ST31H320 A01 including optional cryptographic library NESLIB
CSV information ?
Status | archived |
---|---|
Valid from | 28.12.2015 |
Valid until | 28.12.2020 |
Scheme | 🇫🇷 FR |
Manufacturer | STMicroelectronics |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_TAT.3, AVA_VAN.5, ADV_TDS.5, ATE_COV.3, EAL5+, ADV_IMP.2, ALC_CMC.5, ALC_FLR.1, ALC_DVS.2, ATE_FUN.2, ADV_INT.3 |
Protection profiles | |
Maintenance updates | ANSSI-CC-2015/59-M01 (20.04.2016) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DESAsymmetric Algorithms
ECCRandomness
TRNG, DRBGLibraries
NesLib v4.2, NesLib 4.2.10, NesLib 4.2Vendor
STMicroelectronicsSecurity level
EAL 5, EAL2, EAL7, EAL 1, EAL 3, EAL 7, EAL 5 augmented, ITSEC E6 HighSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.3, ATE_FUN.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0084-2014Certificates
ANSSI-CC-2015/59Evaluation facilities
Serma TechnologiesSide-channel analysis
Physical tamperingStandards
AIS 31, AIS31, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | ANSSI-CC-2015_59en |
---|---|
Pages | 15 |
Creator | PDFCreator Version 1.2.1 |
Producer | GPL Ghostscript 9.02 |
Frontpage
Certificate ID | ANSSI-CC-2015/59 |
---|---|
Certified item | ST31H320 A01 including optional cryptographic library NESLIB |
Certification lab | Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France |
Developer | STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France |
References
Incoming- ANSSI-CC-2017/60 - archived - ST31H320 B01 including optional cryptographic library NESLIB
- ANSSI-CC-2017/10 - archived - Plate-forme STSafe-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
- ANSSI-CC-2017/23 - archived - Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-192, AES-, DES, TDES, TDEA, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224Randomness
TRNG, DRBG, RND, RNGLibraries
NesLib 4.2Block cipher modes
ECB, CBCVendor
Infineon Technologies, STMicroelectronics, PhilipsSecurity level
EAL5, EAL5+, EAL4, EAL6+, EAL5 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADO_DEL, ADV_FSP, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_ARC.1, ADV_FSP.5, ADV_SPM, ADV_ARC, ADV_IMP, ADV_SPM.1, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_DVS, ALC_CMS, ALC_CMC, ATE_COV, ATE_COV.3, ATE_FUN.2, ATE_DPT.3, ATE_IND.2, AVA_VAN.5, AVA_VAN, ASE_INT, ASE_CCL, ASE_ECD, ASE_SPD, ASE_OBJ, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FCS_RNG.1, FCS_COP.1, FCS_CKM.1, FCS_RNG, FCS_CKM.4, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.2, FDP_ACF.1, FDP_ACC.1, FDP_ITC.1, FDP_SDC, FDP_ITC.2, FDP_CKM.2, FDP_SMF.1, FDP_SMR.1, FIA_UID.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FMT_LIM, FMT_ITC.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP- 0084-2014, BSI-CC-PP-0084-Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, physical tampering, Malfunction, malfunctionCertification process
out of scope, ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded, The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specificStandards
FIPS PUB 197, FIPS PUB 186-4, FIPS PUB 180-2, FIPS PUB 198-1, FIPS PUB 140-2, NIST SP 800-67, SP 800-38A, NIST SP 800-56A, NIST SP 800-90, NIST SP 800-38A, SP 800-67, NIST SP 800-38B, SP 800-90A, PKCS1, PKCS #1, AIS31, ISO/IEC 7816-3, ISO/IEC 9796-2, ISO/IEC 14888, ISO/IEC 9796, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-001File metadata
Title | SMD_ST31H320_VA01_5P.book |
---|---|
Author | Christiane DROULERS |
Creation date | D:20151215093653Z |
Modification date | D:20151215094303+01'00' |
Pages | 68 |
Creator | FrameMaker 11.0 |
Producer | Acrobat Elements 10.0.0 (Windows) |
References
Incoming- BSI-DSZ-CC-1037-2018 - archived - STSAFE-J100-BS Smart Meter Security Module V2.1.6
- ANSSI-CC-2017/10 - archived - Plate-forme STSafe-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
- ANSSI-CC-2017/23 - archived - Plate-forme STSAFE-J, en configuration fermée, version 1.1.4, sur le composant ST31H320 A03
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ASE_TSS.1, ADV_IMP.2, ADV_ARC.1, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ASE_INT.1, AGD_PRE.1, ADV_TDS.5, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2Scheme data ?
Product | ST31H320 A01 including optional cryptographic library NESLIB | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib | |
Description | Le produit certifié est le microcontôleur sécurisé « ST31H320 A01 including optionalcryptographic library NESLIB » développé par STMICROELECTRONICS. Comme décrit dans la cible de sécurité [ST] au paragraphe « TOE overview », ce produit sedécline en différentes configurations selon la taille de mémoire non volatile FLASH etl’activation du coprocesseur cryptographique NesCrypt. Ces configurati | |
Sponsor | STMicroelectronics | |
Developer | STMicroelectronics | |
Cert Id | ANSSI-CC-2015/59 | |
Level | EAL5+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2015/59 | |
Certification Date | 28.12.2015 | |
Category | Micro-circuits | |
Cc Version | Critères Communs version 3.1r4 | |
Developer | STMicroelectronics | |
Sponsor | STMicroelectronics | |
Evaluation Facility | Serma Technologies | |
Level | EAL5+ | |
Protection Profile | BSI-CC-PP-0084-2014 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5 | |
Target Link | https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf |
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit certifié est le microcontôleur sécurisé « ST31H320 A01 including optionalcryptographic library NESLIB » développé par STMICROELECTRONICS. Comme décrit dans la cible de sécurité [ST] au paragraphe « TOE overview », ce produit sedécline en différentes configurations selon la taille de mémoire non volatile FLASH etl’activation du coprocesseur cryptographique NesCrypt. Ces configurati', 'cert_id': 'ANSSI-CC-2015/59', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2015/59', 'certification_date': '2015-12-28', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BAROC_SC_PP_V1.0', 'JAVA_OC', 'SECURITY_IC_AUGP_V1.0']}}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'ST31H320 A01 including optional cryptographic library NESLIB', 'url': 'https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib', 'description': 'Le produit certifié est le microcontôleur sécurisé « ST31H320 A01 including optionalcryptographic library NESLIB » développé par STMICROELECTRONICS.\n\nComme décrit dans la cible de sécurité [ST] au paragraphe « TOE overview », ce produit sedécline en différentes configurations selon la taille de mémoire non volatile FLASH etl’activation du coprocesseur cryptographique NesCrypt. Ces configurati', 'sponsor': 'STMicroelectronics', 'developer': 'STMicroelectronics', 'cert_id': '2015/59', 'level': 'EAL5+', 'enhanced': {'cert_id': '2015/59', 'certification_date': '28/12/2015', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'STMicroelectronics', 'sponsor': 'STMicroelectronics', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bd30ad5fa652dba174ee2c11bff22be59db9418a46b2e1db42555b011ce264eb', 'txt_hash': '617d674733e5106acaf983c5af447d8163656ac421f0c4cf7295d12f15bbdfe7'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8f252458d69fce752b249d8b257fdd59f7e3614e36640666270c3a6a8bd11516', 'txt_hash': '25a18b3b82f1711bd1d9963aa7f660e7b127c67e027ad32a72d6c40df783cac7'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 186044, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/Producer': 'GPL Ghostscript 9.02', '/CreationDate': '', '/ModDate': '', '/Title': 'ANSSI-CC-2015_59en', '/Creator': 'PDFCreator Version 1.2.1', '/Author': '', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 956228, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/Author': 'Christiane DROULERS', '/CreationDate': 'D:20151215093653Z', '/Creator': 'FrameMaker 11.0', '/ModDate': "D:20151215094303+01'00'", '/Producer': 'Acrobat Elements 10.0.0 (Windows)', '/Title': 