name |
Suite logicielle IPS-Firewall pour boîtiers NETASQ |
MX-2631 / 3631 with MX-FR62U and MX-PK13; MX-4151 / 5151 / 6151 / 2661 / 3161 / 3661 / 4171 / 5171 / 6171 with MX-FR62U; MX-2651 / 3051 / 3551 / 4051 / 5051 / 6051 with MX-FR62U, MX-PK13 and MX-FX15; and MX-3061 / 3561 / 4061 / 3071 / 3571 / 4071 / 5071 / 6071 with MX-FR62U and MX-FX15 0310Zd00 |
category |
Boundary Protection Devices and Systems |
Multi-Function Devices |
scheme |
FR |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
03.06.2024 |
not_valid_before |
16.04.2013 |
24.07.2019 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0647_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-17fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0647_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-17fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0647_est.pdf |
manufacturer |
Netasq |
Sharp Corporation |
manufacturer_web |
https://www.netasq.com/ |
https://sharp-world.com/ |
security_level |
ALC_CMS.4, ALC_CMC.4, AVA_VAN.3, EAL3+, ALC_FLR.3 |
{} |
dgst |
6b15dfe4debe1b05 |
09348072751e1cf5 |
heuristics/cert_id |
ANSSI-CC-2013/17 |
JISEC-CC-CRP-C0647-01-2019 |
heuristics/cert_lab |
IT&L@BS |
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:sharp:mx-3061:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-6051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3561:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-2651:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3551:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-4051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-6071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-5071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-4071:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3571:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-4061:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3051:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-5051:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
- |
4061, 5071, 2651, 3551, 6151, 4071, 3631, 6071, 3161, 5051, 3661, 3561, 3061, 2661, 3051, 2631, 3571, 6171, 4051, 3071, 5171, 6051, 5151, 4151, 4171 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2012/34, ANSSI-CC-2009/29 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2012/34, ANSSI-CC-2009/29 |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0647
- certification_date: 01.07.2019
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0647
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000lwi-att/c0647_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan, fax and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Fax Line Separation Function Residual Data Overwrite Function Data Purging Function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-2631 / 3631 with MX-FR62U and MX-PK13; MX-4151 / 5151 / 6151 / 2661 / 3161 / 3661 / 4171 / 5171 / 6171 with MX-FR62U; MX-2651 / 3051 / 3551 / 4051 / 5051 / 6051 with MX-FR62U, MX-PK13 and MX-FX15; and MX-3061 / 3561 / 4061 / 3071 / 3571 / 4071 / 5071 / 6071 with MX-FR62U and MX-FX15
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000lwi-att/c0647_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000lwi-att/c0647_est.pdf
- toe_version: 0310Zd00
- vendor: SHARP CORPORATION
- expiration_date: 01.06.2024
- supplier: SHARP CORPORATION
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0647_it8701.html
- toe_overseas_name: MX-2631 / 3631 with MX-FR62U and MX-PK13; MX-4151 / 5151 / 6151 / 2661 / 3161 / 3661 / 4171 / 5171 / 6171 with MX-FR62U; MX-2651 / 3051 / 3551 / 4051 / 5051 / 6051 with MX-FR62U, MX-PK13 and MX-FX15; and MX-3061 / 3561 / 4061 / 3071 / 3571 / 4071 / 5071 / 6071 with MX-FR62U and MX-FX150310Zd00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b2cfec7a92fa2940 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
pdf_data/cert_filename |
|
c0647_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0647-01-2019: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20190815102423+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20190815102821+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 85953
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC_2013-17fr.pdf |
c0647_erpt.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL 3 augmenté ALC_CMC.4, ALC_CMS.4, ALC_FLR.3, AVA_VAN.3
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/17
- cert_item: Suite logicielle IPS-Firewall pour boîtiers NETASQ
- cert_item_version: Version 8.1.7.1
- cert_lab: IT&L@bs 4 rue de la châtaigneraie, CS 51766, 35517 Cesson Sévigné, France
- developer: NETASQ Parc Horizon – Bâtiment 6, Avenue de l’horizon, 59650 Villeneuve d’Ascq, France Commanditaire NETASQ Parc Horizon – Bâtiment 6, Avenue de l’horizon, 59650 Villeneuve d’Ascq, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-2009/29: 1
- ANSSI-2012/34: 2
- ANSSI-CC-2013/17: 18
|
- JP:
- JISEC-CC-CRP-C0647-01-2019: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL3+: 1
- EAL4: 2
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 2
- ALC_CMS: 1
- ALC_CMS.4: 2
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 4
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- miscellaneous:
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20130417175455+02'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20130418140704+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title:
- pdf_file_size_bytes: 144301
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /CreationDate: D:20191113095115+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20191113095142+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 351938
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
pdf_data/st_filename |
ANSSI-CC-cible_2013-17fr.pdf |
c0647_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- NL:
- CC-01: 3
- CC-02: 6
- CC-03: 27
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 24
- EAL3 augmented: 1
- EAL4+: 2
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.3: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.2: 3
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.4: 10
- ALC_CMS.1: 1
- ALC_CMS.4: 9
- ALC_DEL.1: 4
- ALC_DVS.1: 5
- ALC_FLR.3: 5
- ALC_LCD.1: 5
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 7
- ASE_SPD.1: 2
- ASE_TSS.1: 2
- ASE_XXX: 1
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP: 2
- FAU_ARP.1: 16
- FAU_ARP.1.1: 2
- FAU_GEN: 1
- FAU_GEN.1: 9
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 4
- FAU_GEN.2: 6
- FAU_GEN.2.1: 2
- FAU_SAA.1: 2
- FAU_SAA.4: 10
- FAU_SAA.4.1: 6
- FAU_SAA.4.2: 2
- FAU_SAA.4.3: 3
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_STG.3: 6
- FAU_STG.3.1: 2
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 6
- FCS_COP.1: 16
- FCS_COP.1.1: 17
- FDP:
- FDP_ACC.1: 2
- FDP_ACC.2: 7
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_IFC.1: 11
- FDP_IFC.1.1: 2
- FDP_IFC.2: 7
- FDP_IFC.2.1: 3
- FDP_IFC.2.2: 2
- FDP_IFF.1: 29
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_UCT.1: 11
- FDP_UCT.1.1: 2
- FDP_UIT.1: 13
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FIA:
- FIA_UAU.2: 7
- FIA_UAU.2.1: 2
- FIA_UAU.5: 38
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 3
- FIA_UID.1: 2
- FIA_UID.2: 10
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 3
- FMT_MSA.3: 2
- FMT_MTD: 22
- FMT_MTD.1: 13
- FMT_MTD.1.1: 4
- FMT_SMF.1: 15
- FMT_SMF.1.1: 2
- FMT_SMR.1: 8
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 4
- FPT:
- FPT_ITT.1: 11
- FPT_ITT.1.1: 2
- FPT_STM.1: 7
- FPT_STM.1.1: 2
- FPT_TDC.1: 9
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FTP:
- FTP_ITC.1: 2
- FTP_ITT.1: 1
- FTP_TRP.1: 48
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN: 15
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 40
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 27
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 98
- FCS_COP.1.1: 6
- FCS_KDF_EXT.1: 4
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 25
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 4
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 3
- FCS_TLS_EXT.1: 25
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 3
- FDP_DSK_EXT.1: 9
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 3
- FDP_FXS_EXT.1: 6
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.1: 8
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 16
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
- O:
- O.IPS_CONFORMITE_RFC: 7
- O.IPS_DETECTION_ATTAQUES: 8
- O.JAA_IPS: 9
- O.JAA_PCAOA: 13
- O.JAA_PCFI: 8
- O.PCAOA: 12
- O.PCFI_CHIFFREMENT: 13
- O.PCFI_CONTEXTE_APPLICATIF: 5
- O.PCFI_FILTRAGE: 7
- O.PROTECT_JOURN: 4
- O.PROTECT_SESSIONS_ADMIN: 6
- O.RESIST_AUTH_ADMIN: 6
- O.RESIST_AUTH_UTIL: 5
- O.SAUVEGARDE_RESTAURATION: 4
- OE:
- OE.AUTONOME: 3
- OE.BONNE_PCFI: 3
- OE.COUPURE: 4
- OE.MOT_PASSE: 3
- OE.PERSONNEL: 3
- OE.PROTECT_BOITIERS: 2
- OE.PROTECT_CLIENTS_VPN: 3
- OE.PROTECT_CORRESP_VPN: 3
- OE.PROTECT_STATIONS: 3
- OE.SUPER_ADMIN: 3
- OE.USAGE_STRICT: 3
- SA:
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 4
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 3
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
- AES_competition:
- AES:
- AES: 18
- AES-128: 1
- AES-256: 2
- Rijndael:
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 5
- SHA256: 1
- SHA384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 39
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 7
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 180-1: 1
- FIPS 180-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- PKCS:
- RFC:
- RFC 1034: 1
- RFC 1035: 1
- RFC 1058: 1
- RFC 1321: 1
- RFC 1349: 1
- RFC 2104: 1
- RFC 2144: 1
- RFC 2246: 1
- RFC 2389: 1
- RFC 2401: 2
- RFC 2406: 1
- RFC 2408: 1
- RFC 2409: 3
- RFC 2428: 1
- RFC 2453: 1
- RFC 2474: 1
- RFC 2518: 1
- RFC 2577: 1
- RFC 2616: 1
- RFC 2631: 1
- RFC 2945: 3
- RFC 3253: 1
- RFC 3261: 1
- RFC 3330: 1
- RFC 3376: 1
- RFC 3435: 1
- RFC 3526: 1
- RFC 3550: 1
- RFC 3605: 1
- RFC 768: 1
- RFC 792: 1
- RFC 793: 1
- RFC 959: 1
|
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- ISO:
- ISO/IEC 10116: 6
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 2
- NIST SP 800-90A: 5
- RFC:
- RFC 2246: 1
- RFC 2818: 4
- RFC 4346: 1
- RFC 5246: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20130418140619+02'00'
- /Creator: Writer
- /ModDate: D:20130418140812+02'00'
- /Producer: LibreOffice 3.5
- /Title:
- pdf_file_size_bytes: 1091235
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 102
|
- /Author:
- /CreationDate: D:20191112114644+09'00'
- /Creator: Word 用 Acrobat PDFMaker 15
- /ModDate: D:20191112114714+09'00'
- /Producer: Adobe PDF Library 15.0
- /Title:
- pdf_file_size_bytes: 737144
- pdf_hyperlinks: http://csrc.nist.gov/archive/aes/katmct/katmct.htm
- pdf_is_encrypted: False
- pdf_number_of_pages: 66
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |