name |
Microcontrôleur AT90SC28880RCFV2 révision C embarquant la bibliothèque cryptographique optionnelle TBX version 00.03.22.04
|
Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000 MFP Software /Hardware Version : Software System/Copy 1.22 Network Support 8.27 Scanner 01.23 Printer 1.22 Fax 04.00.00 Web Support 1.10 Web Uapl 1.08 Network Doc Box 1.03 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-13(WW) 04.04.00
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Multi-Function Devices
|
not_valid_before |
2013-12-24
|
2010-08-31
|
not_valid_after |
2019-09-01
|
2015-09-01
|
scheme |
FR
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/TPG0224C-VIC-09Dec13.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0266_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Inside Secure
|
Ricoh Company, Ltd.
|
manufacturer_web |
https://insidesecure.com
|
https://www.ricoh.com/
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL3 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_59_v2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0266_erpt.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
|
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 2, 26), 'maintenance_title': 'ANSSI-CC-2013/59-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_59-M01.pdf', 'maintenance_st_link': None}) |
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
14801a5daf74e3d7b7c5e2495d6bd9ab6fee76976cc3b1435a5146c9b5e3ae8d
|
4a2725db8285c4280f1e18e1273122278ed97c7aa4bafd2877dbf4200557a88c
|
state/report/txt_hash |
47f70521b1b7f3d6bc045e69979257cf6b8cb95217bf0054c4c472b8b1d48bab
|
37d11d7d44bb18cebb5ba8182d96ac3ffdeaefba5f77c33246c6320aa4d95f1f
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
ecf642d2af1a115402e7681904da17b797bf229597ff619fd8ef675d1887a9d6
|
00eb8923e3de7e92705f4d9f86598c5d6c3110ad8d88995d7368d91611ab4345
|
state/st/txt_hash |
a9c888d3482cc61d93efb8f27aa55b9bd4d3364439594a40650d17c1770f4bea
|
98830cf4fb98dba7b8104d47ab10f40cfcda2d6689fe75e56105e6bc646625b9
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2013/59
|
JISEC-CC-CRP-C0266
|
heuristics/cert_lab |
CEA |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
00.03.22.04 |
1.08, 1.22, 1.03, 8.27, 04.00.00, 04.04.00, 1.10, 01.23 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- product: Microcontrôleur AT90SC28880RCFV2 révision C embarquant la bibliothèque cryptographique optionnelle TBX version 00.03.22.04
- url: https://cyber.gouv.fr/produits-certifies/microcontroleur-at90sc28880rcfv2-revision-c-embarquant-la-bibliotheque
- description: Le produit évalué est le « Microcontrôleur AT90SC28880RCFV2 révision C embarquant la bibliothèque cryptographique optionnelle TBX version 00.03.22.04 » développé par Inside Secure.
Le microcontrôleur seul n'est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Le
- sponsor: Inside Secure Maxwell Building - Scottish Enterprise Technology Park
- developer: Inside Secure Maxwell Building - Scottish Enterprise Technology Park
- cert_id:
2013/59
- level: EAL5+
- enhanced:
- cert_id:
2013/59
- certification_date:
24/12/2013
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r4
- developer:
Inside Secure Maxwell Building - Scottish Enterprise Technology Park
- sponsor:
Inside Secure Maxwell Building - Scottish Enterprise Technology Park
- evaluation_facility:
CEA - LETI
- level:
EAL5+
- protection_profile:
PP0035
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-59en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-59fr.pdf
|
- cert_id:
C0266
- supplier: RICOH COMPANY, LTD.
- toe_overseas_name: Following MFP with FCU(Fax Option Type C5000)
MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300
FCU: Fax Option Type C5000
MFP Software /Hardware Version : < Cont. >
- expiration_date: 2015-09
- claim: EAL3
- certification_date: 2010-08
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0266_it0289.html
- toe_japan_name: -----
- enhanced:
- product:
Following MFP with FCU(Fax Option Type C5000)
MFP:
Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300
FCU:
Fax Option Type C5000
- toe_version:
MFP Software /Hardware Version :
Software
System/Copy 1.22
Network Support 8.27
Scanner 01.23
Printer 1.22
Fax 04.00.00
Web Support 1.10
Web Uapl 1.08
Network Doc Box 1.03
Hardware
Ic Key 1100
Ic Ctlr 03
FCU Version : GWFCU3-13(WW) 04.04.00
- product_type:
Multi Function Product
- certification_date:
2010-08-31
- cc_version:
3.1
- assurance_level:
EAL3
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0266_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0266_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0266_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions.
TOE security functionality
The major security functions of the TOE are:
-
Audit, which creates audit logs of security events.
-
Identification and Authentication, which identifies and authenticates users.
-
Document Data Access Control, which controls each users operation of documents.
-
Stored Data Protection, which encrypts stored document data on hard disk.
-
Network Communication Data Protection, which encrypts network communications.
-
Security Management, which provides total management of the security function settings.
-
Service Mode Lock, which controls the maintenance functions.
-
Telephone Line Intrusion Protection, which permits fax only communication.
-
MFP Control Software Verification, which checks the integrity of the software.
|
heuristics/scheme_data/cert_id |
2013/59
|
C0266
|
heuristics/scheme_data/enhanced |
- cert_id: 2013/59
- certification_date:
24/12/2013
- category: Micro-circuits
- cc_version:
Critères Communs version 3.1r4
- developer: Inside Secure Maxwell Building - Scottish Enterprise Technology Park
- sponsor: Inside Secure Maxwell Building - Scottish Enterprise Technology Park
- evaluation_facility:
CEA - LETI
- level: EAL5+
- protection_profile: PP0035
- mutual_recognition: SOG-IS
CCRA
- augmented: ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-59en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-59fr.pdf
|
- product: Following MFP with FCU(Fax Option Type C5000)
MFP:
Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300
FCU:
Fax Option Type C5000
- toe_version: MFP Software /Hardware Version :
Software
System/Copy 1.22
Network Support 8.27
Scanner 01.23
Printer 1.22
Fax 04.00.00
Web Support 1.10
Web Uapl 1.08
Network Doc Box 1.03
Hardware
Ic Key 1100
Ic Ctlr 03
FCU Version : GWFCU3-13(WW) 04.04.00
- product_type: Multi Function Product
- certification_date:
2010-08-31
- cc_version:
3.1
- assurance_level: EAL3
- vendor: RICOH COMPANY, LTD.
- evaluation_facility:
Information Technology Security Center Evaluation Department
- report_link:
https://www.ipa.go.jp/en/security/c0266_erpt.pdf
- cert_link: https://www.ipa.go.jp/en/security/c0266_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0266_est.pdf
- description: PRODUCT DESCRIPTION
Description of TOE
The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions.
TOE security functionality
The major security functions of the TOE are:
-
Audit, which creates audit logs of security events.
-
Identification and Authentication, which identifies and authenticates users.
-
Document Data Access Control, which controls each users operation of documents.
-
Stored Data Protection, which encrypts stored document data on hard disk.
-
Network Communication Data Protection, which encrypts network communications.
-
Security Management, which provides total management of the security function settings.
-
Service Mode Lock, which controls the maintenance functions.
-
Telephone Line Intrusion Protection, which permits fax only communication.
-
MFP Control Software Verification, which checks the integrity of the software.
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r4
|
3.1
|
heuristics/scheme_data/enhanced/certification_date |
24/12/2013
|
2010-08-31
|
heuristics/scheme_data/enhanced/evaluation_facility |
CEA - LETI
|
Information Technology Security Center Evaluation Department
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-59fr.pdf
|
https://www.ipa.go.jp/en/security/c0266_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-59en.pdf
|
https://www.ipa.go.jp/en/security/c0266_est.pdf
|
heuristics/st_references/directly_referenced_by |
CRP283, CRP284 |
None
|
heuristics/st_references/directly_referencing |
None
|
None
|
heuristics/st_references/indirectly_referenced_by |
CRP283, CRP284 |
None
|
heuristics/st_references/indirectly_referencing |
None
|
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
ANSSI-CC-2013_59_v2.pdf
|
c0266_erpt.pdf
|
pdf_data/report_frontpage |
- FR:
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2013/59
- cert_item:
Microcontrôleur AT90SC28880RCFV2 révision C embarquant la bibliothèque cryptographique optionnelle TBX version 00.03.22.04
- cert_item_version:
Révision C (microcontrôleur), version 00.03.22.04 (bibliothèque cryptographique
- ref_protection_profiles:
PP0035] : Security IC platform Protection Profile Version 1.0
- cc_version:
Critères Communs version 3.1 révision 4
- cc_security_level:
EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- developer:
Inside Secure Maxwell Building – Scottish Enterprise Technology Park East Kilbride – Glasgow G75 0QF - Ecosse Commanditaire Inside Secure Maxwell Building – Scottish Enterprise Technology Park East Kilbride – Glasgow G75 0QF - Ecosse
- cert_lab:
CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0266-01:
1
- Certification No. C0266:
1
|
pdf_data/report_keywords/cc_claims |
|
- T:
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
7
- T.ABUSE_SEC_MNG:
3
- T.SALVAGE:
3
- T.TRANSIT:
3
- T.FAX_LINE:
3
- A:
- A.ADMIN:
2
- A.SUPERVISOR:
1
- A.NETWORK:
1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 5:
2
- EAL4:
2
- EAL5:
1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
- ITSEC:
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 5:
2
- EAL4:
2
- EAL5:
1
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- users, receives the document data from client computers which are connected via Network, stores the confidential document data into HDD of the TOE, and performs outputting by print and delivery. Therefore, the TOE is a:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center:
3
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224:
1
- SHA-256:
1
- SHA-384:
1
- SHA-512:
1
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- FIPS:
- BSI:
- CC:
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
172532
- pdf_is_encrypted:
False
- pdf_number_of_pages:
17
- /Producer:
GPL Ghostscript 9.02
- /CreationDate:
D:20131230114710+01'00'
- /ModDate:
D:20131230114710+01'00'
- /Title:
ANSSI-CC-2013_59_v2
- /Creator:
PDFCreator Version 1.2.1
- /Author:
doucet
- /Keywords:
- /Subject:
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
519570
- pdf_is_encrypted:
False
- pdf_number_of_pages:
47
- /CreationDate:
D:20110216120931+09'00'
- /Author:
- /Creator:
Word 用 Acrobat PDFMaker 8.1
- /Producer:
Acrobat Distiller 8.2.3 (Windows)
- /ModDate:
D:20110216120934+09'00'
- /Title:
CRP-e
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
doucet
|
|
pdf_data/report_metadata//CreationDate |
D:20131230114710+01'00'
|
D:20110216120931+09'00'
|
pdf_data/report_metadata//Creator |
PDFCreator Version 1.2.1
|
Word 用 Acrobat PDFMaker 8.1
|
pdf_data/report_metadata//ModDate |
D:20131230114710+01'00'
|
D:20110216120934+09'00'
|
pdf_data/report_metadata//Producer |
GPL Ghostscript 9.02
|
Acrobat Distiller 8.2.3 (Windows)
|
pdf_data/report_metadata//Title |
ANSSI-CC-2013_59_v2
|
CRP-e
|
pdf_data/report_metadata/pdf_file_size_bytes |
172532
|
519570
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
17
|
47
|
pdf_data/st_filename |
TPG0224C-VIC-09Dec13.pdf
|
c0266_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AUDIT:
16
- O.MANAGE:
11
- O.MEM:
11
- O.NET:
9
- O.GENUINE:
9
- O.LINE_PROTECT:
7
- O.DOC_ACC:
8
- O.LINE:
1
- T:
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
3
- T.ABUSE_SEC_MNG:
4
- T.SALVAGE:
3
- T.TRANSIT:
4
- T.FAX_LINE:
3
- A:
- A.ADMIN:
5
- A.SUPERVISOR:
4
- A.NETWORK:
5
- OE:
- OE.ADMIN:
3
- OE.SUPERVISOR:
3
- OE.NETWORK:
3
|
pdf_data/st_keywords/cc_claims/O |
|
- O.AUDIT:
16
- O.MANAGE:
11
- O.MEM:
11
- O.NET:
9
- O.GENUINE:
9
- O.LINE_PROTECT:
7
- O.DOC_ACC:
8
- O.LINE:
1
|
pdf_data/st_keywords/cc_claims/T |
|
- T.ILLEGAL_USE:
4
- T.UNAUTH_ACCESS:
3
- T.ABUSE_SEC_MNG:
4
- T.SALVAGE:
3
- T.TRANSIT:
4
- T.FAX_LINE:
3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
5
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
|
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
5
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.2: 3
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.2: 1
|
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 2
- ALC_LCD.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2:
1
- ATE_DPT.3: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.2:
1
- ATE_DPT.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL5:
6
- EAL4:
1
- EAL5+:
1
- EAL4+:
1
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1:
9
- FAU_SAS.1.1:
1
- FCS:
- FCS_COP.1:
13
- FCS_RNG.1:
10
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP:
13
- FCS_COP.1.1:
13
- FCS_CKM.1:
16
- FCS_CKM.4:
15
- FDP:
- FDP_ITT.1:
12
- FDP_IFC.1:
15
- FDP_ITT.1.1:
1
- FDP_ACC.1:
1
- FDP_IFC.1.1:
1
- FDP_IFF.1:
1
- FDP_ITC.1:
15
- FDP_ITC.2:
15
- FMT:
- FMT_LIM.1:
10
- FMT_LIM.2:
9
- FMT_LIM.1.1:
1
- FMT_LIM.2.1:
1
- FPT:
- FPT_FLS.1:
13
- FPT_ITT.1:
11
- FPT_PHP.3:
12
- FPT_FLS.1.1:
1
- FPT_PHP.3.1:
1
- FPT_ITT.1.1:
1
- FPT_AMT.1:
1
- FRU:
- FRU_FLT.2:
12
- FRU_FLT.1:
1
- FRU_FLT.2.1:
1
|
- FAU:
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_SAR.1:
11
- FAU_SAR.2:
9
- FAU_STG.1:
8
- FAU_STG.4:
8
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FCS:
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC.1:
16
- FDP_ACF.1:
12
- FDP_IFC.1:
12
- FDP_IFF.1:
10
- FDP_ITC.1:
1
- FDP_ITC.2:
2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1.1:
1
- FDP_IFF.1.1:
1
- FDP_IFF.1.2:
1
- FDP_IFF.1.3:
1
- FDP_IFF.1.4:
1
- FDP_IFF.1.5:
1
- FDP_ADF.1:
1
- FDP_ITC:
1
- FIA:
- FIA_AFL.1:
10
- FIA_ATD.1:
11
- FIA_SOS.1:
8
- FIA_UAU.2:
12
- FIA_UAU.7:
9
- FIA_UID.2:
10
- FIA_USB.1:
10
- FIA_UAU.1:
6
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UID.1:
8
- FIA_UAU.2.1:
1
- FIA_UAU.7.1:
1
- FIA_UID.2.1:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_MSA.1:
12
- FMT_MSA.3:
14
- FMT_MTD.1:
17
- FMT_SMF.1:
19
- FMT_SMR.1:
19
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_STM.1:
10
- FPT_TST.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_ITC.1:
8
- FTP_TRP.1:
10
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
2
- FTP_TRP.1.3:
2
- FTP_TST.1:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS.1:
9
- FAU_SAS.1.1:
1
|
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_SAR.1:
11
- FAU_SAR.2:
9
- FAU_STG.1:
8
- FAU_STG.4:
8
- FAU_GEN.1.2:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_COP.1:
13
- FCS_RNG.1: 10
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_COP: 13
- FCS_COP.1.1:
13
- FCS_CKM.1:
16
- FCS_CKM.4:
15
|
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2: 2
- FCS_CKM.4:
7
- FCS_CKM.1.1: 1
- FCS_COP.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
16
|
10
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
15
|
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
13
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
13
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ITT.1: 12
- FDP_IFC.1:
15
- FDP_ITT.1.1: 1
- FDP_ACC.1:
1
- FDP_IFC.1.1:
1
- FDP_IFF.1:
1
- FDP_ITC.1:
15
- FDP_ITC.2:
15
|
- FDP_ACC.1:
16
- FDP_ACF.1: 12
- FDP_IFC.1:
12
- FDP_IFF.1:
10
- FDP_ITC.1:
1
- FDP_ITC.2:
2
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1.1:
1
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ADF.1: 1
- FDP_ITC: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
1
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
15
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1 |
1
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
15
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
15
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM.1:
10
- FMT_LIM.2:
9
- FMT_LIM.1.1:
1
- FMT_LIM.2.1:
1
|
- FMT_MSA.1:
12
- FMT_MSA.3:
14
- FMT_MTD.1:
17
- FMT_SMF.1:
19
- FMT_SMR.1:
19
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS.1:
13
- FPT_ITT.1:
11
- FPT_PHP.3:
12
- FPT_FLS.1.1:
1
- FPT_PHP.3.1:
1
- FPT_ITT.1.1:
1
- FPT_AMT.1:
1
|
- FPT_STM.1:
10
- FPT_TST.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224:
5
- SHA-256:
4
- SHA-384:
4
- SHA-512:
3
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
10
- physical probing:
2
- side channel:
1
- FI:
- Malfunction:
11
- malfunction:
1
- other:
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3:
1
- FIPS 197:
1
- FIPS 180-2:
5
- FIPS 186-3:
2
- PKCS:
- BSI:
- ISO:
- ISO/IEC 3309:
2
- ISO/IEC 14443:
2
- ICAO:
|
- FIPS:
- BSI:
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
- CCMB-2007-09-0004:
1
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS PUB 46-3:
1
- FIPS 197:
1
- FIPS 180-2:
5
- FIPS 186-3:
2
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
14
|
3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
999137
- pdf_is_encrypted:
False
- pdf_number_of_pages:
72
- /Title:
Krypton Security Target Lite
- /Author:
John Boggie;Graeme Calder
- /Creator:
Microsoft® Word 2010
- /CreationDate:
D:20131209135833+00'00'
- /ModDate: D:20131209135833+00'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
mailto:[email protected], http://www.ssi.gouv.fr/index.html, http://www.insidesecure.com/
|
- pdf_file_size_bytes:
1778215
- pdf_is_encrypted:
False
- pdf_number_of_pages:
80
- /Creator:
MP_C2800_ST_Eng.doc - Microsoft Word
- /CreationDate:
D:20110105172042
- /Title:
MP_C2800_ST_Eng.doc
- /Author:
p000266068
- /Producer:
Acrobat PDFWriter 5.0 Windows NT
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
John Boggie;Graeme Calder
|
p000266068
|
pdf_data/st_metadata//CreationDate |
D:20131209135833+00'00'
|
D:20110105172042
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2010
|
MP_C2800_ST_Eng.doc - Microsoft Word
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2010
|
Acrobat PDFWriter 5.0 Windows NT
|
pdf_data/st_metadata//Title |
Krypton Security Target Lite
|
MP_C2800_ST_Eng.doc
|
pdf_data/st_metadata/pdf_file_size_bytes |
999137
|
1778215
|
pdf_data/st_metadata/pdf_hyperlinks |
mailto:[email protected], http://www.ssi.gouv.fr/index.html, http://www.insidesecure.com/ |
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
72
|
80
|
dgst |
507c3b7ac2f17a6a
|
5723efcbb184b84c
|