| name |
Data Security Kit(D) Software V1.00J |
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8 |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
archived |
| not_valid_after |
31.01.2013 |
01.09.2019 |
| not_valid_before |
31.10.2006 |
21.07.2014 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0056_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014-46%20-%20OriginalSigné.pdf |
| st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-46en.pdf |
| manufacturer |
KYOCERA MITA Corporation |
STMicroelectronics |
| manufacturer_web |
https://www.kyoceramita.com/ |
https://www.st.com/ |
| security_level |
EAL3 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
9262d09036bb0e7c |
911af0b28d2e5f4e |
| heuristics/cert_id |
JISEC-CC-CRP-C0056 |
ANSSI-CC-2014/46 |
| heuristics/cert_lab |
[] |
THALES |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
{} |
ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, AGD_PRE.1, ALC_CMS.5, ATE_IND.2, ATE_DPT.3, AVA_VAN.5, ATE_FUN.1, AGD_OPE.1, ATE_COV.2, ALC_CMC.4, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1, ADV_INT.2, ALC_TAT.2, ADV_IMP.1 |
| heuristics/extracted_versions |
1.00 |
3.7, 3.8, 4.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2017/02, ANSSI-CC-2016/22, CRP280 |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2017/73, BSI-DSZ-CC-1131-2020, BSI-DSZ-CC-1111-2019, ANSSI-CC-2017/02, BSI-DSZ-CC-1131-V2-2023, BSI-DSZ-CC-1070-2018, ANSSI-CC-2016/22, ANSSI-CC-2016/31, ANSSI-CC-2019/37, CRP280 |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0151
- certification_date: 01.03.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0151_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is installed as an option to the MFPs "KM-2560, KM-3060, KM-2560i, KM-3060i, CS-2560, CS-3060" of KYOCERA MITA Corporation. It is used to protect the image data that exists on HDD during or after each processing the copy function, the print function, the network scanning function, and the fax (sending and receiving) function from an illegal exposure. TOE security functions To defend assets to be protected in relation to the use of the above-mentioned basic functions, the TOE has the following security functions: - Hard disk accumulation data overwrite deletion function - Hard disk accumulation data encryption function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Data Security Kit(C) Type II Software
- product_type: IT Product (data protection function in digital MFP)
- toe_version: V2.40
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2013
- supplier: KYOCERA MITA Corporation
- toe_japan_name: Data Security Kit (C) Type II Software V2.40
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0151_it7182.html
- toe_overseas_name: Data Security Kit (C) Type II Software V2.40
|
|
| heuristics/st_references/directly_referenced_by |
{} |
CRP280, ANSSI-CC-2016/22 |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
CRP280, ANSSI-CC-2016/22 |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
f6d23054061d72ba |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0056_ecvr.pdf |
ANSSI-CC-2014-46 - OriginalSigné.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL5 Augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: CC version 3.1 révision 4
- cert_id: ANSSI-CC-2014/46
- cert_item: Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8
- cert_item_version: Référence maskset K8H0A, révision interne F, firmware révision 9
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0056: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 2
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
- Neslib:
- NesLib 4.1: 3
- NesLib v4.1: 3
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20061102201015+09'00'
- /ModDate: D:20061102201015+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12181
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Duquesnoy
- /CreationDate: D:20140721174339+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.010
- /ModDate: D:20140721174339+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8
- /Title: ANSSI-CC-2014/46
- pdf_file_size_bytes: 783296
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
| pdf_data/st_filename |
|
ANSSI-CC-cible_2014-46en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 2
- EAL4: 1
- EAL5: 17
|
| pdf_data/st_keywords/cc_sar |
|
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.4: 13
- FCS_COP.1: 34
- FCS_RNG: 1
- FCS_RNG.1: 7
- FDP:
- FDP_ACC.1: 42
- FDP_ACC.2: 12
- FDP_ACF.1: 47
- FDP_CKM.2: 1
- FDP_IFC.1: 15
- FDP_ITC.1: 14
- FDP_ITC.2: 13
- FDP_ITT.1: 7
- FDP_RIP.1: 9
- FDP_ROL.1: 9
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FIA:
- FIA_UAU.2: 9
- FIA_UAU.5: 10
- FIA_UID.1: 2
- FIA_UID.2: 11
- FMT:
- FMT_ITC.1: 1
- FMT_LIM: 1
- FMT_LIM.1: 18
- FMT_LIM.2: 17
- FMT_MSA.1: 36
- FMT_MSA.2: 1
- FMT_MSA.3: 46
- FMT_MTD.1: 9
- FMT_SMF.1: 27
- FMT_SMR.1: 22
- FPR:
- FPT:
- FPT_FLS.1: 10
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_RPL.1: 10
- FPT_TDC.1: 10
- FPT_TRP.1: 6
- FRU:
- FRU_FLT.2: 9
- FRU_RSA.2: 9
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 6
- FTP_TRP.1.3: 2
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
- Infineon:
- Philips:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 26
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 3
- CMAC: 2
- HMAC: 3
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 6
- SHA-256: 9
- SHA-384: 6
- SHA-512: 4
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
- Neslib:
- NESLIB 4.1: 1
- NesLib 4.1: 2
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 9
- malfunction: 4
- physical tampering: 1
- SCA:
- Leak-Inherent: 8
- Physical Probing: 4
- physical probing: 3
- side channel: 6
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 40
- CCMB-2012-09-003: 2
- FIPS:
- FIPS 186-3: 2
- FIPS PUB 140-2: 5
- FIPS PUB 180-4: 5
- FIPS PUB 197: 4
- FIPS PUB 198-1: 2
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 10116: 7
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9797: 1
- ISO/IEC 9797-1: 3
- NIST:
- NIST SP 800-38B: 2
- NIST SP 800-90A: 5
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 31 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded. 32 The TOE optionally: 1
- ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded: 1
- out of scope: 1
|
| pdf_data/st_metadata |
|
- /CreationDate: D:20140630112314Z
- /Creator: FrameMaker 7.2
- /ModDate: D:20140812174800+02'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 640362
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
False |
True |
| state/st/download_ok |
False |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |