Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ST33G1M2A and ST33G1M2M D01
ANSSI-CC-2020/79
Samsung Galaxy Devices with Android 9 - Fall
CCEVS-VR-11018-2019
name ST33G1M2A and ST33G1M2M D01 Samsung Galaxy Devices with Android 9 - Fall
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
scheme FR US
status active archived
not_valid_after 07.07.2026 04.11.2021
not_valid_before 18.02.2021 04.11.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_ANSSI-CC-2020_79-S01fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11018-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_79fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11018-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020-79en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11018-st.pdf
manufacturer STMicroelectronics Samsung Electronics Co., Ltd.
manufacturer_web https://www.st.com/ https://www.samsung.com
security_level ALC_DVS.2, EAL5+, AVA_VAN.5 {}
dgst d07d1aad5a502162 f101312fea6df351
heuristics/cert_id ANSSI-CC-2020/79 CCEVS-VR-11018-2019
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:samsung:android:9.0:smr-aug-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-aug-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-may-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-mar-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-sep-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jul-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-apr-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jul-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jul-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-feb-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-apr-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jan-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jun-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-aug-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jul-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jan-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jun-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-sep-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-feb-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-mar-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-aug-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-mar-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-may-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-may-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-may-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jun-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2018-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jan-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jun-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-sep-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-apr-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-mar-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jan-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-feb-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-feb-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-aug-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jan-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2018-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-feb-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-sep-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-sep-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2018-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jul-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-may-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-mar-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-apr-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-apr-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jun-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2020-r1:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-25489, CVE-2021-25370, CVE-2021-25395, CVE-2021-25369, CVE-2021-25487, CVE-2021-25337, CVE-2021-25394
heuristics/extracted_sars AGD_OPE.1, ADV_ARC.1, ALC_DVS.2, ATE_DPT.3, ALC_CMS.5, ASE_OBJ.2, ASE_REQ.2, ALC_DEL.1, ADV_FSP.5, ATE_COV.2, ASE_SPD.1, AVA_VAN.5, ATE_IND.2, ASE_TSS.1, ADV_INT.2, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ADV_TDS.4, ALC_CMC.4, ALC_TAT.2, ATE_FUN.1, ADV_IMP.1 AVA_VAN.1, ATE_IND.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.1, ALC_TSU_EXT.1, ALC_CMC.1
heuristics/extracted_versions - 9
heuristics/protection_profiles cf0f01bcd7be3e9c df09b703c88c665a, f4474c6c73660987, c88af12926be2779
maintenance_updates

protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf
pdf_data/cert_filename certificat_ANSSI-CC-2020_79-S01fr.pdf st_vid11018-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2020/79-S01: 2
  • US:
    • CCEVS-VR-VID11018-2019: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL5: 1
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /Author: cduclos
  • /CreationDate: D:20210715165220+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210715165220+02'00'
  • /Producer: GPL Ghostscript 9.50
  • /Title: Microsoft Word - certificat_ANSSI-CC-2020_79-S01fr.docx
  • pdf_file_size_bytes: 1918078
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20191106134853-05'00'
  • /ModDate: D:20191106134853-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183311
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ANSSI-CC-2020_79fr.pdf st_vid11018-vr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
  • FR:
  • US:
    • cert_id: CCEVS-VR-11018-2019
    • cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 9 - Fall
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2020/79: 4
  • US:
    • CCEVS-VR-11018-2019: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STM: 12
    • STMicroelectronics: 3
  • Qualcomm:
    • Qualcomm: 4
  • Samsung:
    • Samsung: 51
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 13
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 1
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 31: 2
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • PKCS:
    • PKCS #1: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Knox-specific claims made in this evaluation. All other functionality provided by the container is out of scope. 7 Documentation The following documents were available with the TOE for evaluation: Samsung: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20210316154314+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210316154314+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 129017
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /CreationDate: D:20191106131540-05'00'
  • /ModDate: D:20191106131540-05'00'
  • pdf_file_size_bytes: 958233
  • pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename anssi-cible-cc-2020-79en.pdf st_vid11018-st.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 8
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 53
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 17
    • EAL5 augmented: 2
    • EAL5+: 1
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 4
    • ASE_CCL.1: 1
    • ASE_ECD: 3
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 8
    • ASE_OBJ.2: 1
    • ASE_REQ: 23
    • ASE_REQ.2: 1
    • ASE_SPD: 5
    • ASE_SPD.1: 1
    • ASE_TSS: 5
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 3
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 2
    • FAU_SAS.1: 6
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 4
    • FCS_COP.1: 17
    • FCS_RNG: 2
    • FCS_RNG.1: 6
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.2: 12
    • FDP_ACF.1: 35
    • FDP_IFC.1: 16
    • FDP_ITC.1: 13
    • FDP_ITC.2: 2
    • FDP_ITT.1: 10
    • FDP_SDC: 2
    • FDP_SDC.1: 8
    • FDP_SDI.2: 8
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
  • FIA:
    • FIA_UID.1: 10
  • FMT:
    • FMT_ITC.1: 1
    • FMT_LIM: 2
    • FMT_LIM.1: 17
    • FMT_LIM.2: 18
    • FMT_MSA.1: 24
    • FMT_MSA.3: 33
    • FMT_SMF.1: 16
    • FMT_SMR.1: 16
  • FPT:
    • FPT_FLS.1: 11
    • FPT_ITT.1: 9
    • FPT_PHP.3: 11
  • FRU:
    • FRU_FLT.2: 11
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 11
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 50
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 13
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 7
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 10
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 10
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 1
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 15
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BMG_EXT: 5
    • FIA_BMG_EXT.1: 12
    • FIA_BMG_EXT.6: 1
    • FIA_BMG_EXT.6.1: 1
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 3
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF_EXT: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 9
    • FMT_SMF: 4
    • FMT_SMF.1: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 9
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 2
    • FMT_SMF_EXT.3: 4
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 19
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 13
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 10
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC_EXT: 8
    • FTP_ITC_EXT.1: 2
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.C: 2
    • O.RND: 4
  • R:
    • R.O: 2
  • T:
    • T.RND: 3
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 21
  • Broadcom:
    • Broadcom: 2
  • Qualcomm:
    • Qualcomm: 11
  • Samsung:
    • Samsung: 136
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 5
    • DES:
      • DES: 21
  • AES_competition:
    • AES:
      • AES: 20
      • AES-: 4
      • AES-128: 1
      • AES-256: 14
  • constructions:
    • MAC:
      • HMAC: 11
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 4
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 15
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 2048: 2
    • RSA-PSS: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 22
      • SHA-384: 3
      • SHA-512: 4
      • SHA256: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv1: 13
    • IKEv2: 11
  • IPsec:
    • IPsec: 41
  • TLS:
    • TLS:
      • TLS: 47
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 104
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 7
    • RNG: 6
  • TRNG:
    • TRNG: 3
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 13
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 7
  • CBC:
    • CBC: 5
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 5
  • XTS:
    • XTS: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 14
    • P-384: 8
    • P-521: 6
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 23
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 13
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 12
    • Physical Probing: 4
    • physical probing: 3
    • side channel: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 10
  • IBM:
    • SE: 4
  • other:
    • Kinibi: 1
    • TEE: 24
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 23
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS PUB 197: 3
  • ISO:
    • ISO/IEC 13239: 2
    • ISO/IEC 14888: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796: 1
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-67: 3
    • SP 800-38A: 2
    • SP 800-67: 1
  • PKCS:
    • PKCS #1: 2
  • FIPS:
    • FIPS 180-4: 6
    • FIPS 186-4: 7
    • FIPS 197: 8
    • FIPS 198-1: 5
    • FIPS PUB 186-4: 7
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 5
    • SP 800-132: 2
    • SP 800-38A: 1
    • SP 800-38C: 2
    • SP 800-38E: 2
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 4
  • PKCS:
    • PKCS #1: 1
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2560: 2
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4109: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4492: 2
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 11
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 1
    • RFC 5289: 8
    • RFC 5430: 2
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6379: 2
  • X509:
    • X.509: 9
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 39 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation. 40 The user guidance documentation, part of the TOE, consists of: • the product: 1
    • ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Christiane DROULERS
  • /CreationDate: D:20200518115139Z
  • /Creator: FrameMaker 11.0
  • /ModDate: D:20200518115944+02'00'
  • /Producer: Acrobat Elements 10.0.0 (Windows)
  • /Title: SMD_ST33G1M2AM_VD01_1P.book
  • pdf_file_size_bytes: 541279
  • pdf_hyperlinks: http://www.st.com
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 66
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different