This page was not yet optimized for use on mobile devices.
MCU Root of Trust Protection Profile (GPT_SPE_146, version 1.0)
Web information
Status: activeCertification date: 2023-03-01
Scheme: 🇫🇷
Category: Trusted Computing
Security level: ALC_FLR.3, ADV_FSP.3, EAL2+
Certification report
certification report file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Symmetric Algorithms
DESTrusted Execution Environments
TEESecurity level
EAL 2Security Assurance Requirements (SAR)
ACE_CCL.1, ACE_ECD.1, ACE_INT.1, ACE_OBJ.1, ACE_REQ.1, ACE_SPD.1, ACE_MCO.1, ACE_CCO.1, ALC_FLR.2, AVA_VAN.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAR.1, FAU_STG.1, FCO_NRO.1, FCS_RNG.1, FCS_COP.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ITT.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FPT_INI.1, FPT_FLS.1, FPT_STM.1, FPT_TEE.1, FTP_ITT.1Protection profiles
ANSSI-CC-PP-2023/01Certificates
ANSSI-CC-PP-2023/01Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Profile
protection profile file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
RSA 2048Hash functions
SHA-256Randomness
RNGTrusted Execution Environments
TrustZone, SE, TEESecurity level
EAL 2+, EAL 2, EAL 2 augmentedClaims
O.AROT_AUTHENTICITY, O.ATTESTATION, O.CA_AROT_IDENTIFICATION, O.INITIALISATION, O.INSTANCE_TIME, O.KEYS_USAGE, O.MCU_ROT_DATA_PROTECTION, O.MCU_ROT_ID, O.MCU_ROT_ISOLATION, O.OPERATION, O.RNG, O.ROLLBACK_PROTECTION, O.RUNTIME_INTEGRITY, O.TRUSTED_STORAGE, O.RUNTIME_CONFIDENTIALITY, O.MCU_ROT_DATA_PROTECTI, O.AROT_PERSISTENT_TIME, O.DEBUG, O.AROT_ISOLATION, T.ABUSE_DEBUG, T.ABUSE_FUNCT, T.CLONE, T.FLASH_DUMP, T.IMPERSONATION, T.MCU_ROT_FIRMWARE_DOWNGRADE, T.PERTURBATION, T.RAM, T.RNG, T.ROGUE_CODE_EXECUTION, T.ROLLBACK, T.SPY, T.STORAGE_CORRUPTION, T.AROT_PERSISTENT_TIME, T.ABUSE_AROT, T.MCU_ROT_FIRMWARE_DOWNGR, A.AROT_DEVELOPMENT, A.PROTECTION_AFTER_DELIVERY, OP.USE_KEY, OP.EXTRACT_KEY, OP.LOAD, OP.STORE, OP.AUTHENTICATE, OP.DEBUG, OE.AROT_DEVELOPMENT, OE.DISABLED_DEBUG, OE.INTEGRATION_CONFIGURATION, OE.PROTECTION_AFTER_DELIVERY, OE.SECRETS, OE.UNIQUE_MCU_ROT_ID, OSP.CRYPTO_API, OSP.INTEGRATION_CONFIGURATION, OSP.SECRETS, OSP.UNIQUE_MCU_ROT_IDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAR.1, FAU_STG.1, FAU_ARP.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_SAA.1, FAU_GEN.1, FCO_NRO, FCO_NRO.1, FCS_RNG, FCS_COP, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FDP_IFC, FDP_IFF, FDP_ITT, FDP_RIP, FDP_ACC, FDP_ACF, FDP_SDI.2, FDP_ROL, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ITT.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_ATD.1, FIA_UID.2, FIA_USB.1, FIA_ATD, FIA_UID, FIA_USB, FIA_ATD.1.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UAU.2, FIA_UAU.6, FIA_UAU, FIA_UID.1, FMT_SMR.1, FMT_MSA, FMT_SMF.1, FMT_MTD, FMT_SMF, FMT_SMR, FMT_MSA.1, FMT_MSA.3, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MTD.1, FPT_INI, FPT_ITT, FPT_FLS.1, FPT_INI.1, FPT_TEE.1, FPT_STM, FPT_INI.1.1, FPT_INI.1.2, FPT_INI.1.3, FPT_INI.1.4, FPT_ITT.1, FPT_STM.1, FPT_FLS.1.1, FPT_TEE.1.1, FPT_TEE.1.2Side-channel analysis
side-channels, fault injectionCertification process
out of scope, 2.2.1 and 2.2.2 respectively. The security functionality provided by the Application RoTs is out of scope of the TOE. MCU Root of Trust Protection Profile – Public Release v1.0 19 /93 Copyright Ó, apply to the TOE operational environment and its actors. Note that the operational environment is out of scope of the evaluation. 4.5.1 Core MCU RoT PP The assumptions applicable to the core MCU RoT PP are the, policies that apply to the environment. Application Note: • The TOE operational environment is out of scope of the evaluation. The security guidelines must include recommendations to cover all the TOEStandards
FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-4, AIS 31, AIS31, RFC 2119, RFC 4122, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004References
No references are available for this protection profile.
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-PP-2023/01': 2}}, 'cc_protection_profile_id': {'ANSSI': {'ANSSI-CC-PP-2023/01': 2}}, 'cc_security_level': {'EAL': {'EAL 2': 3}}, 'cc_sar': {'ACE': {'ACE_CCL.1': 1, 'ACE_ECD.1': 1, 'ACE_INT.1': 1, 'ACE_OBJ.1': 1, 'ACE_REQ.1': 1, 'ACE_SPD.1': 1, 'ACE_MCO.1': 1, 'ACE_CCO.1': 1}, 'ALC': {'ALC_FLR.2': 3}, 'AVA': {'AVA_VAN.2': 1}, 'APE': {'APE_CCL.1': 1, 'APE_ECD.1': 1, 'APE_INT.1': 1, 'APE_OBJ.2': 1, 'APE_REQ.2': 1, 'APE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1, 'FAU_SAR.1': 1, 'FAU_STG.1': 1}, 'FCO': {'FCO_NRO.1': 1}, 'FCS': {'FCS_RNG.1': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_IFC.2': 1, 'FDP_IFF.1': 1, 'FDP_ITT.1': 1, 'FDP_RIP.1': 1, 'FDP_ROL.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_ATD.1': 1, 'FIA_UID.2': 1, 'FIA_USB.1': 1}, 'FMT': {'FMT_MSA.1': 1, 'FMT_MSA.3': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_INI.1': 1, 'FPT_FLS.1': 1, 'FPT_STM.1': 1, 'FPT_TEE.1': 1}, 'FTP': {'FTP_ITT.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'other': {'TEE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2+': 1, 'EAL 2': 8, 'EAL 2 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.2': 13, 'ADV_TDS.1': 8, 'ADV_FSP.1': 3}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.2': 4, 'ALC_CMC.2': 1, 'ALC_CMS.2': 2, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 5, 'ATE_FUN.1': 3}, 'AVA': {'AVA_VAN.2': 6}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 4, 'ASE_REQ.1': 2, 'ASE_REQ.2': 1, 'ASE_OBJ.2': 2, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 9, 'FAU_SAR.1': 8, 'FAU_STG.1': 7, 'FAU_ARP.1.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAA.1': 2, 'FAU_GEN.1': 4}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.1': 4}, 'FCS': {'FCS_RNG': 3, 'FCS_COP': 42, 'FCS_RNG.1': 13, 'FCS_RNG.1.1': 3, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 5, 'FCS_CKM.1': 7, 'FCS_CKM.4': 6}, 'FDP': {'FDP_IFC': 18, 'FDP_IFF': 24, 'FDP_ITT': 15, 'FDP_RIP': 6, 'FDP_ACC': 36, 'FDP_ACF': 35, 'FDP_SDI.2': 17, 'FDP_ROL': 7, 'FDP_ACC.1': 13, 'FDP_ACF.1': 17, 'FDP_IFC.2': 3, 'FDP_IFF.1': 20, 'FDP_ITT.1': 4, 'FDP_RIP.1': 2, 'FDP_ROL.1': 3, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_IFC.1': 7}, 'FIA': {'FIA_ATD.1': 14, 'FIA_UID.2': 11, 'FIA_USB.1': 15, 'FIA_ATD': 9, 'FIA_UID': 10, 'FIA_USB': 8, 'FIA_ATD.1.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UAU.2': 1, 'FIA_UAU.6': 2, 'FIA_UAU': 12, 'FIA_UID.1': 4}, 'FMT': {'FMT_SMR.1': 21, 'FMT_MSA': 44, 'FMT_SMF.1': 22, 'FMT_MTD': 6, 'FMT_SMF': 7, 'FMT_SMR': 8, 'FMT_MSA.1': 6, 'FMT_MSA.3': 14, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 2}, 'FPT': {'FPT_INI': 3, 'FPT_ITT': 10, 'FPT_FLS.1': 17, 'FPT_INI.1': 13, 'FPT_TEE.1': 7, 'FPT_STM': 12, 'FPT_INI.1.1': 3, 'FPT_INI.1.2': 3, 'FPT_INI.1.3': 2, 'FPT_INI.1.4': 2, 'FPT_ITT.1': 2, 'FPT_STM.1': 4, 'FPT_FLS.1.1': 1, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1}}, 'cc_claims': {'O': {'O.AROT_AUTHENTICITY': 17, 'O.ATTESTATION': 8, 'O.CA_AROT_IDENTIFICATION': 10, 'O.INITIALISATION': 20, 'O.INSTANCE_TIME': 8, 'O.KEYS_USAGE': 14, 'O.MCU_ROT_DATA_PROTECTION': 15, 'O.MCU_ROT_ID': 9, 'O.MCU_ROT_ISOLATION': 14, 'O.OPERATION': 15, 'O.RNG': 8, 'O.ROLLBACK_PROTECTION': 10, 'O.RUNTIME_INTEGRITY': 17, 'O.TRUSTED_STORAGE': 21, 'O.RUNTIME_CONFIDENTIALITY': 21, 'O.MCU_ROT_DATA_PROTECTI': 2, 'O.AROT_PERSISTENT_TIME': 12, 'O.DEBUG': 17, 'O.AROT_ISOLATION': 22}, 'T': {'T.ABUSE_DEBUG': 6, 'T.ABUSE_FUNCT': 12, 'T.CLONE': 8, 'T.FLASH_DUMP': 3, 'T.IMPERSONATION': 5, 'T.MCU_ROT_FIRMWARE_DOWNGRADE': 5, 'T.PERTURBATION': 7, 'T.RAM': 7, 'T.RNG': 4, 'T.ROGUE_CODE_EXECUTION': 7, 'T.ROLLBACK': 4, 'T.SPY': 4, 'T.STORAGE_CORRUPTION': 6, 'T.AROT_PERSISTENT_TIME': 4, 'T.ABUSE_AROT': 4, 'T.MCU_ROT_FIRMWARE_DOWNGR': 1}, 'A': {'A.AROT_DEVELOPMENT': 4, 'A.PROTECTION_AFTER_DELIVERY': 4}, 'OP': {'OP.USE_KEY': 4, 'OP.EXTRACT_KEY': 4, 'OP.LOAD': 3, 'OP.STORE': 4, 'OP.AUTHENTICATE': 3, 'OP.DEBUG': 3}, 'OE': {'OE.AROT_DEVELOPMENT': 8, 'OE.DISABLED_DEBUG': 6, 'OE.INTEGRATION_CONFIGURATION': 10, 'OE.PROTECTION_AFTER_DELIVERY': 7, 'OE.SECRETS': 5, 'OE.UNIQUE_MCU_ROT_ID': 6}, 'OSP': {'OSP.CRYPTO_API': 2, 'OSP.INTEGRATION_CONFIGURATION': 5, 'OSP.SECRETS': 5, 'OSP.UNIQUE_MCU_ROT_ID': 4}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 30}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channels': 1}, 'FI': {'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'TrustZone': 1}, 'IBM': {'SE': 1}, 'other': {'TEE': 7}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1, 'FIPS PUB 180-4': 1}, 'BSI': {'AIS 31': 1, 'AIS31': 3}, 'RFC': {'RFC 2119': 3, 'RFC 4122': 3}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 3, '2.2.1 and 2.2.2 respectively. The security functionality provided by the Application RoTs is out of scope of the TOE. MCU Root of Trust Protection Profile – Public Release v1.0 19 /93 Copyright Ó': 1, 'apply to the TOE operational environment and its actors. Note that the operational environment is out of scope of the evaluation. 4.5.1 Core MCU RoT PP The assumptions applicable to the core MCU RoT PP are the': 1, 'policies that apply to the environment. Application Note: • The TOE operational environment is out of scope of the evaluation. The security guidelines must include recommendations to cover all the TOE': 1}}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'pdf_hash': '8ce592a906309d337569d48caf14e65261ac143ad6658427331e6019327435ec', 'txt_hash': '741afe7efeefa135799bfc318a7d377227910ea2cd072075c101cb748236113b'}
data. - The report property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'pdf_hash': '9d5a947b09f32a78a9eb964c0fbbf430939cd977437a022c31c08d315eb8962f', 'txt_hash': 'baadfc62e71c30c19c724c6bc88b271885be4aa7b2935fb768528be96967a2a4'}
data.
- The report_keywords property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The report_keywords property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data. - The report property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The report_keywords property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name MCU Root of Trust Protection Profile (GPT_SPE_146, version 1.0) was processed.
Raw data
{
"_id": "c69650699764b6a2",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "c69650699764b6a2",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "anssi-profil-cc-pp-2023_01en.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AROT_DEVELOPMENT": 4,
"A.PROTECTION_AFTER_DELIVERY": 4
},
"O": {
"O.AROT_AUTHENTICITY": 17,
"O.AROT_ISOLATION": 22,
"O.AROT_PERSISTENT_TIME": 12,
"O.ATTESTATION": 8,
"O.CA_AROT_IDENTIFICATION": 10,
"O.DEBUG": 17,
"O.INITIALISATION": 20,
"O.INSTANCE_TIME": 8,
"O.KEYS_USAGE": 14,
"O.MCU_ROT_DATA_PROTECTI": 2,
"O.MCU_ROT_DATA_PROTECTION": 15,
"O.MCU_ROT_ID": 9,
"O.MCU_ROT_ISOLATION": 14,
"O.OPERATION": 15,
"O.RNG": 8,
"O.ROLLBACK_PROTECTION": 10,
"O.RUNTIME_CONFIDENTIALITY": 21,
"O.RUNTIME_INTEGRITY": 17,
"O.TRUSTED_STORAGE": 21
},
"OE": {
"OE.AROT_DEVELOPMENT": 8,
"OE.DISABLED_DEBUG": 6,
"OE.INTEGRATION_CONFIGURATION": 10,
"OE.PROTECTION_AFTER_DELIVERY": 7,
"OE.SECRETS": 5,
"OE.UNIQUE_MCU_ROT_ID": 6
},
"OP": {
"OP.AUTHENTICATE": 3,
"OP.DEBUG": 3,
"OP.EXTRACT_KEY": 4,
"OP.LOAD": 3,
"OP.STORE": 4,
"OP.USE_KEY": 4
},
"OSP": {
"OSP.CRYPTO_API": 2,
"OSP.INTEGRATION_CONFIGURATION": 5,
"OSP.SECRETS": 5,
"OSP.UNIQUE_MCU_ROT_ID": 4
},
"T": {
"T.ABUSE_AROT": 4,
"T.ABUSE_DEBUG": 6,
"T.ABUSE_FUNCT": 12,
"T.AROT_PERSISTENT_TIME": 4,
"T.CLONE": 8,
"T.FLASH_DUMP": 3,
"T.IMPERSONATION": 5,
"T.MCU_ROT_FIRMWARE_DOWNGR": 1,
"T.MCU_ROT_FIRMWARE_DOWNGRADE": 5,
"T.PERTURBATION": 7,
"T.RAM": 7,
"T.RNG": 4,
"T.ROGUE_CODE_EXECUTION": 7,
"T.ROLLBACK": 4,
"T.SPY": 4,
"T.STORAGE_CORRUPTION": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 3,
"ADV_FSP.2": 13,
"ADV_TDS.1": 8
},
"AGD": {
"AGD_OPE.1": 10,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 2,
"ALC_DEL.1": 1,
"ALC_FLR.2": 4
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 4,
"ASE_OBJ.2": 2,
"ASE_REQ.1": 2,
"ASE_REQ.2": 1,
"ASE_SPD.1": 3,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 5,
"ATE_FUN.1": 3
},
"AVA": {
"AVA_VAN.2": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 8,
"EAL 2 augmented": 3,
"EAL 2+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 9,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 4,
"FAU_SAA.1": 2,
"FAU_SAR.1": 8,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.1": 4
},
"FCS": {
"FCS_CKM.1": 7,
"FCS_CKM.4": 6,
"FCS_COP": 42,
"FCS_COP.1": 5,
"FCS_RNG": 3,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 36,
"FDP_ACC.1": 13,
"FDP_ACF": 35,
"FDP_ACF.1": 17,
"FDP_IFC": 18,
"FDP_IFC.1": 7,
"FDP_IFC.2": 3,
"FDP_IFF": 24,
"FDP_IFF.1": 20,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_ITT": 15,
"FDP_ITT.1": 4,
"FDP_RIP": 6,
"FDP_RIP.1": 2,
"FDP_ROL": 7,
"FDP_ROL.1": 3,
"FDP_SDI.2": 17,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_ATD": 9,
"FIA_ATD.1": 14,
"FIA_ATD.1.1": 1,
"FIA_UAU": 12,
"FIA_UAU.2": 1,
"FIA_UAU.6": 2,
"FIA_UID": 10,
"FIA_UID.1": 4,
"FIA_UID.2": 11,
"FIA_UID.2.1": 1,
"FIA_USB": 8,
"FIA_USB.1": 15,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 44,
"FMT_MSA.1": 6,
"FMT_MSA.3": 14,
"FMT_MTD": 6,
"FMT_MTD.1": 2,
"FMT_SMF": 7,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR": 8,
"FMT_SMR.1": 21,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 17,
"FPT_FLS.1.1": 1,
"FPT_INI": 3,
"FPT_INI.1": 13,
"FPT_INI.1.1": 3,
"FPT_INI.1.2": 3,
"FPT_INI.1.3": 2,
"FPT_INI.1.4": 2,
"FPT_ITT": 10,
"FPT_ITT.1": 2,
"FPT_STM": 12,
"FPT_STM.1": 4,
"FPT_TEE.1": 7,
"FPT_TEE.1.1": 1,
"FPT_TEE.1.2": 1
}
},
"certification_process": {
"OutOfScope": {
"2.2.1 and 2.2.2 respectively. The security functionality provided by the Application RoTs is out of scope of the TOE. MCU Root of Trust Protection Profile \u2013 Public Release v1.0 19 /93 Copyright \u00d3": 1,
"apply to the TOE operational environment and its actors. Note that the operational environment is out of scope of the evaluation. 4.5.1 Core MCU RoT PP The assumptions applicable to the core MCU RoT PP are the": 1,
"out of scope": 3,
"policies that apply to the environment. Application Note: \u2022 The TOE operational environment is out of scope of the evaluation. The security guidelines must include recommendations to cover all the TOE": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 30
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"side-channels": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 1,
"AIS31": 3
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS PUB 180-4": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1
},
"RFC": {
"RFC 2119": 3,
"RFC 4122": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"TDES": 2
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {},
"tee_name": {
"ARM": {
"TrustZone": 1
},
"IBM": {
"SE": 1
},
"other": {
"TEE": 7
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": null,
"report_filename": "anssi-cc-pp-2023_01fr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP-2023/01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2023/01": 2
}
},
"cc_sar": {
"ACE": {
"ACE_CCL.1": 1,
"ACE_CCO.1": 1,
"ACE_ECD.1": 1,
"ACE_INT.1": 1,
"ACE_MCO.1": 1,
"ACE_OBJ.1": 1,
"ACE_REQ.1": 1,
"ACE_SPD.1": 1
},
"ALC": {
"ALC_FLR.2": 3
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1,
"FAU_SAR.1": 1,
"FAU_STG.1": 1
},
"FCO": {
"FCO_NRO.1": 1
},
"FCS": {
"FCS_COP.1": 1,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_IFC.2": 1,
"FDP_IFF.1": 1,
"FDP_ITT.1": 1,
"FDP_RIP.1": 1,
"FDP_ROL.1": 1,
"FDP_SDI.2": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_UID.2": 1,
"FIA_USB.1": 1
},
"FMT": {
"FMT_MSA.1": 1,
"FMT_MSA.3": 1,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_INI.1": 1,
"FPT_STM.1": 1,
"FPT_TEE.1": 1
},
"FTP": {
"FTP_ITT.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"other": {
"TEE": 4
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "8ce592a906309d337569d48caf14e65261ac143ad6658427331e6019327435ec",
"txt_hash": "741afe7efeefa135799bfc318a7d377227910ea2cd072075c101cb748236113b"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "9d5a947b09f32a78a9eb964c0fbbf430939cd977437a022c31c08d315eb8962f",
"txt_hash": "baadfc62e71c30c19c724c6bc88b271885be4aa7b2935fb768528be96967a2a4"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Trusted Computing",
"is_collaborative": false,
"maintenances": [],
"name": "MCU Root of Trust Protection Profile (GPT_SPE_146, version 1.0)",
"not_valid_after": null,
"not_valid_before": "2023-03-01",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-cc-pp-2023_01en.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2023_01fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ADV_FSP.3",
"EAL2+",
"ALC_FLR.3"
]
},
"status": "active",
"version": "1.0"
}
}