name |
Trusted platform modules ST33TPHF2X TPM FIRMWARE 1.512 & 2.512 ST33GTPMA/I TPM FIRMWARE 3.512 & 6.512
|
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
|
category |
Trusted Computing
|
Data Protection
|
not_valid_before |
2021-09-23
|
2014-11-07
|
not_valid_after |
2026-09-23
|
2019-11-08
|
scheme |
FR
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_40en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
|
status |
active
|
archived
|
manufacturer |
STMicroelectronics
|
Kanguru Solutions
|
manufacturer_web |
https://www.st.com/
|
https://www.kanguru.com
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_40.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021_40.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PC Client Specific TPM, TPM Library specification Family 2.0, Level 0, Revision 1.38, Version 1.2', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/anssi-cc-pp-2020_01_pp.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) |
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
3c058cfe9d005d255e830d7d5022e9e248d9e247881bc9e56fe067e927d150c3
|
None
|
state/cert/txt_hash |
3a33ad311188fcf2eea451ca5c180d1d2819d4184a78eb50f9e9b9559aeafba0
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
93b35a364ece3ef03db7d452663228bcc7550631317bcdd26d62cf62602a3389
|
16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
|
state/report/txt_hash |
a87b456fb35b45a30cca0c6170bed623a11e4aae7a6bfb11baefecf5e1d9080b
|
8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
d00aec690696214fad6085a1eeb6caac17cd33000e03a54fa7c2cbce98831f51
|
077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
|
state/st/txt_hash |
e252eee86e5d11c233ecc5bd057196bfc3de29c8c3e39df72173f4054191d8a4
|
74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2021/40
|
BSI-DSZ-CC-0772-2014
|
heuristics/cert_lab |
None
|
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.512, 3.512, 2.512, 6.512 |
2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2022/48 |
None
|
heuristics/report_references/directly_referencing |
None
|
None
|
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2022/48 |
None
|
heuristics/report_references/indirectly_referencing |
None
|
None
|
heuristics/scheme_data |
- product:
Trusted platform modules ST33TPHF2X TPM FIRMWARE 1.512 & 2.512 ST33GTPMA/I TPM FIRMWARE 3.512 & 6.512
- url:
https://cyber.gouv.fr/produits-certifies/trusted-platform-modules-st33tphf2x-tpm-firmware-1512-2512-st33gtpmai-tpm
- description:
Le produit évalué est la famille de TPM : « Trusted platform modules ST33TPHF2X & ST33GTPMA/I, ST33TPHF2X TPM FIRMWARE 1.512 & 2.512 and ST33GTPMA/I TPM FIRMWARE 3.512 & 6.512 » développée par STMICROELECTRONICS GRAND OUEST SAS.
Le ST33TPHF2X correspond à une gamme de Trusted Platform Modules (TPM). Cette gamme de produits est destinée à apporter des services de sécurité (démarrage sécurisé, gé
- sponsor:
STMICROELECTRONICS GRAND OUEST SAS
- developer:
STMICROELECTRONICS GRAND OUEST SAS
- cert_id:
2021/40
- level:
EAL4+
- expiration_date:
23 Septembre 2026
- enhanced:
- cert_id:
2021/40
- certification_date:
23/09/2021
- expiration_date:
23/09/2026
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r5
- developer:
STMICROELECTRONICS GRAND OUEST SAS
- sponsor:
STMICROELECTRONICS GRAND OUEST SAS
- evaluation_facility:
THALES / CNES
- level:
EAL4+
- protection_profile:
Protection profile PC Client Specific TPM Level 0 Revision 1.38 Version 1.2
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_FLR.1, AVA_VAN.5
- report_link:
https://cyber.gouv.fr/sites/default/files/2021/10/anssi-cc-2021_40.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/2021/10/certificat-anssi-cc-2021_40.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2021/10/anssi-cible-cc-2021_40en.pdf
|
None
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-anssi-cc-2021_40.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
300494
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
- /CreationDate:
D:20210929173742+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20210929173742+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
anssi-cc-2021_40.pdf
|
0772a_pdf.pdf
|
pdf_data/report_frontpage |
|
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-0772-2014
- cert_item:
Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
- developer:
Kanguru Solutions
- cert_lab:
BSI
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_FLR.1:
1
- ALC_FLR:
1
- ALC_GEN:
1
- AVA:
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
2
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_FLR.1:
1
- ALC_FLR:
1
- ALC_GEN: 1
|
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 |
1
|
5
|
pdf_data/report_keywords/cc_sar/AVA |
|
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5:
1
- AVA_VAN:
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
1
|
2
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL 2: 8
- EAL 1: 7
- EAL 4:
7
- EAL2:
2
- EAL 3: 4
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL 2 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
1
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_COP.1:
1
- FCS_CKM.1:
1
- FCS_RNG.1:
1
- FDP:
- FDP_ACC.1:
2
- FDP_ACF.1:
2
- FIA:
- FIA_UID.2:
4
- FIA_UAU.2:
4
- FIA_UAU.6:
1
- FIA_SOS.1:
1
- FMT:
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMF.1:
1
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User:
1
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- BSI:
- ISO:
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102:
1
- BSI 7138:
2
- BSI 7125:
2
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- STMicroelectronics:
- STMicroelectronics:
8
- STM:
2
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
202400
- pdf_is_encrypted:
False
- pdf_number_of_pages:
14
- /Author:
- /CreationDate:
D:20210929150917+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20210929150917+02'00'
- /Producer:
Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1643286
- pdf_is_encrypted:
False
- pdf_number_of_pages:
42
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20141121083051+01'00'
- /Creator:
Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
- /ModDate:
D:20141121113713+01'00'
- /Producer:
LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-0772-2014
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
|
pdf_data/report_metadata//Author |
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20210929150917+02'00'
|
D:20141121083051+01'00'
|
pdf_data/report_metadata//Creator |
PScript5.dll Version 5.2.2
|
Writer
|
pdf_data/report_metadata//ModDate |
D:20210929150917+02'00'
|
D:20141121113713+01'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 11.0 (Windows)
|
LibreOffice 4.2
|
pdf_data/report_metadata//Title |
|
Certification Report BSI-DSZ-CC-0772-2014
|
pdf_data/report_metadata/pdf_file_size_bytes |
202400
|
1643286
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
14
|
42
|
pdf_data/st_filename |
anssi-cible-cc-2021_40en.pdf
|
0772b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- ANSSI:
- ANSSI-CC-PP-:
1
- ANSSI-CC-PP-2020/01:
2
|
- BSI:
- BSI-PP-0025:
6
- BSI-PP- 0025:
13
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
|
- ADV_SPM.1: 2
- ADV_ARC.1:
1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.1:
3
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
|
- ALC_FLR.1:
5
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.1 |
3
|
5
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_INT: 2
- ASE_CCL: 2
- ASE_SPD: 2
- ASE_ECD: 2
- ASE_REQ: 2
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_VAN.5:
4
- AVA_VAN.4:
1
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4:
2
- EAL4 augmented:
1
|
|
pdf_data/st_keywords/cc_sfr |
- FCO:
- FCS:
- FCS_RNG.1:
9
- FCS_CKM:
32
- FCS_CKM.2:
6
- FCS_COP.1:
16
- FCS_CKM.4:
20
- FCS_CKM.1:
18
- FCS_CKM.4.1:
1
- FCS_COP:
46
- FCS_RNG:
2
- FCS_RNG.1.1:
2
- FCS_RNG.1.2:
2
- FDP:
- FDP_ACF.1:
17
- FDP_ACC.1:
10
- FDP_IFC.1:
5
- FDP_ITC.1:
11
- FDP_ITC.2:
11
- FDP_ACC:
23
- FDP_ACC.2:
2
- FDP_ACF:
25
- FDP_UIT:
8
- FDP_UIT.1:
2
- FDP_RIP.1:
3
- FDP_ITT.1:
3
- FDP_SDI.1:
3
- FDP_ETC:
6
- FDP_ITC:
6
- FDP_UCT:
6
- FIA:
- FIA_UID.1:
4
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.2:
3
- FIA_AFL:
12
- FIA_UAU.1:
3
- FIA_UAU.5:
3
- FIA_UAU.6:
3
- FIA_USB.1:
3
- FIA_MSA:
1
- FMT:
- FMT_MSA.2:
4
- FMT_MSA.1:
5
- FMT_SMR.1:
8
- FMT_MSA.2.1:
1
- FMT_MSA.3:
7
- FMT_MSA:
55
- FMT_SMF.1:
5
- FMT_MSA.4:
1
- FMT_MTD:
6
- FMT_MOF:
3
- FPT:
- FPT_TST.1:
6
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_FLS:
7
- FPT_FLS.1:
1
- FPT_PHP.3:
4
- FPT_PHP.3.1:
1
- FPT_STM.1:
3
- FPT_ITT.1:
3
- FTP:
- FTP_ITC.1:
1
- FTP_TRP.1:
1
- FTP_ITC:
3
|
- FAU:
- FCS:
- FCS_RNG.1:
15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
- FDP:
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
- FIA:
- FIA_UAU.1:
7
- FIA_UAU.6:
8
- FIA_SOS.1:
8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.6.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF:
20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1:
1
- FMT_MTD.1.1:
2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
- FPT:
- FPT_FLS.1:
9
- FPT_RCV.4:
8
- FPT_PHP.1:
8
- FPT_RCV.4.1:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1:
9
- FCS_CKM: 32
- FCS_CKM.2:
6
- FCS_COP.1:
16
- FCS_CKM.4:
20
- FCS_CKM.1:
18
- FCS_CKM.4.1:
1
- FCS_COP: 46
- FCS_RNG:
2
- FCS_RNG.1.1:
2
- FCS_RNG.1.2:
2
|
- FCS_RNG.1:
15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG:
2
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
3
- FCS_CKM.1.1: 1
- FCS_CKM.4.1:
1
- FCS_COP.1.1: 1
- FCS_CKM.2:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
18
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
6
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
20
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
16
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
9
|
15
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACF.1:
17
- FDP_ACC.1:
10
- FDP_IFC.1:
5
- FDP_ITC.1:
11
- FDP_ITC.2:
11
- FDP_ACC: 23
- FDP_ACC.2: 2
- FDP_ACF: 25
- FDP_UIT: 8
- FDP_UIT.1: 2
- FDP_RIP.1: 3
- FDP_ITT.1: 3
- FDP_SDI.1: 3
- FDP_ETC: 6
- FDP_ITC: 6
- FDP_UCT: 6
|
- FDP_ACC.1:
14
- FDP_ACF.1:
13
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_IFC.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
10
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
17
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
5
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
11
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
11
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_UID.1:
4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_SOS.2: 3
- FIA_AFL: 12
- FIA_UAU.1:
3
- FIA_UAU.5: 3
- FIA_UAU.6:
3
- FIA_USB.1: 3
- FIA_MSA: 1
|
- FIA_UAU.1:
7
- FIA_UAU.6:
8
- FIA_SOS.1: 8
- FIA_UAU.2: 9
- FIA_UID.2: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.2.1: 1
- FIA_UID.2.1: 1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 |
3
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.2: 4
- FMT_MSA.1:
5
- FMT_SMR.1:
8
- FMT_MSA.2.1: 1
- FMT_MSA.3:
7
- FMT_MSA: 55
- FMT_SMF.1:
5
- FMT_MSA.4: 1
- FMT_MTD:
6
- FMT_MOF: 3
|
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF: 20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1: 3
- FMT_MSA.1.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1.1: 2
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_MSA.3:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
5
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
7
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
6
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
5
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
8
|
12
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_FLS: 7
- FPT_FLS.1:
1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_STM.1: 3
- FPT_ITT.1: 3
|
- FPT_FLS.1:
9
- FPT_RCV.4: 8
- FPT_PHP.1: 8
- FPT_RCV.4.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
1
|
9
|
pdf_data/st_keywords/certification_process/OutOfScope |
- out of scope:
1
- same maskset and revision) and only differ by specific production flows out of scope for this evaluation:
1
- same integrated circuit (same maskset and revision) and only differ by specific production flows out of scope for this evaluation. The term ST33G1M2AM will be used in this document to refer to both ST33G1M2A:
1
|
- Out of scope:
2
- 11 1.5.4.3 Out of scope :
1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5:
1
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
3
|
1
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
- SHA1:
- SHA2:
- SHA-256:
5
- SHA-384:
4
- SHA256:
1
- SHA3:
- SHA3-256:
4
- SHA3-384:
3
- SHA-3:
1
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-256:
5
- SHA-384: 4
- SHA256: 1
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
5
|
1
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
13
|
14
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- physical probing:
2
- side channel:
1
- SPA:
1
- DPA:
1
- timing attacks:
1
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 197:
3
- FIPS 180-4:
5
- FIPS 202:
3
- FIPS 198-1:
4
- FIPS PUB 186-4:
1
- FIPS 186-4:
2
- FIPS 140-2:
2
- FIPS PUB 140-2:
1
- NIST:
- SP 800-38A:
3
- SP 800-56A:
3
- NIST SP 800-90A:
2
- SP 800-17:
1
- PKCS:
- BSI:
- RFC:
- RFC 3447:
7
- RFC 2104:
1
- RFC2104:
1
- ISO:
- ISO/IEC 15946-5:
3
- ISO/IEC 9796-2:
2
- ISO/IEC 9797-2:
2
- ISO/IEC 10116:
2
- ISO/IEC 10118-3:
2
- ISO/IEC 14888-3:
2
- ISO/IEC 18033-3:
2
- ISO/IEC 10116:2006:
1
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-04:
1
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS 20 |
3
|
1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
11
|
3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
533298
- pdf_is_encrypted:
False
- pdf_number_of_pages:
55
- /Title:
ST33TPHF2X/GTPMA
- /Author:
Olivier COLLART
- /Subject:
Security Target
- /Creator:
Microsoft® Word for Microsoft 365
- /CreationDate:
D:20210728080626+02'00'
- /ModDate:
D:20210728080626+02'00'
- /Producer:
Microsoft® Word for Microsoft 365
- pdf_hyperlinks:
https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf, https://www.st.com/resource/en/technical_note/dm00711714-st-trusted-platform-module-tpm-endorsement-key-ek-certificates-stmicroelectronics.pdf
|
- pdf_file_size_bytes:
704587
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
- /Subject:
- /Title:
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
- /Creator:
Unknown
- /Author:
Andreas Siegert (generated by CCTool version 2.8)
- /Producer:
XEP 4.23
- /application: CCTool version x.y
- /Trapped: /False
- /CreationDate:
D:20141006150157Z
- /ModDate:
D:20141006150157Z
- pdf_hyperlinks:
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
|
pdf_data/st_metadata//Author |
Olivier COLLART
|
Andreas Siegert (generated by CCTool version 2.8)
|
pdf_data/st_metadata//CreationDate |
D:20210728080626+02'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Creator |
Microsoft® Word for Microsoft 365
|
Unknown
|
pdf_data/st_metadata//ModDate |
D:20210728080626+02'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Producer |
Microsoft® Word for Microsoft 365
|
XEP 4.23
|
pdf_data/st_metadata//Subject |
Security Target
|
|
pdf_data/st_metadata//Title |
ST33TPHF2X/GTPMA
|
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
|
pdf_data/st_metadata/pdf_file_size_bytes |
533298
|
704587
|
pdf_data/st_metadata/pdf_hyperlinks |
https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf, https://www.st.com/resource/en/technical_note/dm00711714-st-trusted-platform-module-tpm-endorsement-key-ek-certificates-stmicroelectronics.pdf |
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
55
|
41
|
dgst |
31e526971c74c794
|
eda06ca3c208ebd0
|