name |
Dell Color MFP S3845cdn Controller ROM Ver. 1.0.31 |
NXP JCOP 5.2 on SN100.C58 Secure Element |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
active |
not_valid_after |
29.03.2023 |
19.04.2028 |
not_valid_before |
29.03.2018 |
19.04.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-23-2200050-01.1-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200050-01-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200050-01-STlite_v3.9.pdf |
manufacturer |
Dell, Inc. |
NXP Semiconductors Germany GmbH |
manufacturer_web |
https://www.dell.com |
https://www.nxp.com |
security_level |
EAL2 |
ALC_FLR.1, EAL5+, AVA_VAN.5, ASE_TSS.2, ALC_DVS.2 |
dgst |
6b431a5164a4c478 |
ef96b78b52008c7a |
heuristics/cert_id |
JISEC-CC-CRP-C0593 |
NSCIB-CC-2200050-01-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_DVS.2, ALC_FLR.1, ASE_TSS.2, AVA_VAN.5 |
heuristics/extracted_versions |
1.0.31 |
5.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0593
- certification_date: 01.03.2018
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0593_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal eMMC memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Dell Color MFP S3845cdn
- product_type: Multi-Function Device
- report_link: https://www.ipa.go.jp/en/security/c0593_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0593_est.pdf
- toe_version: Controller ROM Ver. 1.0.31
- vendor: Dell Inc.
- expiration_date: 01.04.2023
- supplier: Dell Inc.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0593_it6625.html
- toe_overseas_name: Dell Color MFP S3845cdnController ROM Ver. 1.0.31
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
1153ad24c84b397a, d1376142068b1da5, a45361cfdfff49f8 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0100b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0101V2b_pdf.pdf |
pdf_data/cert_filename |
c0593_eimg.pdf |
NSCIB-CC-23-2200050-01.1-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- CC-21-0023577: 1
- NSCIB-2200050-01: 1
- NSCIB-CC-23-2200050-01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-2017: 1
- BSI-CC-PP-0100-2018: 1
- BSI-CC-PP-0104-2019: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.3: 1
- ASE:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 1
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180409142712+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180409142752+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 413818
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
- /Author: Denise Cater
- /CreationDate: D:20230813220359+01'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20230813220359+01'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 94817
- pdf_hyperlinks: https://www.tuv-nederland.nl/
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0593_erpt.pdf |
NSCIB-CC-2200050-01-CR.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-2200050-01-CR
- cert_item: NXP JCOP 5.2 on SN100.C58 Secure Element
- cert_lab: SGS Brightsight B.V.
- developer: NXP Semiconductors Germany GmbH
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0593-01: 1
- Certification No. C0593: 1
|
- NL:
- CC-19-0023577: 1
- CC-22-174263: 1
- NSCIB-2200050-01: 1
- NSCIB-CC-2200050-01-CR: 16
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-2017: 1
- BSI-CC-PP-0100-2018: 1
- BSI-CC-PP-0104-2019: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL4: 1
- EAL5+: 3
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_DVS.2: 2
- ALC_FLR.1: 2
- ASE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 1
- A.SECMODE: 1
- A.USER: 1
- T:
- T.COMM_TAP: 2
- T.CONFDATA: 2
- T.CONSUME: 2
- T.DATA_SEC: 2
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 16
- NXP Semiconductors: 3
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- BrightSight:
- SGS:
- SGS: 6
- SGS Brightsight: 6
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 3
- CMAC: 2
- HMAC: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 1
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
- JCOP:
- JCOP 5: 63
- JCOP 6: 1
- JCOP5: 9
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- X509:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20180619105647+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180619105727+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 383511
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
|
pdf_data/st_filename |
c0593_est.pdf |
NSCIB-CC-2200050-01-STlite_v3.9.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- NL:
- NSCIB-22-174263: 1
- NSCIB-CC-0023577: 1
- NSCIB-CC-2200050-01: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0100-2018: 1
- BSI-CC-PP-0104: 1
- BSI-PP-0084: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 8
- EAL5 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ALC:
- ALC_DVS.2: 4
- ALC_FLR.1: 5
- ASE:
- ASE_INT: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ASE_TSS: 2
- ASE_TSS.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 2
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FIA:
- FIA_AFL.1: 16
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UIA.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP.1: 13
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FAU_SAS.1: 5
- FAU_SAS.1.1: 2
- FCO:
- FCO_NRO: 2
- FCO_NRO.1: 1
- FCO_NRO.2: 6
- FCO_NRO.2.1: 2
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 2
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 15
- FCS_CKM.1.1: 7
- FCS_CKM.2: 3
- FCS_CKM.2.1: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 3
- FCS_CKM.5: 6
- FCS_CKM.5.1: 5
- FCS_COP: 10
- FCS_COP.1: 30
- FCS_COP.1.1: 31
- FCS_RNG: 3
- FCS_RNG.1: 8
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 31
- FDP_ACC.1.1: 5
- FDP_ACC.2: 10
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 25
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 6
- FDP_DAU.2: 2
- FDP_DAU.2.1: 2
- FDP_ETC.2: 1
- FDP_IFC: 3
- FDP_IFC.1: 22
- FDP_IFC.2: 21
- FDP_IFC.2.1: 3
- FDP_IFC.2.2: 3
- FDP_IFF: 3
- FDP_IFF.1: 29
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 5
- FDP_IFF.1.3: 5
- FDP_IFF.1.4: 7
- FDP_IFF.1.5: 4
- FDP_ITC: 2
- FDP_ITC.2: 9
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_RIP.1: 14
- FDP_ROL.1: 8
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDC: 1
- FDP_SDC.1: 2
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 1
- FDP_UIT: 2
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 4
- FIA_API.1: 3
- FIA_ATD.1: 5
- FIA_UAU.1: 25
- FIA_UAU.1.1: 5
- FIA_UAU.1.2: 3
- FIA_UAU.4: 13
- FIA_UAU.4.1: 2
- FIA_UAU.5: 2
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UID: 2
- FIA_UID.1: 51
- FIA_UID.1.1: 7
- FIA_UID.1.2: 4
- FIA_UID.2: 2
- FIA_USB.1: 4
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 9
- FMT_MSA.1: 53
- FMT_MSA.1.1: 6
- FMT_MSA.2: 3
- FMT_MSA.2.1: 1
- FMT_MSA.3: 46
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 6
- FMT_MTD.1: 3
- FMT_MTD.1.1: 3
- FMT_MTD.3: 3
- FMT_REV: 1
- FMT_SAE: 1
- FMT_SAE.1: 1
- FMT_SAE.1.1: 1
- FMT_SMF: 5
- FMT_SMF.1: 52
- FMT_SMF.1.1: 6
- FMT_SMR: 3
- FMT_SMR.1: 59
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 3
- FPR:
- FPR_UNO.1: 6
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 1
- FPT_ESA: 1
- FPT_ESA.1: 1
- FPT_ESA.1.4: 1
- FPT_FLS.1: 30
- FPT_FLS.1.1: 3
- FPT_ISA: 1
- FPT_ISA.1: 2
- FPT_ISA.1.5: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_RCV.3: 1
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_TCT: 1
- FPT_TCT.1: 1
- FPT_TDC.1: 5
- FPT_TDC.1.2: 2
- FPT_TIT: 1
- FPT_TIT.1: 1
- FPT_TST.1: 1
- FPT_TST.1.1: 1
- FRU:
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 15
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 2
- FTP_TST.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 4
- A.SECMODE: 4
- A.USER: 3
- O:
- O.AUDITS: 7
- O.CIPHER: 5
- O.COMM_SEC: 6
- O.FAX_SEC: 6
- O.MANAGE: 8
- O.RESTRICT: 5
- O.USER: 8
- O.VERIFY: 2
- OE:
- OE.ADMIN: 3
- OE.PHYSICAL: 3
- OE.SEC: 7
- OE.USER: 3
- T:
- T.COMM_TAP: 3
- T.CONFDATA: 4
- T.CONSUME: 3
- T.DATA_SEC: 4
|
- A:
- A.APPS-PROVIDER: 5
- A.PROCESS-SEC-IC: 4
- A.USE_DIAG: 5
- A.USE_KEYS: 5
- A.VERIFICATION-AU: 1
- A.VERIFICATION-AUTHORITY: 4
- D:
- D.APP_CODE: 1
- D.APP_C_: 1
- D.APP_C_DATA: 1
- D.APP_I_DATA: 3
- D.APP_KEYS: 2
- D.APSD_KEYS: 3
- D.ATTACK_COUNTER: 7
- D.CARD_: 1
- D.CARD_MNGT_DATA: 1
- D.CONFIG_ITEM: 6
- D.CRYPTO: 2
- D.ISD_KEYS: 3
- D.JCS_: 1
- D.JCS_CODE: 4
- D.JCS_DATA: 3
- D.PIN: 7
- D.SEC_DATA: 1
- D.TOE_IDENTIFICATION: 2
- D.TOE_IDENTIFIER: 2
- D.UPDATE_IMAGE: 24
- D.VASD_KEYS: 2
- OE:
- OE.APPLET: 1
- OE.APPS-PROVIDER: 4
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 2
- OE.CONFID-UPDATE-: 1
- OE.CONFID-UPDATE-IMAGE: 3
- OE.IC: 3
- OE.KEY-: 1
- OE.KEY-CHANGE: 4
- OE.PROCESS_SEC_: 1
- OE.PROCESS_SEC_IC: 3
- OE.RE: 7
- OE.SCP: 16
- OE.SECURITY-DOMA: 1
- OE.SECURITY-DOMAINS: 3
- OE.USE_DIAG: 5
- OE.USE_KEYS: 5
- OE.VERIFICATION: 2
- OE.VERIFICATION-A: 1
- OE.VERIFICATION-AUTHOR: 1
- OE.VERIFICATION-AUTHORITY: 2
- OP:
- OP.MODIFY_: 1
- OP.READ_CONFIG_: 1
- OP.TRIGGER_: 1
- OP.TRIGGER_UPDATE: 2
- OP.USE_CONFIG_: 1
- OSP:
- OSP.KEY-CHANGE: 4
- OSP.PROCESS-TOE: 4
- OSP.SECURITY-DOM: 1
- OSP.SECURITY-DOMAINS: 3
- OT:
- OT.ALARM: 3
- OT.APPLI-AUTH: 5
- OT.ATTACK-COUNT: 1
- OT.ATTACK-COUNTE: 1
- OT.ATTACK-COUNTER: 3
- OT.AUTH-LOAD-: 1
- OT.AUTH-LOAD-UPD: 2
- OT.AUTH-LOAD-UPDATE-IMAGE: 2
- OT.CARD-: 1
- OT.CARD-CONFIGUR: 2
- OT.CARD-CONFIGURATION: 3
- OT.CARD-MANAGEM: 3
- OT.CARD-MANAGEMENT: 3
- OT.CIPHER: 1
- OT.COMM_: 5
- OT.COMM_AUTH: 6
- OT.COMM_CONFIDENTIALITY: 3
- OT.COMM_INTEGRITY: 3
- OT.CONFID-UPDATE-: 2
- OT.CONFID-UPDATE-IMAGE: 3
- OT.DELETION: 1
- OT.DOMAIN-RIGHTS: 7
- OT.EXT-MEM: 1
- OT.FIREWALL: 3
- OT.GLOBAL_: 1
- OT.IDENTIFICATION: 6
- OT.INSTALL: 1
- OT.KEY-MNGT: 1
- OT.LOAD: 2
- OT.OPERATE: 4
- OT.PIN-MNGT: 1
- OT.REALLOCATION: 1
- OT.REMOTE: 1
- OT.RESTRICTED-MO: 3
- OT.RESTRICTED-MODE: 4
- OT.RND: 5
- OT.SCP: 24
- OT.SECURE_AC_: 2
- OT.SECURE_AC_ACTIVATION: 3
- OT.SECURE_LOAD_: 4
- OT.SECURE_LOAD_ACODE: 3
- OT.SID: 1
- OT.TOE_: 2
- OT.TOE_IDENTIFICATION: 3
- OT.TRANSACTION: 1
- SA:
- SA.CONFID-UPDATE: 1
- SA.CONFID-UPDATE-IMAGE: 1
- SA.CONFIG-APPLET: 1
- SA.INTEG-APPLI-DATA: 1
- SA.INTEG-UPDATE-I: 1
- SA.INTEG-UPDATE-IMAGE: 1
- SA.OSU: 1
- SA.RM: 1
- SA.SCP: 3
- T:
- T.ATTACK-COUNTER: 3
- T.COM_EXPLOIT: 3
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.CONFID-UPDATE-I: 1
- T.CONFID-UPDATE-IMAGE: 2
- T.CONFIG: 4
- T.DELETION: 3
- T.EXE-: 1
- T.EXE-CODE: 1
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 3
- T.INTEG-APPLI-: 2
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 9
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.INTEG-UPDATE-IM: 1
- T.INTEG-UPDATE-IMAGE: 2
- T.INTERRUPT-OSU: 4
- T.LIFE_CYCLE: 4
- T.NATIVE: 1
- T.PHYSICAL: 2
- T.RND: 3
- T.SID: 2
- T.UNAUTH-LOAD-UP: 1
- T.UNAUTH-LOAD-UPDATE-IMAGE: 3
- T.UNAUTHORIZED_: 1
- T.UNAUTHORIZED_CARD_MNGT: 3
|
pdf_data/st_keywords/vendor |
|
- Idemia:
- NXP:
- NXP: 340
- NXP Semiconductors: 25
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 16
- AES-: 1
- AES-128: 1
- AES-256: 16
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 10
- HMAC: 9
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA256: 5
- SHA384: 2
- SHA512: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 3
- SHA-384: 2
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CFB:
- ECB:
- GCM:
- OFB:
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 9
- brainpoolP384r1: 9
- brainpoolP521r1: 9
- NIST:
- Curve P-256: 8
- Curve P-384: 8
- Curve P-521: 8
- NIST P-256: 1
- P-256: 9
- P-384: 8
- P-521: 8
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Fault Injection: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 2
- side channel: 2
- side-channel: 1
- timing attack: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
- JCOP:
- JCOP 2: 1
- JCOP 5: 174
- JCOP5: 45
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS PUB 180-2: 2
- FIPS PUB 197: 1
- RFC:
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS PUB 186-4: 30
- PKCS:
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 1
- ALG_AES_BLOCK_128_CBC_NOPAD_: 1
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CBC_ISO9797_M2_STANDARD: 1
- ALG_AES_CBC_PKCS5: 1
- ALG_AES_CMAC16: 1
- ALG_AES_CMAC16_STANDARD: 1
- ALG_AES_ECB_ISO9797_M2: 1
- ALG_AES_ECB_PKCS5: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_ISO9797_M2: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_CBC_PKCS5: 1
- ALG_DES_CMAC8: 1
- ALG_DES_ECB_ISO9797_M1: 1
- ALG_DES_ECB_ISO9797_M2: 2
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_ECB_PKCS5: 1
- ALG_DES_MAC4_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC4_ISO9797_M2: 1
- ALG_DES_MAC4_PKCS5: 1
- ALG_DES_MAC8_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- ALG_DES_MAC8_NOPAD: 1
- ALG_DES_MAC8_PKCS5: 1
- EC:
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC: 1
- ALG_EC_SVDP_DHC_KDF: 1
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_KDF: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 1
- ECDSA:
- ALG_ECDSA_SHA_224: 1
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- HMAC:
- ALG_HMAC_SHA_256: 1
- ALG_HMAC_SHA_384: 1
- ALG_HMAC_SHA_512: 1
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_224_PKCS1: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 2
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_PKCS1: 1
- SHA:
- ALG_SHA_224: 1
- ALG_SHA_256: 3
- ALG_SHA_384: 2
- ALG_SHA_512: 2
- misc:
- LENGTH_AES_128: 3
- LENGTH_AES_192: 3
- LENGTH_AES_256: 3
- LENGTH_DES3_: 2
- LENGTH_DES3_2KEY: 4
- LENGTH_DES3_3KEY: 2
- LENGTH_EC_FP_128: 1
- LENGTH_EC_FP_192: 1
- LENGTH_EC_FP_224: 2
- LENGTH_EC_FP_256: 2
- LENGTH_EC_FP_384: 2
- LENGTH_EC_FP_521: 1
- LENGTH_RSA_1024: 1
- LENGTH_SHA: 1
- LENGTH_SHA_256: 1
- LENGTH_SHA_384: 1
- LENGTH_SHA_512: 1
- PAD_PKCS1_OAEP: 1
- SIG_CIPHER_AES_CMAC16: 1
- SIG_CIPHER_DES_CMAC8: 1
- SIG_CIPHER_ECDSA: 1
- SIG_CIPHER_RSA: 1
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.nxp.id.jcop: 1
- com.nxp.id.jcop.configapplet.cap: 1
- com.nxp.id.jcop.euicc.cap: 1
- com.nxp.id.jcop.euicc.gsmalib.cap: 1
- com.nxp.id.jcop.globalplatform.auxiliary.cap: 1
- com.nxp.id.jcop.globalplatform.auxiliary2.cap: 1
- com.nxp.id.jcop.globalplatform.auxiliary3.cap: 1
- com.nxp.id.jcop.globalplatform.cap: 1
- com.nxp.id.jcop.hci.cap: 1
- com.nxp.id.jcop.javacard.security.cap: 1
- com.nxp.id.jcop.mifare4mobile.cap: 1
- com.nxp.id.jcop.os.cap: 1
- com.nxp.id.jcop.oscca.cap: 1
- com.nxp.id.jcop.uicc.globalplatform.security.cap: 1
- com.nxp.id.jcop.uiccframework.cap: 1
- com.nxp.id.jcopx.accelerator.cap: 1
- com.nxp.id.jcopx.authority.cap: 1
- com.nxp.id.jcopx.blob.cap: 1
- com.nxp.id.jcopx.commerce.cap: 1
- com.nxp.id.jcopx.euicc.gsma.cap: 1
- com.nxp.id.jcopx.globalplatform.contact.cap: 1
- com.nxp.id.jcopx.ioaccess.cap: 1
- com.nxp.id.jcopx.m4mext.cap: 1
- com.nxp.id.jcopx.mifare.mifarecommon.cap: 1
- com.nxp.id.jcopx.mifare.mifaredesfire.cap: 1
- com.nxp.id.jcopx.mifare.mifareplus.cap: 1
- com.nxp.id.jcopx.migration.cap: 1
- com.nxp.id.jcopx.oscca.cap: 1
- com.nxp.id.jcopx.osupdate.cap: 1
- com.nxp.id.jcopx.security.cap: 1
- com.nxp.id.jcopx.systemstack.cap: 1
- com.nxp.id.jcopx.tearing.cap: 1
- com.nxp.id.jcopx.uicc.auth.cap: 1
- com.nxp.id.jcopx.uicc.globalplatform.cap: 1
- com.nxp.id.jcopx.uicc.interfacebroker.cap: 1
- com.nxp.id.jcopx.uicc.interfacebroker.sim.cap: 1
- com.nxp.id.jcopx.uicc.interfacebroker.uicc.cap: 1
- com.nxp.id.jcopx.uicc.system.cap: 1
- com.nxp.id.jcopx.uicc.toolkit.cap: 1
- com.nxp.id.jcopx.util.cap: 1
- com.nxp.id.jcopx.v2xsupport.cap: 1
- com.sec.mobile.fra.cap: 1
- com.sony.javacard.crypto.a4.cap: 1
- com.sony.javacard.crypto.a5.cap: 1
- com.sony.javacard.crypto.a6.cap: 1
- com.sony.javacard.crypto.advance.cap: 1
- com.sony.javacard.crypto.advance.e3.cap: 1
- com.sony.javacard.crypto.advance.e4.cap: 1
- com.sony.javacard.crypto.cap: 1
- de:
- java:
- java.io.cap: 1
- java.lang.cap: 1
- javacard:
- javacard.crypto: 3
- javacard.crypto.advance: 2
- javacard.crypto.advance.cap: 1
- javacard.crypto.cap: 1
- javacard.framework.cap: 1
- javacard.security.cap: 2
- javacardx:
- javacardx.apdu.cap: 2
- javacardx.crypto.cap: 1
- javacardx.external.cap: 1
- javacardx.framework.util.intx.cap: 1
- org:
- org.globalplatform.cap: 1
- org.globalplatform.contactless.cap: 1
- org.globalplatform.upgrade.cap: 1
- org.mifare4mobile: 1
- org.mifare4mobile.hostinterface.cap: 1
- org.mifare4mobile.parser.cap: 1
- org.mifare4mobile.userverifier.cap: 1
- uicc:
- uicc.access.cap: 1
- uicc.access.fileadministration.cap: 1
- uicc.auth.cap: 1
- uicc.globalplatform.cap: 1
- uicc.globalplatform.security.cap: 1
- uicc.hci.framework.cap: 1
- uicc.hci.services.cardemulation.cap: 1
- uicc.hci.services.connectivity.cap: 1
- uicc.hci.services.readermode.cap: 1
- uicc.interfacebroker.cap: 1
- uicc.interfacebroker.sim.cap: 1
- uicc.interfacebroker.uicc.cap: 1
- uicc.isim.access.cap: 1
- uicc.services.highupdatearray.cap: 1
- uicc.system.cap: 2
- uicc.toolkit.cap: 2
- uicc.usim.access.cap: 1
- uicc.usim.geolocation.cap: 1
- uicc.usim.suci.cap: 1
- uicc.usim.toolkit.cap: 1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20180612075934+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20180612080157+09'00'
- /Producer: Acrobat Distiller 10.1.16 (Windows)
- /Subject: Security Target
- /Title: Dell Color MFP S3845cdn
- pdf_file_size_bytes: 422531
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 87
|
- /Author: NXP B.V.
- /CreationDate: D:20230515194411+02'00'
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: Common Criteria, Security Target, NXP JCOP 5.2 on SN100.C58 Secure Element
- /Producer: Apache FOP Version 2.3
- /Subject: NXP JCOP 5.2 on SN100.C58 Secure Element
- /Title: Security Target Lite
- pdf_file_size_bytes: 1054860
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 122
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |