Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)

CSV information ?

Status active
Valid from 01.02.2024
Valid until 01.02.2029
Scheme 🇫🇷 FR
Manufacturer Samsung Electronics Co., Ltd.
Category Trusted Computing
Security level EAL2+

Heuristics summary ?

Certificate ID: ANSSI-CC-2023/71

Certificate ?

Extracted keywords

Trusted Execution Environments
TEEgris, TEE
Vendor
Samsung

Security level
EAL2
Protection profiles
ANSSI-CC-PP-2014/01-M02
Certificates
ANSSI-CC-2023/71

File metadata

Creation date D:20240215120518+01'00'
Modification date D:20240215120555+01'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Trusted Execution Environments
TrustZone, TEEgris, TEE
Vendor
Samsung

Security level
EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ALC_FLR
Protection profiles
ANSSI-CC-PP-2014/01-M02
Certificates
ANSSI-CC-2023/71

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20240215115644+01'00'
Modification date D:20240215120554+01'00'
Pages 15
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC, HMAC-SHA-224, HMAC-SHA-384, HMAC-SHA-512, CMAC
Asymmetric Algorithms
ECDH, ECDSA, EdDSA, Diffie-Hellman, DH, DSA
Hash functions
SHA1, SHA-1, SHA-256, SHA256, SHA224, SHA384, SHA512, SHA-224, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Protocols
SSL, TLS, IPsec, VPN
Randomness
TRNG, DRBG, RNG
Block cipher modes
ECB, CTR

JavaCard API constants
ED25519, X25519
Trusted Execution Environments
TrustZone, SE, TEEgris, TEE
Vendor
Samsung, Thales

Security level
EAL 2, EAL 2+, EAL 2 augmented
Claims
O.CA_TA_IDENTIFICATION, O.KEYS_USAGE, O.TEE_ID, O.INITIALISATION, O.INSTANCE_TIME, O.OPERATION, O.RNG, O.RUNTIME_CONFIDENTIALITY, O.RUNTIME_INTEGRITY, O.TA_AUTHENTICITY, O.TA_ISOLATION, O.TEE_DATA_PROTECTION, O.TEE_ISOLATION, O.TRUSTED_STORAGE, O.DEBUG, O.ROLLBACK_PROTECTION, O.TA_PERSISTENT_TIME, O.PERIPHERAL_INITIALISATION, O.INITIALIZATION, O.PROTECTED_COMMUNICATION_CHANNEL, O.PREVENT_RESIDUAL_DATA, O.DATA_ACCESS, O.FUNCTION_ACCESS, O.SAFE_RELEASE, O.CAPTURE, T.ABUSE_FUNCT, T.CLONE, T.FLASH_DUMP, T.IMPERSONATION, T.ROGUE_CODE_EXECUTION, T.PERTURBATION, T.RAM, T.RNG, T.SPY, T.TEE_FIRMWARE_DOWNGRADE, T.STORAGE_CORRUPTION, T.ABUSE_DEBUG, T.ROLLBACK, T.TA_PERSISTENT_TIME_ROLLBACK, T.SHARED_FUNCTION_ACCESS, T.EXTRACT_EXCHANGED_DATA, T.MODIFY_EXCHANGED_DATA, T.INJECT_EXCHANGED_DATA, T.MODIFY_FIRMWARE, T.INJECT_DATA, T.EXTRACT_DATA, T.MODIFY_DATA, T.RESIDUAL, T.CORRUPT_RUNTIME_DATA, T.CORRUPT_SETUP, T.PERIPHERAL_ACCESS, T.ROGUE_CODE_, T.TEE_FIRMWARE_, T.TA_PERSISTENT_TIME_, T.SHARED_FUNCTION_, T.EXTRACT_EXCHANGED_, T.MODIFY_EXCHANGED_, T.INJECT_EXCHANGED_, T.CORRUPT_RUNTIME_, A.PROTECTION_AFTER_DELIVERY, A.TA_MANAGEMENT, A.TA_DEVELOPMENT, A.ROLLBACK, A.TA_DEVELOPMENT_TUI, A.NO_RESIDUAL_DATA, A.PROTECTION_AFTER_, OP.USE_KEY, OP.EXTRACT_KEY, OP.LOAD, OP.STORE, OP.AUTHENTICATE, OP.DEBUG, OP.ACTIVATE, OE.INTEGRATION_CONFIGURATION, OE.SECRETS, OE.PROTECTION_AFTER_DELIVERY, OE.TA_MANAGEMENT, OE.TA_DEVELOPMENT, OE.ROLLBACK, OE.DISABLED_DEBUG, OE.NO_RESIDUAL_DATA, OE.TA_DEVELOPMENT_TUI, OSP.INTEGRATION_CONFIGURATION, OSP.SECRETS, OSP.INTEGRATION_
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.1, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_SAA.1, FAU_GEN.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.1, FCS_COP, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FDP_ITT.1, FDP_IFC, FDP_IFF, FDP_ITT, FDP_ACC, FDP_ACF, FDP_ROL, FDP_IFC.2, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ROL.1, FDP_SDI, FDP_TRP, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.2, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID, FIA_ATD, FIA_USB, FIA_UAU.6, FIA_UAU, FIA_UAU.2, FIA_UID.1, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_MSA.2, FPT_INI, FPT_INI.1, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_INI.1.4, FPT_FLS.1, FPT_ITT, FPT_ITT.1, FPT_FLS.1.1, FPT_TEE.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_STM, FPT_STM.1, FPT_FLS, FTP_TPR, FTP_TRP, FTP_TRP.1

Side-channel analysis
side-channels, cold boot
Certification process
out of scope, and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist

Standards
FIPS 180-4, FIPS 197, FIPS 46-3, FIPS 81, FIPS 186-2, FIPS 186-4, FIPS 140-2, PKCS#1, RFC 2119, RFC 1423, RFC 4231, RFC 2202, RFC 7748, RFC 8032

File metadata

Title Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx
Author rosep
Creation date D:20240108141421+01'00'
Modification date D:20240108141421+01'00'
Pages 98
Producer Microsoft: Print To PDF

Heuristics ?

Certificate ID: ANSSI-CC-2023/71

Extracted SARs

AVA_VAN.2, ASE_TSS.1, ASE_OBJ.2, ASE_CCL.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ALC_DEL.1, ATE_FUN.1, ASE_SPD.1, AGD_OPE.1, ADV_FSP.2, ATE_COV.1, ASE_ECD.1, ASE_REQ.2, ASE_INT.1, ADV_ARC.1, ALC_CMC.2

Similar certificates

Name Certificate ID
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) ANSSI-CC-2023/36 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) ANSSI-CC-2023/42 Compare
MultiApp V5.1 Java Card Virtual Machine Version 5.1 (ANSSI-CC-2023/45) ANSSI-CC-2023/45 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) ANSSI-CC-2023/55 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) ANSSI-CC-2023/30 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
Showing 5 out of 16.

Scheme data ?

Product Samsung TEEgris on Exynos 2200 Version 5.0.0.0
Url https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000
Description Le produit évalué est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » développé par Samsung Electronics Ltd., Co.. Ce produit, appelé également Samsung Secure OS, est l’implémentation de Samsung d’un TEE (Trusted Execution Environment), basé sur la technologie ARM Trust Zone.
Sponsor Samsung Electronics Ltd., Co.
Developer Samsung Electronics Ltd., Co.
Cert Id ANSSI-CC-2023/71
Level EAL2+
Expiration Date 1 FĂ©vrier 2029
Enhanced
Cert Id ANSSI-CC-2023/71
Certification Date 01/02/2024
Expiration Date 01/02/2029
Category Divers
Cc Version Critères Communs version 3.1r5
Developer Samsung Electronics Ltd., Co.
Sponsor Samsung Electronics Ltd., Co.
Evaluation Facility THALES / CNES
Level EAL2+
Protection Profile GlobalPlatform Technology TEE Protection Profile, réf. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02
Mutual Recognition CCRA SOG-IS
Augmented AVA_VAN_AP.3
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf
Target Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf

References ?

No references are available for this certificate.

Updates ?

  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Samsung TEEgris on Exynos 2200 Version 5.0.0.0', 'url': 'https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000', 'description': 'Le produit Ă©valuĂ© est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » dĂ©veloppĂ© par Samsung Electronics Ltd., Co..\nCe produit, appelĂ© Ă©galement Samsung Secure OS, est l’implĂ©mentation de Samsung d’un TEE (Trusted Execution Environment), basĂ© sur la technologie ARM Trust Zone.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'developer': 'Samsung Electronics Ltd., Co.', 'cert_id': 'ANSSI-CC-2023/71', 'level': 'EAL2+', 'expiration_date': '1 FĂ©vrier 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/71', 'certification_date': '01/02/2024', 'expiration_date': '01/02/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Samsung Electronics Ltd., Co.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': 'GlobalPlatform Technology TEE Protection Profile, rĂ©f. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'AVA_VAN_AP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2c613c0d2b9c0e06d38b41b98da13bae012de0200ef3f438d574970a0c3f3a13', 'txt_hash': '0b454786d28451a2c632cb8566953695867656ba000f3f87c39ac858713f2e46'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3335ea97556a238d5e10afb2b1f2be8a6062ca6d0713af20d650f2f213698809', 'txt_hash': '29d46bd6abb7d82fb0cfc4275921552246cefdff76653ae24402a00854962958'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bdc4ae02f7fe264ef28db9879f54f50e9405b087b868e71971b6daf1a2c3a509', 'txt_hash': 'b19a9df8f1ca95c65efeef96f461d512501d96443dc5cdbac700ee32c09b4ca5'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 427132, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/CreationDate': "D:20240215115644+01'00'", '/Creator': 'Microsoft® Word 2019', '/Keywords': '', '/ModDate': "D:20240215120554+01'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://semiconductor.samsung.com/us/processor/mobile-processor/', 'https://semiconductor.samsung.com/us/processor/showcase/smartphone', 'http://www.sogis.eu/', 'mailto:[email protected]', 'http://www.commoncriteriaportal.org/', 'http://www.ssi.gouv.fr/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1813549, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 98, '/Author': 'rosep', '/CreationDate': "D:20240108141421+01'00'", '/ModDate': "D:20240108141421+01'00'", '/Producer': 'Microsoft: Print To PDF', '/Title': 'Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 154878, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240215120518+01'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240215120555+01'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/71': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2014/01-M02': 2}}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 19}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'TrustZone': 1}, 'other': {'TEEgris': 12, 'TEE': 10}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 6, 'EAL 2+': 1, 'EAL 2 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 7, 'ADV_FSP.2': 15, 'ADV_TDS.1': 10, 'ADV_FSP.1': 3}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 9}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 4}, 'AVA': {'AVA_VAN.2': 7}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 12, 'FAU_ARP.1.1': 1, 'FAU_SAR.1': 5, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1': 5, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAA.1': 2, 'FAU_GEN.1': 4}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 10, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 48, 'FCS_CKM.1': 17, 'FCS_COP': 68, 'FCS_CKM.4': 23, 'FCS_COP.1': 14, 'FCS_CKM.2': 2}, 'FDP': {'FDP_ITT.1': 4, 'FDP_IFC': 13, 'FDP_IFF': 11, 'FDP_ITT': 11, 'FDP_ACC': 40, 'FDP_ACF': 35, 'FDP_ROL': 7, 'FDP_IFC.2': 2, 'FDP_IFF.1': 8, 'FDP_RIP': 10, 'FDP_RIP.1': 2, 'FDP_ACC.1': 15, 'FDP_ACF.1': 21, 'FDP_SDI.2': 15, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ROL.1': 2, 'FDP_SDI': 6, 'FDP_TRP': 1, 'FDP_IFC.1': 8, 'FDP_ITC.1': 15, 'FDP_ITC.2': 15}, 'FIA': {'FIA_ATD.1': 10, 'FIA_ATD.1.1': 1, 'FIA_UID.2': 8, 'FIA_UID.2.1': 1, 'FIA_USB.1': 9, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID': 8, 'FIA_ATD': 7, 'FIA_USB': 6, 'FIA_UAU.6': 2, 'FIA_UAU': 12, 'FIA_UAU.2': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MSA': 55, 'FMT_SMF.1': 21, 'FMT_SMR.1': 24, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 7, 'FMT_MSA.3': 15, 'FMT_SMF.1.1': 1, 'FMT_SMR': 6, 'FMT_MTD': 5, 'FMT_MTD.1': 1, 'FMT_SMF': 5, 'FMT_MSA.2': 1}, 'FPT': {'FPT_INI': 4, 'FPT_INI.1': 14, 'FPT_INI.1.1': 2, 'FPT_INI.1.2': 2, 'FPT_INI.1.3': 2, 'FPT_INI.1.4': 1, 'FPT_FLS.1': 18, 'FPT_ITT': 6, 'FPT_ITT.1': 2, 'FPT_FLS.1.1': 1, 'FPT_TEE.1': 6, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_STM': 10, 'FPT_STM.1': 2, 'FPT_FLS': 12}, 'FTP': {'FTP_TPR': 1, 'FTP_TRP': 7, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.CA_TA_IDENTIFICATION': 11, 'O.KEYS_USAGE': 4, 'O.TEE_ID': 11, 'O.INITIALISATION': 10, 'O.INSTANCE_TIME': 11, 'O.OPERATION': 8, 'O.RNG': 12, 'O.RUNTIME_CONFIDENTIALITY': 10, 'O.RUNTIME_INTEGRITY': 21, 'O.TA_AUTHENTICITY': 7, 'O.TA_ISOLATION': 15, 'O.TEE_DATA_PROTECTION': 11, 'O.TEE_ISOLATION': 14, 'O.TRUSTED_STORAGE': 9, 'O.DEBUG': 12, 'O.ROLLBACK_PROTECTION': 5, 'O.TA_PERSISTENT_TIME': 12, 'O.PERIPHERAL_INITIALISATION': 3, 'O.INITIALIZATION': 1, 'O.PROTECTED_COMMUNICATION_CHANNEL': 12, 'O.PREVENT_RESIDUAL_DATA': 3, 'O.DATA_ACCESS': 11, 'O.FUNCTION_ACCESS': 4, 'O.SAFE_RELEASE': 11, 'O.CAPTURE': 2}, 'T': {'T.ABUSE_FUNCT': 3, 'T.CLONE': 3, 'T.FLASH_DUMP': 3, 'T.IMPERSONATION': 3, 'T.ROGUE_CODE_EXECUTION': 2, 'T.PERTURBATION': 3, 'T.RAM': 3, 'T.RNG': 3, 'T.SPY': 3, 'T.TEE_FIRMWARE_DOWNGRADE': 2, 'T.STORAGE_CORRUPTION': 3, 'T.ABUSE_DEBUG': 3, 'T.ROLLBACK': 3, 'T.TA_PERSISTENT_TIME_ROLLBACK': 2, 'T.SHARED_FUNCTION_ACCESS': 2, 'T.EXTRACT_EXCHANGED_DATA': 2, 'T.MODIFY_EXCHANGED_DATA': 2, 'T.INJECT_EXCHANGED_DATA': 2, 'T.MODIFY_FIRMWARE': 3, 'T.INJECT_DATA': 3, 'T.EXTRACT_DATA': 3, 'T.MODIFY_DATA': 3, 'T.RESIDUAL': 3, 'T.CORRUPT_RUNTIME_DATA': 2, 'T.CORRUPT_SETUP': 5, 'T.PERIPHERAL_ACCESS': 3, 'T.ROGUE_CODE_': 1, 'T.TEE_FIRMWARE_': 1, 'T.TA_PERSISTENT_TIME_': 1, 'T.SHARED_FUNCTION_': 1, 'T.EXTRACT_EXCHANGED_': 1, 'T.MODIFY_EXCHANGED_': 1, 'T.INJECT_EXCHANGED_': 1, 'T.CORRUPT_RUNTIME_': 1}, 'A': {'A.PROTECTION_AFTER_DELIVERY': 2, 'A.TA_MANAGEMENT': 5, 'A.TA_DEVELOPMENT': 4, 'A.ROLLBACK': 1, 'A.TA_DEVELOPMENT_TUI': 3, 'A.NO_RESIDUAL_DATA': 3, 'A.PROTECTION_AFTER_': 1}, 'OP': {'OP.USE_KEY': 4, 'OP.EXTRACT_KEY': 4, 'OP.LOAD': 3, 'OP.STORE': 4, 'OP.AUTHENTICATE': 2, 'OP.DEBUG': 7, 'OP.ACTIVATE': 1}, 'OE': {'OE.INTEGRATION_CONFIGURATION': 7, 'OE.SECRETS': 2, 'OE.PROTECTION_AFTER_DELIVERY': 7, 'OE.TA_MANAGEMENT': 3, 'OE.TA_DEVELOPMENT': 6, 'OE.ROLLBACK': 1, 'OE.DISABLED_DEBUG': 1, 'OE.NO_RESIDUAL_DATA': 2, 'OE.TA_DEVELOPMENT_TUI': 5}, 'OSP': {'OSP.INTEGRATION_CONFIGURATION': 2, 'OSP.SECRETS': 3, 'OSP.INTEGRATION_': 1}}, 'vendor': {'Samsung': {'Samsung': 140}, 'Thales': {'Thales': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}, 'DES': {'DES': {'DES': 7}, '3DES': {'3DES': 7}}, 'constructions': {'MAC': {'HMAC': 5, 'HMAC-SHA-224': 1, 'HMAC-SHA-384': 1, 'HMAC-SHA-512': 1, 'CMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 13}, 'EdDSA': {'EdDSA': 1}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 5}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1, 'SHA-1': 1}, 'SHA2': {'SHA-256': 2, 'SHA256': 2, 'SHA224': 1, 'SHA384': 1, 'SHA512': 1, 'SHA-224': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}, 'IPsec': {'IPsec': 2}, 'VPN': {'VPN': 2}}, 'randomness': {'TRNG': {'TRNG': 5}, 'PRNG': {'DRBG': 5}, 'RNG': {'RNG': 29}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CTR': {'CTR': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channels': 1}, 'other': {'cold boot': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'TrustZone': 2}, 'IBM': {'SE': 2}, 'other': {'TEEgris': 126, 'TEE': 594}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 197': 1, 'FIPS 46-3': 1, 'FIPS 81': 1, 'FIPS 186-2': 1, 'FIPS 186-4': 2, 'FIPS 140-2': 1}, 'PKCS': {'PKCS#1': 1}, 'RFC': {'RFC 2119': 3, 'RFC 1423': 1, 'RFC 4231': 1, 'RFC 2202': 1, 'RFC 7748': 1, 'RFC 8032': 1}}, 'javacard_version': {}, 'javacard_api_const': {'curves': {'ED25519': 4, 'X25519': 4}}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2023/71': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2014/01-M02': 1}}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'other': {'TEEgris': 1, 'TEE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2023_71fr.pdf.
    • The st_filename property was set to ANSSI-cible-CC-2023_71en.pdf.
    • The cert_filename property was set to Certificat-CC-2023_71fr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2023/71.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Samsung TEEgris on Exynos 2200 Version 5.0.0.0', 'url': 'https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000', 'description': 'Le produit Ă©valuĂ© est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » dĂ©veloppĂ© par Samsung Electronics Ltd., Co..\nCe produit, appelĂ© Ă©galement Samsung Secure OS, est l’implĂ©mentation de Samsung d’un TEE (Trusted Execution Environment), basĂ© sur la technologie ARM Trust Zone.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'developer': 'Samsung Electronics Ltd., Co.', 'cert_id': 'ANSSI-CC-2023/71', 'level': 'EAL2+', 'expiration_date': '1 FĂ©vrier 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2023/71', 'certification_date': '01/02/2024', 'expiration_date': '01/02/2029', 'category': 'Divers', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'Samsung Electronics Ltd., Co.', 'sponsor': 'Samsung Electronics Ltd., Co.', 'evaluation_facility': 'THALES / CNES', 'level': 'EAL2+', 'protection_profile': 'GlobalPlatform Technology TEE Protection Profile, rĂ©f. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'AVA_VAN_AP.3', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Trusted Computing",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_71fr.pdf",
  "dgst": "01cb0a033c2b1c55",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2023/71",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0.0.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2023/71",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab Samsung TEEgris on Exynos 2200, Version 5.0.0.0 \u00bb d\u00e9velopp\u00e9 par Samsung Electronics Ltd., Co..\nCe produit, appel\u00e9 \u00e9galement Samsung Secure OS, est l\u2019impl\u00e9mentation de Samsung d\u2019un TEE (Trusted Execution Environment), bas\u00e9 sur la technologie ARM Trust Zone.",
      "developer": "Samsung Electronics Ltd., Co.",
      "enhanced": {
        "augmented": "AVA_VAN_AP.3",
        "category": "Divers",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2023/71",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf",
        "certification_date": "01/02/2024",
        "developer": "Samsung Electronics Ltd., Co.",
        "evaluation_facility": "THALES / CNES",
        "expiration_date": "01/02/2029",
        "level": "EAL2+",
        "mutual_recognition": "CCRA\n                          SOG-IS",
        "protection_profile": "GlobalPlatform Technology TEE Protection Profile, r\u00e9f. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf",
        "sponsor": "Samsung Electronics Ltd., Co.",
        "target_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf"
      },
      "expiration_date": "1 F\u00e9vrier 2029",
      "level": "EAL2+",
      "product": "Samsung TEEgris on Exynos 2200 Version 5.0.0.0",
      "sponsor": "Samsung Electronics Ltd., Co.",
      "url": "https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Samsung Electronics Co., Ltd.",
  "manufacturer_web": "https://www.samsung.com",
  "name": "Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)",
  "not_valid_after": "2029-02-01",
  "not_valid_before": "2024-02-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2023_71fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/71": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2014/01-M02": 1
        }
      },
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "other": {
          "TEE": 1,
          "TEEgris": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240215120518+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240215120555+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 154878,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2023_71fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/71": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "ANSSI": {
          "ANSSI-CC-PP-2014/01-M02": 2
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 3,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "TrustZone": 1
        },
        "other": {
          "TEE": 10,
          "TEEgris": 12
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 19
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240215115644+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "",
      "/ModDate": "D:20240215120554+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 427132,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.ssi.gouv.fr/",
          "http://www.commoncriteriaportal.org/",
          "https://semiconductor.samsung.com/us/processor/mobile-processor/",
          "http://www.sogis.eu/",
          "https://semiconductor.samsung.com/us/processor/showcase/smartphone",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "ANSSI-cible-CC-2023_71en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 13
          },
          "EdDSA": {
            "EdDSA": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 5,
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 4
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_RESIDUAL_DATA": 3,
          "A.PROTECTION_AFTER_": 1,
          "A.PROTECTION_AFTER_DELIVERY": 2,
          "A.ROLLBACK": 1,
          "A.TA_DEVELOPMENT": 4,
          "A.TA_DEVELOPMENT_TUI": 3,
          "A.TA_MANAGEMENT": 5
        },
        "O": {
          "O.CAPTURE": 2,
          "O.CA_TA_IDENTIFICATION": 11,
          "O.DATA_ACCESS": 11,
          "O.DEBUG": 12,
          "O.FUNCTION_ACCESS": 4,
          "O.INITIALISATION": 10,
          "O.INITIALIZATION": 1,
          "O.INSTANCE_TIME": 11,
          "O.KEYS_USAGE": 4,
          "O.OPERATION": 8,
          "O.PERIPHERAL_INITIALISATION": 3,
          "O.PREVENT_RESIDUAL_DATA": 3,
          "O.PROTECTED_COMMUNICATION_CHANNEL": 12,
          "O.RNG": 12,
          "O.ROLLBACK_PROTECTION": 5,
          "O.RUNTIME_CONFIDENTIALITY": 10,
          "O.RUNTIME_INTEGRITY": 21,
          "O.SAFE_RELEASE": 11,
          "O.TA_AUTHENTICITY": 7,
          "O.TA_ISOLATION": 15,
          "O.TA_PERSISTENT_TIME": 12,
          "O.TEE_DATA_PROTECTION": 11,
          "O.TEE_ID": 11,
          "O.TEE_ISOLATION": 14,
          "O.TRUSTED_STORAGE": 9
        },
        "OE": {
          "OE.DISABLED_DEBUG": 1,
          "OE.INTEGRATION_CONFIGURATION": 7,
          "OE.NO_RESIDUAL_DATA": 2,
          "OE.PROTECTION_AFTER_DELIVERY": 7,
          "OE.ROLLBACK": 1,
          "OE.SECRETS": 2,
          "OE.TA_DEVELOPMENT": 6,
          "OE.TA_DEVELOPMENT_TUI": 5,
          "OE.TA_MANAGEMENT": 3
        },
        "OP": {
          "OP.ACTIVATE": 1,
          "OP.AUTHENTICATE": 2,
          "OP.DEBUG": 7,
          "OP.EXTRACT_KEY": 4,
          "OP.LOAD": 3,
          "OP.STORE": 4,
          "OP.USE_KEY": 4
        },
        "OSP": {
          "OSP.INTEGRATION_": 1,
          "OSP.INTEGRATION_CONFIGURATION": 2,
          "OSP.SECRETS": 3
        },
        "T": {
          "T.ABUSE_DEBUG": 3,
          "T.ABUSE_FUNCT": 3,
          "T.CLONE": 3,
          "T.CORRUPT_RUNTIME_": 1,
          "T.CORRUPT_RUNTIME_DATA": 2,
          "T.CORRUPT_SETUP": 5,
          "T.EXTRACT_DATA": 3,
          "T.EXTRACT_EXCHANGED_": 1,
          "T.EXTRACT_EXCHANGED_DATA": 2,
          "T.FLASH_DUMP": 3,
          "T.IMPERSONATION": 3,
          "T.INJECT_DATA": 3,
          "T.INJECT_EXCHANGED_": 1,
          "T.INJECT_EXCHANGED_DATA": 2,
          "T.MODIFY_DATA": 3,
          "T.MODIFY_EXCHANGED_": 1,
          "T.MODIFY_EXCHANGED_DATA": 2,
          "T.MODIFY_FIRMWARE": 3,
          "T.PERIPHERAL_ACCESS": 3,
          "T.PERTURBATION": 3,
          "T.RAM": 3,
          "T.RESIDUAL": 3,
          "T.RNG": 3,
          "T.ROGUE_CODE_": 1,
          "T.ROGUE_CODE_EXECUTION": 2,
          "T.ROLLBACK": 3,
          "T.SHARED_FUNCTION_": 1,
          "T.SHARED_FUNCTION_ACCESS": 2,
          "T.SPY": 3,
          "T.STORAGE_CORRUPTION": 3,
          "T.TA_PERSISTENT_TIME_": 1,
          "T.TA_PERSISTENT_TIME_ROLLBACK": 2,
          "T.TEE_FIRMWARE_": 1,
          "T.TEE_FIRMWARE_DOWNGRADE": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 7,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 15,
          "ADV_TDS.1": 10
        },
        "AGD": {
          "AGD_OPE.1": 10,
          "AGD_PRE.1": 9
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 5,
          "ATE_FUN.1": 4
        },
        "AVA": {
          "AVA_VAN.2": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 6,
          "EAL 2 augmented": 2,
          "EAL 2+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 12,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 4,
          "FAU_SAA.1": 2,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_CKM": 48,
          "FCS_CKM.1": 17,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 23,
          "FCS_COP": 68,
          "FCS_COP.1": 14,
          "FCS_RNG": 3,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 40,
          "FDP_ACC.1": 15,
          "FDP_ACF": 35,
          "FDP_ACF.1": 21,
          "FDP_IFC": 13,
          "FDP_IFC.1": 8,
          "FDP_IFC.2": 2,
          "FDP_IFF": 11,
          "FDP_IFF.1": 8,
          "FDP_ITC.1": 15,
          "FDP_ITC.2": 15,
          "FDP_ITT": 11,
          "FDP_ITT.1": 4,
          "FDP_RIP": 10,
          "FDP_RIP.1": 2,
          "FDP_ROL": 7,
          "FDP_ROL.1": 2,
          "FDP_SDI": 6,
          "FDP_SDI.2": 15,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_TRP": 1
        },
        "FIA": {
          "FIA_ATD": 7,
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 12,
          "FIA_UAU.2": 1,
          "FIA_UAU.6": 2,
          "FIA_UID": 8,
          "FIA_UID.1": 3,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1,
          "FIA_USB": 6,
          "FIA_USB.1": 9,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA": 55,
          "FMT_MSA.1": 7,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 15,
          "FMT_MTD": 5,
          "FMT_MTD.1": 1,
          "FMT_SMF": 5,
          "FMT_SMF.1": 21,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 6,
          "FMT_SMR.1": 24,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS": 12,
          "FPT_FLS.1": 18,
          "FPT_FLS.1.1": 1,
          "FPT_INI": 4,
          "FPT_INI.1": 14,
          "FPT_INI.1.1": 2,
          "FPT_INI.1.2": 2,
          "FPT_INI.1.3": 2,
          "FPT_INI.1.4": 1,
          "FPT_ITT": 6,
          "FPT_ITT.1": 2,
          "FPT_STM": 10,
          "FPT_STM.1": 2,
          "FPT_TEE.1": 6,
          "FPT_TEE.1.1": 1,
          "FPT_TEE.1.2": 1
        },
        "FTP": {
          "FTP_TPR": 1,
          "FTP_TRP": 7,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 2
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 2,
            "SHA-384": 1,
            "SHA-512": 1,
            "SHA224": 1,
            "SHA256": 2,
            "SHA384": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "ED25519": 4,
          "X25519": 4
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 5
        },
        "RNG": {
          "RNG": 29
        },
        "TRNG": {
          "TRNG": 5
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "side-channels": 1
        },
        "other": {
          "cold boot": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-4": 1,
          "FIPS 186-2": 1,
          "FIPS 186-4": 2,
          "FIPS 197": 1,
          "FIPS 46-3": 1,
          "FIPS 81": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 1423": 1,
          "RFC 2119": 3,
          "RFC 2202": 1,
          "RFC 4231": 1,
          "RFC 7748": 1,
          "RFC 8032": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11
          }
        },
        "DES": {
          "3DES": {
            "3DES": 7
          },
          "DES": {
            "DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 3,
            "HMAC": 5,
            "HMAC-SHA-224": 1,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "TrustZone": 2
        },
        "IBM": {
          "SE": 2
        },
        "other": {
          "TEE": 594,
          "TEEgris": 126
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 140
        },
        "Thales": {
          "Thales": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "rosep",
      "/CreationDate": "D:20240108141421+01\u002700\u0027",
      "/ModDate": "D:20240108141421+01\u002700\u0027",
      "/Producer": "Microsoft: Print To PDF",
      "/Title": "Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx",
      "pdf_file_size_bytes": 1813549,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 98
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bdc4ae02f7fe264ef28db9879f54f50e9405b087b868e71971b6daf1a2c3a509",
      "txt_hash": "b19a9df8f1ca95c65efeef96f461d512501d96443dc5cdbac700ee32c09b4ca5"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2c613c0d2b9c0e06d38b41b98da13bae012de0200ef3f438d574970a0c3f3a13",
      "txt_hash": "0b454786d28451a2c632cb8566953695867656ba000f3f87c39ac858713f2e46"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3335ea97556a238d5e10afb2b1f2be8a6062ca6d0713af20d650f2f213698809",
      "txt_hash": "29d46bd6abb7d82fb0cfc4275921552246cefdff76653ae24402a00854962958"
    }
  },
  "status": "active"
}