Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Trusted platform modules ST33TPHF2X TPM FIRMWARE 1.512 & 2.512 ST33GTPMA/I TPM FIRMWARE 3.512 & 6.512
ANSSI-CC-2021/40
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
name Trusted platform modules ST33TPHF2X TPM FIRMWARE 1.512 & 2.512 ST33GTPMA/I TPM FIRMWARE 3.512 & 6.512 - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
category Trusted Computing Data Protection
not_valid_before 2021-09-23 2014-11-07
not_valid_after 2026-09-23 2019-11-08
scheme FR DE
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_40en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
status active archived
manufacturer STMicroelectronics Kanguru Solutions
manufacturer_web https://www.st.com/ https://www.kanguru.com
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_40.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021_40.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific TPM, TPM Library specification Family 2.0, Level 0, Revision 1.38, Version 1.2', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/anssi-cc-pp-2020_01_pp.pdf', 'pp_ids': None}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'})
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 3c058cfe9d005d255e830d7d5022e9e248d9e247881bc9e56fe067e927d150c3 None
state/cert/txt_hash 3a33ad311188fcf2eea451ca5c180d1d2819d4184a78eb50f9e9b9559aeafba0 None
state/report/pdf_hash 93b35a364ece3ef03db7d452663228bcc7550631317bcdd26d62cf62602a3389 16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
state/report/txt_hash a87b456fb35b45a30cca0c6170bed623a11e4aae7a6bfb11baefecf5e1d9080b 8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
state/st/pdf_hash d00aec690696214fad6085a1eeb6caac17cd33000e03a54fa7c2cbce98831f51 077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
state/st/txt_hash e252eee86e5d11c233ecc5bd057196bfc3de29c8c3e39df72173f4054191d8a4 74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
heuristics/cert_id ANSSI-CC-2021/40 BSI-DSZ-CC-0772-2014
heuristics/cert_lab None BSI
heuristics/extracted_versions 1.512, 3.512, 2.512, 6.512 2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6
heuristics/report_references/directly_referenced_by ANSSI-CC-2022/48 None
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2022/48 None
heuristics/scheme_data
  • product: Trusted platform modules ST33TPHF2X TPM FIRMWARE 1.512 & 2.512 ST33GTPMA/I TPM FIRMWARE 3.512 & 6.512
  • url: https://cyber.gouv.fr/produits-certifies/trusted-platform-modules-st33tphf2x-tpm-firmware-1512-2512-st33gtpmai-tpm
  • description: Le produit évalué est la famille de TPM : « Trusted platform modules ST33TPHF2X & ST33GTPMA/I, ST33TPHF2X TPM FIRMWARE 1.512 & 2.512 and ST33GTPMA/I TPM FIRMWARE 3.512 & 6.512 » développée par STMICROELECTRONICS GRAND OUEST SAS. Le ST33TPHF2X correspond à une gamme de Trusted Platform Modules (TPM). Cette gamme de produits est destinée à apporter des services de sécurité (démarrage sécurisé, gé
  • sponsor: STMICROELECTRONICS GRAND OUEST SAS
  • developer: STMICROELECTRONICS GRAND OUEST SAS
  • cert_id: 2021/40
  • level: EAL4+
  • expiration_date: 23 Septembre 2026
  • enhanced:
    • cert_id: 2021/40
    • certification_date: 23/09/2021
    • expiration_date: 23/09/2026
    • category: Micro-circuits
    • cc_version: Critères Communs version 3.1r5
    • developer: STMICROELECTRONICS GRAND OUEST SAS
    • sponsor: STMICROELECTRONICS GRAND OUEST SAS
    • evaluation_facility: THALES / CNES
    • level: EAL4+
    • protection_profile: Protection profile PC Client Specific TPM Level 0 Revision 1.38 Version 1.2
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_FLR.1, AVA_VAN.5
    • report_link: https://cyber.gouv.fr/sites/default/files/2021/10/anssi-cc-2021_40.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/2021/10/certificat-anssi-cc-2021_40.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2021/10/anssi-cible-cc-2021_40en.pdf
None
pdf_data/cert_filename certificat-anssi-cc-2021_40.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2021/40: 2
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL4: 1
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.1: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 300494
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20210929173742+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210929173742+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
None
pdf_data/report_filename anssi-cc-2021_40.pdf 0772a_pdf.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • developer: Kanguru Solutions
    • cert_lab: BSI
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2021/40: 2
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
pdf_data/report_keywords/cc_claims
  • A:
    • A.C: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2020/01: 1
  • BSI:
    • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
    • ALC_FLR: 1
    • ALC_GEN: 1
  • AVA:
    • AVA_VAN.5: 1
    • AVA_VAN: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 1
  • ALC_FLR: 1
  • ALC_GEN: 1
  • ALC_FLR.1: 5
  • ALC_FLR: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 1
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_DVS.2: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 1
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.2: 1
  • ALC_TAT.3: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 1 5
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.5: 1
  • AVA_VAN: 1
  • AVA_VAN.1: 1
  • AVA_VAN.2: 1
  • AVA_VAN.3: 1
  • AVA_VAN.4: 1
  • AVA_VAN.5: 1
  • AVA_VAN: 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 1 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 4: 1
  • EAL2: 2
  • EAL7: 1
  • EAL 2: 8
  • EAL 1: 7
  • EAL 4: 7
  • EAL2: 2
  • EAL 3: 4
  • EAL 5: 6
  • EAL 6: 3
  • EAL 7: 4
  • EAL 2 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 1 7
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E6 Elevé: 1
  • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 1
    • FCS_CKM.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_UID.2: 4
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NESLIB v6.5: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • atsec:
    • atsec: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 13
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 17065: 2
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES-256: 1
      • AES: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
    • BSI 7138: 2
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 8
    • STM: 2
  • Microsoft:
    • Microsoft: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 202400
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /Author:
  • /CreationDate: D:20210929150917+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210929150917+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1643286
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141121083051+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
  • /ModDate: D:20141121113713+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0772-2014
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationstechnik
pdf_data/report_metadata//CreationDate D:20210929150917+02'00' D:20141121083051+01'00'
pdf_data/report_metadata//Creator PScript5.dll Version 5.2.2 Writer
pdf_data/report_metadata//ModDate D:20210929150917+02'00' D:20141121113713+01'00'
pdf_data/report_metadata//Producer Acrobat Distiller 11.0 (Windows) LibreOffice 4.2
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0772-2014
pdf_data/report_metadata/pdf_file_size_bytes 202400 1643286
pdf_data/report_metadata/pdf_hyperlinks https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata/pdf_number_of_pages 14 42
pdf_data/st_filename anssi-cible-cc-2021_40en.pdf 0772b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
  • ECC:
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 20
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
    • ANSSI-CC-PP-2020/01: 2
  • BSI:
    • BSI-PP-0025: 6
    • BSI-PP- 0025: 13
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.4: 1
  • ADV_IMP.1: 1
  • ADV_TDS.3: 1
  • ADV_SPM.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 3
  • ALC_CMC.4: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.1: 1
  • ALC_FLR.1: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.1 3 5
pdf_data/st_keywords/cc_sar/ASE
  • ASE_INT: 2
  • ASE_CCL: 2
  • ASE_SPD: 2
  • ASE_ECD: 2
  • ASE_REQ: 2
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 4
  • AVA_VAN.4: 1
  • AVA_VAN.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL4: 2
  • EAL4 augmented: 1
  • EAL2: 4
pdf_data/st_keywords/cc_sfr
  • FCO:
    • FCO_NRO.1: 1
    • FCO_NRO: 6
  • FCS:
    • FCS_RNG.1: 9
    • FCS_CKM: 32
    • FCS_CKM.2: 6
    • FCS_COP.1: 16
    • FCS_CKM.4: 20
    • FCS_CKM.1: 18
    • FCS_CKM.4.1: 1
    • FCS_COP: 46
    • FCS_RNG: 2
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACF.1: 17
    • FDP_ACC.1: 10
    • FDP_IFC.1: 5
    • FDP_ITC.1: 11
    • FDP_ITC.2: 11
    • FDP_ACC: 23
    • FDP_ACC.2: 2
    • FDP_ACF: 25
    • FDP_UIT: 8
    • FDP_UIT.1: 2
    • FDP_RIP.1: 3
    • FDP_ITT.1: 3
    • FDP_SDI.1: 3
    • FDP_ETC: 6
    • FDP_ITC: 6
    • FDP_UCT: 6
  • FIA:
    • FIA_UID.1: 4
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_SOS.2: 3
    • FIA_AFL: 12
    • FIA_UAU.1: 3
    • FIA_UAU.5: 3
    • FIA_UAU.6: 3
    • FIA_USB.1: 3
    • FIA_MSA: 1
  • FMT:
    • FMT_MSA.2: 4
    • FMT_MSA.1: 5
    • FMT_SMR.1: 8
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA: 55
    • FMT_SMF.1: 5
    • FMT_MSA.4: 1
    • FMT_MTD: 6
    • FMT_MOF: 3
  • FPT:
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_FLS: 7
    • FPT_FLS.1: 1
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 3
    • FPT_ITT.1: 3
  • FTP:
    • FTP_ITC.1: 1
    • FTP_TRP.1: 1
    • FTP_ITC: 3
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 9
    • FCS_RNG: 2
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.6: 8
    • FIA_SOS.1: 8
    • FIA_UAU.2: 9
    • FIA_UID.2: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MTD: 12
    • FMT_SMF: 20
    • FMT_SMR.1: 12
    • FMT_SMF.1: 6
    • FMT_MTD.1: 3
    • FMT_MSA.1.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_RCV.4: 8
    • FPT_PHP.1: 8
    • FPT_RCV.4.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 9
  • FCS_CKM: 32
  • FCS_CKM.2: 6
  • FCS_COP.1: 16
  • FCS_CKM.4: 20
  • FCS_CKM.1: 18
  • FCS_CKM.4.1: 1
  • FCS_COP: 46
  • FCS_RNG: 2
  • FCS_RNG.1.1: 2
  • FCS_RNG.1.2: 2
  • FCS_RNG.1: 15
  • FCS_CKM.1: 9
  • FCS_CKM.4: 9
  • FCS_COP.1: 9
  • FCS_RNG: 2
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.2: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 18 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 6 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 20 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 16 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 9 15
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 2 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 2 3
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACF.1: 17
  • FDP_ACC.1: 10
  • FDP_IFC.1: 5
  • FDP_ITC.1: 11
  • FDP_ITC.2: 11
  • FDP_ACC: 23
  • FDP_ACC.2: 2
  • FDP_ACF: 25
  • FDP_UIT: 8
  • FDP_UIT.1: 2
  • FDP_RIP.1: 3
  • FDP_ITT.1: 3
  • FDP_SDI.1: 3
  • FDP_ETC: 6
  • FDP_ITC: 6
  • FDP_UCT: 6
  • FDP_ACC.1: 14
  • FDP_ACF.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_IFC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 10 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 17 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 5 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 11 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 11 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 4
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_SOS.2: 3
  • FIA_AFL: 12
  • FIA_UAU.1: 3
  • FIA_UAU.5: 3
  • FIA_UAU.6: 3
  • FIA_USB.1: 3
  • FIA_MSA: 1
  • FIA_UAU.1: 7
  • FIA_UAU.6: 8
  • FIA_SOS.1: 8
  • FIA_UAU.2: 9
  • FIA_UID.2: 10
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.6.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 3 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 3 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 4 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.2: 4
  • FMT_MSA.1: 5
  • FMT_SMR.1: 8
  • FMT_MSA.2.1: 1
  • FMT_MSA.3: 7
  • FMT_MSA: 55
  • FMT_SMF.1: 5
  • FMT_MSA.4: 1
  • FMT_MTD: 6
  • FMT_MOF: 3
  • FMT_MSA.1: 8
  • FMT_MTD: 12
  • FMT_SMF: 20
  • FMT_SMR.1: 12
  • FMT_SMF.1: 6
  • FMT_MTD.1: 3
  • FMT_MSA.1.1: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 5 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 7 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 6 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 5 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 8 12
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST.1: 6
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FLS: 7
  • FPT_FLS.1: 1
  • FPT_PHP.3: 4
  • FPT_PHP.3.1: 1
  • FPT_STM.1: 3
  • FPT_ITT.1: 3
  • FPT_FLS.1: 9
  • FPT_RCV.4: 8
  • FPT_PHP.1: 8
  • FPT_RCV.4.1: 2
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 1 9
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 1
  • same maskset and revision) and only differ by specific production flows out of scope for this evaluation: 1
  • same integrated circuit (same maskset and revision) and only differ by specific production flows out of scope for this evaluation. The term ST33G1M2AM will be used in this document to refer to both ST33G1M2A: 1
  • Out of scope: 2
  • 11 1.5.4.3 Out of scope : 1
  • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
  • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 4
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 4
  • CFB:
    • CFB: 4
  • OFB:
    • OFB: 3
  • CBC:
    • CBC: 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 3 1
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib 6.5: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 6
  • SHA2:
    • SHA-256: 5
    • SHA-384: 4
    • SHA256: 1
  • SHA3:
    • SHA3-256: 4
    • SHA3-384: 3
    • SHA-3: 1
  • SHA2:
    • SHA-256: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 5
  • SHA-384: 4
  • SHA256: 1
  • SHA-256: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 5 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 2
  • PRNG:
    • PRNG: 1
    • DRBG: 6
  • RNG:
    • RNG: 13
  • RNG:
    • RNG: 14
pdf_data/st_keywords/randomness/RNG/RNG 13 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 2
    • side channel: 1
    • SPA: 1
    • DPA: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 197: 3
    • FIPS 180-4: 5
    • FIPS 202: 3
    • FIPS 198-1: 4
    • FIPS PUB 186-4: 1
    • FIPS 186-4: 2
    • FIPS 140-2: 2
    • FIPS PUB 140-2: 1
  • NIST:
    • SP 800-38A: 3
    • SP 800-56A: 3
    • NIST SP 800-90A: 2
    • SP 800-17: 1
  • PKCS:
    • PKCS#1: 2
  • BSI:
    • AIS 20: 3
    • AIS20: 1
  • RFC:
    • RFC 3447: 7
    • RFC 2104: 1
    • RFC2104: 1
  • ISO:
    • ISO/IEC 15946-5: 3
    • ISO/IEC 9796-2: 2
    • ISO/IEC 9797-2: 2
    • ISO/IEC 10116: 2
    • ISO/IEC 10118-3: 2
    • ISO/IEC 14888-3: 2
    • ISO/IEC 18033-3: 2
    • ISO/IEC 10116:2006: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-04: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS 20: 3
  • AIS20: 1
  • AIS 20: 1
  • AIS 31: 1
pdf_data/st_keywords/standard_id/BSI/AIS 20 3 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-128: 1
      • AES: 11
  • DES:
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 19
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES-128: 1
  • AES: 11
  • AES: 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 11 3
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 14
pdf_data/st_metadata
  • pdf_file_size_bytes: 533298
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 55
  • /Title: ST33TPHF2X/GTPMA
  • /Author: Olivier COLLART
  • /Subject: Security Target
  • /Creator: Microsoft® Word for Microsoft 365
  • /CreationDate: D:20210728080626+02'00'
  • /ModDate: D:20210728080626+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf, https://www.st.com/resource/en/technical_note/dm00711714-st-trusted-platform-module-tpm-endorsement-key-ek-certificates-stmicroelectronics.pdf
  • pdf_file_size_bytes: 704587
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
  • /Subject:
  • /Title: Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
  • /Creator: Unknown
  • /Author: Andreas Siegert (generated by CCTool version 2.8)
  • /Producer: XEP 4.23
  • /application: CCTool version x.y
  • /Trapped: /False
  • /CreationDate: D:20141006150157Z
  • /ModDate: D:20141006150157Z
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata//Author Olivier COLLART Andreas Siegert (generated by CCTool version 2.8)
pdf_data/st_metadata//CreationDate D:20210728080626+02'00' D:20141006150157Z
pdf_data/st_metadata//Creator Microsoft® Word for Microsoft 365 Unknown
pdf_data/st_metadata//ModDate D:20210728080626+02'00' D:20141006150157Z
pdf_data/st_metadata//Producer Microsoft® Word for Microsoft 365 XEP 4.23
pdf_data/st_metadata//Subject Security Target
pdf_data/st_metadata//Title ST33TPHF2X/GTPMA Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
pdf_data/st_metadata/pdf_file_size_bytes 533298 704587
pdf_data/st_metadata/pdf_hyperlinks https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf, https://www.st.com/resource/en/technical_note/dm00711714-st-trusted-platform-module-tpm-endorsement-key-ek-certificates-stmicroelectronics.pdf http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata/pdf_number_of_pages 55 41
dgst 31e526971c74c794 eda06ca3c208ebd0