| name |
RICOH IM C300 J-1.00 |
Akis Gezgin_N SAC&EAC Configuration v1.0.1.0 |
| category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
TR |
| status |
archived |
archived |
| not_valid_after |
16.10.2025 |
22.03.2024 |
| not_valid_before |
16.10.2020 |
22.03.2021 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS_GEZGiN_N_SAC&EAC_cc.pdf |
| report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0687_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS_GEZGiN_N_SAC&EAC_CR.pdf |
| st_link |
https://www.commoncriteriaportal.org/files/epfiles/c0687_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20SAC%20&%20EAC%20Security%20Target%20Lite.pdf |
| manufacturer |
Ricoh Company, Ltd. |
TÜBİTAK BİLGEM UEKAE |
| manufacturer_web |
|
https://www.uekae.tubitak.gov.tr |
| security_level |
EAL2+, ALC_FLR.2 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
| dgst |
75d37bed42139156 |
6cb9f17e70d5dc02 |
| heuristics/cert_id |
JISEC-CC-CRP-C0687-01-2020 |
21.0.03/TSE-CCCS-72 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ATE_IND.2, ASE_ECD.1, ATE_FUN.1, ASE_OBJ.2, AGD_PRE.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ASE_TSS.1, ASE_SPD.1, ASE_INT.1, ASE_CCL.1, ADV_FSP.2, ALC_FLR.2, ALC_DEL.1, ASE_REQ.2, ALC_CMC.2, ADV_TDS.1, ALC_CMS.2, AGD_OPE.1 |
ASE_TSS.2, ATE_IND.2, ALC_LCD.1, ATE_COMP.1, ASE_ECD.1, ALC_CMS.5, ALC_COMP.1, ASE_OBJ.2, ATE_DPT.3, AGD_PRE.1, ADV_ARC.1, ATE_FUN.1, AVA_COMP.1, ASE_COMP.1, ADV_IMP.1, ADV_TDS.3, ASE_SPD.1, ASE_INT.1, ALC_TAT.2, ASE_CCL.1, AGD_COMP.1, ATE_COV.2, AVA_VAN.5, ADV_COMP.1, ADV_INT.2, ASE_REQ.2, ALC_DEL.1, ALC_FLR.1, ALC_CMC.4, AGD_OPE.1, ALC_DVS.2, ADV_FSP.4 |
| heuristics/extracted_versions |
1.00 |
1.0.1.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0687
- certification_date: 01.10.2020
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0687
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: Audit Function: Enables the TOE to record information related to security events and allows users to review it. Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. Network Protection Function: Enables the TOE to protect network communications using encryption. Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. Security Management Function: Enables the TOE administrator to control security functions. Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: RICOH IM C300
- product_type: Multi Function Product
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck99000000131j-att/c0687_est.pdf
- toe_version: J-1.00
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.10.2025
- supplier: RICOH COMPANY, LTD.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0687_it9723.html
- toe_japan_name: RICOH IM C300J-1.00
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
| heuristics/protection_profiles |
{} |
a33327d40f253f46 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
| pdf_data/cert_filename |
|
AKiS_GEZGiN_N_SAC&EAC_cc.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: Cem ERDİVAN
- /CreationDate: D:20210330120805+03'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20210330120805+03'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 152539
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
c0687_erpt.pdf |
AKiS_GEZGiN_N_SAC&EAC_CR.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0687-01-2020: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0035: 1
- BSI-PP-0056-V2-2012: 1
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 4+: 1
- EAL 5: 1
- EAL 5+: 4
- EAL2: 1
- EAL5+: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_COMP.1: 1
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_VAN.5: 7
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 2
- T.DOC: 2
- T.FUNC: 1
- T.PROT: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20210120164632+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20210120164710+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 529921
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
- /Author: TSE KSDB
- /CreationDate: D:20210330120917+03'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20210330120917+03'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 649800
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
| pdf_data/st_filename |
c0687_est.pdf |
AKiS GEZGiN_N SAC & EAC Security Target Lite.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V3-2022: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 2
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-V2-2012: 5
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0068-V2-2011: 2
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 9
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 3
- EAL 6 augmented: 3
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 5
- ADV_FSP.4: 1
- ADV_IMP.1: 8
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.2: 8
- ALC_FLR.1: 2
- ASE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 7
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 31
- FDP_ACC.1.1: 2
- FDP_ACF.1: 31
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 8
- FDP_ACF.1.4: 3
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 18
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 20
- FMT_MSA.1.1: 2
- FMT_MSA.3: 22
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 5
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 17
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 4
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 15
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 45
- FCS_CKM.1: 21
- FCS_CKM.2: 5
- FCS_CKM.4: 39
- FCS_CKM.4.1: 1
- FCS_COP: 87
- FCS_COP.1: 11
- FCS_RND: 6
- FCS_RND.1: 17
- FCS_RND.1.1: 1
- FCS_RNG: 3
- FDP:
- FDP_ACC: 26
- FDP_ACC.1: 11
- FDP_ACF: 26
- FDP_ACF.1: 23
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_ITT.1: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 9
- FDP_UCT.1: 1
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 4
- FIA_API: 5
- FIA_API.1: 12
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 65
- FIA_UAU.1: 6
- FIA_UAU.4: 1
- FIA_UAU.5: 2
- FIA_UAU.6: 2
- FIA_UID: 15
- FIA_UID.1: 6
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 23
- FMT_LIM.1.1: 2
- FMT_LIM.2: 22
- FMT_LIM.2.1: 2
- FMT_MSA: 2
- FMT_MSA.3: 6
- FMT_MTD: 90
- FMT_MTD.1: 13
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 46
- FMT_SMF.1.1: 1
- FMT_SMR: 23
- FMT_SMR.1: 24
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 19
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 16
- FPT_PHP.3.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 13
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 5
- A.ADMIN: 10
- A.USER: 4
- D:
- O:
- O.AUDIT: 9
- O.CONF: 18
- O.DOC: 18
- O.FUNC: 9
- O.INTERFACE: 9
- O.PROT: 9
- O.SOFTWARE: 9
- O.STORAGE: 14
- O.USER: 21
- OE:
- OE.ADMIN: 8
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_ACCESS_AUTHORIZED: 1
- OE.AUDIT_STORAGE: 3
- OE.INTERFACE: 4
- OE.PHYSICAL: 4
- OE.USER: 21
- T:
- T.CONF: 10
- T.DOC: 14
- T.FUNC: 7
- T.PROT: 5
|
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 6
- NXP Semiconductors: 1
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 14
- AES128: 1
- AES192: 1
- AES256: 1
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 11
- Diffie-Hellman: 14
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 5
- SHA-384: 4
- SHA-512: 5
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- ANSSI:
- Brainpool:
- brainpoolP192r1: 1
- brainpoolP224r1: 4
- brainpoolP224t1: 3
- brainpoolP256r1: 5
- brainpoolP256t1: 3
- brainpoolP320r1: 4
- brainpoolP320t1: 3
- brainpoolP384r1: 5
- brainpoolP384t1: 3
- brainpoolP512r1: 5
- brainpoolP512t1: 3
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 4
- Physical Tampering: 4
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 5
- EF.CardAccess: 3
- EF.DG1: 15
- EF.DG11: 1
- EF.DG14: 17
- EF.DG16: 9
- EF.DG2: 2
- EF.DG3: 12
- EF.DG4: 13
- EF.DG5: 1
- EF.DG6: 1
- EF.DG7: 12
- EF.DG8: 12
- EF.DG9: 1
- EF.SOD: 6
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- NIST:
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 197: 1
- FIPS PUB 197: 1
- ICAO:
- NIST:
- PKCS:
- PKCS #1: 1
- PKCS #15: 1
- PKCS #3: 1
- PKCS#1: 1
- PKCS#3: 2
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- SHA-1. However, this algorithm is out of scope for the certification due to security considerations. The cryptographic functionality of the TOE: 2
- and the list of security mechanisms given in “ICAO Doc 9303” (please see [ 11 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/SIG_GEN Cryptographic Operation - Signature generation: 1
- brainpoolP384r1, and brainpoolP512r1. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.1/CA Cryptographic Key Generation - Diffie-Hellman for Chip: 1
- considerations and BSI and SOGIS recommendations (please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/CA_MAC Cryptographic Operation - MAC for CA protocol: 1
- out of scope: 9
- paper or the plastic card is achieved by physical and organizational security measures which are out of scope of this ST. The physical scope of the TOE is composed of the IC dedicated software, the IC embedded: 1
- please see [ 11 ]), this algorithm is out of scope for the certification as well: 1
- please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 6: The cryptographic functionality of the TOE includes hash: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 8: The cryptographic functionality of the TOE includes hash: 1
- the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.4 Cryptographic Key Destruction Hierarchical to: No other components: 1
|
| pdf_data/st_metadata |
- /Author: RICOH
- /CreationDate: D:20210119110846+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20210119110846+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: RICOH IM C300 Security Target
- pdf_file_size_bytes: 1176783
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 87
|
- /Author: Ali YILDIRIM
- /CreationDate: D:20240219152217+03'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20240219152217+03'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 2020528
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 128
|
| state/cert/convert_garbage |
False |
False |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
False |
False |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
False |
False |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |