name |
Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.20 AR-FR5: version E.20 |
Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
archived |
not_valid_after |
07.01.2013 |
12.01.2022 |
not_valid_before |
17.09.2004 |
12.01.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0018_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-15-84058-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0018_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20Smx2Cl_ST_P60x080yVC_yVG_V_1_11.pdf |
manufacturer |
Sharp Corporation |
NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity |
manufacturer_web |
https://sharp-world.com/ |
https://www.nxp.com |
security_level |
EAL4 |
EAL6+, ALC_FLR.1, ASE_TSS.2 |
dgst |
03749c220b32bdce |
4c4871d2599ba22e |
heuristics/cert_id |
JISEC-CC-CRP-C0018 |
NSCIB-CC-15-84058-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, AGD_FSP.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
20 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0018
- certification_date: 01.09.2004
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- cert_link: https://www.ipa.go.jp/en/security/c0018_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is a firmware intended to reduce the danger against the disclosure of document data and image data that are temporarily spooled in the Multi-Function Device (hereafter referred to as “MFD”). TOE is offered as an upgraded kit for firmware of the MFD. The TOE provides security function to counter the threat against document data and image data that are temporarily spooled in the Mass Storage Device ( hereafter referred to as MSD) which is defined for each configuration of the functional unit in M FD. When MFD executes basic function as copy, print, Fax or image scanning, MFD executes data encryption before spooling document image data in MSD. Moreover MFD erases image data in MSD automatically after finishing copy, print, Fax or image scanning jobs or at the time of power-on. As a result, MFD keeps high confidentiality of the document/ image data in MSD, and it opposes fraudulent disclosure.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Data Security Kit AR-FR4, Data Security Kit AR-FR5
- product_type: IT product (Data protection function inside digital MFD)
- protection_profile: N/A
- report_link: https://www.ipa.go.jp/en/security/c0018_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0018_est.pdf
- toe_version: AR-FR4: version M.20 AR-FR5: version E.20
- vendor: Sharp Corporation
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2005-03', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0018_it4026_01.html'})]
- supplier: Sharp Corporation
- toe_japan_name: Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.20 AR-FR5: version E.20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0018_it4026.html
- toe_overseas_name: Data Security Kit AR-FR4, Data Security Kit AR-FR5 AR-FR4: version M.21 AR-FR5: version E.21
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0018_erpt.pdf |
[CR] NSCIB-CC-15-84058-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-15-84058-CR
- cert_item: Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG
- cert_lab: Riscure
- developer: NXP Semiconductors GmbH
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0018-01: 1
- Certification No. C0018: 1
|
- DE:
- NL:
- NSCIB-CC-15-84058: 1
- NSCIB-CC-15-84058-CR: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.OFFICE: 1
- A.PROCEDURE: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 17
- NXP Semiconductors: 3
|
pdf_data/report_keywords/eval_facility |
|
- Riscure:
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA-384: 3
- SHA-512: 4
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- fault injection: 1
- SCA:
- DPA: 1
- SPA: 1
- side channel: 2
- timing attacks: 2
- other:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- hardware architecture of the platforms only differ in the memory size and availability of Mifare (out of scope of this evaluation). 2.6.4 Testing Results The testing activities, including configurations: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20050214150436+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /Manager: IPA
- /ModDate: D:20050214150557+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20050214053206
- /Title: CRP-e
- pdf_file_size_bytes: 260158
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
|
pdf_data/st_filename |
c0018_est.pdf |
[ST] Smx2Cl_ST_P60x080yVC_yVG_V_1_11.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6: 2
- EAL 6 augmented: 2
- EAL4: 1
- EAL4+: 2
- EAL6: 30
- EAL6 augmented: 2
- EAL6+: 4
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 4
- ACM_CAP.3: 6
- ACM_CAP.4: 3
- ACM_SCP.1: 2
- ACM_SCP.2: 4
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 6
- ADV:
- ADV_FSP.1: 19
- ADV_FSP.2: 4
- ADV_HLD.1: 1
- ADV_HLD.2: 7
- ADV_IMP.1: 7
- ADV_LLD.1: 6
- ADV_RCR.1: 12
- ADV_SPM.1: 4
- AGD:
- AGD_ADM.1: 11
- AGD_FSP.1: 1
- AGD_USR.1: 10
- ALC:
- ALC_DVS.1: 6
- ALC_LCD.1: 4
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 9
- ATE_IND.2: 4
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 4
- AVA_VLA.2: 4
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 2
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_SPM.1: 1
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.5: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 4
- ATE:
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 27
- FCS_CKM.4: 20
- FCS_CKM.4.1: 1
- FCS_COP.1: 20
- FCS_COP.1.1: 1
- FDP:
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID.1: 4
- FMT:
- FMT_MOF.1: 23
- FMT_MOF.1.1: 1
- FMT_MSA.2: 13
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 20
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 1
- FCS_COP.1: 46
- FCS_COP.1.1: 9
- FCS_RNG.1: 18
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 6
- FDP_ACF.1: 5
- FDP_IFC: 1
- FDP_IFC.1: 7
- FDP_ITC.1: 11
- FDP_ITC.2: 11
- FDP_ITT: 1
- FDP_ITT.1: 6
- FDP_RIP: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_SOP: 7
- FDP_SOP.1: 13
- FDP_SOP.1.1: 3
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FMT_MSA.1: 5
- FMT_MSA.3: 5
- FMT_SMF.1: 3
- FPT:
- FPT_FLS.1: 6
- FPT_ITT: 1
- FPT_ITT.1: 6
- FPT_PHP.3: 6
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.OFFICE: 2
- A.PROCEDURE: 1
- O:
- O.AUTHEN: 5
- O.AUTHENTICATION: 1
- O.REMOVE: 4
- O.RESIDUAL: 6
- OE:
- OE.OPERATE: 1
- OE.SECURE: 2
- T:
|
- O:
- O.AES: 5
- O.COMPARE: 1
- O.COPY: 1
- O.CUST_RECONFIG: 3
- O.DES: 4
- O.ECC_DHKE: 4
- O.ECDSA: 5
- O.EEPROM_INTEGRITY: 2
- O.FM_FW: 3
- O.HW_AES: 4
- O.MEM_ACCESS: 3
- O.REUSE: 6
- O.RND: 12
- O.RSA: 5
- O.SFR_ACCESS: 3
- O.SHA: 5
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 19
- NXP Semiconductors: 18
- NXP Semiconductors N.V: 54
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 8
- TDES: 5
- Triple-DES: 13
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 8
- SHA-256: 8
- SHA-384: 8
- SHA-512: 9
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 5
- Malfunction: 12
- fault injection: 1
- malfunction: 2
- SCA:
- DPA: 6
- Leak-Inherent: 7
- Physical Probing: 2
- SPA: 3
- Timing attacks: 1
- side channel: 14
- side-channel: 1
- timing attack: 1
- timing attacks: 7
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 180-3: 1
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ISO:
- ISO/IEC 15946-1: 4
- ISO/IEC 15946-2: 1
- ISO/IEC 15946-3: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38B: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: A.Iwasaki
- /Company: Pigs, Inc.
- /CreationDate: D:20050214174331+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20050214175221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20050214052924
- /Subject: デジタル複合機データセキュリティキット
- /Title: セキュリティターゲット
- /_AdHocReviewCycleID: -4335251
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Yamanaka Toshihiro/副参事
- /_EmailSubject: NIAPへの認証製品掲載の件
- pdf_file_size_bytes: 552988
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
- /Author: NXP Semiconductors N.V.
- /CreationDate: D:20161014145836+02'00'
- /Creator: DITA Open Toolkit
- /Keywords: Security Target, Crypto Library,
P60x080/052/040yVC(Y/Z/A)/yVG
- /Producer: Apache FOP Version 1.1
- /Subject: Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG
- /Title: Security Target
- pdf_file_size_bytes: 398977
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |