Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH MP 305+ J-1.00
JISEC-CC-CRP-C0503
CISCO ADAPTIVE SECURITY APPLIANCES (ASA) AND CISCO ADAPTIVE SECURITY APPLIANCES VIRTUAL (ASAV) Version: ASA 9.4(1.13), ASAv 9.4(1.240) ASDM 7.4Components: ASA 5500 Series (5506-X, 5506-H, 5506-W, 5508-X, 5516-X) and ASAv running on VM ESXi 5.1 and 5.5 on the Unified Computing System (UCS) EN120E, EN120S M2, E140S M1, E140S M2, E140D M1, E160D M2, E160D M1, E180D M2, E140DP M1, E160DP M1, C22 M3, C24 M3, C220 M3, C220 M4, C240 M3, C240 M4, C260 M2, C420 M3, C460 M2, and C460 M4
Certificate Number: 2016/102
name RICOH MP 305+ J-1.00 CISCO ADAPTIVE SECURITY APPLIANCES (ASA) AND CISCO ADAPTIVE SECURITY APPLIANCES VIRTUAL (ASAV) Version: ASA 9.4(1.13), ASAv 9.4(1.240) ASDM 7.4Components: ASA 5500 Series (5506-X, 5506-H, 5506-W, 5508-X, 5516-X) and ASAv running on VM ESXi 5.1 and 5.5 on the Unified Computing System (UCS) EN120E, EN120S M2, E140S M1, E140S M2, E140D M1, E160D M2, E160D M1, E180D M2, E140DP M1, E160DP M1, C22 M3, C24 M3, C220 M3, C220 M4, C240 M3, C240 M4, C260 M2, C420 M3, C460 M2, and C460 M4
category Multi-Function Devices Network and Network-Related Devices and Systems
scheme JP AU
not_valid_after 31.03.2021 10.11.2021
not_valid_before 31.03.2016 10.11.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0503_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016_102_Cisco_ASA_ASAv_CRv1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0503_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016_102_Cisco_ASA_ASAv_STv3.0.pdf
manufacturer Ricoh Company, Ltd. Cisco Systems, Inc.
manufacturer_web https://www.ricoh.com/ https://www.cisco.com
security_level EAL2+, ALC_FLR.2 {}
dgst 67637e425d0906e4 0fc4a86821f53983
heuristics/cert_id JISEC-CC-CRP-C0503 Certificate Number: 2016/102
heuristics/cpe_matches cpe:2.3:h:ricoh:mp_305\+:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:5.5\(203\):*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2018-0338
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1
heuristics/extracted_versions 1.00 7.4, 9.4, 1.13, 1.240, 5.1, 5.5
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0503
  • certification_date: 01.03.2016
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0503_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH MP 305+
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0503_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0503_est.pdf
    • toe_version: J-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.04.2021
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0503_it5535.html
  • toe_japan_name: RICOH MP 305+J-1.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles 43ce79b420f23a00 bb67fb1b4f10e7a5, d7508f508083d040, ac9abe3d5c5a31f0
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf
pdf_data/report_filename c0503_erpt.pdf 2016_102_Cisco_ASA_ASAv_CRv1.0.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0503-01: 1
    • Certification No. C0503: 1
  • AU:
    • Certification Report 2016/102: 1
  • FR:
    • Certification Report 2016/102: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
  • A:
    • A.CONNECTIONS: 1
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 35
    • Cisco Systems: 9
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • TLS:
      • TLS: 2
  • IPsec:
    • IPsec: 16
  • SSH:
    • SSH: 5
    • SSHv2: 8
  • TLS:
    • TLS:
      • TLS: 7
  • VPN:
    • VPN: 27
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • SPA: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20160524142052+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /Keywords:
  • /ModDate: D:20160524142149+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 407140
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /Author: Terence.Caulfield
  • /CreationDate: D:20161116092825+11'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20161125133121+11'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - EFC-T085 Cisco ASA and ASAv Certification Report v1.0.DOC
  • pdf_file_size_bytes: 71070
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename c0503_est.pdf 2016_102_Cisco_ASA_ASAv_STv3.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 18
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 5
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 2
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 28
    • FCS_COP.1.1: 4
    • FCS_IKE_EXT.1: 1
    • FCS_RBG_EXT.1: 8
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSH_EXT.1: 6
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
    • FCS_TLS_EXT.1: 7
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 4
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_PSK_EXT.1.4: 1
    • FIA_UAU.6: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 5
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.5: 1
    • FIA_UIA_EXT.1: 6
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SFR.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 5
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 5
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 4
    • FPT_ITT.1.1: 1
    • FPT_PTD_EXT.1: 2
    • FPT_RPL.1: 1
    • FPT_SKP_EXT.1: 5
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.1.2: 1
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FRU:
    • FRU_RSA.1: 1
  • FTA:
    • FTA_SSL.3: 11
    • FTA_SSL.3.1: 2
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 1
    • FTA_SSL_EXT.1: 7
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 5
    • FTA_TSE.1.1: 1
    • FTA_VCM_EXT.1: 5
    • FTA_VCM_EXT.1.1: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 17
    • O.DOC: 18
    • O.FUNC: 8
    • O.INTERFACE: 8
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 19
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYSICAL: 4
    • OE.USER: 19
  • T:
    • T.CONF: 9
    • T.DOC: 14
    • T.FUNC: 6
    • T.PROT: 5
  • A:
    • A.CONNECTIONS: 1
    • A.NO_GENERAL_PURPOSE: 4
    • A.PHYSICAL: 2
    • A.TRUSTED_ADMIN: 4
  • O:
    • O.ADDRESS_: 1
    • O.ADDRESS_FILTERING: 5
    • O.ASSIGNED_PRIV: 1
    • O.ASSIGNED_PRIVATE_ADDR: 2
    • O.ASSIGNED_PRIVATE_ADDRESS: 1
    • O.AUTHENTICATIO: 1
    • O.AUTHENTICATION: 5
    • O.CLIENT_ESTABLI: 1
    • O.CLIENT_ESTABLISHMENT_: 2
    • O.CLIENT_ESTABLISHMENT_CONSTRAINTS: 1
    • O.CRYPTOGRAPHI: 1
    • O.CRYPTOGRAPHIC_FUNCTI: 1
    • O.CRYPTOGRAPHIC_FUNCTIO: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.DISPLAY_: 1
    • O.DISPLAY_BANNER: 3
    • O.FAIL_SECURE: 6
    • O.PORT_FILTERING: 4
    • O.PROTECTED_: 1
    • O.PROTECTED_COMMUNICA: 1
    • O.PROTECTED_COMMUNICAT: 1
    • O.PROTECTED_COMMUNICATIONS: 3
    • O.RELATED_: 1
    • O.RELATED_CONNECTION_FI: 2
    • O.RELATED_CONNECTION_FILTERING: 3
    • O.REMOTE_SESSIO: 1
    • O.REMOTE_SESSION_TERMIN: 2
    • O.REMOTE_SESSION_TERMINATION: 3
    • O.RESIDUAL_: 1
    • O.RESIDUAL_INFORMATION_: 2
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.RESOURCE_AVAILABILITY: 1
    • O.SESSION_LOCK: 6
    • O.STATEFUL_: 1
    • O.STATEFUL_INSPECTION: 3
    • O.SYSTEM_: 1
    • O.SYSTEM_MONITORING: 5
    • O.TOE_: 1
    • O.TOE_ADMINISTRATION: 5
    • O.TSF_SELF_TEST: 4
    • O.VERIFIABLE_: 1
    • O.VERIFIABLE_UPDATES: 3
  • OE:
    • OE.CONNECTIONS: 2
    • OE.NO_GENERAL_: 1
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.PHYSICAL: 3
    • OE.TRUSTED_: 1
    • OE.TRUSTED_ADMIN: 2
  • T:
    • T.ADMIN_ERROR: 4
    • T.DATA_INTEGRITY: 2
    • T.HIJACKED_SESSION: 2
    • T.NETWORK_ACCESS: 1
    • T.NETWORK_DISCLOSURE: 6
    • T.NETWORK_DOS: 4
    • T.NETWORK_MISUSE: 5
    • T.REPLAY_ATTACK: 4
    • T.TRANSMIT: 1
    • T.TSF_FAILURE: 3
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNAUTHORIZED_CONNECTI: 2
    • T.UNAUTHORIZED_CONNECTION: 1
    • T.UNAUTHORIZED_CONNECTIONS: 1
    • T.UNAUTHORIZED_UPDATE: 2
    • T.UNDETECTED_ACTIONS: 2
    • T.UNPROTECTED_TRAFFIC: 4
    • T.USER_DATA_REUSE: 4
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 20
    • Cisco Systems, Inc: 10
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 4
  • AES_competition:
    • AES:
      • AES: 11
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
  • miscellaneous:
    • SEED:
      • SEED: 1
    • Skinny:
      • Skinny: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 19
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • DH: 12
      • Diffie-Hellman: 3
  • RSA:
    • RSA-2048: 1
    • RSA-OAEP: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 4
      • SHA-384: 2
      • SHA-512: 7
      • SHA256: 6
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 7
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS1.0: 1
      • TLS1.1: 1
      • TLS1.2: 1
  • IKE:
    • IKE: 33
    • IKEv1: 1
    • IKEv2: 13
  • IPsec:
    • IPsec: 76
  • SSH:
    • SSH: 31
    • SSHv2: 19
  • TLS:
    • TLS:
      • TLS: 22
      • TLS 1.0: 1
      • TLS 1.2: 1
      • TLS v1.0: 1
      • TLSv1.2: 1
  • VPN:
    • VPN: 77
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RBG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • GCM:
    • GCM: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS197: 2
  • NIST:
    • NIST SP 800-90: 2
  • CC:
    • CCMB-2012-009-001: 1
    • CCMB-2012-009-004: 1
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 186-3: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 2
    • FIPS PUB 180-4: 2
    • FIPS PUB 186-2: 3
    • FIPS PUB 186-3: 10
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-56A: 3
    • NIST SP 800-56B: 2
    • SP 800-90: 1
  • RFC:
    • RFC 2246: 1
    • RFC 2460: 5
    • RFC 2560: 1
    • RFC 2818: 1
    • RFC 2986: 1
    • RFC 3513: 2
    • RFC 3602: 1
    • RFC 4253: 1
    • RFC 4301: 1
    • RFC 4303: 2
    • RFC 4443: 3
    • RFC 4945: 1
    • RFC 5246: 1
    • RFC 5280: 2
    • RFC 5282: 1
    • RFC 5735: 2
    • RFC 5759: 1
    • RFC 6379: 1
    • RFC 768: 5
    • RFC 791: 5
    • RFC 792: 3
    • RFC 793: 5
    • RFC 959: 1
  • X509:
    • X.509: 2
pdf_data/st_metadata
  • /Author: RICOH
  • /CreationDate: D:20160311094907+09'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20160311094907+09'00'
  • /Producer: Microsoft® Word 2013
  • /Title: RICOH MP 305+ Security Target
  • pdf_file_size_bytes: 1559062
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 82
  • /Author: Terence.Caulfield
  • /CreationDate: D:20161110125039+11'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20161125133048+11'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - Cisco_ASA+ASAv_9.4.x_Security_Target _version 3.0_.docx
  • pdf_file_size_bytes: 693295
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 115
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different