name |
HDD Data Encryption Kit E-Series 2.10 |
ST31G480 C01 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
25.04.2021 |
27.09.2024 |
not_valid_before |
25.04.2016 |
05.10.2017 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2017_61-S02.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_61fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2017_61en.pdf |
manufacturer |
Canon Inc. |
STMicroelectronics |
manufacturer_web |
https://www.canon.com/ |
https://www.st.com/ |
security_level |
EAL3 |
ADV_IMP.2, ALC_FLR.1, ALC_CMC.5, EAL5+, AVA_VAN.5, ATE_COV.3, ASE_TSS.2, ALC_TAT.3, ATE_FUN.2, ADV_TDS.5, ADV_INT.3, ALC_DVS.2 |
dgst |
62bf2f602b0262f1 |
f33745c129c16feb |
heuristics/cert_id |
JISEC-CC-CRP-C0506 |
ANSSI-CC-2017/61 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3 |
heuristics/extracted_versions |
2.10 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1073-2019, BSI-DSZ-CC-1074-2019, ANSSI-CC-2019/08 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2016/58 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1073-V2-2020, BSI-DSZ-CC-1074-2019, BSI-DSZ-CC-1074-V2-2020, ANSSI-CC-2019/08, BSI-DSZ-CC-1073-2019 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2016/58 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0506
- certification_date: 01.04.2016
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0506_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an optional hardware product to encrypt data to be stored in the HDD of Canon Multifunctional Product (MFP) and printer. By using this product, data to be stored in the HDD can be encrypted without compromising the scalability or processing performance of the Canon MFP and printer. TOE security functionality The TOE provides the following security functions. - HDD Data Encryption - Cryptographic Key Management - Self-Test
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: HDD Data Encryption Kit E-Series
- product_type: Cryptographic hardware for MFPs and printers
- report_link: https://www.ipa.go.jp/en/security/c0506_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0506_est.pdf
- toe_version: 2.10
- vendor: Canon Inc.
- expiration_date: 01.05.2021
- revalidations: [frozendict({'date': '2017-04', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534_02.html'})]
- supplier: Canon Inc.
- toe_japan_name: HDD Data Encryption Kit E-Series 2.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534.html
- toe_overseas_name: HDD Data Encryption Kit E-Series 2.11
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2019/16, BSI-DSZ-CC-1073-2019, BSI-DSZ-CC-1074-2019 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2019/16, BSI-DSZ-CC-1073-2019, BSI-DSZ-CC-1074-2019 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
certificat ANSSI-CC-2017_61-S02.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 1
- ALC_TAT.3: 1
- ASE:
- ATE:
- ATE_COV.3: 1
- ATE_FUN.2: 1
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: jchuzel
- /CreationDate: D:20210318180428+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210318180428+01'00'
- /Producer: GPL Ghostscript 9.50
- /Title: Microsoft Word - certificat ANSSI-CC-2017_61-S02.docx
- pdf_file_size_bytes: 1913917
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0506_erpt.pdf |
anssi-cc-2017_61fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/61
- cert_item: ST31G480 C01 including optional cryptographic library NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
- cert_item_version: C01
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité au package “Loader dedicated for usage in Secured Environment only
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0506-01: 1
- Certification No. C0506: 1
|
- FR:
- ANSSI-CC-2016/58: 1
- ANSSI-CC-2017/61: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_INT: 1
- ADV_INT.3: 2
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.5: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 2
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 2
- ALC_FLR.1: 3
- ALC_LCD: 1
- ALC_TAT: 1
- ALC_TAT.3: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 2
- ATE:
- ATE_COV: 1
- ATE_COV.3: 2
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.2: 2
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL_ACCESS_MANAGED: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- Serma:
- Serma Safety & Security: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib 4.2: 2
- NesLib 4.2.10: 2
- NesLib 5.2: 2
- NesLib 5.2.0: 2
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20160715155737+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160715155828+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 447686
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 29
|
- /Category: C01
- /Comments: STMicroelectronics
- /Company: SGDSN/ANSSI
- /CreationDate: D:20171006153354+02'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.025
- /ModDate: D:20171009115848+02'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20171006133134
- /Subject:
- /Title:
- pdf_file_size_bytes: 192820
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
c0506_est.pdf |
anssi-cible2017_61en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 8
- BSI-CC-PP-0084-: 3
- BSI-CC-PP-0084-2014: 65
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL5: 14
- EAL5 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 2
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.2: 4
- ADV_INT.3: 4
- ADV_SPM: 1
- ADV_TDS.5: 4
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 4
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 6
- ALC_LCD.1: 1
- ALC_TAT.3: 4
- ASE:
- ASE_CCL: 4
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 22
- ASE_OBJ.2: 1
- ASE_REQ: 52
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 12
- ASE_SPD.1: 1
- ASE_TSS: 14
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 3
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 4
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FPT:
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 22
- FCS_CKM.4: 22
- FCS_COP.1: 52
- FCS_RNG: 2
- FCS_RNG.1: 8
- FDP:
- FDP_ACC.1: 61
- FDP_ACC.2: 12
- FDP_ACF.1: 63
- FDP_CKM.2: 1
- FDP_IFC.1: 21
- FDP_ITC.1: 15
- FDP_ITC.2: 24
- FDP_ITT.1: 10
- FDP_RIP.1: 18
- FDP_ROL.1: 9
- FDP_SDC: 2
- FDP_SDC.1: 8
- FDP_SDI.2: 8
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FIA:
- FIA_UAU.2: 18
- FIA_UAU.5: 19
- FIA_UID.1: 14
- FIA_UID.2: 22
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 2
- FMT_LIM.1: 17
- FMT_LIM.2: 18
- FMT_MSA.1: 44
- FMT_MSA.3: 58
- FMT_MTD.1: 18
- FMT_SMF.1: 38
- FMT_SMR.1: 40
- FPR:
- FPT:
- FPT_FLS.1: 17
- FPT_ITT.1: 9
- FPT_PHP.3: 11
- FPT_RPL.1: 22
- FPT_TDC.1: 20
- FPT_TRP.1: 17
- FRU:
- FRU_FLT.2: 13
- FRU_RSA.2: 18
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.3: 5
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL_ACCESS_MANAGED: 3
- O:
- O.CORRECT_TSF_OPERATION: 4
- O.CORRECT_TSF_OPETATION: 2
- O.CRYPTO: 7
- OE:
- OE.PHYSICAL_ACCESS_MANAGED: 6
- T:
|
- O:
- O.C: 2
- O.MAC-: 1
- O.RND: 4
- R:
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- NXP:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 46
- AES-: 1
- AES-128: 1
- AES-192: 1
- DES:
- 3DES:
- TDEA: 1
- TDES: 10
- Triple-DES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- Keccak:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 5
- SHA-256: 8
- SHA-384: 5
- SHA-512: 5
- SHA3:
- SHA-3: 1
- SHA3-224: 4
- SHA3-256: 4
- SHA3-384: 4
- SHA3-512: 4
- SHAKE:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Neslib:
- NesLib 4.2: 1
- NesLib 4.2.10: 3
- NesLib 5.2: 21
- NesLib 5.2.0: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 13
- malfunction: 6
- physical tampering: 1
- SCA:
- Leak-Inherent: 12
- Physical Probing: 4
- physical probing: 3
- side channel: 9
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 63
- CCMB-2012-09-003: 2
- FIPS:
- FIPS PUB 140-2: 5
- FIPS PUB 180-2: 5
- FIPS PUB 186-4: 4
- FIPS PUB 197: 4
- FIPS PUB 198-1: 3
- FIPS PUB 202: 6
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14888: 2
- ISO/IEC 18092: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38B: 1
- NIST SP 800-56A: 3
- NIST SP 800-67: 3
- NIST SP 800-90: 4
- SP 800-38A: 2
- SP 800-67: 1
- SP 800-90A: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib, MIFARE DESFire EV1, and MIFARE Plus X when they are embedded: 1
- The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib, MIFARE DESFire EV1, and MIFARE Plus X when they are embedded: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20160715151953+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords:
- /ModDate: D:20160715151954+09'00'
- /Producer: Adobe LiveCycle PDFGenerator
- /Subject:
- /Title: HDD Data Encryption Kit E-Series Security Target
- pdf_file_size_bytes: 420636
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
- /CreationDate: D:20170623111915Z
- /Creator: FrameMaker 11.0
- /ModDate: D:20171009115904+02'00'
- /Producer: Acrobat Elements 10.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 1891357
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 127
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |