Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "f36ba0c67c1665ec",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2013/13",
"cert_lab": [
"THAL\u00c8S"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.2",
"3.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/81",
"ANSSI-CC-2013/45",
"ANSSI-CC-2013/60"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2012/79"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/60",
"ANSSI-CC-2019/38",
"ANSSI-CC-2013/45",
"ANSSI-CC-2014/81",
"ANSSI-CC-2013/60"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2010/49",
"ANSSI-CC-2011/07",
"ANSSI-CC-2012/79",
"ANSSI-CC-2010/50"
]
}
},
"scheme_data": {
"cert_id": "2013/13",
"description": "Le produit \u00e9valu\u00e9 est la famille de microcontr\u00f4leurs \u00ab ST33F1M/1M0/896/768/640/512, SC33F1M0/896/768/640/512/384, SM33F1M/1M0/896/768/640/512, SE33F1M/1M0/896/ 768/640/512, SL33F1M/1M0/896/768/640/512, SP33F1M, With dedicated software revision D, Optional cryptographic library Neslib 3.0 or 3.2, Optional MIFARE DESFireTM EV1 \u00bb en version maskset K8C0A, revision externe E, revision interne G, d\u00e9vel",
"developer": "STMicroelectronics",
"enhanced": {
"augmented": "ALC_DVS.2 et AVA_VAN.5",
"category": "Micro-circuits",
"cc_version": "Crit\u00e8res Communs version 3.1r3",
"cert_id": "2013/13",
"certification_date": "06/03/2013",
"developer": "STMicroelectronics",
"evaluation_facility": "Thal\u00e8s (TCS-CNES)",
"level": "EAL5+",
"mutual_recognition": "SOG-IS\n CCRA",
"protection_profile": "BSI_PP_0035-2007",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-13fr.pdf",
"sponsor": "STMicroelectronics",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-13en.pdf"
},
"level": "EAL5+",
"product": "ST33F1M/1M0/896/768/640/512, SC33F1M0/896/768/640/512/384, SM33F1M/1M0/896/768/640/512, SE33F1M/1M0/896/768/640/512, SL33F1M/1M0/896/768/640/512, SP33F1M, With dedicated software revision D, Optional cryptographic library Neslib 3.0 or 3.2, Optional MIFARE DESFireTM EV1",
"sponsor": "STMicroelectronics",
"url": "https://cyber.gouv.fr/produits-certifies/st33f1m1m0896768640512-sc33f1m0896768640512384-sm33f1m1m0896768640512-0"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/81",
"ANSSI-CC-2013/60"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/81",
"ANSSI-CC-2013/60"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2013-04-08",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20de%20maintenance%202013-13-M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2013/13-M01"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-08-19",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20de%20maintenance%202013-13-M02.pdf",
"maintenance_st_link": null,
"maintenance_title": "Rapport de maintenance ANSSI-CC-2013/13-M02"
}
]
},
"manufacturer": "STMicroelectronics",
"manufacturer_web": "https://www.st.com/",
"name": "ST33F1M/1M0/896/768/640/512, SC33F1M0/896/768/640/512/384, SM33F1M/1M0/896/768/640/512, SE33F1M/1M0/896/768/640/512, SL33F1M/1M0/896/768/640/512, SP33F1M, With dedicated software revision D, Optional cryptographic library Neslib 3.0 or 3.2, Optional MIFARE DESFireTM EV1",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-03-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2013_13__Rapport.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL5 Augment\u00e9 ALC_DVS.2 et AVA_VAN.5",
"cc_version": "CC version 3.1 r\u00e9vision 3",
"cert_id": "ANSSI-CC-2013/13",
"cert_item": "ST33F1M/1M0/896/768/640/512, SC33F1M0/896/768/640/512/384, SM33F1M/1M0/896/768/640/512, SE33F1M/1M0/896/768/640/512, SL33F1M/1M0/896/768/640/512, SP33F1M, With dedicated software revision D, Optional cryptographic library Neslib 3.0 or 3.2, Optional MIFARE DESFireTM EV1",
"cert_item_version": "Version maskset K8C0A, revision externe E, revision interne G",
"cert_lab": "Thal\u00e8s (TCS-CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France",
"developer": "STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur (.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2012/79": 3,
"ANSSI-CC-2013/13": 22
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 2,
"EAL5": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NesLib 3.0": 1,
"NesLib 3.2": 1,
"NesLib v3.0": 1,
"NesLib v3.2": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"TRNG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 2,
"AIS31": 2
},
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STMicroelectronics": 14
