name |
Data Security Kit DA-SC02 V1.00 |
Rambus AES-ECB-DPA-FIA cores HW3.0 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
active |
not_valid_after |
13.12.2010 |
29.07.2027 |
not_valid_before |
15.12.2006 |
29.07.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-certificate%2022-0397779.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0070_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0397779-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0070_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-lite][revC]AES-ECB-32-DPA-FIA_V3.0_ST-Lite-RevC).pdf |
manufacturer |
Panasonic Communications Co., Ltd. |
Rambus Inc. |
manufacturer_web |
https://www.panasonic.com/ |
https://www.rambus.com/ |
security_level |
EAL2 |
EAL4+, AVA_VAN.5, ALC_DVS.2, ATE_DPT.2 |
dgst |
29eaf5156432f4d1 |
de8f81504d9aea23 |
heuristics/cert_id |
JISEC-CC-CRP-C0070 |
NSCIB-CC-0397779-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_USR.1, AVA_VLA.1, ADV_HLD.1, ADV_RCR.1, ATE_COV.1, AGD_ADM.1, ATE_IND.2, ADV_FSP.1, AVA_SOF.1, ATE_FUN.1 |
ADV_IMP.1, ASE_OBJ.2, ADV_ARC.1, AVA_VAN.5, ATE_IND.2, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, ALC_CMS.4, ALC_DVS.2, ASE_ECD.1, AGD_OPE.1, ADV_FSP.4, ATE_DPT.2, ASE_INT.1, ASE_SPD.1, ASE_REQ.2, ATE_FUN.1, ADV_TDS.3, ALC_TAT.1, AGD_PRE.1, ALC_DEL.1, ASE_CCL.1, ALC_CMC.4 |
heuristics/extracted_versions |
1.00 |
3.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0070
- certification_date: 01.12.2006
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cert_link: https://www.ipa.go.jp/en/security/c0070_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is a software product to protect the used document data which had been already stored on the HDD (Hard Disk Drive) after being processed by the digital imaging system from being disclosed illicitly. To realize them, The TOE offers the function to overwrite for residual data and the function to delete the security information including set values of the unit. Moreover, the hard disk drive lock mechanism is used to prevent any information leak in case of removing and taking the HDD out illegally. The TOE is offered as an optional product of Panasonic Communications Co., Ltd. Digital Color Imaging System DP-C2635 / C2626 / C2121 for Japan (DP-C354 / C264 / C323 / C263 / C213 for Overseas), and provides the security functions by replacing with the standard bundled software of the digital imaging system.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Data Security Kit DA-SC02
- product_type: IT Product (data protection function in digital imaging system)
- report_link: https://www.ipa.go.jp/en/security/c0070_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0070_est.pdf
- toe_version: V1.00
- vendor: Panasonic System Networks Co., Ltd.
- expiration_date: 01.01.2011
- supplier: Panasonic System Networks Co., Ltd.
- toe_japan_name: Data Security Kit DA-SC02 V1.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0070_it6097.html
- toe_overseas_name: Data Security Kit DA-SC02 V1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
NSCIB-certificate 22-0397779.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.3: 1
- ATE:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20220815111020+01'00'
- /Creator: C458-M
- /ModDate: D:20220815152629+02'00'
- /Producer: KONICA MINOLTA bizhub C458
- /Title: C458-M&S22081511100
- pdf_file_size_bytes: 205167
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0070_erpt.pdf |
NSCIB-CC-0397779-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-0397779-CR
- cert_item: AES-ECB-DPA-FIA cores HW3.0
- cert_lab: SGS Brightsight B.V.
- developer: Rambus Inc
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0070: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 6
- EAL4 augmented: 3
- EAL4+: 7
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.SE: 1
- A.SETSEC: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Fault Injection: 1
- fault injection: 2
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 2
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:1999: 1
- ISO/IEC 18045:2005: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20070205121743+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20070205121921+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 103214
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
|
pdf_data/st_filename |
c0070_est.pdf |
[ST-lite][revC]AES-ECB-32-DPA-FIA_V3.0_ST-Lite-RevC).pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 6
- EAL4 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 11
- ADV_HLD.1: 2
- ADV_RCR.1: 5
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 3
- ATE:
- ATE_COV: 1
- ATE_COV.1: 3
- ATE_FUN.1: 4
- ATE_IND.2: 4
- AVA:
- AVA_SOF.1: 4
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 3
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.2: 7
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FDP:
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 26
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_SOS.1: 30
- FIA_SOS.1.1: 2
- FIA_UAU.1: 19
- FIA_UAU.2: 34
- FIA_UAU.7: 26
- FIA_UAU.7.1: 2
- FIA_UID.1: 19
- FIA_UID.2: 36
- FMT:
- FMT_MOF.1: 13
- FMT_MOF.1.1: 1
- FMT_MTD.1: 41
- FMT_MTD.1.1: 3
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 30
- FPT_RVM.1.1: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 8
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 1
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 2
- FDP_ITC.1: 14
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 2
- FMT:
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FRU:
- FRU_FLT.2: 7
- FRU_FLT.2.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 4
- A.SE: 5
- A.SETSEC: 5
- O:
- O.HDLMNG: 6
- O.RESIDUAL: 5
- OE:
- OE.ADMIN: 3
- OE.AUTH: 4
- OE.HDD: 7
- OE.SE: 3
- T:
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 27
- AES-128: 1
- AES-256: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Fault Injection: 1
- fault injection: 1
- malfunction: 1
- SCA:
- DPA: 3
- side-channel: 1
- template attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- ISO:
|
- CC:
- CCMB-2017-04-0004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- NIST:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 205 in [PP] This refinement is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP] This refinement is out of scope: 1
- This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP] This refinement is applicable without any adjustments. It must be: 1
- This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP] This refinement is applicable without any adjustments. Guidance documents: 1
- contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP] This refinement refers to mechanisms against physical attacks that require: 1
- in the development environment as defined above. ALC_CMS 199 in [PP] This refinement is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery: 1
- is out of scope for the TOE 241 in [PP] This refinement refers to downloading of embedded software. This refinement: 1
- must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP] This refinement relates to physical testing. This refinement is out of: 1
- of the layout or tests besides the TSFI. This refinement is regarded out of scope for the TOE, as physical attacks are not in scope and there is no layout to be verified. 218 in [PP: 1
- out of scope: 14
- out of scope for the TOE. AVA_VAN 245 in [PP] This refinement is applicable without any adjustments, but it has: 1
- to identify the TOE in line with FAU_SAS.1, which is not claimed in this ST. This refinement is out of scope for the TOE. 240 in [PP] This refinement refers to configuration in Phase 2 or Phase 7. This: 1
- to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP] This refinement refers to features that do not provide functionality but: 1
- transitions of power save modes if provided by the TOE. 210 in [PP] This refinement in [PP] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP] This: 1
|
pdf_data/st_metadata |
- /Author: 1800072
- /CreationDate: D:20070126110308+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20070126110308+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - DA-SC02英文ST20070126.doc
- pdf_file_size_bytes: 366061
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
- /CreationDate: D:20220704125503-07'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220704125503-07'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 466125
- pdf_hyperlinks: https://www.rambus.com/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |