name |
System Software for e-STUDIO202L/232/282 V1.0 |
Microcontrôleurs sécurisés ST33G1M2A et ST33G1M2M révision G, Firmware révision 1.3.2, incluant optionnellement la bibliothèque cryptographique Neslib 4.2.10 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
16.02.2017 |
not_valid_before |
29.03.2006 |
16.02.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_02.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible_Lite_2017_02.pdf |
manufacturer |
Toshiba TEC Corporation |
STMicroelectronics |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.st.com/ |
security_level |
EAL3 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
79cf3cf36c8217af |
33875a8b0eef6aff |
heuristics/cert_id |
JISEC-CC-CRP-C0043 |
ANSSI-CC-2017/02 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.0 |
1.3.2, 4.2.10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2019/37, ANSSI-CC-2017/73 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2014/46, ANSSI-CC-2016/33 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1131-2020, BSI-DSZ-CC-1131-V2-2023, ANSSI-CC-2017/73, BSI-DSZ-CC-1111-2019, ANSSI-CC-2019/37, BSI-DSZ-CC-1070-2018 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2015/80, ANSSI-CC-2014/46, ANSSI-CC-2016/33, ANSSI-CC-2015/36 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0043
- certification_date: 01.03.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0043_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is the system software of the digital multi function device “ e-STUDIO202L/232/282 ” manufactured by TOSHIBA TEC CORPORATION. The system software provides general functions as a digital multifunction device as well as the function of data overwrite and complete deletion on the user document data deleted from the e-STUDIO202L/232/282 HDD. The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
- product: System Software for e-STUDIO202L/232/282
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0043_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0043_est.pdf
- toe_version: V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.01.2011
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: System Software for e-STUDIO202L/232/282 V1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0043_it5057.html
- toe_overseas_name: System Software for e-STUDIO 202L/232/282 V1.0
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0043_erpt.pdf |
ANSSI-CC-2017_02.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL5 Augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: CC version 3.1 révision 4
- cert_id: ANSSI-CC-2017/02
- cert_item: Microcontrôleurs sécurisés ST33G1M2A et ST33G1M2M révision G, Firmware révision 1.3.2, incluant optionnellement la bibliothèque cryptographique Neslib 4.2.10
- cert_item_version: Référence maskset K8H0A, révision interne G, firmware révision 1.3.2
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0043-01: 1
- Certification No. C0043: 1
|
- FR:
- ANSSI-CC-2014/46: 1
- ANSSI-CC-2016/33: 1
- ANSSI-CC-2017/02: 21
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL5: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.STOREDATA_ACCESS: 1
- T.TEMPDATA_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib 4.2: 3
- NesLib v4.1: 2
- NesLib v4.2.10: 1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20060515142139+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20060515142342+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 546561
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2017_02_LATOURAM
- pdf_file_size_bytes: 282497
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
c0043_est.pdf |
Cible_Lite_2017_02.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 17
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_RIP.2: 8
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.4: 4
- FCS_COP.1: 29
- FCS_RNG: 1
- FCS_RNG.1: 7
- FDP:
- FDP_ACC.1: 27
- FDP_ACC.2: 13
- FDP_ACF.1: 38
- FDP_CKM.2: 1
- FDP_IFC.1: 16
- FDP_ITC.1: 14
- FDP_ITC.2: 2
- FDP_ITT.1: 11
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 1
- FMT_LIM.1: 20
- FMT_LIM.2: 19
- FMT_MSA.1: 28
- FMT_MSA.2: 1
- FMT_MSA.3: 38
- FMT_SMF.1: 18
- FMT_SMR.1: 10
- FPT:
- FPT_FLS.1: 12
- FPT_ITT.1: 10
- FPT_PHP.3: 12
- FRU:
|
pdf_data/st_keywords/cc_claims |
- O:
- O.STOREDATA_OVERWRITE: 4
- O.TEMPDATA_OVERWRITE: 6
- OE:
- OE.HDD_ERASE: 3
- OE.OVERWRITE_COMPLETE: 3
- T:
- T.STOREDATA_ACCESS: 3
- T.TEMPDATA_ACCESS: 4
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 14
- AES-: 1
- AES-128: 1
- AES-192: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 1
- HMAC: 4
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 6
- SHA-256: 9
- SHA-384: 6
- SHA-512: 5
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Neslib:
- NESLIB 4.2.10: 1
- NesLib 4.2: 2
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 12
- Physical Probing: 4
- physical probing: 3
- side channel: 6
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 19
- CCMB-2012-09-003: 2
- FIPS:
- FIPS 186-4: 4
- FIPS PUB 140-2: 5
- FIPS PUB 180-2: 5
- FIPS PUB 197: 4
- FIPS PUB 198-1: 2
- ISO:
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 2
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38B: 1
- NIST SP 800-56A: 3
- NIST SP 800-67: 3
- NIST SP 800-90: 4
- SP 800-38A: 2
- SP 800-67: 1
- SP 800-90A: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 32 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib when it is embedded: 1
- 20]. 32 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib when it is embedded. 33 The user guidance documentation, part of: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /CreationDate: D:20060512044538Z
- /ModDate: D:20060731114807+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: 2006/7/31 update
- pdf_file_size_bytes: 741778
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: Christiane DROULERS
- /CreationDate: D:20170112141113Z
- /Creator: FrameMaker 11.0
- /ModDate: D:20170112142849+01'00'
- /Producer: Acrobat Elements 10.0.0 (Windows)
- /Title: SMD_ST33G_V1_2.book
- pdf_file_size_bytes: 1279244
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |