name |
HDD Data Encryption Kit E-Series 2.10 |
J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
archived |
not_valid_after |
25.04.2021 |
16.10.2018 |
not_valid_before |
25.04.2016 |
16.10.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-13-37762-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Lite_JxE081_DF_00.03.pdf |
manufacturer |
Canon Inc. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.canon.com/ |
https://www.nxp.com |
security_level |
EAL3 |
ASE_TSS.2, ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
62bf2f602b0262f1 |
0f76ffd0c75b9402 |
heuristics/cert_id |
JISEC-CC-CRP-C0506 |
NSCIB-CC-13-37762-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
cpe:2.3:h:nxp:j3e016_m66_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m64_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m64_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m64_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m66_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m66_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m66:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2021-3011 |
heuristics/direct_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/indirect_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
2.10 |
3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
NSCIB-CC-13-37761-CR2, NSCIB-CC-13-37760-CR2 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0707-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
OCSI/CERT/CCL/09/2022/RC, BSI-DSZ-CC-0914-2014, OCSI/CERT/SYS/02/2016/RC, BSI-DSZ-CC-0913-2014, BSI-DSZ-CC-0911-2014, BSI-DSZ-CC-0912-2014, OCSI/CERT/SYS/04/2015/RC, OCSI/CERT/SYS/06/2016/RC, OCSI/CERT/SYS/03/2016/RC, BSI-DSZ-CC-0821-2014, OCSI/CERT/SYS/05/2015/RC, NSCIB-CC-13-37760-CR2, OCSI/CERT/CCL/05/2021/RC, OCSI/CERT/CCL/06/2021/RC, BSI-DSZ-CC-0825-2017, NSCIB-CC-13-37761-CR2, OCSI/CERT/SYS/05/2016/RC |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0707-2012 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0506
- certification_date: 01.04.2016
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0506_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an optional hardware product to encrypt data to be stored in the HDD of Canon Multifunctional Product (MFP) and printer. By using this product, data to be stored in the HDD can be encrypted without compromising the scalability or processing performance of the Canon MFP and printer. TOE security functionality The TOE provides the following security functions. - HDD Data Encryption - Cryptographic Key Management - Self-Test
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: HDD Data Encryption Kit E-Series
- product_type: Cryptographic hardware for MFPs and printers
- report_link: https://www.ipa.go.jp/en/security/c0506_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0506_est.pdf
- toe_version: 2.10
- vendor: Canon Inc.
- expiration_date: 01.05.2021
- revalidations: [frozendict({'date': '2017-04', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534_02.html'})]
- supplier: Canon Inc.
- toe_japan_name: HDD Data Encryption Kit E-Series 2.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534.html
- toe_overseas_name: HDD Data Encryption Kit E-Series 2.11
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
85bef5b6f16c4d33 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0506_erpt.pdf |
[CR] NSCIB-CC-13-37762-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-13-37762-CR
- cert_item: NXP J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF,J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3
- cert_lab: Brightsight
- developer: NXP Semiconductors Germany GmbH
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0506-01: 1
- Certification No. C0506: 1
|
- DE:
