name |
SCE900U (Version A) (ANSSI-CC-2024/19)
|
MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2) (ANSSI-CC-2024/03)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2024-07-02
|
2024-04-15
|
not_valid_after |
2029-07-02
|
2029-04-15
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_19en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_03en.pdf
|
status |
active
|
active
|
manufacturer |
Idemia
|
STMicroelectronics
|
manufacturer_web |
https://www.idemia.com
|
https://www.st.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_19fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_03fr.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_19fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_03fr.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
ef79b7fb71085cefdd4bd70a5f193f38a7c2e2e5647940e9815faf73b120313e
|
34dc82d2224a8b1e18f8cf6057612e32e012140f37a2c53459489f6ba8a53584
|
state/cert/txt_hash |
459c92a8d1726371c3d31b880866db1689a02e15ca1cc11a6546f78823e2a44d
|
9b7a0707f4a3523c1c31aecc847c85344a8eb8df3d2fa7dae0467f3160940559
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
214bb5b686fa1c9f0078c2cfeae5bbc1efd75aa092811d16931139a7031050b9
|
d62c0198281061164d95c9b66d8804d151cb4c6fc3762b64b8eab5792989e9b9
|
state/report/txt_hash |
740a610dc2eeabca2e4009bd38085d4daeb6b652c4a17f2f350ff713a77fa3b6
|
796cad73221581b1a2a0d5f82726ba941ae3ba4d4bd3cd9f6ee2ee39298f7ed5
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
f05ea0a565ea6541077db3ca52b73f6a2c6042d184311caa866b9c48851e762d
|
54cbeec187b94bf16e63f1340275f829066ab13b0445dee89fc8adf0ad8eedd1
|
state/st/txt_hash |
0284c253eb774144fd59020bf981d47f404c5a185661480a6e3d4cbcc0fe9ec5
|
ef385f87cd6f0e8f30f06ce7a19a994011da63d4601a00ea514cbbec81bd53bb
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2024/19
|
ANSSI-CC-2024/03
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
19, 2024 |
1.0.2 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
None
|
ANSSI-CC-2022/21 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
None
|
ANSSI-CC-2022/21 |
heuristics/scheme_data/cert_id |
ANSSI-CC-2024/19
|
ANSSI-CC-2024/03
|
heuristics/scheme_data/description |
Le produit évalué est « SCE900U, Version A » développé par IDEMIA.
Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applications bancaires, télévision à p
|
Le produit évalué est « MIFARE Plus EV2 on ST31N600 A01, Version 1.0.2 » développé par STMICROELECTRONICS.
Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés
|
heuristics/scheme_data/developer |
IDEMIA
|
STMICROELECTRONICS
|
heuristics/scheme_data/enhanced |
- cert_id:
ANSSI-CC-2024/19
- certification_date:
02/07/2024
- expiration_date:
02/07/2029
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r5
- developer:
IDEMIA
- sponsor:
IDEMIA
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages, version 1.0
certifié BSI-CC-PP-0084-2014 le 19 février 2014
avec conformité aux packages: “Loader dedicated for usage in Secured Environment only”
“Packages for Cryptographic Services (Package “AES”)”
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, ALC_FLR.3, AVA_VAN.5
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2024_19fr.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_19fr.pdf
|
- cert_id:
ANSSI-CC-2024/03
- certification_date:
15/04/2024
- expiration_date:
15/04/2029
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r5
- developer:
STMICROELECTRONICS
- sponsor:
STMICROELECTRONICS
- evaluation_facility:
THALES / CNES
- level:
EAL5+
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014
avec conformité aux packages :
“Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only”
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ALC_DVS.2, ALC_FLR.1, AVA_VAN.
- cert_link:
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_03fr.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, ALC_FLR.3, AVA_VAN.5
|
ALC_DVS.2, ALC_FLR.1, AVA_VAN.
|
heuristics/scheme_data/enhanced/category |
Micro-circuits
|
Micro-circuits
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
ANSSI-CC-2024/19
|
ANSSI-CC-2024/03
|
heuristics/scheme_data/enhanced/cert_link |
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_19fr.pdf
|
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2024_03fr.pdf
|
heuristics/scheme_data/enhanced/certification_date |
02/07/2024
|
15/04/2024
|
heuristics/scheme_data/enhanced/developer |
IDEMIA
|
STMICROELECTRONICS
|
heuristics/scheme_data/enhanced/evaluation_facility |
SERMA SAFETY & SECURITY
|
THALES / CNES
|
heuristics/scheme_data/enhanced/expiration_date |
02/07/2029
|
15/04/2029
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
CCRA
SOG-IS
|
CCRA
SOG-IS
|
heuristics/scheme_data/enhanced/protection_profile |
Security IC Platform Protection Profile with Augmentation Packages, version 1.0
certifié BSI-CC-PP-0084-2014 le 19 février 2014
avec conformité aux packages: “Loader dedicated for usage in Secured Environment only”
“Packages for Cryptographic Services (Package “AES”)”
|
Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014
avec conformité aux packages :
“Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only”
|
heuristics/scheme_data/enhanced/sponsor |
IDEMIA
|
STMICROELECTRONICS
|
heuristics/scheme_data/expiration_date |
2 Juillet 2029
|
15 Avril 2029
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
SCE900U (Version A)
|
MIFARE Plus EV2 on ST31N600 A01 (Version 1.0.2)
|
heuristics/scheme_data/sponsor |
IDEMIA
|
STMICROELECTRONICS
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/sce900u-version
|
https://cyber.gouv.fr/produits-certifies/mifare-plus-ev2-st31n600-a01-version-102
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
Certificat-CC-2024_19fr.pdf
|
Certificat-CC-2024_03fr.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar/ALC |
- ALC_DVS.2:
1
- ALC_FLR.3: 2
|
- ALC_DVS.2:
1
- ALC_FLR.1: 1
|
pdf_data/cert_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
1
|
pdf_data/cert_keywords/cc_sar/AVA |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata//CreationDate |
D:20240708095658+02'00'
|
D:20240419102056+02'00'
|
pdf_data/cert_metadata//Creator |
Acrobat PDFMaker 23 pour Word
|
Acrobat PDFMaker 23 pour Word
|
pdf_data/cert_metadata//Keywords |
|
|
pdf_data/cert_metadata//ModDate |
D:20240708095828+02'00'
|
D:20240419102224+02'00'
|
pdf_data/cert_metadata//Producer |
Adobe PDF Library 23.1.175
|
Adobe PDF Library 23.1.175
|
pdf_data/cert_metadata/pdf_file_size_bytes |
169627
|
149588
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
2
|
pdf_data/report_filename |
ANSSI-CC-2024_19fr.pdf
|
ANSSI-CC-2024_03fr.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
|
- ANSSI-CC-2024/03:
2
- ANSSI-CC-2022/21:
1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-2014:
1
- BSI-PP-0084-2014:
1
|
- BSI:
- BSI-CC-PP-0084-2014:
1
- BSI-PP-0084-2014:
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
1
- ALC_FLR.3: 2
- ALC_FLR:
1
|
- ALC_DVS.2:
1
- ALC_FLR.1: 2
- ALC_FLR:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/eval_facility/CESTI |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20240708095109+02'00'
|
D:20240419102137+02'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 23 pour Word
|
Acrobat PDFMaker 23 pour Word
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
D:20240708095830+02'00'
|
D:20240419102224+02'00'
|
pdf_data/report_metadata//Producer |
Adobe PDF Library 23.1.175
|
Adobe PDF Library 23.1.175
|
pdf_data/report_metadata/pdf_file_size_bytes |
346485
|
365853
|
pdf_data/report_metadata/pdf_hyperlinks |
mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/ |
mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
13
|
14
|
pdf_data/st_filename |
ANSSI-cible-CC-2024_19en.pdf
|
ANSSI-Cible-CC-2024_03en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.RND:
6
- O.MAC:
13
- O.LEAK-INHERENT:
6
- O.PHYS-PROBING:
5
- O.MALFUNCTION:
6
- O.PHYS-MANIPULATION:
5
- O.LEAK-FORCED:
3
- O.PHYS-:
1
- O.ABUSE-FUNC:
3
- O.LEAK-:
2
- O.IDENTIFICATION:
3
- O.ADD-FUNCTIONS:
3
- O.MEM-ACCESS:
3
- T:
- OE:
- OE.RESP-APPL:
3
- OE.PROCESS-SEC-IC:
3
- OE.LIM-BLOCK-LOADER:
3
- OE.LOADER-USAGE:
3
|
pdf_data/st_keywords/cc_claims/O |
|
- O.RND:
6
- O.MAC: 13
- O.LEAK-INHERENT: 6
- O.PHYS-PROBING: 5
- O.MALFUNCTION: 6
- O.PHYS-MANIPULATION: 5
- O.LEAK-FORCED: 3
- O.PHYS-: 1
- O.ABUSE-FUNC: 3
- O.LEAK-: 2
- O.IDENTIFICATION: 3
- O.ADD-FUNCTIONS: 3
- O.MEM-ACCESS: 3
|
pdf_data/st_keywords/cc_claims/O/O.RND |
1
|
6
|
pdf_data/st_keywords/cc_claims/T/T.RND |
1
|
3
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0084:
32
- BSI-PP- 0084:
2
|
- BSI-CC-PP-0084-2014:
64
- BSI-CC-PP- 0084-2014:
11
- BSI-CC-PP-0084-:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_ARC.1:
3
- ADV_FSP.4: 1
- ADV_FSP.5:
2
- ADV_IMP.1:
3
- ADV_INT.2:
1
- ADV_TDS.3: 1
- ADV_TDS.4:
2
|
- ADV_ARC.1:
1
- ADV_FSP.5:
1
- ADV_IMP.1:
1
- ADV_INT.2:
1
- ADV_TDS.4:
1
- ADV_ARC:
1
- ADV_FSP: 1
- ADV_IMP: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
3
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 |
3
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_INT.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.4 |
2
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
3
- AGD_PRE.1:
3
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE: 1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
3
|
1
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
3
|
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMC:
1
- ALC_FLR.3: 6
- ALC_DVS.2:
8
- ALC_CMC.4:
2
- ALC_CMS.4: 1
- ALC_CMS.5:
1
- ALC_DEL.1:
2
- ALC_LCD.1:
2
- ALC_TAT.1: 1
- ALC_TAT.2:
1
|
- ALC_DVS.2:
6
- ALC_FLR.1: 9
- ALC_CMC.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.2:
1
- ALC_DVS: 1
- ALC_CMS: 1
- ALC_CMC:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
8
|
6
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_TSS:
1
- ASE_CCL.1:
2
- ASE_ECD.1:
2
- ASE_INT.1:
2
- ASE_OBJ.2:
2
- ASE_REQ.2:
2
- ASE_SPD.1:
2
- ASE_TSS.1:
2
|
- ASE_INT: 2
- ASE_CCL: 4
- ASE_ECD: 3
- ASE_SPD: 5
- ASE_OBJ: 12
- ASE_REQ: 15
- ASE_TSS:
6
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS |
1
|
6
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2:
2
- ATE_DPT.1: 1
- ATE_DPT.3:
1
- ATE_FUN.1:
2
- ATE_IND.2:
2
|
- ATE_COV.2:
1
- ATE_DPT.3:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- ATE_COV: 1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
2
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
9
|
6
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL5:
2
- EAL 4: 2
- EAL 5: 2
- EAL5 augmented:
1
- EAL 4 augmented: 2
- EAL 5 augmented: 2
|
- EAL5:
19
- EAL6: 2
- EAL4: 1
- EAL5 augmented:
3
- EAL6 augmented: 2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
2
|
19
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
1
|
3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS:
1
- FAU_SAS.1:
3
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG:
1
- FCS_RNG.1:
3
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP:
4
- FCS_COP.1:
3
- FCS_CKM.1:
4
- FCS_CKM:
6
- FCS_CKM.4:
1
- FDP:
- FDP_SDC:
1
- FDP_SDC.1:
3
- FDP_SDC.1.1:
1
- FDP_SDI.2:
2
- FDP_SDI.1:
1
- FDP_SDI.2.2:
1
- FDP_ITT.1:
4
- FDP_ITT.1.1:
1
- FDP_ACC:
14
- FDP_IFC.1:
8
- FDP_IFC.1.1:
1
- FDP_IFF.1:
1
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC.1:
2
- FDP_ACF:
9
- FDP_ACF.1:
4
- FIA:
- FIA_API:
1
- FIA_API.1:
7
- FIA_API.1.1:
1
- FMT:
- FMT_LIM:
12
- FMT_LIM.1:
11
- FMT_LIM.1.1:
1
- FMT_LIM.2:
10
- FMT_LIM.2.1:
1
- FMT_MSA.3:
4
- FMT_MSA:
10
- FMT_SMR.1:
7
- FMT_MSA.1:
2
- FMT_SMF.1:
3
