S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Library including specific IC Dedicated Software
CSV information ?
Status | active |
---|---|
Valid from | 03.03.2020 |
Valid until | 03.03.2025 |
Scheme | 🇫🇷 FR |
Manufacturer | Samsung |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL6+, ASE_TSS.2 |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DESRandomness
DTRNGEngines
TORNADOVendor
SamsungSecurity level
EAL 6, EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0084-2014, BSI-PP-0084-2014Certificates
ANSSI-CC-2020/12, ANSSI-CC-2018/33Evaluation facilities
CESTI, CEA - LETI, CEA-LETI, Trusted LabsStandards
AIS31, AIS 31, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Creation date | D:20200309161803+01'00' |
---|---|
Modification date | D:20200309161958+01'00' |
Pages | 16 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 11.0 (Windows) |
Frontpage
Certificate ID | ANSSI-CC-2020/12 |
---|---|
Certified item | S3FTIMH/S3FTIMV/S3FTIMG Référence/version du produit S3FTIMH_ 20190702 |
Certification lab | CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France |
Developer | Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Corée du Sud Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Corée du Sud |
References
Outgoing- ANSSI-CC-2018/33 - archived - S3FT9MH/S3FT9MV/S3FT9MG
- ANSSI-CC-2020/93 - active - S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software(S3FT9MH_20200702)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, TDEA, HMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA1, SHA-1, SHA224, SHA256, SHA384, SHA512, SHA-224, SHA-256, SHA-384, SHA-512Schemes
Key AgreementProtocols
PGPRandomness
DTRNG, TRNG, RNG, RNDEngines
TORNADOElliptic Curves
P-192, P-224, P-256, P-384, secp192k1, secp192r1, secp224k1, secp224r1, secp256k1, secp256r1, secp384r1, brainpoolP192r1, brainpoolP192t1, brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1Block cipher modes
ECBCPLC
IC VersionVendor
SamsungSecurity level
EAL6, EAL 4, EAL 5, EAL6 augmented, EAL 4 augmented, EAL 5 augmentedClaims
O.RSA, O.ECC, O.RND, O.AES, O.SHA, O.TDES, O.MEM_ACCESS, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_ARC.1, ADV_SPM.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_FSP.4, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_CMS.4, ATE_COV, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5, AVA_VAN, APE_ECD, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FAU_GEN.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FDP_SDC, FDP_ACF, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_ITT.1.1, FDP_ACC.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1, FDP_UCT.1.1, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC, FDP_SDI.1, FDP_IFC, FDP_ITT, FIA_API, FIA_API.1, FIA_API.1.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_CKM.4, FMT_MSA, FMT_SMF, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_PHP, FPT_ITT.1, FPT_ITT.1.1, FPT_FLS, FPT_ITT, FRU_FLT.2, FRU_FLT.1, FRU_FLT, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-CC-PP-0084, BSI-PP-0084, BSI-CC-PP-0084-Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Physical probing, side-channel, side channel, DPA, SPA, timing attacks, timing attack, physical tampering, Malfunction, malfunction, DFA, reverse engineeringStandards
FIPS PUB 180-3, FIPS197, FIPS 197, BSI-AIS31, AIS31, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5Similar certificates
Scheme data ?
Product | PRESTO Engineering HVM | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/presto-engineering-hvm-0 | |
Description | Le site de production qui propose des services à ses clients afin de tester, qualifier et prépersonnaliser des microcircuits. Les activités suivantes entrent dans le cadre de cette certification : la réception, la conservation, le stockage et l’expédition de wafers de microcircuits sécurisés et de produits finis ; le contrôle d’entrée, des tests de wafers et le contrôle de sortie des wa | |
Sponsor | PRESTO Engineering HVM | |
Developer | PRESTO Engineering HVM | |
Cert Id | ANSSI-CC-2020/12 | |
Level | EAL6 | |
Expiration Date | 18.05.2025 | |
Enhanced | ||
Cert Id | ANSSI-CC-2020/12 | |
Certification Date | 18.05.2020 | |
Expiration Date | 18.05.2025 | |
Category | Sites certifiés | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | PRESTO Engineering HVM | |
Sponsor | PRESTO Engineering HVM | |
Evaluation Facility | Serma Safety & Security | |
Level | EAL6 | |
Protection Profile | ||
Mutual Recognition | ||
Augmented | ALC_CMC.5 ALC_CMS.5 ALC_DVS.2 ALC_LCD.1 ALC_TAT.3 ALC_DEL.1 | |
Target Link | https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cible-site-2020_12en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/2020/06/anssi-site-2020_12fr.pdf |
References ?
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'PRESTO Engineering HVM', 'url': 'https://cyber.gouv.fr/produits-certifies/presto-engineering-hvm-0', 'description': 'Le site de production qui propose des services à ses clients afin de tester, qualifier et prépersonnaliser des microcircuits. Les activités suivantes entrent dans le cadre de cette certification : la réception, la conservation, le stockage et l’expédition de wafers de microcircuits sécurisés et de produits finis ; le contrôle d’entrée, des tests de wafers et le contrôle de sortie des wa', 'sponsor': 'PRESTO Engineering HVM', 'developer': 'PRESTO Engineering HVM', 'cert_id': 'ANSSI-CC-2020/12', 'level': 'EAL6', 'expiration_date': '2025-05-18', 'enhanced': {'cert_id': 'ANSSI-CC-2020/12', 'certification_date': '2020-05-18', 'expiration_date': '2025-05-18', 'category': 'Sites certifiés', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'PRESTO Engineering HVM', 'sponsor': 'PRESTO Engineering HVM', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL6', 'protection_profile': '', 'mutual_recognition': '', 'augmented': 'ALC_CMC.5 ALC_CMS.5 ALC_DVS.2 ALC_LCD.1 ALC_TAT.3 ALC_DEL.1', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cible-site-2020_12en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/anssi-site-2020_12fr.pdf'}}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'product': 'PRESTO Engineering HVM', 'url': 'https://cyber.gouv.fr/produits-certifies/presto-engineering-hvm-0', 'description': 'Le site de production qui propose des services à ses clients afin de tester, qualifier et prépersonnaliser des microcircuits. Les activités suivantes entrent dans le cadre de cette certification : la réception, la conservation, le stockage et l’expédition de wafers de microcircuits sécurisés et de produits finis ; le contrôle d’entrée, des tests de wafers et le contrôle de sortie des wa', 'sponsor': 'PRESTO Engineering HVM', 'developer': 'PRESTO Engineering HVM', 'cert_id': 'ANSSI-CC-2020/12', 'level': 'EAL6', 'expiration_date': '2025-05-18', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2020/12', 'certification_date': '2020-05-18', 'expiration_date': '2025-05-18', 'category': 'Sites certifiés', 'developer': 'PRESTO Engineering HVM', 'sponsor': 'PRESTO Engineering HVM', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL6', 'protection_profile': '', 'mutual_recognition': '', 'augmented': 'ALC_CMC.5 ALC_CMS.5 ALC_DVS.2 ALC_LCD.1 ALC_TAT.3 ALC_DEL.1', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/anssi-site-2020_12fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cible-site-2020_12en.pdf'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['JAVA_OC', 'SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0']}}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Library including specific IC Dedicated Software', 'url': 'https://cyber.gouv.fr/produits-certifies/s3ft9mhs3ft9mvs3ft9mg-16-bit-risc-microcontroller-smart-card-optional-ce1-secure', 'description': 'Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applications bancaires, télévision à péage, transport, santé, etc.) en fonction des logiciels applicatifs', 'sponsor': 'Samsung Electronics Co. Ltd.', 'developer': 'Samsung Electronics Co. Ltd.', 'cert_id': '2020/12', 'level': 'EAL6+', 'expiration_date': '3 Mars 2025', 'enhanced': {'cert_id': '2020/12', 'certification_date': '03/03/2020', 'expiration_date': '03/03/2025', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Samsung Electronics Co. Ltd.', 'sponsor': 'Samsung Electronics Co. Ltd.', 'evaluation_facility': 'CEA-Leti', 'level': 'EAL6+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ASE_TSS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/03/anssi-cc-2020_12.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/03/anssi-cible-cc-2020_12en.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'pdf_hash': 'a022a65bd4e7a7e077743a7a6d50aeb355e00015d73d0f28459f28e933a4bde0', 'txt_hash': 'f6bc127e9a7e3614748b50e87e8f9e5959fa25f2b05c4c8f7be8dca9f56740b1'}
data.
The PDF extraction data was updated.
- The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084': 2, 'BSI-PP-0084': 1, 'BSI-CC-PP-0084-': 1}}, 'cc_security_level': {'EAL': {'EAL6': 5, 'EAL 4': 1, 'EAL 5': 2, 'EAL6 augmented': 1, 'EAL 4 augmented': 1, 'EAL 5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 2, 'ADV_IMP': 1, 'ADV_ARC.1': 5, 'ADV_SPM.1': 2, 'ADV_FSP.5': 3, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_FSP.4': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 2, 'ALC_CMC': 1, 'ALC_CMC.5': 1, 'ALC_CMS.5': 3, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_CMS.4': 1}, 'ATE': {'ATE_COV': 1, 'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 1}, 'APE': {'APE_ECD': 1}, 'ASE': {'ASE_TSS.2': 11, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 2, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_REQ.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 8, 'FAU_GEN': 2, 'FAU_SAS.1': 12, 'FAU_SAS.1.1': 2, 'FAU_GEN.1': 1}, 'FCS': {'FCS_RNG': 24, 'FCS_RNG.1': 16, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_COP.1': 21, 'FCS_COP': 49, 'FCS_CKM.1': 25, 'FCS_CKM.4': 12, 'FCS_CKM': 16, 'FCS_CKM.2': 4}, 'FDP': {'FDP_SDC': 4, 'FDP_ACF': 13, 'FDP_SDC.1': 14, 'FDP_SDI': 1, 'FDP_SDC.1.1': 2, 'FDP_SDI.2': 8, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITT.1': 18, 'FDP_ITT.1.1': 1, 'FDP_ACC.1': 19, 'FDP_IFC.1': 23, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 3, 'FDP_ACF.1': 17, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_UCT.1': 9, 'FDP_UCT.1.1': 1, 'FDP_UIT.1': 9, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC': 10, 'FDP_SDI.1': 1, 'FDP_IFC': 1, 'FDP_ITT': 1}, 'FIA': {'FIA_API': 6, 'FIA_API.1': 12, 'FIA_API.1.1': 2}, 'FMT': {'FMT_LIM': 22, 'FMT_LIM.1': 28, 'FMT_LIM.2': 32, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_MSA.3': 15, 'FMT_MSA.1': 12, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 6, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 9, 'FMT_SMF.1.1': 1, 'FMT_CKM.4': 1, 'FMT_MSA': 2, 'FMT_SMF': 1}, 'FPT': {'FPT_FLS.1': 22, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 21, 'FPT_PHP.3.1': 1, 'FPT_PHP': 3, 'FPT_ITT.1': 16, 'FPT_ITT.1.1': 1, 'FPT_FLS': 1, 'FPT_ITT': 1}, 'FRU': {'FRU_FLT.2': 17, 'FRU_FLT.1': 1, 'FRU_FLT': 1}, 'FTP': {'FTP_TRP.1': 12, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1, 'FTP_ITC.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.RSA': 7, 'O.ECC': 7, 'O.RND': 6, 'O.AES': 5, 'O.SHA': 7, 'O.TDES': 6, 'O.MEM_ACCESS': 1}, 'T': {'T.RND': 5}}, 'vendor': {'Samsung': {'Samsung': 17}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 32}}, 'DES': {'DES': {'DES': 10}, '3DES': {'Triple-DES': 6, 'TDES': 18, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 1}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 14}, 'ECC': {'ECC': 31}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 2, 'SHA-1': 1}, 'SHA2': {'SHA224': 6, 'SHA256': 6, 'SHA384': 6, 'SHA512': 5, 'SHA-224': 2, 'SHA-256': 2, 'SHA-384': 2, 'SHA-512': 2}}}, 'crypto_scheme': {'KA': {'Key Agreement': 3}}, 'crypto_protocol': {'PGP': {'PGP': 2}}, 'randomness': {'TRNG': {'DTRNG': 52, 'TRNG': 1}, 'RNG': {'RNG': 17, 'RND': 11}}, 'cipher_mode': {'ECB': {'ECB': 3}}, 'ecc_curve': {'NIST': {'P-192': 8, 'P-224': 8, 'P-256': 8, 'P-384': 8, 'secp192k1': 4, 'secp192r1': 4, 'secp224k1': 4, 'secp224r1': 4, 'secp256k1': 4, 'secp256r1': 4, 'secp384r1': 4}, 'Brainpool': {'brainpoolP192r1': 4, 'brainpoolP192t1': 4, 'brainpoolP224r1': 4, 'brainpoolP224t1': 4, 'brainpoolP256r1': 4, 'brainpoolP256t1': 4, 'brainpoolP320r1': 4, 'brainpoolP320t1': 4, 'brainpoolP384r1': 4, 'brainpoolP384t1': 4, 'brainpoolP512r1': 4, 'brainpoolP512t1': 4}}, 'crypto_engine': {'TORNADO': {'TORNADO': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 23, 'Physical Probing': 4, 'physical probing': 9, 'Physical probing': 2, 'side-channel': 3, 'side channel': 2, 'DPA': 8, 'SPA': 7, 'timing attacks': 1, 'timing attack': 2}, 'FI': {'physical tampering': 3, 'Malfunction': 26, 'malfunction': 13, 'DFA': 4}, 'other': {'reverse engineering': 5}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICVersion': {'IC Version': 1}}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-3': 6, 'FIPS197': 1, 'FIPS 197': 1}, 'BSI': {'BSI-AIS31': 3, 'AIS31': 11}, 'CC': {'CCMB-2017-04-001': 3, 'CCMB-2017-04-002': 3, 'CCMB-2017-04-003': 3, 'CCMB-2017-04-004': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-cc-2020_12en.pdf
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/33']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/33', 'ANSSI-CC-2017/24', 'ANSSI-CC-2016/59', 'ANSSI-CC-2015/66']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ff8a730983787bc7da87589efa113d509af8eedc7cc51a3bff941f21b7031c8f', 'txt_hash': 'ded458fb0f56b98d3e966d0c509229a426b6a104d1e782a4fa0dbe4b0330c9fd'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 308176, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': "D:20200309161803+01'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20200309161958+01'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ["Référence du rapport de certification(.+)Nom du produit(.+)()Conformité à un profil de protection(.+)Critères d'évaluation et version(.+)Niveau d'évaluation(.+)Développeur (.+)Centre d'évaluation(.+)Accords de reconnaissance applicables"], 'cert_id': 'ANSSI-CC-2020/12', 'cert_item': 'S3FTIMH/S3FTIMV/S3FTIMG Référence/version du produit S3FTIMH_ 20190702', 'cert_item_version': '', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only', 'cc_version': 'Critères Communs version 3.1 révision 5', 'cc_security_level': 'EAL 6 augmenté ASE_TSS.2', 'developer': 'Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Corée du Sud Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Corée du Sud', 'cert_lab': 'CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2020/12': 16, 'ANSSI-CC-2018/33': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6': 2, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR': 2, 'ALC_CMC': 2, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 2}, 'ASE': {'ASE_TSS.2': 2, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 4}}, 'eval_facility': {'CESTI': {'CESTI': 3}, 'CEA-LETI': {'CEA - LETI': 1, 'CEA-LETI': 2}, 'TrustedLabs': {'Trusted Labs': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'DTRNG': 20}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'TORNADO': {'TORNADO': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS31': 1, 'AIS 31': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2020_12.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CEA']
. - The cert_id property was set to
ANSSI-CC-2020/12
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/93']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/93']}}
data.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_12.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_12en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/24', 'ANSSI-CC-2016/59', 'ANSSI-CC-2015/66']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]}
values discarded. - The scheme_data property was set to
{'product': 'S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Library including specific IC Dedicated Software', 'url': 'https://cyber.gouv.fr/produits-certifies/s3ft9mhs3ft9mvs3ft9mg-16-bit-risc-microcontroller-smart-card-optional-ce1-secure', 'description': 'Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applications bancaires, télévision à péage, transport, santé, etc.) en fonction des logiciels applicatifs', 'sponsor': 'Samsung Electronics Co. Ltd.', 'developer': 'Samsung Electronics Co. Ltd.', 'cert_id': '2020/12', 'level': 'EAL6+', 'expiration_date': '3 Mars 2025', 'enhanced': {'cert_id': '2020/12', 'certification_date': '03/03/2020', 'expiration_date': '03/03/2025', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Samsung Electronics Co. Ltd.', 'sponsor': 'Samsung Electronics Co. Ltd.', 'evaluation_facility': 'CEA-Leti', 'level': 'EAL6+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ASE_TSS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/03/anssi-cc-2020_12.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/03/anssi-cible-cc-2020_12en.pdf'}}
.
- The st property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Library including specific IC Dedicated Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "69a3e097d69e074d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2020/12",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"16"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/93"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/33"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/93"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/33",
"ANSSI-CC-2016/59",
"ANSSI-CC-2015/66",
"ANSSI-CC-2017/24"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2020/12",
"description": "Le site de production qui propose des services \u00e0 ses clients afin de tester, qualifier et pr\u00e9personnaliser des microcircuits. Les activit\u00e9s suivantes entrent dans le cadre de cette certification : la r\u00e9ception, la conservation, le stockage et l\u2019exp\u00e9dition de wafers de microcircuits s\u00e9curis\u00e9s et de produits finis ; le contr\u00f4le d\u2019entr\u00e9e, des tests de wafers et le contr\u00f4le de sortie des wa",
"developer": "PRESTO Engineering HVM",
"enhanced": {
"augmented": "ALC_CMC.5 ALC_CMS.5 ALC_DVS.2 ALC_LCD.1 ALC_TAT.3 ALC_DEL.1",
"category": "Sites certifi\u00e9s",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2020/12",
"certification_date": "2020-05-18",
"developer": "PRESTO Engineering HVM",
"evaluation_facility": "Serma Safety \u0026 Security",
"expiration_date": "2025-05-18",
"level": "EAL6",
"mutual_recognition": "",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/2020/06/anssi-site-2020_12fr.pdf",
"sponsor": "PRESTO Engineering HVM",
"target_link": "https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cible-site-2020_12en.pdf"
},
"expiration_date": "2025-05-18",
"level": "EAL6",
"product": "PRESTO Engineering HVM",
"sponsor": "PRESTO Engineering HVM",
"url": "https://cyber.gouv.fr/produits-certifies/presto-engineering-hvm-0"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Samsung",
"manufacturer_web": "https://www.samsung.com/",
"name": "S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Library including specific IC Dedicated Software",
"not_valid_after": "2025-03-03",
"not_valid_before": "2020-03-03",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "anssi-cc-2020_12.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 6 augment\u00e9 ASE_TSS.2",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2020/12",
"cert_item": "S3FTIMH/S3FTIMV/S3FTIMG R\u00e9f\u00e9rence/version du produit S3FTIMH_ 20190702",
"cert_item_version": "",
"cert_lab": "CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Cor\u00e9e du Sud Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Cor\u00e9e du Sud",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)()Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u0027\u00e9valuation et version(.+)Niveau d\u0027\u00e9valuation(.+)D\u00e9veloppeur (.+)Centre d\u0027\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifi\u00e9 BSI-CC-PP-0084-2014 le 19 f\u00e9vrier 2014 avec conformit\u00e9 aux packages \u201cAuthentication of the security IC\u201d \u201cLoader dedicated for usage in Secured Environment only\u201d \u201cLoader dedicated for usage by authorized users only"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2018/33": 4,
"ANSSI-CC-2020/12": 16
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 2,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_SPD": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 2
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 2,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"TORNADO": {
"TORNADO": 1
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1,
"CEA-LETI": 2
},
"CESTI": {
"CESTI": 3
},
"TrustedLabs": {
"Trusted Labs": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"TRNG": {
"DTRNG": 20
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 1,
"AIS31": 1
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20200309161803+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20200309161958+01\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 308176,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "anssi-cible-cc-2020_12en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 31
},
"ECDH": {
"ECDH": 9
},
"ECDSA": {
"ECDSA": 14
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 4
}
},
"RSA": {
"RSA-CRT": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AES": 5,
"O.ECC": 7,
"O.MEM_ACCESS": 1,
"O.RND": 6,
"O.RSA": 7,
"O.SHA": 7,
"O.TDES": 6
},
"T": {
"T.RND": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084": 2,
"BSI-CC-PP-0084-": 1,
"BSI-PP-0084": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 5,
"ADV_FSP": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 3,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT.3": 1,
"ADV_SPM.1": 2,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 2,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_ECD": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 2,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.2": 11
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 1,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 2,
"EAL 5 augmented": 2,
"EAL6": 5,
"EAL6 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 1,
"FAU_SAS": 8,
"FAU_SAS.1": 12,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 16,
"FCS_CKM.1": 25,
"FCS_CKM.2": 4,
"FCS_CKM.4": 12,
"FCS_COP": 49,
"FCS_COP.1": 21,
"FCS_RNG": 24,
"FCS_RNG.1": 16,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 10,
"FDP_ACC.1": 19,
"FDP_ACC.1.1": 1,
"FDP_ACF": 13,
"FDP_ACF.1": 17,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 23,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 3,
"FDP_ITC.1": 12,
"FDP_ITC.2": 12,
"FDP_ITT": 1,
"FDP_ITT.1": 18,
"FDP_ITT.1.1": 1,
"FDP_SDC": 4,
"FDP_SDC.1": 14,
"FDP_SDC.1.1": 2,
"FDP_SDI": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT.1": 9,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 9,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_API": 6,
"FIA_API.1": 12,
"FIA_API.1.1": 2
},
"FMT": {
"FMT_CKM.4": 1,
"FMT_LIM": 22,
"FMT_LIM.1": 28,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 32,
"FMT_LIM.2.1": 2,
"FMT_MSA": 2,
"FMT_MSA.1": 12,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 15,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 22,
"FPT_FLS.1.1": 1,
"FPT_ITT": 1,
"FPT_ITT.1": 16,
"FPT_ITT.1.1": 1,
"FPT_PHP": 3,
"FPT_PHP.3": 21,
"FPT_PHP.3.1": 1
},
"FRU": {
"FRU_FLT": 1,
"FRU_FLT.1": 1,
"FRU_FLT.2": 17
},
"FTP": {
"FTP_ITC.1": 13,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 12,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"ECB": {
"ECB": 3
}
},
"cplc_data": {
"ICVersion": {
"IC Version": 1
}
},
"crypto_engine": {
"TORNADO": {
"TORNADO": 1
}
},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 2
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP192r1": 4,
"brainpoolP192t1": 4,
"brainpoolP224r1": 4,
"brainpoolP224t1": 4,
"brainpoolP256r1": 4,
"brainpoolP256t1": 4,
"brainpoolP320r1": 4,
"brainpoolP320t1": 4,
"brainpoolP384r1": 4,
"brainpoolP384t1": 4,
"brainpoolP512r1": 4,
"brainpoolP512t1": 4
},
"NIST": {
"P-192": 8,
"P-224": 8,
"P-256": 8,
"P-384": 8,
"secp192k1": 4,
"secp192r1": 4,
"secp224k1": 4,
"secp224r1": 4,
"secp256k1": 4,
"secp256r1": 4,
"secp384r1": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1,
"SHA1": 2
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2,
"SHA224": 6,
"SHA256": 6,
"SHA384": 6,
"SHA512": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 11,
"RNG": 17
},
"TRNG": {
"DTRNG": 52,
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 4,
"Malfunction": 26,
"malfunction": 13,
"physical tampering": 3
},
"SCA": {
"DPA": 8,
"Leak-Inherent": 23,
"Physical Probing": 4,
"Physical probing": 2,
"SPA": 7,
"physical probing": 9,
"side channel": 2,
"side-channel": 3,
"timing attack": 2,
"timing attacks": 1
},
"other": {
"reverse engineering": 5
}
},
"standard_id": {
"BSI": {
"AIS31": 11,
"BSI-AIS31": 3
},
"CC": {
"CCMB-2017-04-001": 3,
"CCMB-2017-04-002": 3,
"CCMB-2017-04-003": 3,
"CCMB-2017-04-004": 3
},
"FIPS": {
"FIPS 197": 1,
"FIPS PUB 180-3": 6,
"FIPS197": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 32
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 18,
"Triple-DES": 6
},
"DES": {
"DES": 10
}
},
"constructions": {
"MAC": {
"HMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 17
}
},
"vulnerability": {}
},
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"JAVA_OC",
"BAROC_SC_PP_V1.0",
"SECURITY_IC_AUGP_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_12.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ASE_TSS.2",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_12en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ff8a730983787bc7da87589efa113d509af8eedc7cc51a3bff941f21b7031c8f",
"txt_hash": "ded458fb0f56b98d3e966d0c509229a426b6a104d1e782a4fa0dbe4b0330c9fd"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "a022a65bd4e7a7e077743a7a6d50aeb355e00015d73d0f28459f28e933a4bde0",
"txt_hash": "f6bc127e9a7e3614748b50e87e8f9e5959fa25f2b05c4c8f7be8dca9f56740b1"
}
},
"status": "active"
}