This page was not yet optimized for use on mobile
devices.
Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Qualcomm Snapdragon Processors including the Galaxy S4, Galaxy Note 3, and the Galaxy NotePRO Tablet
CSV information
| Status | archived |
|---|---|
| Valid from | 26.02.2014 |
| Valid until | 19.04.2016 |
| Scheme | 🇺🇸 US |
| Manufacturer | Samsung Electronics Co., Ltd. |
| Category | Other Devices and Systems |
| Security level | |
| Protection profiles | |
| Maintenance updates | Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Qualcomm Snapdragon Processors (MDFPP10) (13.06.2014) Certification report Security target |
Heuristics summary
Certificate ID: CCEVS-VR-10556-2014
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Asymmetric Algorithms
RSA-PSSHash functions
SHA-512Protocols
TLS, VPNVendor
Samsung, QualcommSecurity level
EAL 1, EAL1Certificates
CCEVS-VR-10556-2014Evaluation facilities
Gossamer SecurityStandards
FIPS 140-2, PKCS #1File metadata
| Author | Jerome Myers |
|---|---|
| Creation date | D:20140225150027-05'00' |
| Modification date | D:20140225150034-05'00' |
| Pages | 16 |
| Creator | Acrobat PDFMaker 10.1 for Word |
| Producer | Adobe PDF Library 10.0 |
Frontpage
| Certificate ID | CCEVS-VR-10556-2014 |
|---|---|
| Certified item | Samsung Electronics Co., Ltd. 416 Maetan-3dong, Yeongtong-gu, Suwon-si, Gyeonggi- do, 443-742 Korea Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Qualcomm Snapdragon Processors |
| Certification lab | US NIAP |
Security target
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES256, AES-256, AES-, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSA 2048, RSA-PSS, ECDH, ECDSA, ECC, DHHash functions
SHA-1, SHA-512, SHA-256, SHA-384, SHA256, PBKDF, PBKDF2Schemes
MACProtocols
TLS, TLS 1.0, TLS 1.2, TLS 1.1, IPsec, VPNRandomness
DRBG, RNG, RBGLibraries
OpenSSLElliptic Curves
P-256, P-384, P-521Block cipher modes
CBC, GCM, CCMTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384Trusted Execution Environments
TrustZone, TEEVendor
Samsung, QualcommSecurity level
EAL 1, EAL 1 augmentedClaims
OE.CONFIG, OE.NOTIFY, OE.PRECAUTIONSecurity Assurance Requirements (SAR)
ADV_FSP, ADV_FSP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_TSU_EXT.1, ALC_TSU_EXT, ALC_CMC, ALC_CMS, ALC_CMC.1, ALC_CMS.1, ATE_IND, ATE_IND.1, AVA_VAN, AVA_VAN.1Security Functional Requirements (SFR)
FCS_CKM_EXT, FCS_RBG_EXT, FCS_SRV_EXT, FCS_STG_EXT, FCS_TLS_EXT, FCS_CKM.1, FCS_CKM, FCS_COP.1, FCS_RBG_EXT.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM_EXT.1, FCS_CKM_EXT.1.1, FCS_CKM_EXT.1.2, FCS_CKM_EXT.1.3, FCS_CKM_EXT.1.4, FCS_CKM_EXT.2, FCS_CKM_EXT.2.1, FCS_CKM_EXT.3, FCS_CKM_EXT.3.1, FCS_CKM_EXT.3.2, FCS_CKM_EXT.4, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_CKM_EXT.5, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.6, FCS_CKM_EXT.6.1, FCS_TLS_EXT.2, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_RBG_EXT.1.3, FCS_SRV_EXT.1, FCS_SRV_EXT.1.1, FCS_STG_EXT.1, FCS_STG_EXT.1.1, FCS_STG_EXT.1.2, FCS_STG_EXT.1.3, FCS_STG_EXT.1.4, FCS_STG_EXT.1.5, FCS_STG_EXT.2, FCS_STG_EXT.2.1, FCS_STG_EXT.2.2, FCS_STG_EXT.3, FCS_STG_EXT.3.1, FCS_STG_EXT.3.2, FCS_TLS_EXT.1, FCS_TLS_EXT.1.1, FCS_TLS_EXT.1.2, FCS_TLS_EXT.2.1, FCS_TLS_EXT.2.2, FCS_COP, FCS_COP.1.1, FCS_CKM.1.1, FDP_ACC, FDP_ACC.1, FDP_ACF_EXT, FDP_DAR_EXT, FDP_STG_EXT.1, FDP_ACF_EXT.1, FDP_ACF_EXT.1.1, FDP_DAR_EXT.1, FDP_DAR_EXT.1.1, FDP_DAR_EXT.1.2, FDP_STG_EXT.1.1, FDP_STG_EXT, FIA_AFL_EXT, FIA_PAE_EXT, FIA_PMG_EXT, FIA_TRT_EXT, FIA_UAU_EXT.1, FIA_UAU_EXT, FIA_UAU, FIA_AFL_EXT.1, FIA_AFL_EXT.1.1, FIA_AFL_EXT.1.2, FIA_PAE_EXT.1, FIA_PAE_EXT.1.1, FIA_PMG_EXT.1, FIA_PMG_EXT.1.1, FIA_TRT_EXT.1, FIA_TRT_EXT.1.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UAU_EXT.2, FIA_UAU_EXT.2.1, FIA_UAU_EXT.2.2, FIA_UAU_EXT.3, FIA_UAU_EXT.3.1, FMT_SMF_EXT, FMT_MOF.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1, FMT_SMF_EXT.1, FMT_SMF_EXT.1.1, FPT_AEX_EXT, FPT_BBD_EXT, FPT_KST_EXT, FPT_NOT_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_STM, FPT_AEX_EXT.1, FPT_AEX_EXT.1.1, FPT_AEX_EXT.1.2, FPT_AEX_EXT.2, FPT_AEX_EXT.2.1, FPT_AEX_EXT.3, FPT_AEX_EXT.3.1, FPT_AEX_EXT.4, FPT_AEX_EXT.4.1, FPT_AEX_EXT.4.2, FPT_BBD_EXT.1, FPT_BBD_EXT.1.1, FPT_KST_EXT.1, FPT_KST_EXT.1.1, FPT_KST_EXT.2, FPT_KST_EXT.2.1, FPT_KST_EXT.3, FPT_KST_EXT.3.1, FPT_NOT_EXT.1, FPT_NOT_EXT.1.1, FPT_STM.1, FPT_STM.1.1, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_TST_EXT.2, FPT_TST_EXT.2.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.2, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_TUD_EXT.2.3, FPT_TUD_EXT.2.4, FTA_SSL_EXT, FTA_WSE_EXT, FTA_TAB, FTA_SSL_EXT.1, FTA_SSL_EXT.1.1, FTA_TAB.1, FTA_TAB.1.1, FTA_WSE_EXT.1, FTA_WSE_EXT.1.1, FTP_ITC_EXT, FTP_ITC_EXT.1, FTP_ITC_EXT.1.1, FTP_ITC_EXT.1.2, FTP_ITC_EXT.1.3Standards
FIPS 140-2, FIPS PUB 186-4, FIPS PUB 197, FIPS 186-2, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 180-4, NIST SP 800-38F, NIST SP 800-38A, NIST SP 800-38C, NIST SP 800-38D, NIST SP 800-132, NIST SP 800-57, NIST SP 800-56A, SP 800-108, SP 800-56A, SP 800-90A, SP 800-38A, SP 800-132, PKCS #1, PKCS 1, PKCS 2, PKCS#12, RFC 2818, RFC 5216, RFC 2246, RFC 5246, RFC 4346, RFC 5289, RFC 6460, RFC 5280, RFC 5759, RFC 3394, RFC 7460File metadata
| Title | Samsung Electronics Co., Ltd. Samsung Galaxy S4, Galaxy Note 3, Galaxy Note 10.1 2014 Edition, and Galaxy S4 Active (MDFPP10) Security Target |
|---|---|
| Subject | Common Criteria Security Target |
| Author | Edward "Macho Man" Morris |
| Creation date | D:20140617145524-04'00' |
| Modification date | D:20140617145531-04'00' |
| Pages | 40 |
| Creator | Acrobat PDFMaker 10.1 for Word |
| Producer | Adobe PDF Library 10.0 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
CCEVS-VR-10556-2014Extracted SARs
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "2613e6a7d46e7f9f",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-10556-2014",
"cert_lab": [
"US"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:samsung:galaxy_note_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TSU_EXT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"7a7b216fc3e5f2ae"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2014-06-13",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10556-add1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10556-st.pdf",
"maintenance_title": "Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Qualcomm Snapdragon Processors (MDFPP10)"
}
]
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Qualcomm Snapdragon Processors including the Galaxy S4, Galaxy Note 3, and the Galaxy NotePRO Tablet",
"not_valid_after": "2016-04-19",
"not_valid_before": "2014-02-26",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10556-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-10556-2014",
"cert_item": "Samsung Electronics Co., Ltd. 416 Maetan-3dong, Yeongtong-gu, Suwon-si, Gyeonggi- do, 443-742 Korea Samsung Electronics Co., Ltd. Samsung Galaxy Devices with Qualcomm Snapdragon Processors",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA-PSS": 1
}
},
"cc_cert_id": {
"US": {
"CCEVS-VR-10556-2014": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL1": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 4
}
},
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 5
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 5
},
"PKCS": {
"PKCS #1": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Qualcomm": {
"Qualcomm": 16
},
"Samsung": {
"Samsung": 37
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Jerome Myers",
"/Company": "",
"/ContentTypeId": "0x0101005D9107176838F542B4297D2C73272E37",
"/CreationDate": "D:20140225150027-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/ModDate": "D:20140225150034-05\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20140225200009",
"/_NewReviewCycle": "",
"pdf_file_size_bytes": 144797,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "st_vid10556-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 10
}
},
"FF": {
"DH": {
"DH": 1
}
},
"RSA": {
"RSA 2048": 3,
"RSA-PSS": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"OE": {
"OE.CONFIG": 1,
"OE.NOTIFY": 1,
"OE.PRECAUTION": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.1": 9
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 10,
"AGD_PRE": 1,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 4,
"ALC_CMS": 1,
"ALC_CMS.1": 5,
"ALC_TSU_EXT": 2,
"ALC_TSU_EXT.1": 11
},
"ATE": {
"ATE_IND": 1,
"ATE_IND.1": 5
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 5,
"EAL 1 augmented": 5
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 14,
"FCS_CKM.1.1": 5,
"FCS_CKM.2": 1,
"FCS_CKM.2.1": 1,
"FCS_CKM_EXT": 18,
"FCS_CKM_EXT.1": 1,
"FCS_CKM_EXT.1.1": 1,
"FCS_CKM_EXT.1.2": 1,
"FCS_CKM_EXT.1.3": 1,
"FCS_CKM_EXT.1.4": 1,
"FCS_CKM_EXT.2": 1,
"FCS_CKM_EXT.2.1": 1,
"FCS_CKM_EXT.3": 1,
"FCS_CKM_EXT.3.1": 1,
"FCS_CKM_EXT.3.2": 1,
"FCS_CKM_EXT.4": 1,
"FCS_CKM_EXT.4.1": 2,
"FCS_CKM_EXT.4.2": 1,
"FCS_CKM_EXT.5": 1,
"FCS_CKM_EXT.5.1": 1,
"FCS_CKM_EXT.5.2": 1,
"FCS_CKM_EXT.6": 1,
"FCS_CKM_EXT.6.1": 1,
"FCS_COP": 1,
"FCS_COP.1": 20,
"FCS_COP.1.1": 8,
"FCS_RBG_EXT": 3,
"FCS_RBG_EXT.1": 5,
"FCS_RBG_EXT.1.1": 3,
"FCS_RBG_EXT.1.2": 1,
"FCS_RBG_EXT.1.3": 1,
"FCS_SRV_EXT": 3,
"FCS_SRV_EXT.1": 1,
"FCS_SRV_EXT.1.1": 1,
"FCS_STG_EXT": 9,
"FCS_STG_EXT.1": 1,
"FCS_STG_EXT.1.1": 1,
"FCS_STG_EXT.1.2": 1,
"FCS_STG_EXT.1.3": 1,
"FCS_STG_EXT.1.4": 1,
"FCS_STG_EXT.1.5": 1,
"FCS_STG_EXT.2": 2,
"FCS_STG_EXT.2.1": 1,
"FCS_STG_EXT.2.2": 1,
"FCS_STG_EXT.3": 1,
"FCS_STG_EXT.3.1": 1,
"FCS_STG_EXT.3.2": 1,
"FCS_TLS_EXT": 6,
"FCS_TLS_EXT.1": 1,
"FCS_TLS_EXT.1.1": 1,
"FCS_TLS_EXT.1.2": 1,
"FCS_TLS_EXT.2": 2,
"FCS_TLS_EXT.2.1": 1,
"FCS_TLS_EXT.2.2": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 1,
"FDP_ACF_EXT": 3,
"FDP_ACF_EXT.1": 1,
"FDP_ACF_EXT.1.1": 1,
"FDP_DAR_EXT": 3,
"FDP_DAR_EXT.1": 1,
"FDP_DAR_EXT.1.1": 1,
"FDP_DAR_EXT.1.2": 1,
"FDP_STG_EXT": 1,
"FDP_STG_EXT.1": 3,
"FDP_STG_EXT.1.1": 1
},
"FIA": {
"FIA_AFL_EXT": 3,
"FIA_AFL_EXT.1": 1,
"FIA_AFL_EXT.1.1": 1,
"FIA_AFL_EXT.1.2": 1,
"FIA_PAE_EXT": 3,
"FIA_PAE_EXT.1": 1,
"FIA_PAE_EXT.1.1": 1,
"FIA_PMG_EXT": 3,
"FIA_PMG_EXT.1": 1,
"FIA_PMG_EXT.1.1": 1,
"FIA_TRT_EXT": 3,
"FIA_TRT_EXT.1": 1,
"FIA_TRT_EXT.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.7": 1,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT": 7,
"FIA_UAU_EXT.1": 4,
"FIA_UAU_EXT.2": 1,
"FIA_UAU_EXT.2.1": 1,
"FIA_UAU_EXT.2.2": 1,
"FIA_UAU_EXT.3": 1,
"FIA_UAU_EXT.3.1": 1
},
"FMT": {
"FMT_MOF.1": 8,
"FMT_SMF": 2,
"FMT_SMF.1": 2,
"FMT_SMF.1.1": 1,
"FMT_SMF_EXT": 3,
"FMT_SMF_EXT.1": 1,
"FMT_SMF_EXT.1.1": 1
},
"FPT": {
"FPT_AEX_EXT": 12,
"FPT_AEX_EXT.1": 1,
"FPT_AEX_EXT.1.1": 1,
"FPT_AEX_EXT.1.2": 1,
"FPT_AEX_EXT.2": 1,
"FPT_AEX_EXT.2.1": 1,
"FPT_AEX_EXT.3": 1,
"FPT_AEX_EXT.3.1": 1,
"FPT_AEX_EXT.4": 1,
"FPT_AEX_EXT.4.1": 1,
"FPT_AEX_EXT.4.2": 1,
"FPT_BBD_EXT": 3,
"FPT_BBD_EXT.1": 1,
"FPT_BBD_EXT.1.1": 1,
"FPT_KST_EXT": 9,
"FPT_KST_EXT.1": 1,
"FPT_KST_EXT.1.1": 1,
"FPT_KST_EXT.2": 1,
"FPT_KST_EXT.2.1": 1,
"FPT_KST_EXT.3": 1,
"FPT_KST_EXT.3.1": 1,
"FPT_NOT_EXT": 3,
"FPT_NOT_EXT.1": 1,
"FPT_NOT_EXT.1.1": 1,
"FPT_STM": 2,
"FPT_STM.1": 1,
"FPT_STM.1.1": 1,
"FPT_TST_EXT": 6,
"FPT_TST_EXT.1": 1,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.2": 1,
"FPT_TST_EXT.2.1": 1,
"FPT_TUD_EXT": 6,
"FPT_TUD_EXT.1": 1,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.1.3": 1,
"FPT_TUD_EXT.2": 1,
"FPT_TUD_EXT.2.1": 1,
"FPT_TUD_EXT.2.2": 1,
"FPT_TUD_EXT.2.3": 1,
"FPT_TUD_EXT.2.4": 1
},
"FTA": {
"FTA_SSL_EXT": 3,
"FTA_SSL_EXT.1": 1,
"FTA_SSL_EXT.1.1": 1,
"FTA_TAB": 2,
"FTA_TAB.1": 1,
"FTA_TAB.1.1": 1,
"FTA_WSE_EXT": 3,
"FTA_WSE_EXT.1": 1,
"FTA_WSE_EXT.1.1": 1
},
"FTP": {
"FTP_ITC_EXT": 3,
"FTP_ITC_EXT.1": 1,
"FTP_ITC_EXT.1.1": 1,
"FTP_ITC_EXT.1.2": 1,
"FTP_ITC_EXT.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 7
},
"CCM": {
"CCM": 1
},
"GCM": {
"GCM": 7
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 18
}
},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"TLS": {
"TLS": {
"TLS": 23,
"TLS 1.0": 2,
"TLS 1.1": 1,
"TLS 1.2": 1
}
},
"VPN": {
"VPN": 7
}
},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 8,
"P-384": 8,
"P-521": 8
}
},
"eval_facility": {},
"hash_function": {
"PBKDF": {
"PBKDF": 1,
"PBKDF2": 1
},
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-256": 10,
"SHA-384": 1,
"SHA-512": 4,
"SHA256": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 5
},
"RNG": {
"RBG": 9,
"RNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 5,
"FIPS 180-4": 2,
"FIPS 186-2": 2,
"FIPS 186-4": 1,
"FIPS 197": 2,
"FIPS 198-1": 2,
"FIPS PUB 186-4": 5,
"FIPS PUB 197": 1
},
"NIST": {
"NIST SP 800-132": 1,
"NIST SP 800-38A": 1,
"NIST SP 800-38C": 1,
"NIST SP 800-38D": 1,
"NIST SP 800-38F": 2,
"NIST SP 800-56A": 1,
"NIST SP 800-57": 1,
"SP 800-108": 2,
"SP 800-132": 1,
"SP 800-38A": 1,
"SP 800-56A": 1,
"SP 800-90A": 1
},
"PKCS": {
"PKCS #1": 1,
"PKCS 1": 2,
"PKCS 2": 1,
"PKCS#12": 2
},
"RFC": {
"RFC 2246": 2,
"RFC 2818": 2,
"RFC 3394": 1,
"RFC 4346": 1,
"RFC 5216": 1,
"RFC 5246": 9,
"RFC 5280": 2,
"RFC 5289": 4,
"RFC 5759": 1,
"RFC 6460": 3,
"RFC 7460": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19,
"AES-": 1,
"AES-128": 5,
"AES-256": 9,
"AES256": 1
}
},
"constructions": {
"MAC": {
"HMAC": 5,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"ARM": {
"TrustZone": 2
},
"other": {
"TEE": 11
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 4,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 4,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA": 4,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 2,
"TLS_RSA_WITH_AES_256_CBC_SHA": 4
}
},
"vendor": {
"Qualcomm": {
"Qualcomm": 47
},
"Samsung": {
"Samsung": 78
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Edward \"Macho Man\" Morris",
"/Category": "Security Target",
"/Comments": "Originally created by Gossamer Security Solutions",
"/Company": "Gossamer Security Solutions",
"/CreationDate": "D:20140617145524-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/ModDate": "D:20140617145531-04\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20140617185504",
"/Subject": "Common Criteria Security Target",
"/Title": "Samsung Electronics Co., Ltd. Samsung Galaxy S4, Galaxy Note 3, Galaxy Note 10.1 2014 Edition, and Galaxy S4 Active (MDFPP10) Security Target",
"pdf_file_size_bytes": 376267,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://source.android.com/source/report-bugs.html",
"https://source.android.com/devices/tech/security/index.html",
"http://developer.samsung.com/notice/How-to-Use-the-Forum"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 40
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MD_v1.1.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10556-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10556-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8225dfb2b97bb88c851803177607e4301739d58cbd01c1ee140c6aa611b24720",
"txt_hash": "27be4e330ed3364d1a6ef24fd9586118d27cfc55a9dd50c22a0ad3345629b1bd"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3dd20fcd7bce91ed20a4b22ed63cdc13df6ad715cf158adff444f1614720a0dd",
"txt_hash": "d95871aba7d7b15b1f08cb6e3041a1fe25046e9bddd271066c634ed16a66c714"
}
},
"status": "archived"
}