- BSI-DSZ-CC-0707: 2
- BSI-DSZ-CC-0707-2012: 1
- BSI-DSZ-CC-0864: 1
- BSI-DSZ-CC-783: 1
- BSI-DSZ-CC-784: 1
- BSI-DSZ-CC-860: 1
- NL:
- NSCIB-CC-13-37761: 1
- NSCIB-CC-13-37762: 6
- NSCIB-CC-13-37762-CR: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 3
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 3
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL_ACCESS_MANAGED: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 21
- NXP Semiconductors: 3
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- BSI:
- ICAO:
- SCP:
- SCP01: 2
- SCP02: 2
- SCP03: 2
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20160715155737+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160715155828+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 447686
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 29
|
|
pdf_data/st_filename |
c0506_est.pdf |
ST_Lite_JxE081_DF_00.03.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0707: 3
- BSI-DSZ-CC-0864: 3
- NL:
- CC-0707: 2
- NSCIB-CC-13-37762: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0017: 2
- BSI-PP-0035: 2
- BSI-PP-0035-2007: 1
- BSI-PP-0035-2007―: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL4: 20
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 4
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 3
- ASE_TSS.2: 7
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 8
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FPT:
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FAU:
- FAU_ARP.1: 29
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_SAA.1: 2
- FAU_SAS: 13
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 46
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 47
- FCS_CKM.4.1: 1
- FCS_COP: 35
- FCS_COP.1: 37
- FCS_RNG: 17
- FCS_RNG.1: 21
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 72
- FDP_ACC.1: 24
- FDP_ACC.2: 9
- FDP_ACF: 65
- FDP_ACF.1: 44
- FDP_IFC: 26
- FDP_IFC.1: 17
- FDP_IFC.2: 2
- FDP_IFF: 19
- FDP_IFF.1: 13
- FDP_ITC: 10
- FDP_ITC.1: 17
- FDP_ITC.2: 27
- FDP_RIP: 91
- FDP_RIP.1: 10
- FDP_ROL: 11
- FDP_ROL.1: 10
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 2
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UAU.1: 3
- FIA_UAU.2: 4
- FIA_UAU.5: 4
- FIA_UID: 18
- FIA_UID.1: 11
- FIA_UID.2: 6
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 146
- FMT_MSA.1: 21
- FMT_MSA.2: 3
- FMT_MSA.3: 32
- FMT_MTD: 18
- FMT_MTD.1: 7
- FMT_MTD.3: 1
- FMT_REV: 1
- FMT_SMF: 42
- FMT_SMF.1: 29
- FMT_SMF.1.1: 1
- FMT_SMR: 35
- FMT_SMR.1: 39
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 40
- FPT_FLS.1: 25
- FPT_FLS.1.1: 1
- FPT_ITC.1: 1
- FPT_PHP: 6
- FPT_PHP.3: 3
- FPT_RCV: 10
- FPT_RCV.3: 4
- FPT_RPL.1: 6
- FPT_TDC.1: 11
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC: 18
- FTP_ITC.1: 6
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL_ACCESS_MANAGED: 3
- O:
- O.CORRECT_TSF_OPERATION: 4
- O.CORRECT_TSF_OPETATION: 2
- O.CRYPTO: 7
- OE:
- OE.PHYSICAL_ACCESS_MANAGED: 6
- T:
|
- A:
- A.APPLET: 4
- A.DF_SECURE-: 1
- A.DF_SECURE-VALUE: 1
- A.DF_SECURE-VALUES: 4
- A.DF_TERMINAL-: 1
- A.DF_TERMINAL-SUPPORT: 4
- A.NATIVE: 1
- A.PPROCESS-SEC-IC: 1
- A.PROCESS-SEC-IC: 2
- A.PROCESS_SEC_IC: 2
- A.USE_DIAG: 7
- A.USE_KEY: 1
- A.USE_KEYS: 6
- A.VERIFICATION: 3
- D:
- D.ADMIN_CONF_DATA: 3
- D.API_DATA: 3
- D.APP_CODE: 10
- D.APP_C_DATA: 3
- D.APP_I_DATA: 8
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.DF_CODE: 1
- D.DF_DATA: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PERSO_CONF_DATA: 4
- D.PIN: 12
- D.SEC_DATA: 7
- O:
- O.APPLET: 18
- O.CIPHER: 1
- O.CODE_: 1
- O.CODE_PKG: 13
- O.DF_TYPE-CONSISTENCY: 1
- O.EXT-MEM: 1
- O.EXT_MEM_IN: 2
- O.EXT_MEM_INSTANCE: 8
- O.JAVAOBJECT: 36
- O.NON_SB_CONTENT: 1
- O.NON_SB_SFR: 4
- O.REMOTE_MTHD: 4
- O.REMOTE_OBJ: 4
- O.RMI_SERVICE: 5
- O.ROR: 2
- O.SB_CONTENT: 3
- O.SB_SFR: 5
- O.SCP: 1
- OE:
- OE.APPLET: 7
- OE.CARD-MANAGEMENT: 1
- OE.DF_SECURE-VALUES: 4
- OE.DF_TERMINAL-SUPPORT: 1
- OE.NATIVE: 1
- OE.PROCESS_SEC_IC: 6
- OE.SCP: 2
- OE.USE_DIAG: 9
- OE.USE_KEYS: 7
- OE.VERIFICATION: 20
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.CREATE_EXT_MEM_INSTANCE: 3
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 6
- OP.INVK_VIRTUAL: 5
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.READ_EXT_MEM: 3
- OP.RET_RORD: 2
- OP.SB_ACCESS: 3
- OP.SB_ACCESS_SFR: 3
- OP.THROW: 4
- OP.TYPE_ACCESS: 4
- OP.WRITE_EXT_MEM: 3
- OSP:
- OSP.PROCESS-TOE: 5
- OSP.VERIFICATION: 3
- OT:
- OT.ALARM: 15
- OT.CARD-: 2
- OT.CARD-MANAGEMENT: 17
- OT.CIPHER: 10
- OT.DELETION: 6
- OT.DF_AUTHENTICATION: 7
- OT.DF_CONFIDENTIALITY: 7
- OT.DF_DATA-: 1
- OT.DF_DATA-ACCESS: 7
- OT.DF_TRANSACTION: 7
- OT.DF_TYPE-: 1
- OT.DF_TYPE-CONSISTENCY: 5
- OT.EXT-MEM: 13
- OT.FIREWALL: 17
- OT.GLOBAL_ARRAYS_CONFID: 9
- OT.GLOBAL_ARRAYS_INTEG: 9
- OT.IDENTIFICATION: 10
- OT.INSTALL: 9
- OT.KEY-: 1
- OT.KEY-MNGT: 9
- OT.LOAD: 9
- OT.MF_FW: 8
- OT.NATIVE: 9
- OT.OBJ-DELETION: 8
- OT.OPERATE: 20
- OT.PIN-MNGT: 10
- OT.REALLOCATION: 9
- OT.REMOTE: 8
- OT.RESOURCES: 9
- OT.RND: 11
- OT.SCP: 37
- OT.SEC_BOX_FW: 10
- OT.SID: 13
- OT.TRANSACTION: 8
- OT.VERIFICATION: 1
- OT.XYZ: 1
- R:
- T:
- T.CONFID-APPLI-DATA: 5
- T.CONFID-JCS-CODE: 5
- T.CONFID-JCS-DATA: 5
- T.DELETION: 4
- T.DF_CLONING: 6
- T.DF_DATA-MODIFICATION: 5
- T.DF_DATA_MODIFICATION: 1
- T.DF_IMPERSONATE: 6
- T.EXE-CODE: 8
- T.EXE-CODE-REMOTE: 4
- T.INSTALL: 4
- T.INTEG-APPLI-: 2
- T.INTEG-APPLI-CODE: 8
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 5
- T.NATIVE: 5
- T.OBJ-DELETION: 4
- T.OS_OPERATE: 7
- T.PHYSICAL: 4
- T.RESOURCES: 4
- T.RND: 7
- T.SEC_BOX_BORDER: 7
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 158
- NXP Semiconductors: 22
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 2
- Triple-DES: 7
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 8
- SHA-256: 14
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 7
- Fault Injection: 1
- Physical tampering: 3
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 10
- SPA: 2
- physical probing: 3
- side channel: 17
- side-channel: 1
- side-channels: 2
- timing attack: 1
- timing attacks: 6
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- FIPS:
- FIPS 180-3: 6
- FIPS 186-3: 5
- FIPS 197: 2
- FIPS 46-3: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 186-3: 1
- FIPS PUB 81: 2
- ICAO:
- ISO:
- ISO/IEC 11770: 2
- ISO/IEC 15946-1: 1
- ISO/IEC 9796-: 1
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS#3: 2
- PKCS1: 1
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.2.1: 1
- GlobalPlatform 2.2.1: 2
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.applet: 1
- javacard.security: 4
- javacardx:
- javacardx.crypto: 2
- javacardx.rmi: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT are: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20160715151953+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /Keywords:
- /ModDate: D:20160715151954+09'00'
- /Producer: Adobe LiveCycle PDFGenerator
- /Subject:
- /Title: HDD Data Encryption Kit E-Series Security Target
- pdf_file_size_bytes: 420636
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
- /Author: NXP Semiconductors
- /CreationDate: D:20130813120145Z
- /Creator: Microsoft® Office Word 2007
- /Keywords: JCOP, ST, Security Target Lite
- /ModDate: D:20130813120256+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target Lite
- /Title: NXP J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3
- pdf_file_size_bytes: 1629614
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 144
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |