Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)
CSV information ?
Status | active |
---|---|
Valid from | 01.02.2024 |
Valid until | 01.02.2029 |
Scheme | 🇫🇷 FR |
Manufacturer | Samsung Electronics Co., Ltd. |
Category | Trusted Computing |
Security level | EAL2+ |
Heuristics summary ?
Certificate ?
Extracted keywords
Trusted Execution Environments
TEEgris, TEEVendor
SamsungSecurity level
EAL2Protection profiles
ANSSI-CC-PP-2014/01-M02Certificates
ANSSI-CC-2023/71File metadata
Creation date | D:20240215120518+01'00' |
---|---|
Modification date | D:20240215120555+01'00' |
Pages | 2 |
Creator | Acrobat PDFMaker 23 pour Word |
Producer | Adobe PDF Library 23.1.175 |
Certification report ?
Extracted keywords
Symmetric Algorithms
DESTrusted Execution Environments
TrustZone, TEEgris, TEEVendor
SamsungSecurity level
EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ALC_FLRProtection profiles
ANSSI-CC-PP-2014/01-M02Certificates
ANSSI-CC-2023/71Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
Creation date | D:20240215115644+01'00' |
---|---|
Modification date | D:20240215120554+01'00' |
Pages | 15 |
Creator | Microsoft® Word 2019 |
Producer | Microsoft® Word 2019 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, HMAC, HMAC-SHA-224, HMAC-SHA-384, HMAC-SHA-512, CMACAsymmetric Algorithms
ECDH, ECDSA, EdDSA, Diffie-Hellman, DH, DSAHash functions
SHA1, SHA-1, SHA-256, SHA256, SHA224, SHA384, SHA512, SHA-224, SHA-384, SHA-512Schemes
MAC, Key AgreementProtocols
SSL, TLS, IPsec, VPNRandomness
TRNG, DRBG, RNGBlock cipher modes
ECB, CTRJavaCard API constants
ED25519, X25519Trusted Execution Environments
TrustZone, SE, TEEgris, TEEVendor
Samsung, ThalesSecurity level
EAL 2, EAL 2+, EAL 2 augmentedClaims
O.CA_TA_IDENTIFICATION, O.KEYS_USAGE, O.TEE_ID, O.INITIALISATION, O.INSTANCE_TIME, O.OPERATION, O.RNG, O.RUNTIME_CONFIDENTIALITY, O.RUNTIME_INTEGRITY, O.TA_AUTHENTICITY, O.TA_ISOLATION, O.TEE_DATA_PROTECTION, O.TEE_ISOLATION, O.TRUSTED_STORAGE, O.DEBUG, O.ROLLBACK_PROTECTION, O.TA_PERSISTENT_TIME, O.PERIPHERAL_INITIALISATION, O.INITIALIZATION, O.PROTECTED_COMMUNICATION_CHANNEL, O.PREVENT_RESIDUAL_DATA, O.DATA_ACCESS, O.FUNCTION_ACCESS, O.SAFE_RELEASE, O.CAPTURE, T.ABUSE_FUNCT, T.CLONE, T.FLASH_DUMP, T.IMPERSONATION, T.ROGUE_CODE_EXECUTION, T.PERTURBATION, T.RAM, T.RNG, T.SPY, T.TEE_FIRMWARE_DOWNGRADE, T.STORAGE_CORRUPTION, T.ABUSE_DEBUG, T.ROLLBACK, T.TA_PERSISTENT_TIME_ROLLBACK, T.SHARED_FUNCTION_ACCESS, T.EXTRACT_EXCHANGED_DATA, T.MODIFY_EXCHANGED_DATA, T.INJECT_EXCHANGED_DATA, T.MODIFY_FIRMWARE, T.INJECT_DATA, T.EXTRACT_DATA, T.MODIFY_DATA, T.RESIDUAL, T.CORRUPT_RUNTIME_DATA, T.CORRUPT_SETUP, T.PERIPHERAL_ACCESS, T.ROGUE_CODE_, T.TEE_FIRMWARE_, T.TA_PERSISTENT_TIME_, T.SHARED_FUNCTION_, T.EXTRACT_EXCHANGED_, T.MODIFY_EXCHANGED_, T.INJECT_EXCHANGED_, T.CORRUPT_RUNTIME_, A.PROTECTION_AFTER_DELIVERY, A.TA_MANAGEMENT, A.TA_DEVELOPMENT, A.ROLLBACK, A.TA_DEVELOPMENT_TUI, A.NO_RESIDUAL_DATA, A.PROTECTION_AFTER_, OP.USE_KEY, OP.EXTRACT_KEY, OP.LOAD, OP.STORE, OP.AUTHENTICATE, OP.DEBUG, OP.ACTIVATE, OE.INTEGRATION_CONFIGURATION, OE.SECRETS, OE.PROTECTION_AFTER_DELIVERY, OE.TA_MANAGEMENT, OE.TA_DEVELOPMENT, OE.ROLLBACK, OE.DISABLED_DEBUG, OE.NO_RESIDUAL_DATA, OE.TA_DEVELOPMENT_TUI, OSP.INTEGRATION_CONFIGURATION, OSP.SECRETS, OSP.INTEGRATION_Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.1, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_SAA.1, FAU_GEN.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_COP, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FDP_ITT.1, FDP_IFC, FDP_IFF, FDP_ITT, FDP_ACC, FDP_ACF, FDP_ROL, FDP_IFC.2, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ROL.1, FDP_SDI, FDP_TRP, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.2, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID, FIA_ATD, FIA_USB, FIA_UAU.6, FIA_UAU, FIA_UAU.2, FIA_UID.1, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_MSA.2, FPT_INI, FPT_INI.1, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_INI.1.4, FPT_FLS.1, FPT_ITT, FPT_ITT.1, FPT_FLS.1.1, FPT_TEE.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_STM, FPT_STM.1, FPT_FLS, FTP_TPR, FTP_TRP, FTP_TRP.1Side-channel analysis
side-channels, cold bootCertification process
out of scope, and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy existStandards
FIPS 180-4, FIPS 197, FIPS 46-3, FIPS 81, FIPS 186-2, FIPS 186-4, FIPS 140-2, PKCS#1, RFC 2119, RFC 1423, RFC 4231, RFC 2202, RFC 7748, RFC 8032File metadata
Title | Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx |
---|---|
Author | rosep |
Creation date | D:20240108141421+01'00' |
Modification date | D:20240108141421+01'00' |
Pages | 98 |
Producer | Microsoft: Print To PDF |
Heuristics ?
Extracted SARs
AVA_VAN.2, ASE_TSS.1, ASE_OBJ.2, ASE_CCL.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ALC_DEL.1, ATE_FUN.1, ASE_SPD.1, AGD_OPE.1, ADV_FSP.2, ATE_COV.1, ASE_ECD.1, ASE_REQ.2, ASE_INT.1, ADV_ARC.1, ALC_CMC.2CPE matches
Similar certificates
Scheme data ?
Product | Samsung TEEgris on Exynos 2200 Version 5.0.0.0 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000 | |
Description | Le produit évalué est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » développé par Samsung Electronics Ltd., Co.. Ce produit, appelé également Samsung Secure OS, est l’implémentation de Samsung d’un TEE (Trusted Execution Environment), basé sur la technologie ARM Trust Zone. | |
Sponsor | Samsung Electronics Ltd., Co. | |
Developer | Samsung Electronics Ltd., Co. | |
Cert Id | ANSSI-CC-2023/71 | |
Level | EAL2+ | |
Expiration Date | 1 FĂ©vrier 2029 | |
Enhanced | ||
Cert Id | ANSSI-CC-2023/71 | |
Certification Date | 01/02/2024 | |
Expiration Date | 01/02/2029 | |
Category | Divers | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | Samsung Electronics Ltd., Co. | |
Sponsor | Samsung Electronics Ltd., Co. | |
Evaluation Facility | THALES / CNES | |
Level | EAL2+ | |
Protection Profile | GlobalPlatform Technology TEE Protection Profile, réf. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02 | |
Mutual Recognition | CCRA SOG-IS | |
Augmented | AVA_VAN_AP.3 | |
Report Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf | |
Cert Link | https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf |
References ?
No references are available for this certificate.
Updates ?
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Samsung TEEgris on Exynos 2200 Version 5.0.0.0', 'url': 'https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000', 'description': 'Le produit évalué est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » développé par Samsung Electronics Ltd., Co..\nCe produit, appelé également Samsung Secure OS, est l’implémentation de Samsung d’un TEE (Trusted Execution Environment), basé sur la technologie ARM Trust Zone.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'developer': 'Samsung Electronics Ltd., Co.', 'cert_id': 'ANSSI-CC-2023/71', 'level': 'EAL2+', 'expiration_date': '1 Février 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/71', 'certification_date': '01/02/2024', 'expiration_date': '01/02/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Samsung Electronics Ltd., Co.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': 'GlobalPlatform Technology TEE Protection Profile, réf. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'AVA_VAN_AP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2c613c0d2b9c0e06d38b41b98da13bae012de0200ef3f438d574970a0c3f3a13', 'txt_hash': '0b454786d28451a2c632cb8566953695867656ba000f3f87c39ac858713f2e46'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3335ea97556a238d5e10afb2b1f2be8a6062ca6d0713af20d650f2f213698809', 'txt_hash': '29d46bd6abb7d82fb0cfc4275921552246cefdff76653ae24402a00854962958'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bdc4ae02f7fe264ef28db9879f54f50e9405b087b868e71971b6daf1a2c3a509', 'txt_hash': 'b19a9df8f1ca95c65efeef96f461d512501d96443dc5cdbac700ee32c09b4ca5'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 427132, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/CreationDate': "D:20240215115644+01'00'", '/Creator': 'Microsoft® Word 2019', '/Keywords': '', '/ModDate': "D:20240215120554+01'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://semiconductor.samsung.com/us/processor/mobile-processor/', 'https://semiconductor.samsung.com/us/processor/showcase/smartphone', 'http://www.sogis.eu/', 'mailto:[email protected]', 'http://www.commoncriteriaportal.org/', 'http://www.ssi.gouv.fr/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1813549, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 98, '/Author': 'rosep', '/CreationDate': "D:20240108141421+01'00'", '/ModDate': "D:20240108141421+01'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 154878, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240215120518+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240215120555+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2023/71': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2014/01-M02': 2}}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 19}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'TrustZone': 1}, 'other': {'TEEgris': 12, 'TEE': 10}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 6, 'EAL 2+': 1, 'EAL 2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 7, 'ADV_FSP.2': 15, 'ADV_TDS.1': 10, 'ADV_FSP.1': 3}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 9}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 4}, 'AVA': {'AVA_VAN.2': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 12, 'FAU_ARP.1.1': 1, 'FAU_SAR.1': 5, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1': 5, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAA.1': 2, 'FAU_GEN.1': 4}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 48, 'FCS_CKM.1': 17, 'FCS_COP': 68, 'FCS_CKM.4': 23, 'FCS_COP.1': 14, 'FCS_CKM.2': 2}, 'FDP': {'FDP_ITT.1': 4, 'FDP_IFC': 13, 'FDP_IFF': 11, 'FDP_ITT': 11, 'FDP_ACC': 40, 'FDP_ACF': 35, 'FDP_ROL': 7, 'FDP_IFC.2': 2, 'FDP_IFF.1': 8, 'FDP_RIP': 10, 'FDP_RIP.1': 2, 'FDP_ACC.1': 15, 'FDP_ACF.1': 21, 'FDP_SDI.2': 15, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ROL.1': 2, 'FDP_SDI': 6, 'FDP_TRP': 1, 'FDP_IFC.1': 8, 'FDP_ITC.1': 15, 'FDP_ITC.2': 15}, 'FIA': {'FIA_ATD.1': 10, 'FIA_ATD.1.1': 1, 'FIA_UID.2': 8, 'FIA_UID.2.1': 1, 'FIA_USB.1': 9, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID': 8, 'FIA_ATD': 7, 'FIA_USB': 6, 'FIA_UAU.6': 2, 'FIA_UAU': 12, 'FIA_UAU.2': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MSA': 55, 'FMT_SMF.1': 21, 'FMT_SMR.1': 24, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 7, 'FMT_MSA.3': 15, 'FMT_SMF.1.1': 1, 'FMT_SMR': 6, 'FMT_MTD': 5, 'FMT_MTD.1': 1, 'FMT_SMF': 5, 'FMT_MSA.2': 1}, 'FPT': {'FPT_INI': 4, 'FPT_INI.1': 14, 'FPT_INI.1.1': 2, 'FPT_INI.1.2': 2, 'FPT_INI.1.3': 2, 'FPT_INI.1.4': 1, 'FPT_FLS.1': 18, 'FPT_ITT': 6, 'FPT_ITT.1': 2, 'FPT_FLS.1.1': 1, 'FPT_TEE.1': 6, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_STM': 10, 'FPT_STM.1': 2, 'FPT_FLS': 12}, 'FTP': {'FTP_TPR': 1, 'FTP_TRP': 7, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.CA_TA_IDENTIFICATION': 11, 'O.KEYS_USAGE': 4, 'O.TEE_ID': 11, 'O.INITIALISATION': 10, 'O.INSTANCE_TIME': 11, 'O.OPERATION': 8, 'O.RNG': 12, 'O.RUNTIME_CONFIDENTIALITY': 10, 'O.RUNTIME_INTEGRITY': 21, 'O.TA_AUTHENTICITY': 7, 'O.TA_ISOLATION': 15, 'O.TEE_DATA_PROTECTION': 11, 'O.TEE_ISOLATION': 14, 'O.TRUSTED_STORAGE': 9, 'O.DEBUG': 12, 'O.ROLLBACK_PROTECTION': 5, 'O.TA_PERSISTENT_TIME': 12, 'O.PERIPHERAL_INITIALISATION': 3, 'O.INITIALIZATION': 1, 'O.PROTECTED_COMMUNICATION_CHANNEL': 12, 'O.PREVENT_RESIDUAL_DATA': 3, 'O.DATA_ACCESS': 11, 'O.FUNCTION_ACCESS': 4, 'O.SAFE_RELEASE': 11, 'O.CAPTURE': 2}, 'T': {'T.ABUSE_FUNCT': 3, 'T.CLONE': 3, 'T.FLASH_DUMP': 3, 'T.IMPERSONATION': 3, 'T.ROGUE_CODE_EXECUTION': 2, 'T.PERTURBATION': 3, 'T.RAM': 3, 'T.RNG': 3, 'T.SPY': 3, 'T.TEE_FIRMWARE_DOWNGRADE': 2, 'T.STORAGE_CORRUPTION': 3, 'T.ABUSE_DEBUG': 3, 'T.ROLLBACK': 3, 'T.TA_PERSISTENT_TIME_ROLLBACK': 2, 'T.SHARED_FUNCTION_ACCESS': 2, 'T.EXTRACT_EXCHANGED_DATA': 2, 'T.MODIFY_EXCHANGED_DATA': 2, 'T.INJECT_EXCHANGED_DATA': 2, 'T.MODIFY_FIRMWARE': 3, 'T.INJECT_DATA': 3, 'T.EXTRACT_DATA': 3, 'T.MODIFY_DATA': 3, 'T.RESIDUAL': 3, 'T.CORRUPT_RUNTIME_DATA': 2, 'T.CORRUPT_SETUP': 5, 'T.PERIPHERAL_ACCESS': 3, 'T.ROGUE_CODE_': 1, 'T.TEE_FIRMWARE_': 1, 'T.TA_PERSISTENT_TIME_': 1, 'T.SHARED_FUNCTION_': 1, 'T.EXTRACT_EXCHANGED_': 1, 'T.MODIFY_EXCHANGED_': 1, 'T.INJECT_EXCHANGED_': 1, 'T.CORRUPT_RUNTIME_': 1}, 'A': {'A.PROTECTION_AFTER_DELIVERY': 2, 'A.TA_MANAGEMENT': 5, 'A.TA_DEVELOPMENT': 4, 'A.ROLLBACK': 1, 'A.TA_DEVELOPMENT_TUI': 3, 'A.NO_RESIDUAL_DATA': 3, 'A.PROTECTION_AFTER_': 1}, 'OP': {'OP.USE_KEY': 4, 'OP.EXTRACT_KEY': 4, 'OP.LOAD': 3, 'OP.STORE': 4, 'OP.AUTHENTICATE': 2, 'OP.DEBUG': 7, 'OP.ACTIVATE': 1}, 'OE': {'OE.INTEGRATION_CONFIGURATION': 7, 'OE.SECRETS': 2, 'OE.PROTECTION_AFTER_DELIVERY': 7, 'OE.TA_MANAGEMENT': 3, 'OE.TA_DEVELOPMENT': 6, 'OE.ROLLBACK': 1, 'OE.DISABLED_DEBUG': 1, 'OE.NO_RESIDUAL_DATA': 2, 'OE.TA_DEVELOPMENT_TUI': 5}, 'OSP': {'OSP.INTEGRATION_CONFIGURATION': 2, 'OSP.SECRETS': 3, 'OSP.INTEGRATION_': 1}}, 'vendor': {'Samsung': {'Samsung': 140}, 'Thales': {'Thales': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}, 'DES': {'DES': {'DES': 7}, '3DES': {'3DES': 7}}, 'constructions': {'MAC': {'HMAC': 5, 'HMAC-SHA-224': 1, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 13}, 'EdDSA': {'EdDSA': 1}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 5}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1, 'SHA-1': 1}, 'SHA2': {'SHA-256': 2, 'SHA256': 2, 'SHA224': 1, 'SHA384': 1, 'SHA512': 1, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}, 'IPsec': {'IPsec': 2}, 'VPN': {'VPN': 2}}, 'randomness': {'TRNG': {'TRNG': 5}, 'PRNG': {'DRBG': 5}, 'RNG': {'RNG': 29}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CTR': {'CTR': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channels': 1}, 'other': {'cold boot': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'TrustZone': 2}, 'IBM': {'SE': 2}, 'other': {'TEEgris': 126, 'TEE': 594}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 197': 1, 'FIPS 46-3': 1, 'FIPS 81': 1, 'FIPS 186-2': 1, 'FIPS 186-4': 2, 'FIPS 140-2': 1}, 'PKCS': {'PKCS#1': 1}, 'RFC': {'RFC 2119': 3, 'RFC 1423': 1, 'RFC 4231': 1, 'RFC 2202': 1, 'RFC 7748': 1, 'RFC 8032': 1}}, 'javacard_version': {}, 'javacard_api_const': {'curves': {'ED25519': 4, 'X25519': 4}}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2023/71': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2014/01-M02': 1}}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'other': {'TEEgris': 1, 'TEE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2023_71fr.pdf
. - The st_filename property was set to
ANSSI-cible-CC-2023_71en.pdf
. - The cert_filename property was set to
Certificat-CC-2023_71fr.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2023/71
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Samsung TEEgris on Exynos 2200 Version 5.0.0.0', 'url': 'https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000', 'description': 'Le produit évalué est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » développé par Samsung Electronics Ltd., Co..\nCe produit, appelé également Samsung Secure OS, est l’implémentation de Samsung d’un TEE (Trusted Execution Environment), basé sur la technologie ARM Trust Zone.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'developer': 'Samsung Electronics Ltd., Co.', 'cert_id': 'ANSSI-CC-2023/71', 'level': 'EAL2+', 'expiration_date': '1 Février 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/71', 'certification_date': '01/02/2024', 'expiration_date': '01/02/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Samsung Electronics Ltd., Co.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': 'GlobalPlatform Technology TEE Protection Profile, réf. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'AVA_VAN_AP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf'}}
.
- The scheme_data property was set to
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Trusted Computing",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_71fr.pdf",
"dgst": "01cb0a033c2b1c55",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2023/71",
"cert_lab": null,
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0.0.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2023/71",
"description": "Le produit \u00e9valu\u00e9 est \u00ab Samsung TEEgris on Exynos 2200, Version 5.0.0.0 \u00bb d\u00e9velopp\u00e9 par Samsung Electronics Ltd., Co..\nCe produit, appel\u00e9 \u00e9galement Samsung Secure OS, est l\u2019impl\u00e9mentation de Samsung d\u2019un TEE (Trusted Execution Environment), bas\u00e9 sur la technologie ARM Trust Zone.",
"developer": "Samsung Electronics Ltd., Co.",
"enhanced": {
"augmented": "AVA_VAN_AP.3",
"category": "Divers",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2023/71",
"cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf",
"certification_date": "01/02/2024",
"developer": "Samsung Electronics Ltd., Co.",
"evaluation_facility": "THALES / CNES",
"expiration_date": "01/02/2029",
"level": "EAL2+",
"mutual_recognition": "CCRA\n SOG-IS",
"protection_profile": "GlobalPlatform Technology TEE Protection Profile, r\u00e9f. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02",
"report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf",
"sponsor": "Samsung Electronics Ltd., Co.",
"target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf"
},
"expiration_date": "1 F\u00e9vrier 2029",
"level": "EAL2+",
"product": "Samsung TEEgris on Exynos 2200 Version 5.0.0.0",
"sponsor": "Samsung Electronics Ltd., Co.",
"url": "https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Samsung Electronics Co., Ltd.",
"manufacturer_web": "https://www.samsung.com",
"name": "Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)",
"not_valid_after": "2029-02-01",
"not_valid_before": "2024-02-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "Certificat-CC-2023_71fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/71": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2014/01-M02": 1
}
},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"other": {
"TEE": 1,
"TEEgris": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20240215120518+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20240215120555+01\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 154878,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "ANSSI-CC-2023_71fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2023/71": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2014/01-M02": 2
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 3,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"ARM": {
"TrustZone": 1
},
"other": {
"TEE": 10,
"TEEgris": 12
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 19
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20240215115644+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/Keywords": "",
"/ModDate": "D:20240215120554+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"pdf_file_size_bytes": 427132,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"http://www.commoncriteriaportal.org/",
"https://semiconductor.samsung.com/us/processor/mobile-processor/",
"http://www.sogis.eu/",
"https://semiconductor.samsung.com/us/processor/showcase/smartphone",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "ANSSI-cible-CC-2023_71en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 13
},
"EdDSA": {
"EdDSA": 1
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 4
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_RESIDUAL_DATA": 3,
"A.PROTECTION_AFTER_": 1,
"A.PROTECTION_AFTER_DELIVERY": 2,
"A.ROLLBACK": 1,
"A.TA_DEVELOPMENT": 4,
"A.TA_DEVELOPMENT_TUI": 3,
"A.TA_MANAGEMENT": 5
},
"O": {
"O.CAPTURE": 2,
"O.CA_TA_IDENTIFICATION": 11,
"O.DATA_ACCESS": 11,
"O.DEBUG": 12,
"O.FUNCTION_ACCESS": 4,
"O.INITIALISATION": 10,
"O.INITIALIZATION": 1,
"O.INSTANCE_TIME": 11,
"O.KEYS_USAGE": 4,
"O.OPERATION": 8,
"O.PERIPHERAL_INITIALISATION": 3,
"O.PREVENT_RESIDUAL_DATA": 3,
"O.PROTECTED_COMMUNICATION_CHANNEL": 12,
"O.RNG": 12,
"O.ROLLBACK_PROTECTION": 5,
"O.RUNTIME_CONFIDENTIALITY": 10,
"O.RUNTIME_INTEGRITY": 21,
"O.SAFE_RELEASE": 11,
"O.TA_AUTHENTICITY": 7,
"O.TA_ISOLATION": 15,
"O.TA_PERSISTENT_TIME": 12,
"O.TEE_DATA_PROTECTION": 11,
"O.TEE_ID": 11,
"O.TEE_ISOLATION": 14,
"O.TRUSTED_STORAGE": 9
},
"OE": {
"OE.DISABLED_DEBUG": 1,
"OE.INTEGRATION_CONFIGURATION": 7,
"OE.NO_RESIDUAL_DATA": 2,
"OE.PROTECTION_AFTER_DELIVERY": 7,
"OE.ROLLBACK": 1,
"OE.SECRETS": 2,
"OE.TA_DEVELOPMENT": 6,
"OE.TA_DEVELOPMENT_TUI": 5,
"OE.TA_MANAGEMENT": 3
},
"OP": {
"OP.ACTIVATE": 1,
"OP.AUTHENTICATE": 2,
"OP.DEBUG": 7,
"OP.EXTRACT_KEY": 4,
"OP.LOAD": 3,
"OP.STORE": 4,
"OP.USE_KEY": 4
},
"OSP": {
"OSP.INTEGRATION_": 1,
"OSP.INTEGRATION_CONFIGURATION": 2,
"OSP.SECRETS": 3
},
"T": {
"T.ABUSE_DEBUG": 3,
"T.ABUSE_FUNCT": 3,
"T.CLONE": 3,
"T.CORRUPT_RUNTIME_": 1,
"T.CORRUPT_RUNTIME_DATA": 2,
"T.CORRUPT_SETUP": 5,
"T.EXTRACT_DATA": 3,
"T.EXTRACT_EXCHANGED_": 1,
"T.EXTRACT_EXCHANGED_DATA": 2,
"T.FLASH_DUMP": 3,
"T.IMPERSONATION": 3,
"T.INJECT_DATA": 3,
"T.INJECT_EXCHANGED_": 1,
"T.INJECT_EXCHANGED_DATA": 2,
"T.MODIFY_DATA": 3,
"T.MODIFY_EXCHANGED_": 1,
"T.MODIFY_EXCHANGED_DATA": 2,
"T.MODIFY_FIRMWARE": 3,
"T.PERIPHERAL_ACCESS": 3,
"T.PERTURBATION": 3,
"T.RAM": 3,
"T.RESIDUAL": 3,
"T.RNG": 3,
"T.ROGUE_CODE_": 1,
"T.ROGUE_CODE_EXECUTION": 2,
"T.ROLLBACK": 3,
"T.SHARED_FUNCTION_": 1,
"T.SHARED_FUNCTION_ACCESS": 2,
"T.SPY": 3,
"T.STORAGE_CORRUPTION": 3,
"T.TA_PERSISTENT_TIME_": 1,
"T.TA_PERSISTENT_TIME_ROLLBACK": 2,
"T.TEE_FIRMWARE_": 1,
"T.TEE_FIRMWARE_DOWNGRADE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 7,
"ADV_FSP.1": 3,
"ADV_FSP.2": 15,
"ADV_TDS.1": 10
},
"AGD": {
"AGD_OPE.1": 10,
"AGD_PRE.1": 9
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 4
},
"AVA": {
"AVA_VAN.2": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 6,
"EAL 2 augmented": 2,
"EAL 2+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 12,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 4,
"FAU_SAA.1": 2,
"FAU_SAR.1": 5,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 5,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCS": {
"FCS_CKM": 48,
"FCS_CKM.1": 17,
"FCS_CKM.2": 2,
"FCS_CKM.4": 23,
"FCS_COP": 68,
"FCS_COP.1": 14,
"FCS_RNG": 3,
"FCS_RNG.1": 10,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 40,
"FDP_ACC.1": 15,
"FDP_ACF": 35,
"FDP_ACF.1": 21,
"FDP_IFC": 13,
"FDP_IFC.1": 8,
"FDP_IFC.2": 2,
"FDP_IFF": 11,
"FDP_IFF.1": 8,
"FDP_ITC.1": 15,
"FDP_ITC.2": 15,
"FDP_ITT": 11,
"FDP_ITT.1": 4,
"FDP_RIP": 10,
"FDP_RIP.1": 2,
"FDP_ROL": 7,
"FDP_ROL.1": 2,
"FDP_SDI": 6,
"FDP_SDI.2": 15,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_TRP": 1
},
"FIA": {
"FIA_ATD": 7,
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_UAU": 12,
"FIA_UAU.2": 1,
"FIA_UAU.6": 2,
"FIA_UID": 8,
"FIA_UID.1": 3,
"FIA_UID.2": 8,
"FIA_UID.2.1": 1,
"FIA_USB": 6,
"FIA_USB.1": 9,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 55,
"FMT_MSA.1": 7,
"FMT_MSA.2": 1,
"FMT_MSA.3": 15,
"FMT_MTD": 5,
"FMT_MTD.1": 1,
"FMT_SMF": 5,
"FMT_SMF.1": 21,
"FMT_SMF.1.1": 1,
"FMT_SMR": 6,
"FMT_SMR.1": 24,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS": 12,
"FPT_FLS.1": 18,
"FPT_FLS.1.1": 1,
"FPT_INI": 4,
"FPT_INI.1": 14,
"FPT_INI.1.1": 2,
"FPT_INI.1.2": 2,
"FPT_INI.1.3": 2,
"FPT_INI.1.4": 1,
"FPT_ITT": 6,
"FPT_ITT.1": 2,
"FPT_STM": 10,
"FPT_STM.1": 2,
"FPT_TEE.1": 6,
"FPT_TEE.1.1": 1,
"FPT_TEE.1.2": 1
},
"FTP": {
"FTP_TPR": 1,
"FTP_TRP": 7,
"FTP_TRP.1": 3
}
},
"certification_process": {
"OutOfScope": {
"and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 2
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1,
"SHA1": 1
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 2,
"SHA-384": 1,
"SHA-512": 1,
"SHA224": 1,
"SHA256": 2,
"SHA384": 1,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"ED25519": 4,
"X25519": 4
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 5
},
"RNG": {
"RNG": 29
},
"TRNG": {
"TRNG": 5
}
},
"side_channel_analysis": {
"SCA": {
"side-channels": 1
},
"other": {
"cold boot": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 180-4": 1,
"FIPS 186-2": 1,
"FIPS 186-4": 2,
"FIPS 197": 1,
"FIPS 46-3": 1,
"FIPS 81": 1
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 1423": 1,
"RFC 2119": 3,
"RFC 2202": 1,
"RFC 4231": 1,
"RFC 7748": 1,
"RFC 8032": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11
}
},
"DES": {
"3DES": {
"3DES": 7
},
"DES": {
"DES": 7
}
},
"constructions": {
"MAC": {
"CMAC": 3,
"HMAC": 5,
"HMAC-SHA-224": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"ARM": {
"TrustZone": 2
},
"IBM": {
"SE": 2
},
"other": {
"TEE": 594,
"TEEgris": 126
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 140
},
"Thales": {
"Thales": 7
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "rosep",
"/CreationDate": "D:20240108141421+01\u002700\u0027",
"/ModDate": "D:20240108141421+01\u002700\u0027",
"/Producer": "Microsoft: Print To PDF",
"/Title": "Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx",
"pdf_file_size_bytes": 1813549,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 98
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bdc4ae02f7fe264ef28db9879f54f50e9405b087b868e71971b6daf1a2c3a509",
"txt_hash": "b19a9df8f1ca95c65efeef96f461d512501d96443dc5cdbac700ee32c09b4ca5"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2c613c0d2b9c0e06d38b41b98da13bae012de0200ef3f438d574970a0c3f3a13",
"txt_hash": "0b454786d28451a2c632cb8566953695867656ba000f3f87c39ac858713f2e46"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3335ea97556a238d5e10afb2b1f2be8a6062ca6d0713af20d650f2f213698809",
"txt_hash": "29d46bd6abb7d82fb0cfc4275921552246cefdff76653ae24402a00854962958"
}
},
"status": "active"
}