TPHF2E mode TPM 2.0
- cert_item_version:
Hardware ST33HTPH révision A/C (Externe/Interne), TPM Firmware versions 73.08 et 73.09
- ref_protection_profiles:
PP-TPM] PC Client Specific Trusted Platform Module (TPM Library specification Family 2.0 Level 0, Revision 1.38, Version 1.1
- cc_version:
Critères Communs version 3.1 révision 5
- cc_security_level:
EAL 4 augmenté ALC_FLR.1, AVA_VAN.4
- developer:
STMicroelectronics Green Square Building B, Lambroekstraat, 5, B-1831 Diegem, Belgique Commanditaire STMicroelectronics Green Square Building B, Lambroekstraat,5, B-1831 Diegem, Belgique
- cert_lab:
THALES (TCS – CNES) 18 avenue Edouard Belin, BPI 1414, 31401 Toulouse Cedex 9, France
- st_frontpage:
None
- cert_frontpage:
None
- report_keywords:
- cc_cert_id:
- FR:
- ANSSI-CC-2018/41:
17
- ANSSI-CC-2015/36:
1
- ANSSI-CC-2016/43-M01:
1
- ANSSI-CC-2016/44-M01:
1
- ANSSI-CC-2016/78-M01:
1
- ANSSI-CC-2017/39:
1
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 4:
2
- EAL2:
2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
- ITSEC:
- cc_sar:
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_FLR.1:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_LCD:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- AES_competition:
- DES:
- constructions:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- BSI:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
- st_keywords:
- cc_cert_id:
- cc_protection_profile_id:
- ANSSI:
- ANSSI-CC-PP-:
1
- ANSSI-CC-PP-2018/03:
2
- cc_security_level:
- EAL:
- EAL4:
2
- EAL4 augmented:
1
- cc_sar:
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.4:
1
- ADV_IMP.1:
1
- ADV_TDS.3:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
3
- ALC_CMC.4:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_ECD:
2
- ASE_REQ:
2
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
- cc_sfr:
- FCO:
- FCS:
- FCS_RNG.1:
9
- FCS_CKM:
32
- FCS_CKM.2:
6
- FCS_COP.1:
14
- FCS_CKM.4:
18
- FCS_CKM.1:
15
- FCS_CKM.4.1:
1
- FCS_COP:
42
- FCS_RNG:
2
- FCS_RNG.1.1:
2
- FCS_RNG.1.2:
2
- FDP:
- FDP_ACF.1:
17
- FDP_ACC.1:
10
- FDP_IFC.1:
5
- FDP_ITC.1:
9
- FDP_ITC.2:
9
- FDP_ACC:
23
- FDP_ACC.2:
2
- FDP_ACF:
25
- FDP_UIT:
8
- FDP_UIT.1:
2
- FDP_ITT.1:
3
- FDP_RIP.1:
2
- FDP_SDI.1:
3
- FDP_ETC:
6
- FDP_ITC:
6
- FDP_UCT:
6
- FIA:
- FIA_UID.1:
4
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.2:
3
- FIA_AFL:
6
- FIA_UAU.1:
3
- FIA_UAU.5:
3
- FIA_UAU.6:
3
- FIA_USB.1:
3
- FIA_MSA:
1
- FMT:
- FMT_MSA.2:
4
- FMT_MSA.1:
5
- FMT_SMR.1:
8
- FMT_MSA.2.1:
1
- FMT_MSA.3:
7
- FMT_MSA:
55
- FMT_SMF.1:
5
- FMT_MSA.4:
1
- FMT_MTD:
6
- FMT_MOF:
3
- FPT:
- FPT_TST.1:
6
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_FLS:
7
- FPT_FLS.1:
1
- FPT_PHP.3:
4
- FPT_PHP.3.1:
1
- FPT_STM.1:
3
- FPT_ITT.1:
3
- FTP:
- FTP_ITC.1:
1
- FTP_TRP.1:
1
- FTP_ITC:
3
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- AES_competition:
- DES:
- constructions:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- SCA:
- physical probing:
2
- side channel:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- FIPS:
- FIPS 197:
3
- FIPS 180-4:
4
- FIPS 198-1:
4
- FIPS PUB 186-4:
1
- FIPS 186-4:
2
- FIPS 140-2:
2
- FIPS PUB 140-2:
1
- NIST:
- SP 800-38A:
3
- SP 800-56A:
3
- NIST SP 800-90A:
2
- SP 800-17:
1
- PKCS:
- BSI:
- RFC:
- RFC 3447:
7
- RFC 2104:
1
- RFC2104:
1
- ISO:
- ISO/IEC 15946-5:
3
- ISO/IEC 9796-2:
2
- ISO/IEC 9797-2:
2
- ISO/IEC 10116:
2
- ISO/IEC 10118-3:
2
- ISO/IEC 14888-3:
2
- ISO/IEC 18033-3:
2
- ISO/IEC 10116:2006:
1
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-04:
1
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
- cert_keywords:
None
- report_filename:
anssi-cc-2018_41fr.pdf
- st_filename:
anssi-cible-cc-2018_41en.pdf
- cert_filename:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.PdfData
- report_metadata:
- pdf_file_size_bytes:
334203
- pdf_is_encrypted:
False
- pdf_number_of_pages:
16
- /Comments:
ST Microelectronics
- /Company:
SGDSN/ANSSI
- /CreationDate:
D:20180927140859+02'00'
- /Creator:
Acrobat PDFMaker 11 pour Word
- /Keywords:
ANSSI-CC-CER-F-07.026
- /ModDate:
D:20181003123248+02'00'
- /Producer:
Adobe PDF Library 11.0
- /SourceModified:
D:20180927120855
- /Subject:
- /Title:
- pdf_hyperlinks:
mailto:[email protected], http://www.sogis.org/, http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/
- st_metadata:
- pdf_file_size_bytes:
645169
- pdf_is_encrypted:
False
- pdf_number_of_pages:
55
- /CreationDate:
D:20180803094620+02'00'
- /Creator:
PDFCreator 2.4.1.13
- /Keywords:
- /ModDate:
D:20181003123157+02'00'
- /Producer:
PDFCreator 2.4.1.13
- /Subject:
- /Title:
- pdf_hyperlinks:
- cert_metadata:
None
- report_frontpage:
- FR:
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2018/41
- cert_item:
ST33TPHF2E mode TPM 2.0
- cert_item_version:
Hardware ST33HTPH révision A/C (Externe/Interne), TPM Firmware versions 73.08 et 73.09
- ref_protection_profiles:
PP-TPM] PC Client Specific Trusted Platform Module (TPM Library specification Family 2.0 Level 0, Revision 1.38, Version 1.1
- cc_version:
Critères Communs version 3.1 révision 5
- cc_security_level:
EAL 4 augmenté ALC_FLR.1, AVA_VAN.4
- developer:
STMicroelectronics Green Square Building B, Lambroekstraat, 5, B-1831 Diegem, Belgique Commanditaire STMicroelectronics Green Square Building B, Lambroekstraat,5, B-1831 Diegem, Belgique
- cert_lab:
THALES (TCS – CNES) 18 avenue Edouard Belin, BPI 1414, 31401 Toulouse Cedex 9, France
- st_frontpage:
None
- cert_frontpage:
None
- report_keywords:
- cc_cert_id:
- FR:
- ANSSI-CC-2018/41:
17
- ANSSI-CC-2015/36:
1
- ANSSI-CC-2016/43-M01:
1
- ANSSI-CC-2016/44-M01:
1
- ANSSI-CC-2016/78-M01:
1
- ANSSI-CC-2017/39:
1
