Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Ricoh Aficio MP C3002/C3002G/C3502/C3502G, Savin MP C3002/C3002G/C3502/C3502G, Lanier MP C3002/C3002G/C3502/C3502G, nashuatec MP C3002/C3502, Rex-Rotary MP C3002/C3502, Gestetner MP C3002/C3502, infotec MP C3002/C3502 all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03
JISEC-CC-CRP-C0353
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
CCEVS-VR-VID-10443-2012
name Ricoh Aficio MP C3002/C3002G/C3502/C3502G, Savin MP C3002/C3002G/C3502/C3502G, Lanier MP C3002/C3002G/C3502/C3502G, nashuatec MP C3002/C3502, Rex-Rotary MP C3002/C3502, Gestetner MP C3002/C3502, infotec MP C3002/C3502 all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
category Multi-Function Devices Detection Devices and Systems
not_valid_before 2012-06-14 2012-10-01
not_valid_after 2017-02-07 2014-11-01
scheme JP US
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0353_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf
manufacturer Ricoh Company, Ltd. Tenable Network Security, Inc.
manufacturer_web https://www.ricoh.com/ https://www.tenable.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0353_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': frozenset({'IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile Intrusion Detection System - System for Basic Robustness Environme...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf', 'pp_ids': None})
state/report/pdf_hash f0c6e8ebfd14bcae75cc809514c25f6d1bc70188f431b8a271095beb4f33760e 6bbe4e39fb1e3e1496edb10118d6519fe521fc80f7080eb44d7404caa0dbfbb4
state/report/txt_hash a509631ff13794693a6fa6ee297b638f5681a42c48e5a03a1ddb450d7f652e1a 0cc9c7cf65c4283fa42658cbdbdf224629263190e3e25cbfe0a0fd5d7e8152ce
state/st/pdf_hash 80a6b622a717a350c8fd71e5933f22620df84791cde468d10a722187897d7f87 3b767d5258133c0eb3601092a8cf7081b94bf08c654a872c21fb6c7e48566775
state/st/txt_hash 0fe443fe70025dc0027f678a8fe5d2b8215ba4e46b2fdcaf71ec3038c940270d ac95bdcc32b3b1fa5fb3cb004f461c884649a1e12a831f99e30019259a8b5792
heuristics/cert_id JISEC-CC-CRP-C0353 CCEVS-VR-VID-10443-2012
heuristics/cert_lab None US
heuristics/cpe_matches None cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:*
heuristics/extracted_versions 0.16, 1.07, 1.01, 01.00.04, 02.00.00, 11.77, 1.05.4, 1.06, 1.04, 1.03, 3.5, 01.09, 1.00, 1.05.1 5.0.1, 2.0.1, 4.4, 2.1, 3.6
heuristics/related_cves None CVE-2018-1141, CVE-2022-22827, CVE-2017-18214, CVE-2017-5179, CVE-2018-20843, CVE-2022-22824, CVE-2016-1000029, CVE-2022-23852, CVE-2020-5774, CVE-2019-3923, CVE-2024-0971, CVE-2018-1148, CVE-2022-28291, CVE-2021-20079, CVE-2022-22825, CVE-2023-6062, CVE-2022-32973, CVE-2019-3962, CVE-2023-3252, CVE-2021-3449, CVE-2023-3251, CVE-2021-3450, CVE-2018-5407, CVE-2021-20106, CVE-2021-46143, CVE-2022-33757, CVE-2016-9260, CVE-2020-5765, CVE-2022-22826, CVE-2022-22822, CVE-2022-23990, CVE-2019-3982, CVE-2016-4055, CVE-2019-3961, CVE-2022-0778, CVE-2019-1559, CVE-2022-22823, CVE-2021-45960, CVE-2023-3253, CVE-2022-3499, CVE-2024-0955, CVE-2023-6178, CVE-2022-4313, CVE-2018-1147, CVE-2021-20135, CVE-2022-32974, CVE-2016-1000028
heuristics/scheme_data
  • cert_id: C0353
  • supplier: RICOH COMPANY, LTD.
  • toe_overseas_name: Ricoh Aficio MP C3002/C3002G/C3502/C3502G, Savin MP C3002/C3002G/C3502/C3502G, Lanier MP C3002/C3002G/C3502/C3502G, nashuatec MP C3002/C3502, Rex-Rotary MP C3002/C3502, Gestetner MP C3002/C3502, infotec MP C3002/C3502 all of above with Facsimile Function - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, < Cont. >
  • expiration_date: 2017-02
  • claim: EAL3+ ALC_FLR.2 PP
  • certification_date: 2012-04
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0353_it1371.html
  • toe_japan_name: -----
  • enhanced:
    • product: Ricoh Aficio MP C3002/C3002G/C3502/C3502G, Savin MP C3002/C3002G/C3502/C3502G, Lanier MP C3002/C3002G/C3502/C3502G, nashuatec MP C3002/C3502, Rex-Rotary MP C3002/C3502, Gestetner MP C3002/C3502, infotec MP C3002/C3502 all of above with Facsimile Function
    • toe_version: -Software: System/Copy 1.05.4 Network Support 11.77 Fax 02.00.00 RemoteFax 02.00.00 NetworkDocBox 1.04 Web Support 1.07 Web Uapl 1.03 animation 1.00 Scanner 01.09 Printer 1.05.1 PCL 1.07 PCL Font 1.06 Data Erase Onb 1.01x GWFCU3.5-4(WW) 01.00.04 Engine 0.16:04 OpePanel 1.04 LANG0 1.03 LANG1 1.03 -Hardware: Ic Key 01020700 Ic Ctlr 03
    • product_type: Multi Function Product
    • certification_date: 2012-06-14
    • cc_version: 3.1
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • protection_profile: IEEE Std 2600.1-2009
    • vendor: RICOH COMPANY, LTD.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0353_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0353_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0353_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
  • product: Log Correlation Engine 6.0.6
  • id: CCEVS-VR-VID11065
  • url: https://www.niap-ccevs.org/product/11065
  • certification_date: 2020-12-08T00:00:00Z
  • expiration_date: 2022-12-08T00:00:00Z
  • category: Application Software
  • vendor: Tenable, Inc
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • scheme: US
heuristics/scheme_data/certification_date 2012-04 2020-12-08T00:00:00Z
heuristics/scheme_data/expiration_date 2017-02 2022-12-08T00:00:00Z
pdf_data/report_filename c0353_erpt.pdf st_vid10443-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10443-2012
    • cert_item: Tenable SecurityCenter 4 and Components
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0353-01: 1
    • Certification No. C0353: 1
  • US:
    • CCEVS-VR-VID10443-2012: 1
pdf_data/report_keywords/cc_claims/A
  • A.ACCESS: 1
  • A.USER: 1
  • A.ADMIN: 2
  • A.WKSTN: 1
  • A.OS: 1
  • A.LOCATE: 1
  • A.PROTCT: 1
  • A.MANAGE: 1
  • A.NOEVIL: 1
  • A.NOTRST: 1
  • A.ACCESS: 1
  • A.ASCOPE: 1
  • A.DYNMIC: 1
pdf_data/report_keywords/cc_claims/T
  • T.DOC: 2
  • T.FUNC: 1
  • T.PROT: 1
  • T.CONF: 2
  • T.COMINT: 1
  • T.COMDIS: 1
  • T.LOSSOF: 1
  • T.NOHALT: 1
  • T.PRIVIL: 1
  • T.IMPCON: 1
  • T.INFLUX: 1
  • T.FACCNT: 1
  • T.SCNCFG: 1
  • T.SCNMLC: 1
  • T.SCNVUL: 1
  • T.FALACT: 1
  • T.FALREC: 1
  • T.FALASC: 1
  • T.MISUSE: 1
  • T.INADVE: 1
  • T.MISACT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.2 4 5
pdf_data/report_keywords/cc_security_level/EAL
  • EAL3: 4
  • EAL3 augmented: 1
  • EAL 2: 4
  • EAL 4: 1
  • EAL2: 1
  • EAL2+: 3
  • EAL 2 augmented: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
  • IPsec:
    • IPsec: 5
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/crypto_protocol/TLS/SSL/SSL 3 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 386931
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 39
  • /CreationDate: D:20120719145731+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20120719145808+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 441073
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
  • /Title: Validation Report for IronPort Messaging Gateway
  • /Author: Evaluation Team
  • /Subject: Validator Report
  • /Keywords: VR
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20121024103543
  • /ModDate: D:20121024103543
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20120719145731+09'00' D:20121024103543
pdf_data/report_metadata//Creator Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/report_metadata//ModDate D:20120719145808+09'00' D:20121024103543
pdf_data/report_metadata//Producer Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/report_metadata/pdf_file_size_bytes 386931 441073
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 39 25
pdf_data/st_filename c0353_est.pdf st_vid10443-st.pdf
pdf_data/st_keywords/cc_claims/A
  • A.ACCESS: 5
  • A.USER: 4
  • A.ADMIN: 10
  • A.ACCESS: 3
  • A.ASCOPE: 3
  • A.DYNMIC: 3
  • A.LOCATE: 3
  • A.PROTCT: 3
  • A.MANAGE: 3
  • A.NOEVIL: 3
  • A.NOTRST: 3
pdf_data/st_keywords/cc_claims/A/A.ACCESS 5 3
pdf_data/st_keywords/cc_claims/O
  • O.STORAGE: 14
  • O.RCGATE: 13
  • O.DOC: 18
  • O.FUNC: 9
  • O.PROT: 9
  • O.CONF: 18
  • O.USER: 21
  • O.INTERFACE: 9
  • O.SOFTWARE: 9
  • O.AUDIT: 9
  • O.PROTCT: 11
  • O.IDSCAN: 7
  • O.IDSENS: 7
  • O.IDANLZ: 5
  • O.RESPON: 5
  • O.EADMIN: 5
  • O.ACCESS: 12
  • O.IDAUTH: 20
  • O.OFLOWS: 6
  • O.AUDITS: 5
  • O.INTEGR: 7
  • O.EXPORT: 3
pdf_data/st_keywords/cc_claims/OE
  • OE.AUDIT_STORAGE: 3
  • OE.AUDIT_ACCESS: 2
  • OE.INTERFACE: 4
  • OE.PHYSICAL: 4
  • OE.USER: 21
  • OE.ADMIN: 8
  • OE.AUDIT: 3
  • OE.AUDIT_ACCESS_AUTHORIZED: 1
  • OE.INSTAL: 7
  • OE.PHYCAL: 6
  • OE.CREDEN: 6
  • OE.TIME: 4
  • OE.INTROP: 5
  • OE.PERSON: 5
  • OE.AUDIT_PROTECTION: 4
  • OE.AUDIT_SORT: 2
pdf_data/st_keywords/cc_claims/T
  • T.DOC: 10
  • T.FUNC: 5
  • T.PROT: 5
  • T.CONF: 10
  • T.COMINT: 3
  • T.COMDIS: 3
  • T.LOSSOF: 3
  • T.NOHALT: 3
  • T.PRIVIL: 3
  • T.IMPCON: 3
  • T.INFLUX: 3
  • T.FACCNT: 3
  • T.SCNCFG: 3
  • T.SCNMLC: 3
  • T.SCNVUL: 3
  • T.FALACT: 3
  • T.FALREC: 3
  • T.FALASC: 3
  • T.MISUSE: 3
  • T.INADVE: 3
  • T.MISACT: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 3
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ADV:
    • ADV_ARC.1: 22
    • ADV_FSP.2: 12
    • ADV_TDS.1: 12
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 7
  • ALC:
    • ALC_FLR.2: 22
    • ALC_CMS.2: 8
    • ALC_DEL.1: 6
    • ALC_CMC.2: 8
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 9
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.3: 1
  • ADV_TDS.2: 2
  • ADV_ARC.1: 22
  • ADV_FSP.2: 12
  • ADV_TDS.1: 12
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 22
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 1 11
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 1 7
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.2: 3
  • ALC_CMC.3: 1
  • ALC_CMS.3: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 1
  • ALC_FLR.2: 22
  • ALC_CMS.2: 8
  • ALC_DEL.1: 6
  • ALC_CMC.2: 8
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 1 6
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.2 3 22
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.1: 5
  • ATE_FUN.1: 9
  • ATE_IND.2: 8
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 9
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 8
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.2 2 8
pdf_data/st_keywords/cc_security_level/EAL
  • EAL3: 1
  • EAL2: 9
  • EAL 2: 1
  • EAL2 augmented: 4
  • EAL 2 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_STG.1: 9
    • FAU_STG.4: 8
    • FAU_SAR.1: 10
    • FAU_SAR.2: 8
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_COP.1: 10
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_CKM.1.1: 1
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_ACC.1: 31
    • FDP_IFF: 1
    • FDP_IFC: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_AFL.1: 9
    • FIA_UAU.7: 8
    • FIA_SOS.1: 10
    • FIA_UAU.1: 31
    • FIA_UID.1: 39
    • FIA_UAU.2: 12
    • FIA_UID.2: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2.1: 1
    • FIA_UAU.7.1: 1
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_SMF.1: 22
    • FMT_SMR.1: 29
    • FMT_MSA.3: 23
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 8
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TST.1: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_SAR: 6
    • FAU_SEL: 2
    • FAU_STG: 4
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 5
    • FAU_SAR.2: 6
    • FAU_SEL.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FIA:
    • FIA_UAU.2: 8
    • FIA_AFL: 2
    • FIA_ATD: 2
    • FIA_UAU: 2
    • FIA_UID: 2
    • FIA_UID.2: 7
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 1
    • FIA_UAU.1: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMR: 2
    • FMT_MOF.1: 7
    • FMT_MDT.1: 1
    • FMT_SMR.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT: 2
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_STM: 1
    • FPT_ITA.1: 2
    • FPT_ITC.1: 2
    • FPT_ITI.1: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.1: 9
  • FAU_STG.4: 8
  • FAU_SAR.1: 10
  • FAU_SAR.2: 8
  • FAU_GEN.1: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 6
  • FAU_GEN.2.1: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3: 1
  • FAU_STG.4.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_GEN: 2
  • FAU_SAR: 6
  • FAU_SEL: 2
  • FAU_STG: 4
  • FAU_GEN.1: 7
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_SAR.1: 5
  • FAU_SAR.2: 6
  • FAU_SEL.1: 5
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_SAR.2.1: 1
  • FAU_SAR.3: 4
  • FAU_SAR.3.1: 1
  • FAU_SEL.1.1: 1
  • FAU_STG.2: 9
  • FAU_STG.2.1: 1
  • FAU_STG.2.2: 1
  • FAU_STG.2.3: 1
  • FAU_STG.4: 5
  • FAU_STG.4.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 12 7
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 10 5
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 8 6
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 8 5
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 9
  • FIA_UAU.7: 8
  • FIA_SOS.1: 10
  • FIA_UAU.1: 31
  • FIA_UID.1: 39
  • FIA_UAU.2: 12
  • FIA_UID.2: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 8
  • FIA_ATD.1.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.2.1: 1
  • FIA_UAU.7.1: 1
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 7
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_UAU.2: 8
  • FIA_AFL: 2
  • FIA_ATD: 2
  • FIA_UAU: 2
  • FIA_UID: 2
  • FIA_UID.2: 7
  • FIA_AFL.1: 2
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 4
  • FIA_ATD.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 1
  • FIA_UAU.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 9 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 8 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 31 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 12 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 1 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 39 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 13 7
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMF.1: 22
  • FMT_SMR.1: 29
  • FMT_MSA.3: 23
  • FMT_MSA.1: 20
  • FMT_MSA.1.1: 2
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MOF: 2
  • FMT_MTD: 2
  • FMT_SMF: 2
  • FMT_SMR: 2
  • FMT_MOF.1: 7
  • FMT_MDT.1: 1
  • FMT_SMR.1: 5
  • FMT_MOF.1.1: 1
  • FMT_MTD.1: 7
  • FMT_MTD.1.1: 1
  • FMT_SMF.1: 9
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 22 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 29 5
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FDI_EXP: 8
  • FPT_FDI_EXP.1: 11
  • FPT_FDI_EXP.1.1: 2
  • FPT_STM.1: 9
  • FPT_STM.1.1: 1
  • FPT_TST.1: 5
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_ITT: 2
  • FPT_STM.1: 6
  • FPT_STM.1.1: 1
  • FPT_ITT.1: 9
  • FPT_ITT.1.1: 1
  • FPT_STM: 1
  • FPT_ITA.1: 2
  • FPT_ITC.1: 2
  • FPT_ITI.1: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 9 6
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
  • SSH:
    • SSH: 18
  • TLS:
    • SSL:
      • SSL: 20
  • VPN:
    • VPN: 1
pdf_data/st_keywords/crypto_protocol/TLS
  • SSL:
    • SSL3.0: 1
  • TLS:
    • TLS1.0: 2
  • SSL:
    • SSL: 20
pdf_data/st_keywords/crypto_protocol/TLS/SSL
  • SSL3.0: 1
  • SSL: 20
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 1 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 6
pdf_data/st_metadata
  • pdf_file_size_bytes: 745804
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
  • /Producer: Nitro PDF PrimoPDF
  • /CreationDate: D:20120627143630-09'00'
  • /ModDate: D:20120627143630-09'00'
  • /Title: Microsoft Word - MP_C3002_ST_EXP_1.00_jp_ENG_0.01
  • /Creator: PrimoPDF http://www.primopdf.com
  • /Author: z00se00558
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1188447
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 59
  • /Author: ktodd
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20121024103427
  • /ModDate: D:20121024103427
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks: http://cve.mitre.org/, http://nvd.nist.gov/fdcc/download_fdcc.cfm, http://www.securityfocus.com/bid/
pdf_data/st_metadata//Author z00se00558 ktodd
pdf_data/st_metadata//CreationDate D:20120627143630-09'00' D:20121024103427
pdf_data/st_metadata//Creator PrimoPDF http://www.primopdf.com Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20120627143630-09'00' D:20121024103427
pdf_data/st_metadata//Producer Nitro PDF PrimoPDF Microsoft® Office Word 2007
pdf_data/st_metadata/pdf_file_size_bytes 745804 1188447
pdf_data/st_metadata/pdf_hyperlinks http://cve.mitre.org/, http://nvd.nist.gov/fdcc/download_fdcc.cfm, http://www.securityfocus.com/bid/
pdf_data/st_metadata/pdf_number_of_pages 94 59
dgst 2a6b407fd8e443a5 7a9d9dd29e76bfba