Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m
JISEC-CC-CRP-C0246
ST31H320 B01 including optional cryptographic library NESLIB
ANSSI-CC-2017/60
name Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m ST31H320 B01 including optional cryptographic library NESLIB
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 01.03.2015 08.10.2024
not_valid_before 25.02.2010 05.10.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2017_60-S02.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_60fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2017_60en.pdf
manufacturer Ricoh Company, Ltd. STMicroelectronics
manufacturer_web https://www.ricoh.com/ https://www.st.com/
security_level EAL3+, ALC_FLR.2 ADV_IMP.2, ALC_FLR.1, ALC_CMC.5, EAL5+, AVA_VAN.5, ATE_COV.3, ALC_TAT.3, ATE_FUN.2, ADV_TDS.5, ADV_INT.3, ALC_DVS.2
dgst 93cdda41b5a03cdf df83b419973202f5
heuristics/cert_id JISEC-CC-CRP-C0246 ANSSI-CC-2017/60
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3
heuristics/extracted_versions 7.33, 15.000, 1.04, 2.16, 1.11.1, 7.15.02, 7.26, 1.3, 1.59, 1.01, 1.11, 1.10, 01.24, 1.15 -
heuristics/report_references/directly_referencing {} ANSSI-CC-2015/59
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2015/59
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0246
  • certification_date: 01.02.2010
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0246_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions. TOE security functionality The main security functions are described as follows: - Audit Function: to generate / review audit log of the event. - Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout. - Access Control Function: to control available functions for each user, and to control the document operation. - Network Protection Function: to protect information on the Network with use of the encrypted communication. - Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data. - Security Management Function: to make the administrators control the security functions. - Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Ricoh imagio MP 5000SP/4000SP with security card Type 9
    • product_type: Multi Function Product
    • protection_profile: 2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
    • report_link: https://www.ipa.go.jp/en/security/c0246_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0246_est.pdf
    • toe_version: - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1 Network Support7.26 Network DocBox1.10C Web Support1.59 Web Uapl1.15 animation1.3 Scanner01.24 RPDL7.33 Printer1.11 MSIS7.15.02 RPCS Font1.01 Engine1.04:05 OpePanel1.01 LANG01.01 LANG11.01 ADF15.000:15 - ASIC Ic Key1100 - Option Data Erase Opt1.01m
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.03.2015
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0246_it9257.html
  • toe_japan_name: Ricoh imagio MP 5000SP/4000SP with security card Type 9 - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1, Network Support7.26, Network DocBox1.10C, Web Support1.59, Web Uapl1.15, animation1.3, Scanner01.24, RPDL7.33, Printer;1.11, MSIS7.15.02, RPCS Font1.01, Engine1.04:05, OpePanel1.01, LANG01.01, LANG11.01, ADF15.000:15 - ASIC Ic Key1100 - Option Data Erase Opt1.01m
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles 32475ccb695b1644 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf {}
pdf_data/cert_filename certificat ANSSI-CC-2017_60-S02.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2017/60-S02: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_TDS.5: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 1
    • ALC_TAT.3: 1
  • ATE:
    • ATE_COV.3: 1
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/cert_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: jchuzel
  • /CreationDate: D:20210318180322+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210318180322+01'00'
  • /Producer: GPL Ghostscript 9.50
  • /Title: Microsoft Word - certificat ANSSI-CC-2017_60-S02.docx
  • pdf_file_size_bytes: 1913807
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename c0246_erpt.pdf anssi-cc-2017_60fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ACL_DVS.2, ALC_FLR.1, ALC_TAT.3, ATE_COV.3, ATE_FUN.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2017/60
    • cert_item: ST31H320 B01 including optional cryptographic library NESLIB
    • cert_item_version: B01
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0246-01: 1
    • Certification No. C0246: 1
  • FR:
    • ANSSI-CC-2015/59: 1
    • ANSSI-CC-2017/60: 15
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
    • EAL3 augmented: 2
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_INT: 1
    • ADV_INT.3: 2
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.5: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 2
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 2
    • ALC_FLR.1: 3
    • ALC_LCD: 1
    • ALC_TAT: 1
    • ALC_TAT.3: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 2
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_FUN.2: 2
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 5
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Safety & Security: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NESLIB 1: 1
    • NESLIB 2: 1
    • NESLIB 3.3: 1
    • NesLib 4.2: 2
    • NesLib 4.2.10: 2
    • NesLib 5.2: 2
    • NesLib 5.2.0: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • BSI:
    • AIS 31: 1
    • AIS31: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20100629170727+09'00'
  • /ModDate: D:20100629170727+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 230440
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /Category: B01
  • /Comments: STMicroelectronics
  • /Company: SGDSN/ANSSI
  • /CreationDate: D:20171009143717+02'00'
  • /Creator: Acrobat PDFMaker 11 pour Word
  • /Keywords: ANSSI-CC-CER-F-07.025
  • /ModDate: D:20171009152625+02'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20171009123714
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 183861
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename c0246_est.pdf anssi-cible2017_60en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 10
    • BSI-CC-PP-0084-: 2
    • BSI-CC-PP-0084-2014: 64
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL4: 1
    • EAL5: 13
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_FLR.2: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.2: 4
    • ADV_INT.3: 4
    • ADV_TDS.5: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 4
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.3: 4
  • ASE:
    • ASE_CCL: 4
    • ASE_CCL.1: 1
    • ASE_ECD: 3
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 11
    • ASE_OBJ.2: 1
    • ASE_REQ: 33
    • ASE_REQ.2: 1
    • ASE_SPD: 8
    • ASE_SPD.1: 1
    • ASE_TSS: 10
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 3
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 4
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 29
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 27
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 4
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TST.1: 1
  • FAU:
    • FAU_GEN.1: 8
    • FAU_SAR.1: 25
    • FAU_SAS: 2
    • FAU_SAS.1: 28
  • FCS:
    • FCS_CKM.1: 20
    • FCS_CKM.4: 4
    • FCS_COP.1: 35
    • FCS_RNG: 2
    • FCS_RNG.1: 6
  • FDP:
    • FDP_ACC.1: 22
    • FDP_ACC.2: 12
    • FDP_ACF: 1
    • FDP_ACF.1: 28
    • FDP_CKM.2: 1
    • FDP_IFC.1: 17
    • FDP_ITC.1: 3
    • FDP_ITC.2: 2
    • FDP_ITT.1: 10
    • FDP_SDC: 2
    • FDP_SDC.1: 8
    • FDP_SDI.2: 14
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
    • FDP_UCT.1: 16
    • FDP_UIT.1: 16
  • FIA:
    • FIA_API: 2
    • FIA_API.1: 6
    • FIA_UAU.1: 14
    • FIA_UID.1: 16
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 29
    • FMT_LIM.2: 30
    • FMT_MSA.1: 26
    • FMT_MSA.3: 26
    • FMT_SMF.1: 21
    • FMT_SMR.1: 17
  • FPT:
    • FPT_FLS.1: 22
    • FPT_ITT.1: 9
    • FPT_PHP.3: 11
  • FRU:
    • FRU_FLT.2: 11
  • FTP:
    • FTP_ITC.1: 27
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYISCAL: 3
    • OE.PHYSICAL: 1
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
  • O:
    • O.RND: 4
    • O.TOE-: 1
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 25
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
      • AES-: 1
      • AES-128: 1
      • AES-192: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 10
    • DES:
      • DES: 17
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 11
pdf_data/st_keywords/hash_function
  • Keccak:
    • Keccak: 14
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-2: 1
      • SHA-224: 5
      • SHA-256: 8
      • SHA-384: 5
      • SHA-512: 5
    • SHA3:
      • SHA-3: 1
      • SHA3-224: 4
      • SHA3-256: 4
      • SHA3-384: 4
      • SHA3-512: 4
  • SHAKE:
    • SHAKE128: 4
    • SHAKE256: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 10
  • RNG:
    • RND: 7
    • RNG: 6
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 2
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 3
    • Nescrypt: 7
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib 4.2: 2
    • NesLib 4.2.10: 2
    • NesLib 5.2: 21
    • NesLib 5.2.0: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Malfunction: 13
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 14
    • Physical Probing: 4
    • physical probing: 3
    • side channel: 10
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 24
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS PUB 140-2: 5
    • FIPS PUB 180-2: 5
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 4
    • FIPS PUB 198-1: 3
    • FIPS PUB 202: 6
  • ISO:
    • ISO/IEC 14888: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796: 1
    • ISO/IEC 9796-2: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38B: 1
    • NIST SP 800-56A: 3
    • NIST SP 800-67: 3
    • NIST SP 800-90: 4
    • SP 800-38A: 2
    • SP 800-67: 1
    • SP 800-90A: 1
  • PKCS:
    • PKCS #1: 8
    • PKCS1: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib when it is embedded: 1
    • The Security IC Embedded Software (ES) is in User NVM. Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib when it is embedded. 1.6.3 TOE documentation 37 The user guidance: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20100618152326+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20100618152326+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: Microsoft Word - C0246ST_eng_2010-6-18.doc
  • pdf_file_size_bytes: 464939
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
  • /CreationDate: D:20170824132615Z
  • /Creator: FrameMaker 11.0
  • /ModDate: D:20171009152213+02'00'
  • /Producer: Acrobat Elements 10.0.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 1186810
  • pdf_hyperlinks: http://www.st.com
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 87
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different