Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20
JISEC-CC-CRP-C0720-01-2021
ST31P450 B02 including optional cryptographic library Neslib version 6.4.7 and optional technology MIFARE Plus® EV1 version 1.1.2
ANSSI-CC-2020/05
name KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20 ST31P450 B02 including optional cryptographic library Neslib version 6.4.7 and optional technology MIFARE Plus® EV1 version 1.1.2
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 15.04.2026 04.11.2025
not_valid_before 15.04.2021 18.02.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2020_05-S01.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_05.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0720_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_05en.pdf
manufacturer KONICA MINOLTA, INC. STMicroelectronics
manufacturer_web https://www.konicaminolta.com/index.html https://www.st.com/
security_level {} EAL5+, ASE_TSS.2, AVA_VAN.4, ALC_DVS.2
dgst 6171283e8ac6eea1 ab5eb5dc6d8aef2b
heuristics/cert_id JISEC-CC-CRP-C0720-01-2021 ANSSI-CC-2020/05
heuristics/cert_lab [] THALES
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_SPD.1, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ASE_TSS.2, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, AVA_VAN.4, ASE_CCL.1
heuristics/extracted_versions 20 1.1.2, 6.4.7
heuristics/report_references/directly_referenced_by {} NSCIB-CC-0635023-CR, NSCIB-CC-0434407-CR
heuristics/report_references/indirectly_referenced_by {} NSCIB-CC-2200059-01-CR, NSCIB-CC-0635023-CR, NSCIB-CC-0434407-CR
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0720
  • certification_date: 01.04.2021
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0720
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Product (MFP) that has the functions, such as copy, scan and Document storage and retrieval. The TOE provides the security functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP. TOE Security functions The TOE provides the following security functions: Identification and authentication function Access control function Storage encryption function Trusted communications function Security management function Audit function Software update verification function Self-testing function
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio100000006bm-att/c0720_est.pdf
    • toe_version: GM2-20
    • vendor: KONICA MINOLTA, INC.
  • expiration_date:
  • supplier: KONICA MINOLTA, INC.
  • toe_japan_name: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0720_it0772.html
  • toe_overseas_name: KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint C4065 with UK-112GM2-20
heuristics/st_references/directly_referenced_by {} NSCIB-CC-0635023-CR, NSCIB-CC-0434407-CR
heuristics/st_references/indirectly_referenced_by {} NSCIB-CC-0635023-CR, NSCIB-CC-0434407-CR
heuristics/protection_profiles b2cfec7a92fa2940 cf0f01bcd7be3e9c
maintenance_updates

protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename c0720_eimg.pdf certificat ANSSI-CC-2020_05-S01.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0720-01-2021: 1
  • FR:
    • ANSSI-CC-2020/05-S01: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/cert_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210602111203+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210602115815+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 83609
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20201223103230+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20201223103230+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 275566
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename c0720_erpt.pdf anssi-cc-2020_05.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ASE_TSS.2, ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2020/05
    • cert_item: ST31P450 B02 including optional cryptographic library NESLIB version 6.4.7, and optional technology MIFARE Plus® EV1 version 1.1.2
    • cert_item_version: B02
    • cert_lab: THALES / CNES 290 allée du Lac, 31670 Labège, France
    • developer: STMicroelectronics 190 avenue Célestin Coq, ZI de Rousset, 13106 Rousset Cedex, France Commanditaire STMicroelectronics 1 190 avenue Célestin Coq, ZI de Rousset, 13106 Rousset Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0720-01-2021: 1
  • FR:
    • ANSSI-CC-2020/05: 19
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 1
    • EAL4: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RBG_EXT.1: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • STMicroelectronics:
    • STM: 11
    • STMicroelectronics: 5
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • TRNG:
    • TRNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
pdf_data/report_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 1
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NesLib 6.4: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 14443: 2
pdf_data/report_metadata
  • /CreationDate: D:20210720120228+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210720120315+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 419944
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 30
  • /CreationDate: D:20200220174818+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200220174935+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 345645
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename c0720_est.pdf anssi-cible-cc-2020_05en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 10
    • BSI-CC-PP-0084-: 4
    • BSI-CC-PP-0084-2014: 70
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 17
    • EAL5 augmented: 2
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 2
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 5
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 4
    • ASE_CCL.1: 1
    • ASE_ECD: 4
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 2
    • ASE_OBJ: 19
    • ASE_OBJ.2: 1
    • ASE_REQ: 48
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 10
    • ASE_SPD.1: 1
    • ASE_TSS: 13
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV: 3
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 13
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 37
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 3
    • FCS_CKM_EXT.4: 31
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 114
    • FCS_COP.1.1: 7
    • FCS_KDF_EXT: 3
    • FCS_KDF_EXT.1: 13
    • FCS_KDF_EXT.1.1: 4
    • FCS_KYC_EXT: 4
    • FCS_KYC_EXT.1: 6
    • FCS_KYC_EXT.1.1: 3
    • FCS_PCC_EXT: 3
    • FCS_PCC_EXT.1: 7
    • FCS_PCC_EXT.1.1: 2
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 38
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SMC_EXT.1: 7
    • FCS_SNI_EXT: 3
    • FCS_SNI_EXT.1: 5
    • FCS_SNI_EXT.1.1: 3
    • FCS_SNI_EXT.1.2: 2
    • FCS_SNI_EXT.1.3: 2
    • FCS_SSH_EXT.1: 4
    • FCS_TLS_EXT.1: 4
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 2
    • FDP_DSK_EXT.1: 7
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 2
    • FIA_PSK_EXT: 2
    • FIA_PSK_EXT.1: 10
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 2
    • FIA_PSK_EXT.1.3: 2
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 3
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 2
    • FPT_KYP_EXT.1: 4
    • FPT_KYP_EXT.1.1: 2
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 7
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 8
    • FAU_SAR.1: 25
    • FAU_SAS: 2
    • FAU_SAS.1: 28
  • FCS:
    • FCS_CKM.1: 21
    • FCS_CKM.4: 17
    • FCS_COP.1: 42
    • FCS_RNG: 2
    • FCS_RNG.1: 7
  • FDP:
    • FDP_ACC.1: 52
    • FDP_ACF: 1
    • FDP_ACF.1: 43
    • FDP_CKM.2: 1
    • FDP_IFC.1: 18
    • FDP_ITC.1: 4
    • FDP_ITC.2: 13
    • FDP_ITT.1: 10
    • FDP_RIP.1: 9
    • FDP_SDC: 2
    • FDP_SDC.1: 8
    • FDP_SDI.2: 15
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
    • FDP_UCT.1: 16
    • FDP_UIT.1: 16
  • FIA:
    • FIA_API: 2
    • FIA_API.1: 6
    • FIA_UAU.1: 14
    • FIA_UAU.2: 9
    • FIA_UAU.5: 9
    • FIA_UID.1: 18
    • FIA_UID.2: 11
  • FMT:
    • FMT_LIM: 2
    • FMT_LIM.1: 29
    • FMT_LIM.2: 30
    • FMT_MSA.1: 36
    • FMT_MSA.3: 40
    • FMT_MTD.1: 9
    • FMT_SMF.1: 34
    • FMT_SMR.1: 29
  • FPR:
    • FPR_UNL.1: 9
  • FPT:
    • FPT_FLS.1: 25
    • FPT_ITT.1: 9
    • FPT_PHP.3: 11
    • FPT_RPL.1: 11
    • FPT_TDC.1: 10
  • FRU:
    • FRU_FLT.2: 12
    • FRU_RSA.2: 9
  • FTP:
    • FTP_ITC.1: 28
    • FTP_TRP.1: 17
    • FTP_TRP.1.3: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 7
    • D.USER: 7
  • O:
    • O.ACCESS_CONTROL: 7
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 5
    • O.COMMS_PROTECTION: 10
    • O.KEY_MATERIAL: 1
    • O.PURGE_DATA: 2
    • O.STORAGE_ENCRYPTION: 7
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTE: 1
    • OE.PHYSICAL_PROTE: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_A: 1
    • T.UNAUTHORIZED_U: 1
  • O:
    • O.C: 2
    • O.MAC-: 1
    • O.RND: 4
    • O.TOE-: 1
  • R:
    • R.O: 2
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Infineon:
    • Infineon Technologies: 1
  • NXP:
    • NXP: 1
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 21
  • Samsung:
    • Samsung: 6
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 26
      • AES-: 1
      • AES-256: 4
  • constructions:
    • MAC:
      • HMAC: 13
      • HMAC-SHA-256: 6
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 4
  • AES_competition:
    • AES:
      • AES: 32
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 10
      • Triple-DES: 1
    • DES:
      • DES: 12
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 4
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 10
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 1
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 4
    • EdDSA:
      • EdDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 10
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 4
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-224: 2
      • SHA-256: 18
      • SHA-384: 10
      • SHA-512: 14
      • SHA384: 2
  • Keccak:
    • Keccak: 14
  • SHA:
    • SHA1:
      • SHA-1: 15
    • SHA2:
      • SHA-2: 3
      • SHA-224: 5
      • SHA-256: 8
      • SHA-384: 8
      • SHA-512: 7
    • SHA3:
      • SHA-3: 6
      • SHA3-224: 4
      • SHA3-256: 4
      • SHA3-384: 4
      • SHA3-512: 4
  • SHAKE:
    • SHAKE128: 4
    • SHAKE256: 4
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
  • KEM:
    • KEM: 1
  • MAC:
    • MAC: 17
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 5
    • IKEv1: 20
    • IKEv2: 9
  • IPsec:
    • IPsec: 64
  • SSH:
    • SSH: 6
  • TLS:
    • TLS:
      • TLS: 6
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 10
    • RNG: 6
  • PRNG:
    • DRBG: 10
  • RNG:
    • RND: 7
    • RNG: 6
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 22
  • CTR:
    • CTR: 7
  • GCM:
    • GCM: 10
  • XTS:
    • XTS: 4
  • CBC:
    • CBC: 8
  • CCM:
    • CCM: 3
  • ECB:
    • ECB: 7
  • GCM:
    • GCM: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 2
    • P-521: 2
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 3
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib : 9
    • NesLib 436: 1
    • NesLib 437: 1
    • NesLib 440: 1
    • NesLib 443: 1
    • NesLib 447: 1
    • NesLib 448: 1
    • NesLib 449: 1
    • NesLib 451: 1
    • NesLib 452: 1
    • NesLib 6.4: 3
    • NesLib 6.4.7: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Malfunction: 13
    • malfunction: 4
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 14
    • Physical Probing: 4
    • physical probing: 3
    • side channel: 10
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 8
    • FIPS PUB 197: 3
    • FIPS PUB 198-1: 1
  • ISO:
    • ISO/IEC 10116: 14
    • ISO/IEC 10118: 4
    • ISO/IEC 10118-: 2
    • ISO/IEC 18031:2011: 5
    • ISO/IEC 18033-3: 1
    • ISO/IEC 19772: 8
  • NIST:
    • NIST SP 800-108: 3
    • NIST SP 800-132: 6
    • NIST SP 800-38A: 3
    • NIST SP 800-38B: 2
    • NIST SP 800-38C: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-90A: 7
  • RFC:
    • RFC 3602: 10
    • RFC 4106: 6
    • RFC 4109: 3
    • RFC 4301: 2
    • RFC 4303: 2
    • RFC 4304: 5
    • RFC 4868: 7
    • RFC 5282: 3
  • BSI:
    • AIS20: 2
    • AIS31: 3
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 44
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS PUB 140-2: 5
    • FIPS PUB 180-2: 5
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 4
    • FIPS PUB 198-1: 3
    • FIPS PUB 202: 6
  • ISO:
    • ISO/IEC 13239: 2
    • ISO/IEC 14443: 2
    • ISO/IEC 14888: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796: 1
    • ISO/IEC 9796-2: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38B: 2
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-56A: 3
    • NIST SP 800-67: 3
    • NIST SP 800-90: 4
    • SP 800-38A: 3
    • SP 800-38C: 1
    • SP 800-38D: 1
    • SP 800-67: 1
    • SP 800-90A: 1
  • PKCS:
    • PKCS #1: 6
    • PKCS1: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • ES) is in User NVM. 47 Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and MIFARE Plus EV1 when they are embedded: 1
    • Level. Proximity Check, Virtual Card Architecture, data access of sectors in SL3 or SL1SL3Mix, are out of scope. • Security level 3 (SL3): The card user can access the data and value blocks in the TOE after an: 1
    • Security IC Embedded Software (ES) is in User NVM. 47 Note: The ES is not part of the TOE and is out of scope of the evaluation, except NesLib and MIFARE Plus EV1 when they are embedded. 1.6.3 TOE: 1
    • is never in scope of the evaluation. Proximity Check, Virtual Card Architecture are also out of scope. Personalization and Originality Check are in scope. • Security level 1 (SL1): Different: 1
    • out of scope: 3
pdf_data/st_metadata
  • /CreationDate: D:20210719145643+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210719145643+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 1020463
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 74
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different