Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC
CSV information ?
Status | archived |
---|---|
Valid from | 16.11.2015 |
Valid until | 16.11.2020 |
Scheme | 🇫🇷 FR |
Manufacturer | Samsung Electronics Co., Ltd. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL6+, ASE_TSS.2 |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DESAsymmetric Algorithms
ECCRandomness
DTRNGEngines
TORNADOVendor
SamsungSecurity level
EAL 6, EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_SPM.1, ADV_INT.3, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, AVA_VAN.5, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP- 0084-2014Certificates
ANSSI-CC-2015/60, ANSSI-CC-2014/84Evaluation facilities
CESTI, CEA - LETI, CEA-LETI, Trusted LabsStandards
AIS31, AIS 31, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
Title | ANSSI-CC-2015_60fr |
---|---|
Pages | 18 |
Creator | PDFCreator Version 1.2.1 |
Producer | GPL Ghostscript 9.02 |
Frontpage
Certificate ID | ANSSI-CC-2015/60 |
---|---|
Certified item | Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC |
Certification lab | CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France |
Developer | Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Corée du Sud Trusted Labs 5, rue du Baillage 78000 Versailles, France Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud |
References
Outgoing- ANSSI-CC-2014/84 - archived - Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC rev1_SW10-50-60-24_GU15-12-15-225-15-18-14-00
- ANSSI-CC-2016/01 - archived - Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, TDEA, HMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA1, SHA224, SHA256, SHA384, SHA512Schemes
Key AgreementRandomness
DTRNG, TRNG, RNG, RNDEngines
TORNADOCPLC
IC VersionVendor
SamsungSecurity level
EAL6+, EAL6, EAL 4, EAL 5, EAL6 augmented, EAL 4 augmented, EAL 5 augmentedClaims
O.RSA, O.ECC, O.RND, O.SHA, O.TDES, O.AES, O.ECDSA, O.ECDH, O.MEM_ACCESS, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_ARC.1, ADV_SPM.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_FSP.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_CMS.4, ATE_COV, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5, AVA_VAN, APE_ECD, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FAU_GEN.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FDP_SDC, FDP_ACF, FDP_SDC.1, FDP_SDI, FDP_SDI.2, FDP_SDI.1, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC, FDP_IFC, FDP_ITT, FIA_API, FIA_API.1, FIA_API.1.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA, FMT_SMF, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FPT_FLS, FPT_PHP, FPT_ITT, FRU_FLT.2, FRU_FLT.1, FRU_FLT.2.1, FRU_FLT, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-CC-PP-0084, BSI-PP-0084, BSI-CC-PP-0084-Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side-channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, reverse engineeringStandards
FIPS PUB 180-3, FIPS 197, BSI-AIS31, AIS31, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | ST_Klallam7_Ver1.1 |
---|---|
Author | Windows 사용자 |
Creation date | D:20150825131438+09'00' |
Modification date | D:20150825131438+09'00' |
Pages | 96 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5Similar certificates
Scheme data ?
Product | Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/microcontroleurs-samsung-s3ft9mfs3ft9mts3ft9ms-avec-bibliotheques-optionnelles-0 | |
Description | Les produits certifiés sont les « Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC, référence S3FT9MF/S3FT9MT/S3FT9MS _rev1_SW10-50-60-24_GU111-12-19-225-15-19-14-20-05 » développés par SAMSUNG ELECTRONICS CO. LTD et TRUSTED LABS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applica | |
Sponsor | Samsung Electronics Co. Ltd. | |
Developer | Samsung Electronics Co. Ltd. / Trusted Labs | |
Cert Id | ANSSI-CC-2015/60 | |
Level | EAL6+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2015/60 | |
Certification Date | 16.11.2015 | |
Category | Micro-circuits | |
Cc Version | Critères Communs version 3.1r4 | |
Developer | Samsung Electronics Co. Ltd. / Trusted Labs | |
Sponsor | Samsung Electronics Co. Ltd. | |
Evaluation Facility | CEA - LETI | |
Level | EAL6+ | |
Protection Profile | BSI-CC-PP-0084-2014 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ASE_TSS.2 | |
Report Link | https://cyber.gouv.fr/sites/default/files/2015/11/ANSSI-CC-2015_60fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/2015/11/ANSSI_cible2015_60en.pdf |
References ?
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC', 'url': 'https://cyber.gouv.fr/produits-certifies/microcontroleurs-samsung-s3ft9mfs3ft9mts3ft9ms-avec-bibliotheques-optionnelles-0', 'description': 'Les produits certifiés sont les « Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC, référence S3FT9MF/S3FT9MT/S3FT9MS _rev1_SW10-50-60-24_GU111-12-19-225-15-19-14-20-05 » développés par SAMSUNG ELECTRONICS CO. LTD et TRUSTED LABS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applica', 'sponsor': 'Samsung Electronics Co. Ltd.', 'developer': 'Samsung Electronics Co. Ltd. / Trusted Labs', 'cert_id': 'ANSSI-CC-2015/60', 'level': 'EAL6+', 'enhanced': {'cert_id': 'ANSSI-CC-2015/60', 'certification_date': '2015-11-16', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Samsung Electronics Co. Ltd. / Trusted Labs', 'sponsor': 'Samsung Electronics Co. Ltd.', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL6+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ASE_TSS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2015/11/ANSSI-CC-2015_60fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2015/11/ANSSI_cible2015_60en.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Les produits certifiés sont les « Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC, référence S3FT9MF/S3FT9MT/S3FT9MS _rev1_SW10-50-60-24_GU111-12-19-225-15-19-14-20-05 » développés par SAMSUNG ELECTRONICS CO. LTD et TRUSTED LABS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applica', 'cert_id': 'ANSSI-CC-2015/60', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2015/60', 'certification_date': '2015-11-16', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JAVA_OC', 'SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0']}}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC', 'url': 'https://cyber.gouv.fr/produits-certifies/microcontroleurs-samsung-s3ft9mfs3ft9mts3ft9ms-avec-bibliotheques-optionnelles-0', 'description': 'Les produits certifiés sont les « Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC, référence S3FT9MF/S3FT9MT/S3FT9MS _rev1_SW10-50-60-24_GU111-12-19-225-15-19-14-20-05 » développés par SAMSUNG ELECTRONICS CO. LTD et TRUSTED LABS.\n\nLe microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applica', 'sponsor': 'Samsung Electronics Co. Ltd.', 'developer': 'Samsung Electronics Co. Ltd. / Trusted Labs', 'cert_id': '2015/60', 'level': 'EAL6+', 'enhanced': {'cert_id': '2015/60', 'certification_date': '16/11/2015', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Samsung Electronics Co. Ltd. / Trusted Labs', 'sponsor': 'Samsung Electronics Co. Ltd.', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL6+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ASE_TSS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2015/11/ANSSI-CC-2015_60fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2015/11/ANSSI_cible2015_60en.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '948e57db6d97e1743c9c3923a3da357d57d318ba3a39d6ae88b41728b8f5dfea', 'txt_hash': 'e9e186125abecf99d9616485b19799a71303b78d44ba24598d904b7f4033bcff'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8d718bcd51af74437c52c660874b18ca4967f84b97ef980ad1789d7e5185800d', 'txt_hash': 'ad87fb5e074cf1f3865b6115eb825ca0fdde74efc52fb9ac4034900e4fd3a674'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 293881, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Producer': 'GPL Ghostscript 9.02', '/CreationDate': '', '/ModDate': '', '/Title': 'ANSSI-CC-2015_60fr', '/Creator': 'PDFCreator Version 1.2.1', '/Author': '', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1150044, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 96, '/Title': 'ST_Klallam7_Ver1.1', '/Author': 'Windows 사용자', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20150825131438+09'00'", '/ModDate': "D:20150825131438+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ecc-brainpool.org/']}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2015/60', 'cert_item': 'Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC', 'cert_item_version': 'S3FT9MF/S3FT9MT/S3FT9MS _rev1_SW10-50-60-24_GU111-12-19-225-15-19-14-20-05', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité à “Package 1: Loader dedicated for usage in Secured Environment only” “Package 2: Loader dedicated for usage by authorized users only', 'cc_version': 'Critères Communs version 3.1 révision 4', 'cc_security_level': 'EAL 6 augmenté ASE_TSS.2', 'developer': 'Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Corée du Sud Trusted Labs 5, rue du Baillage 78000 Versailles, France Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2015/60': 19, 'ANSSI-CC-2014/84': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP- 0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6': 2, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 1, 'ADV_INT.3': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR': 2, 'ALC_CMC': 2, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 2, 'AVA_VAN.5': 1}, 'ASE': {'ASE_TSS.2': 2, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 38}}, 'eval_facility': {'CESTI': {'CESTI': 3}, 'CEA-LETI': {'CEA - LETI': 1, 'CEA-LETI': 2}, 'TrustedLabs': {'Trusted Labs': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 28}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'DTRNG': 10}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'TORNADO': {'TORNADO': 3}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS31': 2, 'AIS 31': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084': 1, 'BSI-PP-0084': 1, 'BSI-CC-PP-0084-': 1}}, 'cc_security_level': {'EAL': {'EAL6+': 2, 'EAL6': 4, 'EAL 4': 1, 'EAL 5': 2, 'EAL6 augmented': 1, 'EAL 4 augmented': 1, 'EAL 5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 2, 'ADV_IMP': 1, 'ADV_ARC.1': 5, 'ADV_SPM.1': 2, 'ADV_FSP.5': 3, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_FSP.4': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 2, 'ALC_CMC': 1, 'ALC_CMC.5': 1, 'ALC_CMS.5': 3, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_CMS.4': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 1}, 'APE': {'APE_ECD': 1}, 'ASE': {'ASE_TSS.2': 10, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 2, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_REQ.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 8, 'FAU_GEN': 2, 'FAU_SAS.1': 12, 'FAU_SAS.1.1': 2, 'FAU_GEN.1': 1}, 'FCS': {'FCS_RNG': 8, 'FCS_RNG.1': 17, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_COP.1': 21, 'FCS_COP': 49, 'FCS_CKM.1': 24, 'FCS_CKM.4': 12, 'FCS_CKM': 11, 'FCS_CKM.2': 4}, 'FDP': {'FDP_SDC': 4, 'FDP_ACF': 10, 'FDP_SDC.1': 14, 'FDP_SDI': 1, 'FDP_SDI.2': 8, 'FDP_SDI.1': 2, 'FDP_ITT.1': 18, 'FDP_ITT.1.1': 1, 'FDP_ACC.1': 19, 'FDP_IFC.1': 23, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 3, 'FDP_ACF.1': 17, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 11, 'FDP_ITC.2': 11, 'FDP_UCT.1': 9, 'FDP_UCT.1.1': 1, 'FDP_UIT.1': 9, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC': 8, 'FDP_IFC': 1, 'FDP_ITT': 1}, 'FIA': {'FIA_API': 6, 'FIA_API.1': 12, 'FIA_API.1.1': 2}, 'FMT': {'FMT_LIM': 22, 'FMT_LIM.1': 28, 'FMT_LIM.2': 32, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_MSA.3': 15, 'FMT_MSA.1': 12, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 6, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 9, 'FMT_SMF.1.1': 1, 'FMT_MSA': 2, 'FMT_SMF': 1}, 'FPT': {'FPT_FLS.1': 18, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 20, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 16, 'FPT_ITT.1.1': 1, 'FPT_FLS': 1, 'FPT_PHP': 1, 'FPT_ITT': 1}, 'FRU': {'FRU_FLT.2': 15, 'FRU_FLT.1': 1, 'FRU_FLT.2.1': 1, 'FRU_FLT': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.RSA': 8, 'O.ECC': 2, 'O.RND': 6, 'O.SHA': 6, 'O.TDES': 7, 'O.AES': 5, 'O.ECDSA': 4, 'O.ECDH': 5, 'O.MEM_ACCESS': 1}, 'T': {'T.RND': 5}}, 'vendor': {'Samsung': {'Samsung': 17}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 28}}, 'DES': {'DES': {'DES': 9}, '3DES': {'Triple-DES': 6, 'TDES': 12, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 1}, 'ECC': {'ECDH': {'ECDH': 15}, 'ECDSA': {'ECDSA': 19}, 'ECC': {'ECC': 27}}, 'FF': {'DH': {'Diffie-Hellman': 4}, 'DSA': {'DSA': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 3}, 'SHA2': {'SHA224': 5, 'SHA256': 5, 'SHA384': 5, 'SHA512': 4}}}, 'crypto_scheme': {'KA': {'Key Agreement': 3}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'DTRNG': 14, 'TRNG': 1}, 'RNG': {'RNG': 4, 'RND': 11}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'TORNADO': {'TORNADO': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 21, 'Physical Probing': 4, 'physical probing': 6, 'Physical probing': 2, 'side-channel': 1, 'DPA': 2, 'timing attacks': 1}, 'FI': {'physical tampering': 3, 'Malfunction': 26, 'malfunction': 10}, 'other': {'reverse engineering': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICVersion': {'IC Version': 1}}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-3': 6, 'FIPS 197': 1}, 'BSI': {'BSI-AIS31': 2, 'AIS31': 4}, 'CC': {'CCMB-2012-09-001': 3, 'CCMB-2012-09-002': 3, 'CCMB-2012-09-003': 3, 'CCMB-2012-09-004': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2015_60fr.pdf
. - The st_filename property was set to
ANSSI_cible2015_60en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CEA']
. - The cert_id property was set to
ANSSI-CC-2015/60
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/01']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/65', 'ANSSI-CC-2016/01', 'ANSSI-CC-2017/17', 'ANSSI-CC-2019/22', 'ANSSI-CC-2017/18v2', 'ANSSI-CC-2020/06', 'ANSSI-CC-2017/42', 'ANSSI-CC-2017/18', 'ANSSI-CC-2017/17v2', 'ANSSI-CC-2018/31']}, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2014/84']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2014/84', 'ANSSI-CC-2014/20']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_60fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2015_60en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/22', 'ANSSI-CC-2020/06', 'ANSSI-CC-2018/31']}}, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The scheme_data property was set to
{'product': 'Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC', 'url': 'https://cyber.gouv.fr/produits-certifies/microcontroleurs-samsung-s3ft9mfs3ft9mts3ft9ms-avec-bibliotheques-optionnelles-0', 'description': 'Les produits certifiés sont les « Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC, référence S3FT9MF/S3FT9MT/S3FT9MS _rev1_SW10-50-60-24_GU111-12-19-225-15-19-14-20-05 » développés par SAMSUNG ELECTRONICS CO. LTD et TRUSTED LABS.\n\nLe microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applica', 'sponsor': 'Samsung Electronics Co. Ltd.', 'developer': 'Samsung Electronics Co. Ltd. / Trusted Labs', 'cert_id': '2015/60', 'level': 'EAL6+', 'enhanced': {'cert_id': '2015/60', 'certification_date': '16/11/2015', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Samsung Electronics Co. Ltd. / Trusted Labs', 'sponsor': 'Samsung Electronics Co. Ltd.', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL6+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ASE_TSS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2015/11/ANSSI-CC-2015_60fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2015/11/ANSSI_cible2015_60en.pdf'}}
.