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Hubert PUJOL",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20130311134142+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.0 for Word",
"/Keywords": "CER/F/07.5",
"/ModDate": "D:20130311134208+01\u002700\u0027",
"/Producer": "Acrobat Distiller 9.0.0 (Windows)",
"/SourceModified": "D:20130311124044",
"/Subject": "Nom du produit",
"/Title": "ANSSI-CC-2010/xx",
"pdf_file_size_bytes": 200550,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:certification.anssi@ssi.gouv.fr",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "SECURITY_TARGET_PUBLIC_ST33F1ME_MIFARE_EV1_SMD_SM33Fxxx_ST_12_001_v01_02.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 3
},
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 70
}
},
"cc_sar": {
"ADO": {
"ADO_DEL": 1
},
"ADV": {
"ADV_ARC": 2,
"ADV_ARC.1": 1,
"ADV_FSP": 4,
"ADV_FSP.5": 3,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 4,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_COV": 3,
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 2,
"EAL 5 augmented": 2,
"EAL4": 1,
"EAL5": 17
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 1,
"FAU_SAS.1": 6
},
"FCS": {
"FCS_CKM.1": 26,
"FCS_CKM.4": 14,
"FCS_COP.1": 38,
"FCS_RNG": 1,
"FCS_RNG.1": 7
},
"FDP": {
"FDP_ACC.1": 31,
"FDP_ACC.2": 12,
"FDP_ACF.1": 35,
"FDP_CKM.2": 1,
"FDP_IFC.1": 15,
"FDP_ITC.1": 15,
"FDP_ITC.2": 15,
"FDP_ITT.1": 7,
"FDP_ROL.1": 9,
"FDP_SMF.1": 2,
"FDP_SMR.1": 1
},
"FIA": {
"FIA_UAU.2": 9,
"FIA_UAU.5": 10,
"FIA_UID.1": 2,
"FIA_UID.2": 11
},
"FMT": {
"FMT_ITC.1": 1,
"FMT_LIM": 1,
"FMT_LIM.1": 18,
"FMT_LIM.2": 17,
"FMT_MSA.1": 32,
"FMT_MSA.2": 1,
"FMT_MSA.3": 33,
"FMT_MTD.1": 10,
"FMT_SMF.1": 27,
"FMT_SMR.1": 18
},
"FPR": {
"FPR_UNL.1": 9
},
"FPT": {
"FPT_FLS.1": 9,
"FPT_ITT.1": 6,
"FPT_PHP.3": 7,
"FPT_RPL.1": 10,
"FPT_TDC.1": 10,
"FPT_TRP.1": 6,
"FPT_TST.1": 9
},
"FRU": {
"FRU_FLT.2": 9,
"FRU_RSA.2": 9
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 6,
"FTP_TRP.1.3": 2
}
},
"certification_process": {
"OutOfScope": {
"37 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded. 38 The TOE optionally": 1,
"ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NESLIB 3.0": 1,
"NesLib 3.0": 1,
"NesLib 3.2": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 5,
"SHA-256": 5,
"SHA-384": 5,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 6
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 9,
"malfunction": 4,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 8,
"Physical Probing": 4,
"SPA": 1,
"physical probing": 3,
"side channel": 6,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 3,
"BSI-AIS31": 3
},
"CC": {
"CCMB-2009-07-001": 3,
"CCMB-2009-07-002": 38,
"CCMB-2009-07-003": 2
},
"FIPS": {
"FIPS PUB 140-2": 7,
"FIPS PUB 180-1": 4,
"FIPS PUB 180-2": 3,
"FIPS PUB 186": 2,
"FIPS PUB 197": 4,
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 10116": 5,
"ISO/IEC 10118-": 2,
"ISO/IEC 14888": 2,
"ISO/IEC 7816-3": 1,
"ISO/IEC 9796": 1,
"ISO/IEC 9796-2": 4,
"ISO/IEC 9797": 1,
"ISO/IEC 9797-1": 3
},
"PKCS": {
"PKCS #1": 8
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 20
}
},
"DES": {
"3DES": {
"3DES": 5
},
"DES": {
"DES": 20
}
},
"constructions": {
"MAC": {
"CBC-MAC": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
},
"Philips": {
"Philips": 1
},
"STMicroelectronics": {
"STMicroelectronics": 9
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Christiane DROULERS",
"/CreationDate": "D:20121218105558Z",
"/Creator": "FrameMaker 7.2",
"/ModDate": "D:20130225202953+01\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "SMD_SM33Fxxx_V1_2.book",
"pdf_file_size_bytes": 821982,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.st.com"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 87
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf",
"pp_name": "Security IC Platform Protection Profile, Version 1.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2013_13__Rapport.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ALC_DVS.2",
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/SECURITY_TARGET_PUBLIC_ST33F1ME_MIFARE_EV1_SMD_SM33Fxxx_ST_12_001_v01_02.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ed3b4d64cfffe3fb1d7a983014482c42f6d0fd16823dfc3ce8294bddee6fabce",
"txt_hash": "d0bf1a3a9140f3e4648c07d526bccb7561421625f9d532152e25d35a5c4a164c"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3b8e6fdbb67eae99636f68777cf79702bcc87de324856f4263b9e16f4d9f1e69",
"txt_hash": "8e4c771aab72ad2ae291e688e6fd56a4933c3474905309b9de36d347b4892506"
}
},
"status": "archived"
}