ST31H320 A01 including optional cryptographic library NESLIB

CSV information ?

Status archived
Valid from 28.12.2015
Valid until 28.12.2020
Scheme 🇫🇷 FR
Manufacturer STMicroelectronics
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_TDS.5, ADV_IMP.2, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ATE_COV.3, ADV_INT.3, ALC_TAT.3, AVA_VAN.5, ATE_FUN.2, EAL5+
Protection profiles
Maintenance updates ANSSI-CC-2015/59-M01 (20.04.2016) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2015/59

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
ECC
Randomness
TRNG, DRBG
Libraries
NesLib v4.2, NesLib 4.2.10, NesLib 4.2

Vendor
STMicroelectronics

Security level
EAL 5, EAL2, EAL7, EAL 1, EAL 3, EAL 7, EAL 5 augmented, ITSEC E6 High
Security Assurance Requirements (SAR)
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.3, ATE_FUN.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0084-2014
Certificates
ANSSI-CC-2015/59
Evaluation facilities
Serma Technologies

Side-channel analysis
Physical tampering

Standards
AIS 31, AIS31, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title: ANSSI-CC-2015_59en
Pages: 15
Creator: PDFCreator Version 1.2.1
Producer: GPL Ghostscript 9.02

Frontpage

Certificate ID: ANSSI-CC-2015/59
Certified item: ST31H320 A01 including optional cryptographic library NESLIB
Certification lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
Developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France

References

Incoming
  • ANSSI-CC-2017/23 - Plate-forme STSAFE-J, en configuration fermĂ©e, version 1.1.4, sur le composant ST31H320 A03
  • ANSSI-CC-2017/10 - Plate-forme STSafe-J, en configuration fermĂ©e, version 1.1.4, sur le composant ST31H320 A03
  • ANSSI-CC-2017/60 - ST31H320 B01 including optional cryptographic library NESLIB

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-128, AES-192, AES-, DES, TDES, TDEA, HMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224
Randomness
TRNG, DRBG, RND, RNG
Libraries
NesLib 4.2
Block cipher modes
ECB, CBC

Vendor
Infineon Technologies, STMicroelectronics, Philips

Security level
EAL5, EAL5+, EAL4, EAL6+, EAL5 augmented
Claims
O.RND, T.RND
Security Assurance Requirements (SAR)
ADO_DEL, ADV_FSP, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_ARC.1, ADV_FSP.5, ADV_SPM, ADV_ARC, ADV_IMP, ADV_SPM.1, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_DVS, ALC_CMS, ALC_CMC, ATE_COV, ATE_COV.3, ATE_FUN.2, ATE_DPT.3, ATE_IND.2, AVA_VAN.5, AVA_VAN, ASE_INT, ASE_CCL, ASE_ECD, ASE_SPD, ASE_OBJ, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FCS_RNG.1, FCS_COP.1, FCS_CKM.1, FCS_RNG, FCS_CKM.4, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.2, FDP_ACF.1, FDP_ACC.1, FDP_ITC.1, FDP_SDC, FDP_ITC.2, FDP_CKM.2, FDP_SMF.1, FDP_SMR.1, FIA_UID.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FMT_LIM, FMT_ITC.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2
Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP- 0084-2014, BSI-CC-PP-0084-
Certification process
out of scope, ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded, The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, physical tampering, Malfunction, malfunction
Certification process
out of scope, ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded, The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific

Standards
FIPS PUB 197, FIPS PUB 186-4, FIPS PUB 180-2, FIPS PUB 198-1, FIPS PUB 140-2, NIST SP 800-67, SP 800-38A, NIST SP 800-56A, NIST SP 800-90, NIST SP 800-38A, SP 800-67, NIST SP 800-38B, SP 800-90A, PKCS1, PKCS #1, AIS31, ISO/IEC 7816-3, ISO/IEC 9796-2, ISO/IEC 14888, ISO/IEC 9796, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-001

File metadata

Title: SMD_ST31H320_VA01_5P.book
Author: Christiane DROULERS
Creation date: D:20151215093653Z
Modification date: D:20151215094303+01'00'
Pages: 68
Creator: FrameMaker 11.0
Producer: Acrobat Elements 10.0.0 (Windows)

References

Incoming
  • ANSSI-CC-2017/23 - Plate-forme STSAFE-J, en configuration fermĂ©e, version 1.1.4, sur le composant ST31H320 A03
  • BSI-DSZ-CC-1037-2018 - STSAFE-J100-BS Smart Meter Security Module V2.1.6
  • ANSSI-CC-2017/10 - Plate-forme STSafe-J, en configuration fermĂ©e, version 1.1.4, sur le composant ST31H320 A03

Heuristics ?

Certificate ID: ANSSI-CC-2015/59

Extracted SARs

ADV_ARC.1, ASE_OBJ.2, AVA_VAN.5, ATE_COV.3, ASE_SPD.1, ASE_ECD.1, ASE_INT.1, ATE_IND.2, ALC_LCD.1, ADV_INT.3, ALC_TAT.3, ADV_SPM.1, ATE_DPT.3, ADV_FSP.5, ALC_FLR.1, ASE_TSS.1, ALC_CMS.5, ADV_TDS.5, ASE_REQ.2, ALC_CMC.5, ADV_IMP.2, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AGD_OPE.1, ALC_DEL.1, ATE_FUN.2

Scheme data ?

Product ST31H320 A01 including optional cryptographic library NESLIB
Url https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib
Description Le produit certifié est le microcontôleur sécurisé « ST31H320 A01 including optionalcryptographic library NESLIB » développé par STMICROELECTRONICS. Comme décrit dans la cible de sécurité [ST] au paragraphe « TOE overview », ce produit sedécline en différentes configurations selon la taille de mémoire non volatile FLASH etl’activation du coprocesseur cryptographique NesCrypt. Ces configurati
Sponsor STMicroelectronics
Developer STMicroelectronics
Cert Id 2015/59
Level EAL5+
Enhanced
Cert Id 2015/59
Certification Date 28/12/2015
Category Micro-circuits
Cc Version Critères Communs version 3.1r4
Developer STMicroelectronics
Sponsor STMicroelectronics
Evaluation Facility Serma Technologies
Level EAL5+
Protection Profile BSI-CC-PP-0084-2014
Mutual Recognition SOG-IS CCRA
Augmented ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5
Target Link https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bd30ad5fa652dba174ee2c11bff22be59db9418a46b2e1db42555b011ce264eb', 'txt_hash': '617d674733e5106acaf983c5af447d8163656ac421f0c4cf7295d12f15bbdfe7'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8f252458d69fce752b249d8b257fdd59f7e3614e36640666270c3a6a8bd11516', 'txt_hash': '25a18b3b82f1711bd1d9963aa7f660e7b127c67e027ad32a72d6c40df783cac7'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'FR': {'match_rules': ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Mutual Recognition Agreements'], 'cert_id': 'ANSSI-CC-2015/59', 'cert_item': 'ST31H320 A01 including optional cryptographic library NESLIB', 'cert_item_version': '/version A01', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certified by the BSI under reference BSI-CC-PP-0084-2014 o, 19 February 2014 with “Package 1: Loader dedicated for usage in Secured Environment only', 'cc_version': 'Common criteria version 3.1 revision 4', 'cc_security_level': 'EAL 5 augmented ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5', 'developer': 'STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France', 'cert_lab': 'Serma Technologies 14 rue GalilĂ©e, CS 10055, 33615 Pessac Cedex, France'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2015/59': 16}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2015/59': 32}}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 21, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 5': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 3, '3 3 3': 1, '1 1 3': 1, '2 2 3': 1}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2015/59': 16}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'2-2-1': 1}}} data.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'ST31H320 A01 including optional cryptographic library NESLIB', 'url': 'https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib', 'description': 'Le produit certifiĂ© est le microcontĂ´leur sĂ©curisĂ© « ST31H320 A01 including optionalcryptographic library NESLIB » dĂ©veloppĂ© par STMICROELECTRONICS.\n\nComme dĂ©crit dans la cible de sĂ©curitĂ© [ST] au paragraphe « TOE overview », ce produit sedĂ©cline en diffĂ©rentes configurations selon la taille de mĂ©moire non volatile FLASH etl’activation du coprocesseur cryptographique NesCrypt. Ces configurati', 'sponsor': 'STMicroelectronics', 'developer': 'STMicroelectronics', 'cert_id': '2015/59', 'level': 'EAL5+', 'enhanced': {'cert_id': '2015/59', 'certification_date': '28/12/2015', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'STMicroelectronics', 'sponsor': 'STMicroelectronics', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf'}}.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2016-04-20', 'maintenance_title': 'ANSSI-CC-2015/59-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2015_59-M01.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 8f252458d69fce752b249d8b257fdd59f7e3614e36640666270c3a6a8bd11516.
    • The st_txt_hash property was set to 25a18b3b82f1711bd1d9963aa7f660e7b127c67e027ad32a72d6c40df783cac7.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 956228, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/Author': 'Christiane DROULERS', '/CreationDate': 'D:20151215093653Z', '/Creator': 'FrameMaker 11.0', '/ModDate': "D:20151215094303+01'00'", '/Producer': 'Acrobat Elements 10.0.0 (Windows)', '/Title': 'SMD_ST31H320_VA01_5P.book', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 53, 'BSI-CC-PP- 0084-2014': 8, 'BSI-CC-PP-0084-': 2}}, 'cc_security_level': {'EAL': {'EAL5': 14, 'EAL5+': 1, 'EAL4': 1, 'EAL6+': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_FSP': 4, 'ADV_IMP.2': 4, 'ADV_INT.3': 4, 'ADV_TDS.5': 4, 'ADV_ARC.1': 1, 'ADV_FSP.5': 3, 'ADV_SPM': 1, 'ADV_ARC': 2, 'ADV_IMP': 1, 'ADV_SPM.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.5': 4, 'ALC_DVS.2': 4, 'ALC_FLR.1': 4, 'ALC_TAT.3': 4, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.3': 4, 'ATE_FUN.2': 4, 'ATE_DPT.3': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 4, 'ASE_ECD': 4, 'ASE_SPD': 7, 'ASE_OBJ': 7, 'ASE_REQ': 23, 'ASE_TSS': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 6, 'FAU_SAS': 2}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP.1': 28, 'FCS_CKM.1': 20, 'FCS_RNG': 2, 'FCS_CKM.4': 4}, 'FDP': {'FDP_SDC.1': 8, 'FDP_SDI.2': 8, 'FDP_ITT.1': 10, 'FDP_IFC.1': 16, 'FDP_ACC.2': 12, 'FDP_ACF.1': 24, 'FDP_ACC.1': 17, 'FDP_ITC.1': 13, 'FDP_SDC': 2, 'FDP_ITC.2': 2, 'FDP_CKM.2': 1, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_UID.1': 10}, 'FMT': {'FMT_LIM.1': 17, 'FMT_LIM.2': 18, 'FMT_MSA.3': 22, 'FMT_MSA.1': 21, 'FMT_SMF.1': 16, 'FMT_SMR.1': 13, 'FMT_LIM': 2, 'FMT_ITC.1': 1}, 'FPT': {'FPT_FLS.1': 11, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 11}}, 'cc_claims': {'O': {'O.RND': 4}, 'T': {'T.RND': 3}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 20}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12, 'AES-128': 1, 'AES-192': 1, 'AES-': 1}}, 'DES': {'DES': {'DES': 6}, '3DES': {'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-256': 9, 'SHA-384': 6, 'SHA-512': 6, 'SHA-224': 5}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 10}, 'RNG': {'RND': 7, 'RNG': 6}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib 4.2': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 4, 'physical probing': 3, 'side channel': 6}, 'FI': {'physical tampering': 1, 'Malfunction': 13, 'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 4, 'FIPS PUB 186-4': 4, 'FIPS PUB 180-2': 5, 'FIPS PUB 198-1': 3, 'FIPS PUB 140-2': 5}, 'NIST': {'NIST SP 800-67': 3, 'SP 800-38A': 2, 'NIST SP 800-56A': 3, 'NIST SP 800-90': 4, 'NIST SP 800-38A': 2, 'SP 800-67': 1, 'NIST SP 800-38B': 1, 'SP 800-90A': 1}, 'PKCS': {'PKCS1': 1, 'PKCS #1': 8}, 'BSI': {'AIS31': 3}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 9796-2': 3, 'ISO/IEC 14888': 2, 'ISO/IEC 9796': 1}, 'CC': {'CCMB-2012-09-002': 20, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded': 1, 'The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific': 1}}}.
    • The st_filename property was set to ANSSI_cible2015_59en.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/ANSSI_cible2015_59en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1037-2018']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23']}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2015_59en.pdf, code: 408'].

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/23']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0', 'JAVA_OC']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'ANSSI-CC-2015_59en.pdf', 'st_filename': 'ANSSI_cible2015_59en.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 2}, '__delete__': ['EAL 2', 'EAL 4', 'EAL 6', 'EAL 5+']}}}, 'vendor': {'__update__': {'STMicroelectronics': {'__delete__': ['STM']}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'randomness': {'__delete__': ['RNG']}, 'tee_name': {}, 'standard_id': {'__update__': {'BSI': {'__update__': {'AIS31': 2}}, 'CC': {'__insert__': {'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_protection_profile_id': {'__update__': {'BSI': {'__update__': {'BSI-CC-PP-0084-2014': 53}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 3}}, 'AVA': {'__update__': {'AVA_VAN.5': 4}}}}, 'cc_sfr': {'__update__': {'FCS': {'__update__': {'FCS_CKM.1': 20, 'FCS_CKM.4': 4}}, 'FDP': {'__update__': {'FDP_ACC.1': 17}, '__delete__': ['FDP_IFF.1']}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 12}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 6}, '__delete__': ['DEA']}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 9}}}}}, '__delete__': ['scrypt']}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'__update__': {'PRNG': {'__update__': {'DRBG': 10}}, 'RNG': {'__update__': {'RNG': 6}, '__delete__': ['RBG']}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 3}, '__delete__': ['SPA']}, 'FI': {'__update__': {'Malfunction': 13, 'malfunction': 2}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS PUB 197': 4, 'FIPS PUB 186-4': 4, 'FIPS PUB 198-1': 3, 'FIPS PUB 140-2': 5}}, 'NIST': {'__insert__': {'SP 800-38A': 2, 'SP 800-67': 1, 'SP 800-90A': 1}, '__update__': {'NIST SP 800-38A': 2, 'NIST SP 800-90': 4}, '__delete__': ['NIST SP 800-90A']}, 'BSI': {'__update__': {'AIS31': 3}}, 'ISO': {'__update__': {'ISO/IEC 9796': 1, 'ISO/IEC 14888': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded': 1, 'The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific': 1}, '__delete__': ['(ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded', '7 The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific']}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0', 'JAVA_OC']}}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2016-04-20', 'maintenance_title': 'ANSSI-CC-2015/59-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2015_59-M01.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.st.com']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2015/59': 32}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 2}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL7': 1, 'EAL2': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 3': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 5+': 1, 'EAL 5 augmented': 2}, 'ITSEC': {'ITSEC E6 High': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_TDS.5': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.5': 2, 'ALC_DVS.2': 2, 'ALC_FLR.1': 2, 'ALC_TAT.3': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_FUN.2': 2, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 16, 'STM': 1}}, 'eval_facility': {'Serma': {'Serma Technologies': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 7}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 1, 'RBG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib v4.2': 1, 'NesLib 4.2.10': 2, 'NesLib 4.2': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'Physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 2, 'AIS31': 5}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 66, 'BSI-CC-PP- 0084-2014': 8, 'BSI-CC-PP-0084-': 2}}, 'cc_security_level': {'EAL': {'EAL5': 14, 'EAL5+': 1, 'EAL4': 1, 'EAL6+': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ADO': {'ADO_DEL': 1}, 'ADV': {'ADV_FSP': 4, 'ADV_IMP.2': 4, 'ADV_INT.3': 4, 'ADV_TDS.5': 4, 'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_SPM': 1, 'ADV_ARC': 2, 'ADV_IMP': 1, 'ADV_SPM.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC.5': 4, 'ALC_DVS.2': 4, 'ALC_FLR.1': 4, 'ALC_TAT.3': 4, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_DVS': 1, 'ALC_CMS': 1, 'ALC_CMC': 1}, 'ATE': {'ATE_COV': 3, 'ATE_COV.3': 4, 'ATE_FUN.2': 4, 'ATE_DPT.3': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 4, 'ASE_ECD': 4, 'ASE_SPD': 7, 'ASE_OBJ': 7, 'ASE_REQ': 23, 'ASE_TSS': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 6, 'FAU_SAS': 2}, 'FCS': {'FCS_RNG.1': 6, 'FCS_COP.1': 28, 'FCS_CKM.1': 19, 'FCS_RNG': 2, 'FCS_CKM.4': 5}, 'FDP': {'FDP_SDC.1': 8, 'FDP_SDI.2': 8, 'FDP_ITT.1': 10, 'FDP_IFC.1': 16, 'FDP_ACC.2': 12, 'FDP_ACF.1': 24, 'FDP_ACC.1': 18, 'FDP_ITC.1': 13, 'FDP_SDC': 2, 'FDP_IFF.1': 1, 'FDP_ITC.2': 2, 'FDP_CKM.2': 1, 'FDP_SMF.1': 2, 'FDP_SMR.1': 1}, 'FIA': {'FIA_UID.1': 10}, 'FMT': {'FMT_LIM.1': 17, 'FMT_LIM.2': 18, 'FMT_MSA.3': 22, 'FMT_MSA.1': 21, 'FMT_SMF.1': 16, 'FMT_SMR.1': 13, 'FMT_LIM': 2, 'FMT_ITC.1': 1}, 'FPT': {'FPT_FLS.1': 11, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 11}}, 'cc_claims': {'O': {'O.RND': 4}, 'T': {'T.RND': 3}}, 'vendor': {'Infineon': {'Infineon Technologies': 1}, 'STMicroelectronics': {'STMicroelectronics': 20}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13, 'AES-128': 1, 'AES-192': 1, 'AES-': 1}}, 'DES': {'DES': {'DES': 15, 'DEA': 1}, '3DES': {'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 3, 'CMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'DH': 3, 'Diffie-Hellman': 2}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-256': 8, 'SHA-384': 6, 'SHA-512': 6, 'SHA-224': 5}}, 'scrypt': {'scrypt': 4}}, 'crypto_scheme': {'MAC': {'MAC': 4}}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 13}, 'RNG': {'RNG': 9, 'RND': 7, 'RBG': 13}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib 4.2': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 4, 'physical probing': 1, 'side channel': 6, 'SPA': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 15, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 7}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 5, 'FIPS PUB 186-4': 6, 'FIPS PUB 180-2': 5, 'FIPS PUB 198-1': 4, 'FIPS PUB 140-2': 6}, 'NIST': {'NIST SP 800-67': 3, 'NIST SP 800-38A': 3, 'NIST SP 800-56A': 3, 'NIST SP 800-90': 3, 'NIST SP 800-38B': 1, 'NIST SP 800-90A': 1}, 'PKCS': {'PKCS1': 1, 'PKCS #1': 8}, 'BSI': {'AIS31': 9}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 9796-2': 3, 'ISO/IEC 9796': 2, 'ISO/IEC 14888': 4}, 'CC': {'CCMB-2012-09-002': 20, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-001': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '(ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded': 1, '7 The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'bd30ad5fa652dba174ee2c11bff22be59db9418a46b2e1db42555b011ce264eb', 'st_pdf_hash': '8f252458d69fce752b249d8b257fdd59f7e3614e36640666270c3a6a8bd11516', 'report_txt_hash': '617d674733e5106acaf983c5af447d8163656ac421f0c4cf7295d12f15bbdfe7', 'st_txt_hash': '25a18b3b82f1711bd1d9963aa7f660e7b127c67e027ad32a72d6c40df783cac7'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 1, 'DES': 7}, 'rules_asymmetric_crypto': {'ECC': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'TRNG': 1, 'DRBG': 1, 'RNG': 1, 'RBG': 1}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'Physical tampering': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 13, 'AES-128': 1, 'AES-192': 1, 'AES-': 1, 'DES': 11, 'TDES': 4, 'TDEA': 1, 'HMAC': 3}, 'rules_asymmetric_crypto': {'ECDH': 3, 'ECDSA': 4, 'ECC': 3, 'DH': 3, 'Diffie-Hellman': 2, 'DSA': 5}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 14, 'SHA-256': 8, 'SHA-384': 6, 'SHA-512': 6, 'SHA-224': 5, 'scrypt': 4}, 'rules_crypto_schemes': {'PACE': 2, 'MAC': 4}, 'rules_randomness': {'TRNG': 2, 'DRBG': 13, 'RNG': 9, 'RND': 7, 'RBG': 13}, 'rules_tee': {'SE': 7}, 'rules_side_channels': {'Malfunction': 15, 'malfunction': 1, 'Leak-Inherent': 12, 'Physical Probing': 4, 'physical probing': 1, 'physical tampering': 1, 'side channel': 6}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23', 'BSI-DSZ-CC-1037-2018']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23', 'BSI-DSZ-CC-1037-2018']}, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23', 'ANSSI-CC-2017/60']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23', 'BSI-DSZ-CC-1037-2018', 'ANSSI-CC-2017/60']}, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['ANSSI-CC-2017/10', 'ANSSI-CC-2017/23', 'ANSSI-CC-2017/60']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0', 'JAVA_OC']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ST31H320 A01 including optional cryptographic library NESLIB was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "36fbd23e279b08ca",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2015/59",
    "cert_lab": [
      "SERMA"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/10",
          "ANSSI-CC-2017/23",
          "ANSSI-CC-2017/60"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/10",
          "ANSSI-CC-2017/23",
          "BSI-DSZ-CC-1037-2018",
          "ANSSI-CC-2017/60"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "2015/59",
      "description": "Le produit certifi\u00e9 est le microcont\u00f4leur s\u00e9curis\u00e9 \u00ab ST31H320 A01 including optionalcryptographic library NESLIB \u00bb d\u00e9velopp\u00e9 par STMICROELECTRONICS.\n\nComme d\u00e9crit dans la cible de s\u00e9curit\u00e9 [ST] au paragraphe \u00ab TOE overview \u00bb, ce produit sed\u00e9cline en diff\u00e9rentes configurations selon la taille de m\u00e9moire non volatile FLASH etl\u2019activation du coprocesseur cryptographique NesCrypt. Ces configurati",
      "developer": "STMicroelectronics",
      "enhanced": {
        "augmented": "ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 3.1r4",
        "cert_id": "2015/59",
        "certification_date": "28/12/2015",
        "developer": "STMicroelectronics",
        "evaluation_facility": "Serma Technologies",
        "level": "EAL5+",
        "mutual_recognition": "SOG-IS\n                          CCRA",
        "protection_profile": "BSI-CC-PP-0084-2014",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI-CC-2015_59en.pdf",
        "sponsor": "STMicroelectronics",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2016/01/ANSSI_cible2015_59en.pdf"
      },
      "level": "EAL5+",
      "product": "ST31H320 A01 including optional cryptographic library NESLIB",
      "sponsor": "STMicroelectronics",
      "url": "https://cyber.gouv.fr/produits-certifies/st31h320-a01-including-optional-cryptographic-library-neslib"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/10",
          "ANSSI-CC-2017/23",
          "BSI-DSZ-CC-1037-2018"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/10",
          "ANSSI-CC-2017/23",
          "BSI-DSZ-CC-1037-2018"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-04-20",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2015_59-M01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2015/59-M01"
      }
    ]
  },
  "manufacturer": "STMicroelectronics",
  "manufacturer_web": "https://www.st.com/",
  "name": "ST31H320 A01 including optional cryptographic library NESLIB",
  "not_valid_after": "2020-12-28",
  "not_valid_before": "2015-12-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC-2015_59en.pdf",
    "report_frontpage": {
      "FR": {
        "cc_security_level": "EAL 5 augmented ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5",
        "cc_version": "Common criteria version 3.1 revision 4",
        "cert_id": "ANSSI-CC-2015/59",
        "cert_item": "ST31H320 A01 including optional cryptographic library NESLIB",
        "cert_item_version": "/version A01",
        "cert_lab": "Serma Technologies 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
        "developer": "STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France",
        "match_rules": [
          "Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Mutual Recognition Agreements"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certified by the BSI under reference BSI-CC-PP-0084-2014 o, 19 February 2014 with \u201cPackage 1: Loader dedicated for usage in Secured Environment only"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2015/59": 16
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 2,
          "ADV_INT": 1,
          "ADV_INT.3": 2,
          "ADV_SPM": 1,
          "ADV_TDS": 1,
          "ADV_TDS.5": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.5": 2,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_FLR": 2,
          "ALC_FLR.1": 2,
          "ALC_LCD": 1,
          "ALC_TAT": 1,
          "ALC_TAT.3": 2
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 2,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_FUN.2": 2,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 5": 3,
          "EAL 5 augmented": 2,
          "EAL 7": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 High": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Neslib": {
          "NesLib 4.2": 2,
          "NesLib 4.2.10": 2,
          "NesLib v4.2": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Technologies": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Physical tampering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 2,
          "AIS31": 2
        },
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STMicroelectronics": 16
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "PDFCreator Version 1.2.1",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "GPL Ghostscript 9.02",
      "/Subject": "",
      "/Title": "ANSSI-CC-2015_59en",
      "pdf_file_size_bytes": 186044,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "ANSSI_cible2015_59en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 4
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.RND": 4
        },
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0084-2014": 8,
          "BSI-CC-PP-0084-": 2,
          "BSI-CC-PP-0084-2014": 53
        }
      },
      "cc_sar": {
        "ADO": {
          "ADO_DEL": 1
        },
        "ADV": {
          "ADV_ARC": 2,
          "ADV_ARC.1": 1,
          "ADV_FSP": 4,
          "ADV_FSP.5": 3,
          "ADV_IMP": 1,
          "ADV_IMP.2": 4,
          "ADV_INT.3": 4,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS.5": 4
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.5": 4,
          "ALC_CMS": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR.1": 4,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 4
        },
        "ASE": {
          "ASE_CCL": 4,
          "ASE_CCL.1": 1,
          "ASE_ECD": 4,
          "ASE_ECD.1": 1,
          "ASE_INT": 2,
          "ASE_INT.1": 1,
          "ASE_OBJ": 7,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 23,
          "ASE_REQ.2": 1,
          "ASE_SPD": 7,
          "ASE_SPD.1": 1,
          "ASE_TSS": 7,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 3,
          "ATE_COV.3": 4,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 4,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL5": 14,
          "EAL5 augmented": 2,
          "EAL5+": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 2,
          "FAU_SAS.1": 6
        },
        "FCS": {
          "FCS_CKM.1": 20,
          "FCS_CKM.4": 4,
          "FCS_COP.1": 28,
          "FCS_RNG": 2,
          "FCS_RNG.1": 6
        },
        "FDP": {
          "FDP_ACC.1": 17,
          "FDP_ACC.2": 12,
          "FDP_ACF.1": 24,
          "FDP_CKM.2": 1,
          "FDP_IFC.1": 16,
          "FDP_ITC.1": 13,
          "FDP_ITC.2": 2,
          "FDP_ITT.1": 10,
          "FDP_SDC": 2,
          "FDP_SDC.1": 8,
          "FDP_SDI.2": 8,
          "FDP_SMF.1": 2,
          "FDP_SMR.1": 1
        },
        "FIA": {
          "FIA_UID.1": 10
        },
        "FMT": {
          "FMT_ITC.1": 1,
          "FMT_LIM": 2,
          "FMT_LIM.1": 17,
          "FMT_LIM.2": 18,
          "FMT_MSA.1": 21,
          "FMT_MSA.3": 22,
          "FMT_SMF.1": 16,
          "FMT_SMR.1": 13
        },
        "FPT": {
          "FPT_FLS.1": 11,
          "FPT_ITT.1": 9,
          "FPT_PHP.3": 11
        },
        "FRU": {
          "FRU_FLT.2": 11
        }
      },
      "certification_process": {
        "OutOfScope": {
          "ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded": 1,
          "The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except Neslib, when it is embedded. 38 The TOE optionally comprises a specific": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Neslib": {
          "NesLib 4.2": 2
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 14
          },
          "SHA2": {
            "SHA-224": 5,
            "SHA-256": 9,
            "SHA-384": 6,
            "SHA-512": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 10
        },
        "RNG": {
          "RND": 7,
          "RNG": 6
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 13,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "Leak-Inherent": 12,
          "Physical Probing": 4,
          "physical probing": 3,
          "side channel": 6
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 3
        },
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 20,
          "CCMB-2012-09-003": 2
        },
        "FIPS": {
          "FIPS PUB 140-2": 5,
          "FIPS PUB 180-2": 5,
          "FIPS PUB 186-4": 4,
          "FIPS PUB 197": 4,
          "FIPS PUB 198-1": 3
        },
        "ISO": {
          "ISO/IEC 14888": 2,
          "ISO/IEC 7816-3": 1,
          "ISO/IEC 9796": 1,
          "ISO/IEC 9796-2": 3
        },
        "NIST": {
          "NIST SP 800-38A": 2,
          "NIST SP 800-38B": 1,
          "NIST SP 800-56A": 3,
          "NIST SP 800-67": 3,
          "NIST SP 800-90": 4,
          "SP 800-38A": 2,
          "SP 800-67": 1,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS #1": 8,
          "PKCS1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 12,
            "AES-": 1,
            "AES-128": 1,
            "AES-192": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 4
          },
          "DES": {
            "DES": 6
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1,
            "HMAC": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        },
        "Philips": {
          "Philips": 1
        },
        "STMicroelectronics": {
          "STMicroelectronics": 20
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Christiane DROULERS",
      "/CreationDate": "D:20151215093653Z",
      "/Creator": "FrameMaker 11.0",
      "/ModDate": "D:20151215094303+01\u002700\u0027",
      "/Producer": "Acrobat Elements 10.0.0 (Windows)",
      "/Title": "SMD_ST31H320_VA01_5P.book",
      "pdf_file_size_bytes": 956228,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.st.com"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 68
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "SECURITY_IC_AUGP_V1.0",
            "BAROC_SC_PP_V1.0",
            "JAVA_OC"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI-CC-2015_59en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_TDS.5",
      "ADV_IMP.2",
      "ALC_CMC.5",
      "ALC_FLR.1",
      "ADV_INT.3",
      "EAL5+",
      "ALC_DVS.2",
      "ATE_COV.3",
      "AVA_VAN.5",
      "ALC_TAT.3",
      "ATE_FUN.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/ANSSI_cible2015_59en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bd30ad5fa652dba174ee2c11bff22be59db9418a46b2e1db42555b011ce264eb",
      "txt_hash": "617d674733e5106acaf983c5af447d8163656ac421f0c4cf7295d12f15bbdfe7"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8f252458d69fce752b249d8b257fdd59f7e3614e36640666270c3a6a8bd11516",
      "txt_hash": "25a18b3b82f1711bd1d9963aa7f660e7b127c67e027ad32a72d6c40df783cac7"
    }
  },
  "status": "archived"
}