Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH IP 500, IM 430 J-1.00
JISEC-CC-CRP-C0644-01-2019
RSA NetWitness Platform v11.3
ISCB-5-RPT-C108-CR-v1
name RICOH IP 500, IM 430 J-1.00 RSA NetWitness Platform v11.3
category Multi-Function Devices Network and Network-Related Devices and Systems
scheme JP MY
not_valid_after 18.07.2024 03.04.2025
not_valid_before 18.07.2019 03.04.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0644_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C108-CERTIFICATE-v1.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0644_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C108-CR-V1%20.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0644_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RSA%20Netwitness%20v11.3_v1.0.pdf
manufacturer Ricoh Company, Ltd. RSA, The Security Division of EMC
manufacturer_web https://www.ricoh.com/ https://www.rsa.com/
security_level EAL2+, ALC_FLR.2 EAL2+, ALC_FLR.1
dgst 1bac924bb193ca41 7cdfc59eb58ce4fa
heuristics/cert_id JISEC-CC-CRP-C0644-01-2019 ISCB-5-RPT-C108-CR-v1
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ALC_FRL.1, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 1.00 11.3
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0644
  • certification_date: 01.07.2019
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0644
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000l25-att/c0644_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH IP 500, IM 430
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000l25-att/c0644_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000l25-att/c0644_est.pdf
    • toe_version: J-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.08.2024
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0644_it8669.html
  • toe_japan_name: RICOH IP 500, IM 430J-1.01
  • toe_overseas_link: None
  • toe_overseas_name: -----
  • cert_no: 2020-001-C108
  • certification_date: 03.04.2020
  • developer: RSA - The Security Division of EMC2
  • enhanced:
    • assurance_level: EAL2+ ALC_FLR.1
    • category: Network and Network-Related Devices and Systems
    • cert_id: C108
    • certification_date: 03.04.2020
    • developer: 10700 Parkridge Blvd. Suite 600 Reston, VA 20191
    • expiration_date: 03.04.2025
    • mutual_recognition: CCRA
    • product: RSA NetWitness Platform v11.3
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C108/ISCB-5-RPT-C108-CR-V1_.pdf
    • scope: RSA NetWitness Platform v11.3 is a collection of appliances that form a security infrastructure for an enterprise network. This architecture provides converged network security monitoring and centralised security information and event management (SIEM). The TOE provides real-time visibility into the monitored network and long-term network data storage to provide detection, investigation, analysis, forensics, and compliance reporting. The product collects log and packet data from the network. Packet collection extracts metadata, reassembles, and globally normalises all network traffic at layers 2 through 7 of the Open Systems Interconnection (OSI) model. This data allows NetWitness to perform real-time session analysis; incident detection, drill-down investigation, reporting, and forensic analysis functions.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C108/RSA_Netwitness_v113_v10.pdf
    • type: Network and Network-Related Devices and Systems
  • expiration_date: 03.04.2025
  • level: EAL2+ ALC_FLR.1
  • product: RSA NetWitness Platform v11.3
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/103
heuristics/protection_profiles 43ce79b420f23a00 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf {}
pdf_data/cert_filename c0644_eimg.pdf ISCB-5-CERT-C108-CERTIFICATE-v1.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0644-01-2019: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190826143720+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20190826143900+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 155900
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /CreationDate: D:20200406221110Z00'00'
  • /Creator: Word
  • /ModDate: D:20200406221110Z00'00'
  • /Producer: macOS Version 10.15.3 (Build 19D76) Quartz PDFContext
  • /Title: Microsoft Word - ISCB-5-CERT-C108-CERTIFICATE-v1.docx
  • pdf_file_size_bytes: 270662
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename c0644_erpt.pdf ISCB-5-RPT-C108-CR-V1 .pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0644-01-2019: 1
  • MY:
    • ISCB-3-RPT-C108-CR-v1: 39
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 2: 5
    • EAL2: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ALC:
    • ALC_FLR.1: 9
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
  • A:
    • A.AUDIT_PROTECTION: 1
    • A.DATA_SOURCES: 1
    • A.DEPLOY: 1
    • A.MANAGE: 1
    • A.PHYSICAL: 1
    • A.TIME: 1
    • A.USER: 1
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
  • Leidos:
    • Leidos: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 3
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 5
      • TLS 1.2: 1
  • VPN:
    • VPN: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 140-2: 2
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_metadata
  • /CreationDate: D:20191001135331+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20191001135438+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 510877
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /CreationDate: D:20200406203839Z00'00'
  • /Creator: Word
  • /ModDate: D:20200406203839Z00'00'
  • /Producer: macOS Version 10.15.3 (Build 19D76) Quartz PDFContext
  • /Title: Microsoft Word - ISCB-5-RPT-C108-CR-V1 .docx
  • pdf_file_size_bytes: 1055786
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename c0644_est.pdf RSA Netwitness v11.3_v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 2: 5
    • EAL 2 augmented: 5
    • EAL2: 4
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.2: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 11
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 8
    • ALC_CMS.2: 7
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_FLR: 1
    • ALC_FLR.1: 14
    • ALC_FRL.1: 2
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 11
    • ASE_INT.1: 13
    • ASE_OBJ.2: 11
    • ASE_REQ.2: 14
    • ASE_SPD.1: 8
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN.2: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_SAR: 4
    • FAU_SAR.1: 15
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_STG: 3
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 1
    • FCS_COP.1: 2
    • FCS_COP.1.1: 1
    • FCS_SSH: 2
    • FCS_SSH_EXT: 3
    • FCS_SSH_EXT.1: 8
    • FCS_SSH_EXT.1.1: 2
    • FCS_SSH_EXT.1.2: 2
    • FCS_SSH_EXT.1.3: 2
    • FCS_SSH_EXT.1.4: 2
    • FCS_SSH_EXT.1.5: 2
    • FCS_SSH_EXT.1.6: 2
    • FCS_TLS: 2
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1: 11
    • FCS_TLS_EXT.1.1: 2
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 1
    • FIA_UAU: 7
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID: 3
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 27
    • FMT_MOF.1.1: 3
    • FMT_MTD: 3
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 3
    • FPT_ITT.1: 4
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FTA:
    • FTA_SSL: 6
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
    • FTA_TAB: 3
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_TRP: 5
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
  • A:
    • A.AUDIT_PROTECTION: 3
    • A.DATA_SOURCES: 2
    • A.DEPLOY: 2
    • A.MANAGE: 2
    • A.PHYSICAL: 2
    • A.TIME: 3
    • A.TRUSTED_ADMIN: 2
    • A.USER: 3
  • O:
    • O.ANALYZE: 5
    • O.AUDIT_GENERATION: 2
    • O.AUDIT_PROTECTION: 4
    • O.MANAGE: 4
    • O.PRIVACY_DATA_PROTECT: 2
    • O.PROTECTED_COMMS: 3
    • O.TOE_ACCESS: 5
  • OE:
    • OE.AUDIT_PROTECTION: 2
    • OE.DATA_SOURCES: 1
    • OE.DEPLOY: 2
    • OE.MANAGE: 2
    • OE.PHYSICAL: 3
    • OE.TIME: 3
    • OE.TRUSTED_ADMIN: 2
    • OE.USER: 2
  • T:
    • T.INADVERTENT_ACTIVITY: 3
    • T.MALICIOUS_ACTIVITY: 3
    • T.MISUSE: 2
    • T.TSF_COMPROMISE: 3
    • T.UNACCOUNTABLE_USERS: 2
    • T.UNPROTECTED_PRIVACY_DATA: 2
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 3
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES-: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 2
      • SHA384: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
  • SSH:
    • SSH: 44
  • TLS:
    • TLS:
      • TLS: 48
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90A: 2
  • FIPS:
    • FIPS 140-2: 5
  • RFC:
    • RFC 4252: 2
    • RFC 5246: 1
pdf_data/st_metadata
  • /Author: RICOH
  • /CreationDate: D:20190919095848+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20190919095848+09'00'
  • /Producer: Microsoft® Word for Office 365
  • /Title: RICOH IP 500, IM 430 Security Target
  • pdf_file_size_bytes: 1544266
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
  • /CreationDate: D:20200330060947Z00'00'
  • /Creator: Word
  • /ModDate: D:20200330060947Z00'00'
  • /Producer: macOS Version 10.15.3 (Build 19D76) Quartz PDFContext
  • /Title: Microsoft Word - RSA Netwitness v11.3_v1.0.docx
  • pdf_file_size_bytes: 1090952
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 67
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different