Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)

CSV information

Status active
Valid from 01.02.2024
Valid until 01.02.2029
Scheme 🇫🇷 FR
Manufacturer Samsung Electronics Co., Ltd.
Category Trusted Computing
Security level EAL2+

Heuristics summary

Certificate ID: ANSSI-CC-2023/71

Certificate

Extracted keywords

Trusted Execution Environments
TEEgris, TEE
Vendor
Samsung

Security level
EAL2
Protection profiles
ANSSI-CC-PP-2014/01-M02
Certificates
ANSSI-CC-2023/71, ANSSI-CC-PP-2014/01-M02

File metadata

Creation date D:20240215120518+01'00'
Modification date D:20240215120555+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report

Extracted keywords

Symmetric Algorithms
DES

Trusted Execution Environments
TrustZone, TEEgris, TEE
Vendor
Samsung

Security level
EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ALC_FLR
Protection profiles
ANSSI-CC-PP-2014/01-M02
Certificates
ANSSI-CC-2023/71, ANSSI-CC-PP-2014/01-M02

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20240215115644+01'00'
Modification date D:20240215120554+01'00'
Pages 15
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC, HMAC-SHA-224, HMAC-SHA-384, HMAC-SHA-512, CMAC
Asymmetric Algorithms
ECDH, ECDSA, EdDSA, Diffie-Hellman, DH, DSA
Hash functions
SHA1, SHA-1, SHA-256, SHA256, SHA224, SHA384, SHA512, SHA-224, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Protocols
SSL, TLS, IPsec, VPN
Randomness
TRNG, DRBG, RNG
Block cipher modes
ECB, CTR

JavaCard API constants
ED25519, X25519
Trusted Execution Environments
TrustZone, SE, TEEgris, TEE
Vendor
Samsung, Thales

Security level
EAL 2, EAL 2+, EAL 2 augmented
Claims
O.CA_TA_IDENTIFICATION, O.KEYS_USAGE, O.TEE_ID, O.INITIALISATION, O.INSTANCE_TIME, O.OPERATION, O.RNG, O.RUNTIME_CONFIDENTIALITY, O.RUNTIME_INTEGRITY, O.TA_AUTHENTICITY, O.TA_ISOLATION, O.TEE_DATA_PROTECTION, O.TEE_ISOLATION, O.TRUSTED_STORAGE, O.DEBUG, O.ROLLBACK_PROTECTION, O.TA_PERSISTENT_TIME, O.PERIPHERAL_INITIALISATION, O.INITIALIZATION, O.PROTECTED_COMMUNICATION_CHANNEL, O.PREVENT_RESIDUAL_DATA, O.DATA_ACCESS, O.FUNCTION_ACCESS, O.SAFE_RELEASE, O.CAPTURE, T.ABUSE_FUNCT, T.CLONE, T.FLASH_DUMP, T.IMPERSONATION, T.ROGUE_CODE_EXECUTION, T.PERTURBATION, T.RAM, T.RNG, T.SPY, T.TEE_FIRMWARE_DOWNGRADE, T.STORAGE_CORRUPTION, T.ABUSE_DEBUG, T.ROLLBACK, T.TA_PERSISTENT_TIME_ROLLBACK, T.SHARED_FUNCTION_ACCESS, T.EXTRACT_EXCHANGED_DATA, T.MODIFY_EXCHANGED_DATA, T.INJECT_EXCHANGED_DATA, T.MODIFY_FIRMWARE, T.INJECT_DATA, T.EXTRACT_DATA, T.MODIFY_DATA, T.RESIDUAL, T.CORRUPT_RUNTIME_DATA, T.CORRUPT_SETUP, T.PERIPHERAL_ACCESS, T.ROGUE_CODE_, T.TEE_FIRMWARE_, T.TA_PERSISTENT_TIME_, T.SHARED_FUNCTION_, T.EXTRACT_EXCHANGED_, T.MODIFY_EXCHANGED_, T.INJECT_EXCHANGED_, T.CORRUPT_RUNTIME_, A.PROTECTION_AFTER_DELIVERY, A.TA_MANAGEMENT, A.TA_DEVELOPMENT, A.ROLLBACK, A.TA_DEVELOPMENT_TUI, A.NO_RESIDUAL_DATA, A.PROTECTION_AFTER_, OP.USE_KEY, OP.EXTRACT_KEY, OP.LOAD, OP.STORE, OP.AUTHENTICATE, OP.DEBUG, OP.ACTIVATE, OE.INTEGRATION_CONFIGURATION, OE.SECRETS, OE.PROTECTION_AFTER_DELIVERY, OE.TA_MANAGEMENT, OE.TA_DEVELOPMENT, OE.ROLLBACK, OE.DISABLED_DEBUG, OE.NO_RESIDUAL_DATA, OE.TA_DEVELOPMENT_TUI, OSP.INTEGRATION_CONFIGURATION, OSP.SECRETS, OSP.INTEGRATION_
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.1, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_SAA.1, FAU_GEN.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_COP, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FDP_ITT.1, FDP_IFC, FDP_IFF, FDP_ITT, FDP_ACC, FDP_ACF, FDP_ROL, FDP_IFC.2, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ROL.1, FDP_SDI, FDP_TRP, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.2, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID, FIA_ATD, FIA_USB, FIA_UAU.6, FIA_UAU, FIA_UAU.2, FIA_UID.1, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_MSA.2, FPT_INI, FPT_INI.1, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_INI.1.4, FPT_FLS.1, FPT_ITT, FPT_ITT.1, FPT_FLS.1.1, FPT_TEE.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_STM, FPT_STM.1, FPT_FLS, FTP_TPR, FTP_TRP, FTP_TRP.1

Side-channel analysis
side-channels, cold boot
Certification process
out of scope, and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist

Standards
FIPS 180-4, FIPS 197, FIPS 46-3, FIPS 81, FIPS 186-2, FIPS 186-4, FIPS 140-2, PKCS#1, RFC 2119, RFC 1423, RFC 4231, RFC 2202, RFC 7748, RFC 8032

File metadata

Title Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx
Author rosep
Creation date D:20240108141421+01'00'
Modification date D:20240108141421+01'00'
Pages 98
Producer Microsoft: Print To PDF

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2023/71

Extracted SARs

ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, AVA_VAN.2

Similar certificates

Name Certificate ID
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45) ANSSI-CC-2023/45 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2)... ANSSI-CC-2023/30 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-... ANSSI-CC-2023/57 Compare
SCR404U (version B) (ANSSI-CC-2023/37-R01) ANSSI-CC-2023/37-R01 Compare
Showing 5 out of 17.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Trusted Computing",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_71fr.pdf",
  "dgst": "01cb0a033c2b1c55",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2023/71",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "eal": "EAL2+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0.0.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Samsung Electronics Co., Ltd.",
  "manufacturer_web": "https://www.samsung.com",
  "name": "Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)",
  "not_valid_after": "2029-02-01",
  "not_valid_before": "2024-02-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2023_71fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/71": 2,
          "ANSSI-CC-PP-2014/01-M02": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2014/01-M02": 1
        }
      },
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "other": {
          "TEE": 1,
          "TEEgris": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240215120518+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240215120555+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 154878,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2023_71fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/71": 2,
          "ANSSI-CC-PP-2014/01-M02": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2014/01-M02": 2
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "TrustZone": 1
        },
        "other": {
          "TEE": 10,
          "TEEgris": 12
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 19
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240215115644+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "",
      "/ModDate": "D:20240215120554+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 427132,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://semiconductor.samsung.com/us/processor/mobile-processor/",
          "mailto:[email protected]",
          "https://semiconductor.samsung.com/us/processor/showcase/smartphone",
          "http://www.sogis.eu/",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "ANSSI-cible-CC-2023_71en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 13
          },
          "EdDSA": {
            "EdDSA": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 4
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_RESIDUAL_DATA": 3,
          "A.PROTECTION_AFTER_": 1,
          "A.PROTECTION_AFTER_DELIVERY": 2,
          "A.ROLLBACK": 1,
          "A.TA_DEVELOPMENT": 4,
          "A.TA_DEVELOPMENT_TUI": 3,
          "A.TA_MANAGEMENT": 5
        },
        "O": {
          "O.CAPTURE": 2,
          "O.CA_TA_IDENTIFICATION": 11,
          "O.DATA_ACCESS": 11,
          "O.DEBUG": 12,
          "O.FUNCTION_ACCESS": 4,
          "O.INITIALISATION": 10,
          "O.INITIALIZATION": 1,
          "O.INSTANCE_TIME": 11,
          "O.KEYS_USAGE": 4,
          "O.OPERATION": 8,
          "O.PERIPHERAL_INITIALISATION": 3,
          "O.PREVENT_RESIDUAL_DATA": 3,
          "O.PROTECTED_COMMUNICATION_CHANNEL": 12,
          "O.RNG": 12,
          "O.ROLLBACK_PROTECTION": 5,
          "O.RUNTIME_CONFIDENTIALITY": 10,
          "O.RUNTIME_INTEGRITY": 21,
          "O.SAFE_RELEASE": 11,
          "O.TA_AUTHENTICITY": 7,
          "O.TA_ISOLATION": 15,
          "O.TA_PERSISTENT_TIME": 12,
          "O.TEE_DATA_PROTECTION": 11,
          "O.TEE_ID": 11,
          "O.TEE_ISOLATION": 14,
          "O.TRUSTED_STORAGE": 9
        },
        "OE": {
          "OE.DISABLED_DEBUG": 1,
          "OE.INTEGRATION_CONFIGURATION": 7,
          "OE.NO_RESIDUAL_DATA": 2,
          "OE.PROTECTION_AFTER_DELIVERY": 7,
          "OE.ROLLBACK": 1,
          "OE.SECRETS": 2,
          "OE.TA_DEVELOPMENT": 6,
          "OE.TA_DEVELOPMENT_TUI": 5,
          "OE.TA_MANAGEMENT": 3
        },
        "OP": {
          "OP.ACTIVATE": 1,
          "OP.AUTHENTICATE": 2,
          "OP.DEBUG": 7,
          "OP.EXTRACT_KEY": 4,
          "OP.LOAD": 3,
          "OP.STORE": 4,
          "OP.USE_KEY": 4
        },
        "OSP": {
          "OSP.INTEGRATION_": 1,
          "OSP.INTEGRATION_CONFIGURATION": 2,
          "OSP.SECRETS": 3
        },
        "T": {
          "T.ABUSE_DEBUG": 3,
          "T.ABUSE_FUNCT": 3,
          "T.CLONE": 3,
          "T.CORRUPT_RUNTIME_": 1,
          "T.CORRUPT_RUNTIME_DATA": 2,
          "T.CORRUPT_SETUP": 5,
          "T.EXTRACT_DATA": 3,
          "T.EXTRACT_EXCHANGED_": 1,
          "T.EXTRACT_EXCHANGED_DATA": 2,
          "T.FLASH_DUMP": 3,
          "T.IMPERSONATION": 3,
          "T.INJECT_DATA": 3,
          "T.INJECT_EXCHANGED_": 1,
          "T.INJECT_EXCHANGED_DATA": 2,
          "T.MODIFY_DATA": 3,
          "T.MODIFY_EXCHANGED_": 1,
          "T.MODIFY_EXCHANGED_DATA": 2,
          "T.MODIFY_FIRMWARE": 3,
          "T.PERIPHERAL_ACCESS": 3,
          "T.PERTURBATION": 3,
          "T.RAM": 3,
          "T.RESIDUAL": 3,
          "T.RNG": 3,
          "T.ROGUE_CODE_": 1,
          "T.ROGUE_CODE_EXECUTION": 2,
          "T.ROLLBACK": 3,
          "T.SHARED_FUNCTION_": 1,
          "T.SHARED_FUNCTION_ACCESS": 2,
          "T.SPY": 3,
          "T.STORAGE_CORRUPTION": 3,
          "T.TA_PERSISTENT_TIME_": 1,
          "T.TA_PERSISTENT_TIME_ROLLBACK": 2,
          "T.TEE_FIRMWARE_": 1,
          "T.TEE_FIRMWARE_DOWNGRADE": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 7,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 15,
          "ADV_TDS.1": 10
        },
        "AGD": {
          "AGD_OPE.1": 10,
          "AGD_PRE.1": 9
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 5,
          "ATE_FUN.1": 4
        },
        "AVA": {
          "AVA_VAN.2": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 6,
          "EAL 2 augmented": 2,
          "EAL 2+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 12,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 4,
          "FAU_SAA.1": 2,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_CKM": 48,
          "FCS_CKM.1": 17,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 23,
          "FCS_COP": 68,
          "FCS_COP.1": 14,
          "FCS_RNG": 3,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 40,
          "FDP_ACC.1": 15,
          "FDP_ACF": 35,
          "FDP_ACF.1": 21,
          "FDP_IFC": 13,
          "FDP_IFC.1": 8,
          "FDP_IFC.2": 2,
          "FDP_IFF": 11,
          "FDP_IFF.1": 8,
          "FDP_ITC.1": 15,
          "FDP_ITC.2": 15,
          "FDP_ITT": 11,
          "FDP_ITT.1": 4,
          "FDP_RIP": 10,
          "FDP_RIP.1": 2,
          "FDP_ROL": 7,
          "FDP_ROL.1": 2,
          "FDP_SDI": 6,
          "FDP_SDI.2": 15,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_TRP": 1
        },
        "FIA": {
          "FIA_ATD": 7,
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 12,
          "FIA_UAU.2": 1,
          "FIA_UAU.6": 2,
          "FIA_UID": 8,
          "FIA_UID.1": 3,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1,
          "FIA_USB": 6,
          "FIA_USB.1": 9,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA": 55,
          "FMT_MSA.1": 7,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 15,
          "FMT_MTD": 5,
          "FMT_MTD.1": 1,
          "FMT_SMF": 5,
          "FMT_SMF.1": 21,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 6,
          "FMT_SMR.1": 24,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS": 12,
          "FPT_FLS.1": 18,
          "FPT_FLS.1.1": 1,
          "FPT_INI": 4,
          "FPT_INI.1": 14,
          "FPT_INI.1.1": 2,
          "FPT_INI.1.2": 2,
          "FPT_INI.1.3": 2,
          "FPT_INI.1.4": 1,
          "FPT_ITT": 6,
          "FPT_ITT.1": 2,
          "FPT_STM": 10,
          "FPT_STM.1": 2,
          "FPT_TEE.1": 6,
          "FPT_TEE.1.1": 1,
          "FPT_TEE.1.2": 1
        },
        "FTP": {
          "FTP_TPR": 1,
          "FTP_TRP": 7,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 2
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 2,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA224": 1,
            "SHA256": 2,
            "SHA384": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "ED25519": 4,
          "X25519": 4
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 5
        },
        "RNG": {
          "RNG": 29
        },
        "TRNG": {
          "TRNG": 5
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "side-channels": 1
        },
        "other": {
          "cold boot": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-4": 1,
          "FIPS 186-2": 1,
          "FIPS 186-4": 2,
          "FIPS 197": 1,
          "FIPS 46-3": 1,
          "FIPS 81": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 1423": 1,
          "RFC 2119": 3,
          "RFC 2202": 1,
          "RFC 4231": 1,
          "RFC 7748": 1,
          "RFC 8032": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11
          }
        },
        "DES": {
          "3DES": {
            "3DES": 7
          },
          "DES": {
            "DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3,
            "HMAC": 5,
            "HMAC-SHA-224": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "TrustZone": 2
        },
        "IBM": {
          "SE": 2
        },
        "other": {
          "TEE": 594,
          "TEEgris": 126
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 140
        },
        "Thales": {
          "Thales": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "rosep",
      "/CreationDate": "D:20240108141421+01\u002700\u0027",
      "/ModDate": "D:20240108141421+01\u002700\u0027",
      "/Producer": "Microsoft: Print To PDF",
      "/Title": "Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx",
      "pdf_file_size_bytes": 1813549,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 98
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bdc4ae02f7fe264ef28db9879f54f50e9405b087b868e71971b6daf1a2c3a509",
      "txt_hash": "b19a9df8f1ca95c65efeef96f461d512501d96443dc5cdbac700ee32c09b4ca5"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2c613c0d2b9c0e06d38b41b98da13bae012de0200ef3f438d574970a0c3f3a13",
      "txt_hash": "0b454786d28451a2c632cb8566953695867656ba000f3f87c39ac858713f2e46"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3335ea97556a238d5e10afb2b1f2be8a6062ca6d0713af20d650f2f213698809",
      "txt_hash": "29d46bd6abb7d82fb0cfc4275921552246cefdff76653ae24402a00854962958"
    }
  },
  "status": "active"
}