- FMT_SMR:
1
- FMT_SMF:
1
- FPT:
- FPT_FLS.1:
5
- FPT_FLS.1.1:
1
- FPT_PHP.3:
3
- FPT_PHP.3.1:
1
- FPT_ITT.1:
3
- FPT_ITT.1.1:
1
- FRU:
- FRU_FLT.2:
4
- FRU_FLT.1:
1
|
- FAU:
- FAU_SAS:
1
- FAU_SAS.1:
13
- FAU_SAR.1:
11
- FAU_GEN.1:
2
- FCS:
- FCS_COP.1:
25
- FCS_CKM.1:
22
- FCS_CKM.4:
15
- FCS_RNG:
1
- FCS_RNG.1:
6
- FCS_CKM.2:
1
- FDP:
- FDP_ACC.1:
36
- FDP_ACF.1:
26
- FDP_ITC.2:
13
- FDP_SDC:
1
- FDP_SDC.1:
7
- FDP_SDI.2:
10
- FDP_ITT.1:
9
- FDP_IFC.1:
18
- FDP_UCT.1:
8
- FDP_UIT.1:
8
- FDP_ITC.1:
3
- FDP_CKM.2:
1
- FDP_SMF.1:
2
- FDP_SMR.1:
1
- FDP_COP.1:
1
- FDP_ACC.2:
2
- FIA:
- FIA_UID.2:
11
- FIA_UAU.2:
9
- FIA_UAU.3:
11
- FIA_UAU.5:
8
- FIA_API:
1
- FIA_API.1:
4
- FIA_UID.1:
12
- FIA_UAU.1:
8
- FMT:
- FMT_SMR.1:
23
- FMT_MSA.3:
25
- FMT_MSA.1:
25
- FMT_SMF.1:
26
- FMT_MTD.1:
9
- FMT_LIM:
1
- FMT_LIM.1:
20
- FMT_LIM.2:
20
- FPR:
- FPT:
- FPT_TDC.1:
10
- FPT_RPL.1:
11
- FPT_FLS.1:
15
- FPT_PHP.3:
9
- FPT_ITT.1:
9
- FRU:
- FTP:
- FTP_TRP.1:
17
- FTP_ITC.1:
18
- FTP_TRP.1.3:
3
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS:
1
- FAU_SAS.1:
3
- FAU_SAS.1.1: 1
|
- FAU_SAS:
1
- FAU_SAS.1:
13
- FAU_SAR.1: 11
- FAU_GEN.1: 2
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 |
3
|
13
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG:
1
- FCS_RNG.1:
3
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_COP: 4
- FCS_COP.1:
3
- FCS_CKM.1:
4
- FCS_CKM: 6
- FCS_CKM.4:
1
|
- FCS_COP.1:
25
- FCS_CKM.1:
22
- FCS_CKM.4:
15
- FCS_RNG:
1
- FCS_RNG.1:
6
- FCS_CKM.2: 1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
4
|
22
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
1
|
15
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
3
|
25
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
3
|
6
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_SDC:
1
- FDP_SDC.1:
3
- FDP_SDC.1.1: 1
- FDP_SDI.2:
2
- FDP_SDI.1: 1
- FDP_SDI.2.2: 1
- FDP_ITT.1:
4
- FDP_ITT.1.1: 1
- FDP_ACC: 14
- FDP_IFC.1:
8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1:
4
- FDP_ITC.2:
4
- FDP_ACC.1:
2
- FDP_ACF: 9
- FDP_ACF.1:
4
|
- FDP_ACC.1:
36
- FDP_ACF.1:
26
- FDP_ITC.2:
13
- FDP_SDC:
1
- FDP_SDC.1:
7
- FDP_SDI.2:
10
- FDP_ITT.1:
9
- FDP_IFC.1:
18
- FDP_UCT.1: 8
- FDP_UIT.1: 8
- FDP_ITC.1:
3
- FDP_CKM.2: 1
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FDP_COP.1: 1
- FDP_ACC.2: 2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
2
|
36
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
4
|
26
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
8
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
4
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 |
4
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC.1 |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
2
|
10
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API:
1
- FIA_API.1:
7
- FIA_API.1.1: 1
|
- FIA_UID.2: 11
- FIA_UAU.2: 9
- FIA_UAU.3: 11
- FIA_UAU.5: 8
- FIA_API:
1
- FIA_API.1:
4
- FIA_UID.1: 12
- FIA_UAU.1: 8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 |
7
|
4
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM:
12
- FMT_LIM.1:
11
- FMT_LIM.1.1: 1
- FMT_LIM.2:
10
- FMT_LIM.2.1: 1
- FMT_MSA.3:
4
- FMT_MSA: 10
- FMT_SMR.1:
7
- FMT_MSA.1:
2
- FMT_SMF.1:
3
- FMT_SMR: 1
- FMT_SMF: 1
|
- FMT_SMR.1:
23
- FMT_MSA.3:
25
- FMT_MSA.1:
25
- FMT_SMF.1:
26
- FMT_MTD.1: 9
- FMT_LIM:
1
- FMT_LIM.1:
20
- FMT_LIM.2:
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
12
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
11
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
10
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
2
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
4
|
25
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
3
|
26
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
7
|
23
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS.1:
5
- FPT_FLS.1.1: 1
- FPT_PHP.3:
3
- FPT_PHP.3.1: 1
- FPT_ITT.1:
3
- FPT_ITT.1.1: 1
|
- FPT_TDC.1: 10
- FPT_RPL.1: 11
- FPT_FLS.1:
15
- FPT_PHP.3:
9
- FPT_ITT.1:
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
5
|
15
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 |
3
|
9
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
3
|
9
|
pdf_data/st_keywords/cc_sfr/FRU |
- FRU_FLT.2:
4
- FRU_FLT.1: 1
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 |
4
|
8
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope:
2
- Target for composition 12/74 SMD_MFPEV2_ST31N600_ST_22_002 Virtual Card Architecture are also out of scope. Personalization and Originality Check are in scope. • Security level 1 (SL1): Different:
1
- Level. Proximity Check, Virtual Card Architecture, data access of sectors in SL3 or SL1SL3Mix, are out of scope. • Security level 3 (SL3): The card user can access the data and value blocks in the TOE after an:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
3
|
7
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
2
|
9
|
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
7
- physical probing:
2
- side channel:
1
- DPA:
1
- SPA:
1
- FI:
- Malfunction:
4
- malfunction:
1
- Fault Injection:
1
|
- SCA:
- Leak-Inherent:
7
- Physical Probing:
4
- side-channel:
1
- FI:
- other:
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Malfunction:
4
- malfunction: 1
- Fault Injection: 1
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
4
|
7
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent:
7
- physical probing: 2
- side channel: 1
- DPA: 1
- SPA: 1
|
- Leak-Inherent:
7
- Physical Probing: 4
- side-channel: 1
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
7
|
7
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS197:
2
- FIPS PUB 197:
1
- NIST:
|
- FIPS:
- NIST:
- NIST SP 800-38A:
3
- NIST SP 800-38B:
4
- NIST SP 800-67:
1
- SP 800-67:
1
- CC:
- CCMB-2017-04-002:
30
- CCMB-2017-04-003:
2
- CCMB-2017-04-001:
2
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS197:
2
- FIPS PUB 197:
1
|
|
pdf_data/st_keywords/standard_id/NIST |
|
- NIST SP 800-38A:
3
- NIST SP 800-38B: 4
- NIST SP 800-67: 1
- SP 800-67: 1
|
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-38A |
1
|
3
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
23
|
24
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC |
1
|
5
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
2132117
- pdf_is_encrypted:
False
- pdf_number_of_pages:
40
- /Author:
Sophien Khayati
- /CreationDate:
D:20240213110709+01'00'
- /Creator:
Microsoft® Word 2016
- /ModDate:
D:20240712120243+02'00'
- /Producer:
Microsoft® Word 2016
- /Title:
Template Document
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1996053
- pdf_is_encrypted:
False
- pdf_number_of_pages:
73
- /Author:
feixbeno
- /CreationDate:
D:20240305180700Z
- /Creator:
FrameMaker 17.0.1
- /CreatorTool: FrameMaker 17.0.1
- /ModDate:
D:20240305182758+01'00'
- /Producer:
Adobe PDF Library 17.0
- /Title:
SMD_MFP_ST31N600_V01_1P.pdf
- /Trapped: /False
- pdf_hyperlinks:
http://www.st.com
|
pdf_data/st_metadata//Author |
Sophien Khayati
|
feixbeno
|
pdf_data/st_metadata//CreationDate |
D:20240213110709+01'00'
|
D:20240305180700Z
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
FrameMaker 17.0.1
|
pdf_data/st_metadata//ModDate |
D:20240712120243+02'00'
|
D:20240305182758+01'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
Adobe PDF Library 17.0
|
pdf_data/st_metadata//Title |
Template Document
|
SMD_MFP_ST31N600_V01_1P.pdf
|
pdf_data/st_metadata/pdf_file_size_bytes |
2132117
|
1996053
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://www.st.com |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
40
|
73
|
dgst |
eb87ba2985440f0f
|
d2f309e22cf72396
|