- The report_references property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Microcontrôleurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec bibliothèques optionnelles RSA et ECC was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "282add8917085fc1",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2015/60",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/01"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/84"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/42",
"ANSSI-CC-2017/18v2",
"ANSSI-CC-2017/18",
"ANSSI-CC-2016/01",
"ANSSI-CC-2020/06",
"ANSSI-CC-2016/65",
"ANSSI-CC-2017/17v2",
"ANSSI-CC-2017/17",
"ANSSI-CC-2019/22",
"ANSSI-CC-2018/31"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2014/84",
"ANSSI-CC-2014/20"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2015/60",
"description": "Les produits certifi\u00e9s sont les \u00ab Microcontr\u00f4leurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec biblioth\u00e8ques optionnelles RSA et ECC, r\u00e9f\u00e9rence S3FT9MF/S3FT9MT/S3FT9MS _rev1_SW10-50-60-24_GU111-12-19-225-15-19-14-20-05 \u00bb d\u00e9velopp\u00e9s par SAMSUNG ELECTRONICS CO. LTD et TRUSTED LABS. Le microcontr\u00f4leur seul n\u2019est pas un produit utilisable en tant que tel. Il est destin\u00e9 \u00e0 h\u00e9berger une ou plusieurs applica",
"developer": "Samsung Electronics Co. Ltd. / Trusted Labs",
"enhanced": {
"augmented": "ASE_TSS.2",
"category": "Micro-circuits",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "ANSSI-CC-2015/60",
"certification_date": "2015-11-16",
"developer": "Samsung Electronics Co. Ltd. / Trusted Labs",
"evaluation_facility": "CEA - LETI",
"level": "EAL6+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "BSI-CC-PP-0084-2014",
"report_link": "https://cyber.gouv.fr/sites/default/files/2015/11/ANSSI-CC-2015_60fr.pdf",
"sponsor": "Samsung Electronics Co. Ltd.",
"target_link": "https://cyber.gouv.fr/sites/default/files/2015/11/ANSSI_cible2015_60en.pdf"
},
"level": "EAL6+",
"product": "Microcontr\u00f4leurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec biblioth\u00e8ques optionnelles RSA et ECC",
"sponsor": "Samsung Electronics Co. Ltd.",
"url": "https://cyber.gouv.fr/produits-certifies/microcontroleurs-samsung-s3ft9mfs3ft9mts3ft9ms-avec-bibliotheques-optionnelles-0"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "Microcontr\u00f4leurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec biblioth\u00e8ques optionnelles RSA et ECC",
"not_valid_after": "2020-11-16",
"not_valid_before": "2015-11-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2015_60fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 6 augment\u00e9 ASE_TSS.2",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2015/60",
"cert_item": "Microcontr\u00f4leurs Samsung S3FT9MF/S3FT9MT/S3FT9MS avec biblioth\u00e8ques optionnelles RSA et ECC",
"cert_item_version": "S3FT9MF/S3FT9MT/S3FT9MS _rev1_SW10-50-60-24_GU111-12-19-225-15-19-14-20-05",
"cert_lab": "CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Cor\u00e9e du Sud Trusted Labs 5, rue du Baillage 78000 Versailles, France Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Cor\u00e9e du Sud",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifi\u00e9 BSI-CC-PP-0084-2014 le 19 f\u00e9vrier 2014 avec conformit\u00e9 \u00e0 \u201cPackage 1: Loader dedicated for usage in Secured Environment only\u201d \u201cPackage 2: Loader dedicated for usage by authorized users only"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 28
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2014/84": 2,
"ANSSI-CC-2015/60": 19
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0084-2014": 1,
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 2,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 2
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 2,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"TORNADO": {
"TORNADO": 3
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1,
"CEA-LETI": 2
},
"CESTI": {
"CESTI": 3
},
"TrustedLabs": {
"Trusted Labs": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"DTRNG": 10
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 2,
"AIS31": 2
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 38
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "PDFCreator Version 1.2.1",
"/Keywords": "",
"/ModDate": "",
"/Producer": "GPL Ghostscript 9.02",
"/Subject": "",
"/Title": "ANSSI-CC-2015_60fr",
"pdf_file_size_bytes": 293881,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "ANSSI_cible2015_60en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 27
},
"ECDH": {
"ECDH": 15
},
"ECDSA": {
"ECDSA": 19
}
},
"FF": {
"DH": {
"Diffie-Hellman": 4
},
"DSA": {
"DSA": 6
}
},
"RSA": {
"RSA-CRT": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AES": 5,
"O.ECC": 2,
"O.ECDH": 5,
"O.ECDSA": 4,
"O.MEM_ACCESS": 1,
"O.RND": 6,
"O.RSA": 8,
"O.SHA": 6,
"O.TDES": 7
},
"T": {
"T.RND": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084": 1,
"BSI-CC-PP-0084-": 1,
"BSI-PP-0084": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 5,
"ADV_FSP": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 3,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT.3": 1,
"ADV_SPM.1": 2,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 2,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 1,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_ECD": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 2,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.2": 10
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 1,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 2,
"EAL 5 augmented": 2,
"EAL6": 4,
"EAL6 augmented": 1,
"EAL6+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 1,
"FAU_SAS": 8,
"FAU_SAS.1": 12,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 11,
"FCS_CKM.1": 24,
"FCS_CKM.2": 4,
"FCS_CKM.4": 12,
"FCS_COP": 49,
"FCS_COP.1": 21,
"FCS_RNG": 8,
"FCS_RNG.1": 17,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 8,
"FDP_ACC.1": 19,
"FDP_ACC.1.1": 1,
"FDP_ACF": 10,
"FDP_ACF.1": 17,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 23,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 3,
"FDP_ITC.1": 11,
"FDP_ITC.2": 11,
"FDP_ITT": 1,
"FDP_ITT.1": 18,
"FDP_ITT.1.1": 1,
"FDP_SDC": 4,
"FDP_SDC.1": 14,
"FDP_SDI": 1,
"FDP_SDI.1": 2,
"FDP_SDI.2": 8,
"FDP_UCT.1": 9,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 9,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_API": 6,
"FIA_API.1": 12,
"FIA_API.1.1": 2
},
"FMT": {
"FMT_LIM": 22,
"FMT_LIM.1": 28,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 32,
"FMT_LIM.2.1": 2,
"FMT_MSA": 2,
"FMT_MSA.1": 12,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 15,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 18,
"FPT_FLS.1.1": 1,
"FPT_ITT": 1,
"FPT_ITT.1": 16,
"FPT_ITT.1.1": 1,
"FPT_PHP": 1,
"FPT_PHP.3": 20,
"FPT_PHP.3.1": 1
},
"FRU": {
"FRU_FLT": 1,
"FRU_FLT.1": 1,
"FRU_FLT.2": 15,
"FRU_FLT.2.1": 1
},
"FTP": {
"FTP_ITC.1": 13,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {
"ICVersion": {
"IC Version": 1
}
},
"crypto_engine": {
"TORNADO": {
"TORNADO": 1
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 3
},
"SHA2": {
"SHA224": 5,
"SHA256": 5,
"SHA384": 5,
"SHA512": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 11,
"RNG": 4
},
"TRNG": {
"DTRNG": 14,
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 26,
"malfunction": 10,
"physical tampering": 3
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 21,
"Physical Probing": 4,
"Physical probing": 2,
"physical probing": 6,
"side-channel": 1,
"timing attacks": 1
},
"other": {
"reverse engineering": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 4,
"BSI-AIS31": 2
},
"CC": {
"CCMB-2012-09-001": 3,
"CCMB-2012-09-002": 3,
"CCMB-2012-09-003": 3,
"CCMB-2012-09-004": 3
},
"FIPS": {
"FIPS 197": 1,
"FIPS PUB 180-3": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 28
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 12,
"Triple-DES": 6
},
"DES": {
"DES": 9
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 17
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Windows \uc0ac\uc6a9\uc790",
"/CreationDate": "D:20150825131438+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20150825131438+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Title": "ST_Klallam7_Ver1.1",
"pdf_file_size_bytes": 1150044,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ecc-brainpool.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 96
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"JAVA_OC",
"BAROC_SC_PP_V1.0",
"SECURITY_IC_AUGP_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_60fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ASE_TSS.2",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2015_60en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "948e57db6d97e1743c9c3923a3da357d57d318ba3a39d6ae88b41728b8f5dfea",
"txt_hash": "e9e186125abecf99d9616485b19799a71303b78d44ba24598d904b7f4033bcff"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8d718bcd51af74437c52c660874b18ca4967f84b97ef980ad1789d7e5185800d",
"txt_hash": "ad87fb5e074cf1f3865b6115eb825ca0fdde74efc52fb9ac4034900e4fd3a674"
}
},
"status": "archived"
}