'SMD_ST31H320_VA01_5P.book', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Mutual Recognition Agreements'], 'cert_id': 'ANSSI-CC-2015/59', 'cert_item': 'ST31H320 A01 including optional cryptographic library NESLIB', 'cert_item_version': '/version A01', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certified by the BSI under reference BSI-CC-PP-0084-2014 o, 19 February 2014 with “Package 1: Loader dedicated for usage in Secured Environment only', 'cc_version': 'Common criteria version 3.1 revision 4', 'cc_security_level': 'EAL 5 augmented ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5', 'developer': 'STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France', 'cert_lab': 'Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2015/59': 16}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 2}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1, 'EAL 5 augmented': 2}, 'ITSEC': {'ITSEC E6 High': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_TDS.5': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.5': 2, 'ALC_DVS.2': 2, 'ALC_FLR.1': 2, 'ALC_TAT.3': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_FUN.2': 2, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 16}}, 'eval_facility': {'Serma': {'Serma Technologies': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'DRBG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v4.2': 1, 'NesLib 4.2.10': 2, 'NesLib 4.2': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'Physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 2, 'AIS31': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 53, 'BSI-CC-PP- 0084-2014': 8, 'BSI-CC-PP-0084-': 2}}, 'cc_security_level': {'EAL': {'EAL5': 14, 'EAL5+': 1, 'EAL4': 1, 'EAL6+': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_FSP': 4, 'ADV_IMP.2': 4, 'ADV_INT.3': 4, 'ADV_TDS.5': 4, 'ADV_ARC.1': 1, 'ADV_FSP.5': 3, 'ADV_SPM': 1, 'ADV_ARC': 2, 'ADV_IMP': 1, 'ADV_SPM.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.5': 4, 'ALC_DVS.2': 4, 'ALC_FLR.1': 4, 'ALC_TAT.3': 4, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.3': 4, 'ATE_FUN.2': 4, 'ATE_DPT.3': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 4, 'ASE_ECD': 4, 'ASE_SPD': 7, 'ASE_OBJ': 7, 'ASE_REQ': 23, 'ASE_TSS': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 6, 'FAU_SAS': 2}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP.1': 28, 'FCS_CKM.1': 20, 'FCS_RNG': 2, 'FCS_CKM.4': 4}, 'FDP': {'FDP_SDC.1': 8, 'FDP_SDI.2': 8, 'FDP_ITT.1': 10, 'FDP_IFC.1': 16, 'FDP_ACC.2': 12, 'FDP_ACF.1': 24, 'FDP_ACC.1': 17, 'FDP_ITC.1': 13, 'FDP_SDC': 2, 'FDP_ITC.2': 2, 'FDP_CKM.2': 1, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_UID.1': 10}, 'FMT': {'FMT_LIM.1': 17, 'FMT_LIM.2': 18, 'FMT_MSA.3': 22, 'FMT_MSA.1': 21, 'FMT_SMF.1': 16, 'FMT_SMR.1': 13, 'FMT_LIM': 2, 'FMT_ITC.1': 1}, 'FPT': {'FPT_FLS.1': 11, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 11}}, 'cc_claims': {'O': {'O.RND': 4}, 'T': {'T.RND': 3}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 20}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12, 'AES-128': 1, 'AES-192': 1, 'AES-': 1}}, 'DES': {'DES': {'DES': 6}, '3DES': {'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-256': 9, 'SHA-384': 6, 'SHA-512': 6, 'SHA-224': 5}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 10}, 'RNG': {'RND': 7, 'RNG': 6}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib 4.2': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 4, 'physical probing': 3, 'side channel': 6}, 'FI': {'physical tampering': 1, 'Malfunction': 13, 'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 4, 'FIPS PUB 186-4': 4, 'FIPS PUB 180-2': 5, 'FIPS PUB 198-1': 3, 'FIPS PUB 140-2': 5}, 'NIST': {'NIST SP 800-67': 3, 'SP 800-38A': 2, 'NIST SP 800-56A': 3, 'NIST SP 800-90': 4, 'NIST SP 800-38A': 2, 'SP 800-67': 1, 'NIST SP 800-38B': 1, 'SP 800-90A': 1}, 'PKCS': {'PKCS1': 1, 'PKCS #1': 8}, 'BSI': {'AIS31': 3}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 9796-2': 3, 'ISO/IEC 14888': 2, 'ISO/IEC 9796': 1}, 'CC': {'CCMB-2012-09-002': 20, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded': 1, 'The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific': 1}}}
. - The report_filename property was set to
ANSSI-CC-2015_59en.pdf
. - The st_filename property was set to
ANSSI_cible2015_59en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['SERMA']
. - The cert_id property was set to
ANSSI-CC-2015/59
. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23', 'ANSSI-CC-2017/10', 'BSI-DSZ-CC-1037-2018']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23', 'ANSSI-CC-2017/10', 'BSI-DSZ-CC-1037-2018']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23', 'ANSSI-CC-2017/10', 'ANSSI-CC-2017/60']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23', 'ANSSI-CC-2017/10', 'BSI-DSZ-CC-1037-2018', 'ANSSI-CC-2017/60']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_59en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2015_59en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23']}}}
data. - The scheme_data property was set to
{'product': 'ST31H320 A01 including optional cryptographic library NESLIB', 'url': 'https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib', 'description': 'Le produit certifié est le microcontôleur sécurisé « ST31H320 A01 including optionalcryptographic library NESLIB » développé par STMICROELECTRONICS.\n\nComme décrit dans la cible de sécurité [ST] au paragraphe « TOE overview », ce produit sedécline en différentes configurations selon la taille de mémoire non volatile FLASH etl’activation du coprocesseur cryptographique NesCrypt. Ces configurati', 'sponsor': 'STMicroelectronics', 'developer': 'STMicroelectronics', 'cert_id': '2015/59', 'level': 'EAL5+', 'enhanced': {'cert_id': '2015/59', 'certification_date': '28/12/2015', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'STMicroelectronics', 'sponsor': 'STMicroelectronics', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf'}}
.
- The st_references property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name ST31H320 A01 including optional cryptographic library NESLIB was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "f3334413a4449fc5",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2015/59",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/10",
"ANSSI-CC-2017/60",
"ANSSI-CC-2017/23"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1037-2018",
"ANSSI-CC-2017/10",
"ANSSI-CC-2017/60",
"ANSSI-CC-2017/23"
]
},
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2015/59",
"description": "Le produit certifi\u00e9 est le microcont\u00f4leur s\u00e9curis\u00e9 \u00ab ST31H320 A01 including optionalcryptographic library NESLIB \u00bb d\u00e9velopp\u00e9 par STMICROELECTRONICS. Comme d\u00e9crit dans la cible de s\u00e9curit\u00e9 [ST] au paragraphe \u00ab TOE overview \u00bb, ce produit sed\u00e9cline en diff\u00e9rentes configurations selon la taille de m\u00e9moire non volatile FLASH etl\u2019activation du coprocesseur cryptographique NesCrypt. Ces configurati",
"developer": "STMicroelectronics",
"enhanced": {
"augmented": "ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5",
"category": "Micro-circuits",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "ANSSI-CC-2015/59",
"certification_date": "2015-12-28",
"developer": "STMicroelectronics",
"evaluation_facility": "Serma Technologies",
"level": "EAL5+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "BSI-CC-PP-0084-2014",
"report_link": "https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf",
"sponsor": "STMicroelectronics",
"target_link": "https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf"
},
"level": "EAL5+",
"product": "ST31H320 A01 including optional cryptographic library NESLIB",
"sponsor": "STMicroelectronics",
"url": "https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1037-2018",
"ANSSI-CC-2017/10",
"ANSSI-CC-2017/23"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1037-2018",
"ANSSI-CC-2017/10",
"ANSSI-CC-2017/23"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-04-20",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_59-M01.pdf",
"maintenance_st_link": null,
"maintenance_title": "ANSSI-CC-2015/59-M01"
}
]
},
"manufacturer": "STMicroelectronics",
"manufacturer_web": "https://www.st.com/",
"name": "ST31H320 A01 including optional cryptographic library NESLIB",
"not_valid_after": "2020-12-28",
"not_valid_before": "2015-12-28",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2015_59en.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augmented ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5",
"cc_version": "Common criteria version 3.1 revision 4",
"cert_id": "ANSSI-CC-2015/59",
"cert_item": "ST31H320 A01 including optional cryptographic library NESLIB",
"cert_item_version": "/version A01",
"cert_lab": "Serma Technologies 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
"developer": "STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France",
"match_rules": [
"Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Mutual Recognition Agreements"
],
"ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certified by the BSI under reference BSI-CC-PP-0084-2014 o, 19 February 2014 with \u201cPackage 1: Loader dedicated for usage in Secured Environment only"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2015/59": 16
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 2,
"ADV_INT": 1,
"ADV_INT.3": 2,
"ADV_SPM": 1,
"ADV_TDS": 1,
"ADV_TDS.5": 2
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.5": 2,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_FLR.1": 2,
"ALC_LCD": 1,
"ALC_TAT": 1,
"ALC_TAT.3": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 2,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_FUN.2": 2,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 5 augmented": 2,
"EAL 7": 1,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 High": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NesLib 4.2": 2,
"NesLib 4.2.10": 2,
"NesLib v4.2": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Serma": {
"Serma Technologies": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Physical tampering": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 2,
"AIS31": 2
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"STMicroelectronics": {
"STMicroelectronics": 16
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "PDFCreator Version 1.2.1",
"/Keywords": "",
"/ModDate": "",
"/Producer": "GPL Ghostscript 9.02",
"/Subject": "",
"/Title": "ANSSI-CC-2015_59en",
"pdf_file_size_bytes": 186044,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "ANSSI_cible2015_59en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 4
},
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0084-2014": 8,
"BSI-CC-PP-0084-": 2,
"BSI-CC-PP-0084-2014": 53
}
},
"cc_sar": {
"ADO": {
"ADO_DEL": 1
},
"ADV": {
"ADV_ARC": 2,
"ADV_ARC.1": 1,
"ADV_FSP": 4,
"ADV_FSP.5": 3,
"ADV_IMP": 1,
"ADV_IMP.2": 4,
"ADV_INT.3": 4,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS.5": 4
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.5": 4,
"ALC_CMS": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 4,
"ALC_FLR.1": 4,
"ALC_LCD.1": 1,
"ALC_TAT.3": 4
},
"ASE": {
"ASE_CCL": 4,
"ASE_CCL.1": 1,
"ASE_ECD": 4,
"ASE_ECD.1": 1,
"ASE_INT": 2,
"ASE_INT.1": 1,
"ASE_OBJ": 7,
"ASE_OBJ.2": 1,
"ASE_REQ": 23,
"ASE_REQ.2": 1,
"ASE_SPD": 7,
"ASE_SPD.1": 1,
"ASE_TSS": 7,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 3,
"ATE_COV.3": 4,
"ATE_DPT.3": 1,
"ATE_FUN.2": 4,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL5": 14,
"EAL5 augmented": 2,
"EAL5+": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 2,
"FAU_SAS.1": 6
},
"FCS": {
"FCS_CKM.1": 20,
"FCS_CKM.4": 4,
"FCS_COP.1": 28,
"FCS_RNG": 2,
"FCS_RNG.1": 6
},
"FDP": {
"FDP_ACC.1": 17,
"FDP_ACC.2": 12,
"FDP_ACF.1": 24,
"FDP_CKM.2": 1,
"FDP_IFC.1": 16,
"FDP_ITC.1": 13,
"FDP_ITC.2": 2,
"FDP_ITT.1": 10,
"FDP_SDC": 2,
"FDP_SDC.1": 8,
"FDP_SDI.2": 8,
"FDP_SMF.1": 2,
"FDP_SMR.1": 1
},
"FIA": {
"FIA_UID.1": 10
},
"FMT": {
"FMT_ITC.1": 1,
"FMT_LIM": 2,
"FMT_LIM.1": 17,
"FMT_LIM.2": 18,
"FMT_MSA.1": 21,
"FMT_MSA.3": 22,
"FMT_SMF.1": 16,
"FMT_SMR.1": 13
},
"FPT": {
"FPT_FLS.1": 11,
"FPT_ITT.1": 9,
"FPT_PHP.3": 11
},
"FRU": {
"FRU_FLT.2": 11
}
},
"certification_process": {
"OutOfScope": {
"ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded": 1,
"The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Neslib": {
"NesLib 4.2": 2
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 14
},
"SHA2": {
"SHA-224": 5,
"SHA-256": 9,
"SHA-384": 6,
"SHA-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 10
},
"RNG": {
"RND": 7,
"RNG": 6
},
"TRNG": {
"TRNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 13,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"Leak-Inherent": 12,
"Physical Probing": 4,
"physical probing": 3,
"side channel": 6
}
},
"standard_id": {
"BSI": {
"AIS31": 3
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 20,
"CCMB-2012-09-003": 2
},
"FIPS": {
"FIPS PUB 140-2": 5,
"FIPS PUB 180-2": 5,
"FIPS PUB 186-4": 4,
"FIPS PUB 197": 4,
"FIPS PUB 198-1": 3
},
"ISO": {
"ISO/IEC 14888": 2,
"ISO/IEC 7816-3": 1,
"ISO/IEC 9796": 1,
"ISO/IEC 9796-2": 3
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-38B": 1,
"NIST SP 800-56A": 3,
"NIST SP 800-67": 3,
"NIST SP 800-90": 4,
"SP 800-38A": 2,
"SP 800-67": 1,
"SP 800-90A": 1
},
"PKCS": {
"PKCS #1": 8,
"PKCS1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12,
"AES-": 1,
"AES-128": 1,
"AES-192": 1
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 4
},
"DES": {
"DES": 6
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1
},
"Philips": {
"Philips": 1
},
"STMicroelectronics": {
"STMicroelectronics": 20
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Christiane DROULERS",
"/CreationDate": "D:20151215093653Z",
"/Creator": "FrameMaker 11.0",
"/ModDate": "D:20151215094303+01\u002700\u0027",
"/Producer": "Acrobat Elements 10.0.0 (Windows)",
"/Title": "SMD_ST31H320_VA01_5P.book",
"pdf_file_size_bytes": 956228,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.st.com"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 68
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"SECURITY_IC_AUGP_V1.0",
"JAVA_OC",
"BAROC_SC_PP_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_59en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ATE_FUN.2",
"ADV_INT.3",
"ATE_COV.3",
"ALC_TAT.3",
"AVA_VAN.5",
"EAL5+",
"ALC_FLR.1",
"ADV_IMP.2",
"ALC_DVS.2",
"ADV_TDS.5",
"ALC_CMC.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2015_59en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bd30ad5fa652dba174ee2c11bff22be59db9418a46b2e1db42555b011ce264eb",
"txt_hash": "617d674733e5106acaf983c5af447d8163656ac421f0c4cf7295d12f15bbdfe7"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8f252458d69fce752b249d8b257fdd59f7e3614e36640666270c3a6a8bd11516",
"txt_hash": "25a18b3b82f1711bd1d9963aa7f660e7b127c67e027ad32a72d6c40df783cac7"
}
},
"status": "archived"
}