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 4:
2
- EAL2:
2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
- ITSEC:
- cc_sar:
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_FLR.1:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_LCD:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- AES_competition:
- DES:
- constructions:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- BSI:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
- st_keywords:
- cc_cert_id:
- cc_protection_profile_id:
- ANSSI:
- ANSSI-CC-PP-:
1
- ANSSI-CC-PP-2018/03:
2
- cc_security_level:
- EAL:
- EAL4:
2
- EAL4 augmented:
1
- cc_sar:
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.4:
1
- ADV_IMP.1:
1
- ADV_TDS.3:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
3
- ALC_CMC.4:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_ECD:
2
- ASE_REQ:
2
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
- cc_sfr:
- FCO:
- FCS:
- FCS_RNG.1:
9
- FCS_CKM:
32
- FCS_CKM.2:
6
- FCS_COP.1:
14
- FCS_CKM.4:
18
- FCS_CKM.1:
15
- FCS_CKM.4.1:
1
- FCS_COP:
42
- FCS_RNG:
2
- FCS_RNG.1.1:
2
- FCS_RNG.1.2:
2
- FDP:
- FDP_ACF.1:
17
- FDP_ACC.1:
10
- FDP_IFC.1:
5
- FDP_ITC.1:
9
- FDP_ITC.2:
9
- FDP_ACC:
23
- FDP_ACC.2:
2
- FDP_ACF:
25
- FDP_UIT:
8
- FDP_UIT.1:
2
- FDP_ITT.1:
3
- FDP_RIP.1:
2
- FDP_SDI.1:
3
- FDP_ETC:
6
- FDP_ITC:
6
- FDP_UCT:
6
- FIA:
- FIA_UID.1:
4
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.2:
3
- FIA_AFL:
6
- FIA_UAU.1:
3
- FIA_UAU.5:
3
- FIA_UAU.6:
3
- FIA_USB.1:
3
- FIA_MSA:
1
- FMT:
- FMT_MSA.2:
4
- FMT_MSA.1:
5
- FMT_SMR.1:
8
- FMT_MSA.2.1:
1
- FMT_MSA.3:
7
- FMT_MSA:
55
- FMT_SMF.1:
5
- FMT_MSA.4:
1
- FMT_MTD:
6
- FMT_MOF:
3
- FPT:
- FPT_TST.1:
6
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_FLS:
7
- FPT_FLS.1:
1
- FPT_PHP.3:
4
- FPT_PHP.3.1:
1
- FPT_STM.1:
3
- FPT_ITT.1:
3
- FTP:
- FTP_ITC.1:
1
- FTP_TRP.1:
1
- FTP_ITC:
3
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- AES_competition:
- DES:
- constructions:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- SCA:
- physical probing:
2
- side channel:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- FIPS:
- FIPS 197:
3
- FIPS 180-4:
4
- FIPS 198-1:
4
- FIPS PUB 186-4:
1
- FIPS 186-4:
2
- FIPS 140-2:
2
- FIPS PUB 140-2:
1
- NIST:
- SP 800-38A:
3
- SP 800-56A:
3
- NIST SP 800-90A:
2
- SP 800-17:
1
- PKCS:
- BSI:
- RFC:
- RFC 3447:
7
- RFC 2104:
1
- RFC2104:
1
- ISO:
- ISO/IEC 15946-5:
3
- ISO/IEC 9796-2:
2
- ISO/IEC 9797-2:
2
- ISO/IEC 10116:
2
- ISO/IEC 10118-3:
2
- ISO/IEC 14888-3:
2
- ISO/IEC 18033-3:
2
- ISO/IEC 10116:2006:
1
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-04:
1
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
- cert_keywords:
None
- report_filename:
anssi-cc-2018_41fr.pdf
- st_filename:
anssi-cible-cc-2018_41en.pdf
- cert_filename:
None
|
dgst |
9319b186cf3ec4c2
|
867183206d68b4fa
|