name |
AhnLab Suhoshin Absolute v3.0 |
KONICA MINOLTA bizhub 751i with FK-514,DEVELOP ineo 751i with FK-514 Ver.G00-RB |
category |
Access Control Devices and Systems |
Multi-Function Devices |
scheme |
KR |
JP |
status |
archived |
active |
not_valid_after |
01.06.2019 |
19.11.2029 |
not_valid_before |
22.12.2008 |
19.11.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0833_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NISS-136-En.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0833_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NISS-136-ST-En.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0833_est.pdf |
manufacturer |
AhnLab, Inc. |
KONICA MINOLTA, INC. |
manufacturer_web |
https://www.ahnlab.com/ |
https://www.konicaminolta.com/index.html |
security_level |
EAL4 |
{} |
dgst |
898d4106bbe49087 |
ab7bd79971c69709 |
heuristics/cert_id |
KECS-NISS-0136-2008 |
JISEC-CC-CRP-C0833-01-2024 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_IMP.1, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, AVA_VAN.3, ALC_CMC.4, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ATE_COV.2, ASE_OBJ.2, ASE_SPD.1, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ALC_DVS.1, ALC_TAT.1, ASE_CCL.1, ATE_DPT.2, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4 |
AGD_OPE.1, ASE_SPD.1, ADV_FSP.1, ASE_REQ.1, ASE_OBJ.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, AGD_PRE.1, ALC_CMS.1, ALC_CMC.1, ASE_INT.1, ASE_TSS.1, ATE_IND.1 |
heuristics/extracted_versions |
3.0 |
514 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: FW
- cert_id: KECS-NISS-0136-2008
- certification_date: 22.12.2008
- enhanced:
- level: EAL4
- product: AhnLab Suhoshin Absolute v3.0
- product_link: https://itscc.kr/certprod/view.do?product_id=136&product_class=4
- vendor: AhnLab, Inc.
|
- cert_id: JISEC-CC-CRP-C0833
- certification_date: 01.11.2024
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0833
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002je58-att/c0833_eimg.pdf
- certification_date: 19.11.2024
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multi-Function Printer (MFP) that has the functions, such as Copy, Scan, Print, Fax and Document storage and retrieval functions. The TOE provides the security functions required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFP TOE security functionality The TOE provides the following security functions: Identification and Authentication function Access Control function Encryption function Trusted Communications function Security Management function Audit function Trusted Operation function FAX Separation function
- evaluation_facility: ECSEC Laboratory Inc., Evaluation Center
- expiration_date: 19.11.2029
- product: KONICA MINOLTA bizhub 751i with FK-514, DEVELOP ineo 751i with FK-514
- product_type: Multi-Function Printer
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002je58-att/c0833_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002je58-att/c0833_est.pdf
- toe_version: G00-RB
- vendor: KONICA MINOLTA, INC.
- expiration_date: 01.11.2029
- supplier: KONICA MINOLTA, INC.
- toe_japan_name: KONICA MINOLTA bizhub 751i with FK-514, DEVELOP ineo 751i with FK-514 G00-RB
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0833_it4883.html
- toe_overseas_name: KONICA MINOLTA bizhub 751i with FK-514, DEVELOP ineo 751i with FK-514 G00-RB
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b2cfec7a92fa2940 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
pdf_data/cert_filename |
|
c0833_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0833-01-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Information-technology Promotion Agency, Japan
- /CreationDate: D:20241226135442+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /Keywords:
- /ModDate: D:20241226135659+09'00'
- /Producer: Adobe PDF Library 20.5.172
- /Subject:
- /Title: C0833_Certificate_01
- pdf_file_size_bytes: 233558
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
NISS-136-En.pdf |
c0833_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0833-01-2024: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: truestar
- /CreationDate: D:20090420083030+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20090420083030+09'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Title: KECS-NISS-0136-2008 인증보고서(AhnLab Suhoshin Absolute V3.0)-EN.hwp
- pdf_file_size_bytes: 583298
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author:
- /CreationDate: D:20250107104244+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /ModDate: D:20250109094102+09'00'
- /Producer: Adobe PDF Library 20.5.172
- /Title:
- pdf_file_size_bytes: 457974
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 32
|
pdf_data/st_filename |
NISS-136-ST-En.pdf |
c0833_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 14
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 14
- ADV_IMP.1: 11
- ADV_TDS.1: 2
- ADV_TDS.3: 20
- AGD:
- AGD_OPE.1: 14
- AGD_PRE.1: 10
- ALC:
- ALC_CMC.4: 17
- ALC_CMS.1: 1
- ALC_CMS.4: 8
- ALC_DEL.1: 7
- ALC_DVS.1: 8
- ALC_LCD.1: 9
- ALC_TAT.1: 10
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 14
- ASE_INT.1: 16
- ASE_OBJ.2: 13
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD.1: 10
- ASE_TSS.1: 7
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 7
- ATE_DPT.2: 8
- ATE_FUN.1: 12
- ATE_FUN.1.1: 1
- ATE_IND.2: 9
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 11
- FAU_ARP.1.1: 2
- FAU_GEN.1: 58
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAA.1: 11
- FAU_SAA.1.1: 2
- FAU_SAA.1.2: 2
- FAU_SAR.1: 10
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.3: 7
- FAU_SAR.3.1: 2
- FAU_SEL.1: 14
- FAU_SEL.1.1: 2
- FAU_STG.1: 10
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FAU_STG.3: 7
- FAU_STG.3.1: 2
- FAU_STG.4: 7
- FAU_STG.4.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.2: 15
- FDP_ACC.2.1: 4
- FDP_ACC.2.2: 4
- FDP_ACF.1: 22
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_IFC.1: 68
- FDP_IFC.1.1: 16
- FDP_IFC.2: 9
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF.1: 84
- FDP_IFF.1.1: 18
- FDP_IFF.1.2: 18
- FDP_IFF.1.3: 18
- FDP_IFF.1.4: 18
- FDP_IFF.1.5: 17
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 5
- FIA_AFL.1.2: 3
- FIA_ATD.1: 29
- FIA_ATD.1.1: 10
- FIA_SOS.1: 13
- FIA_SOS.1.1: 2
- FIA_UAU.1: 31
- FIA_UAU.1.1: 10
- FIA_UAU.1.2: 6
- FIA_UAU.4: 11
- FIA_UAU.4.1: 2
- FIA_UAU.7: 6
- FIA_UAU.7.1: 2
- FIA_UID.1: 13
- FIA_UID.2: 27
- FIA_UID.2.1: 8
- FMT:
- FMT_MOF.1: 43
- FMT_MOF.1.1: 2
- FMT_MSA.1: 35
- FMT_MSA.1.1: 2
- FMT_MSA.3: 45
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 96
- FMT_MTD.1.1: 6
- FMT_MTD.2: 12
- FMT_MTD.2.1: 2
- FMT_MTD.2.2: 2
- FMT_SMF.1: 65
- FMT_SMF.1.1: 2
- FMT_SMR: 1
- FMT_SMR.1: 118
- FMT_SMR.1.1: 5
- FMT_SMR.1.2: 4
- FPT:
- FPT_FLS.1: 11
- FPT_FLS.1.1: 2
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_STM.1: 4
- FPT_TEE.1: 9
- FPT_TEE.1.1: 2
- FPT_TEE.1.2: 2
- FPT_TST: 2
- FPT_TST.1: 9
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FRU:
- FRU_FLT.1: 10
- FRU_FLT.1.1: 2
- FRU_RSA.1: 9
- FRU_RSA.1.1: 2
- FTA:
- FTA_SSL.1: 9
- FTA_SSL.1.1: 2
- FTA_SSL.1.2: 2
- FTA_SSL.3: 10
- FTA_SSL.3.1: 2
|
- FAU:
- FAU_GEN: 10
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 33
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 16
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 55
- FCS_COP.1.1: 4
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 16
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT.1: 6
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_FXS_EXT: 2
- FDP_FXS_EXT.1: 6
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT: 2
- FIA_PSK_EXT.1: 9
- FIA_PSK_EXT.1.1: 2
- FIA_PSK_EXT.1.2: 2
- FIA_PSK_EXT.1.3: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 3
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.PURGE_DATA: 2
- O.STORAGE_ENCRYPTION: 4
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 6
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 18
- SHA-384: 9
- SHA-512: 11
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 5
- IKEv1: 14
- IKEv2: 3
- IPsec:
- SSH:
- TLS:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- RFC:
- RFC 791: 1
- RFC 792: 1
- RFC 793: 1
|
- CC:
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 186-4: 5
- FIPS PUB 197: 3
- FIPS PUB 198-1: 2
- ISO:
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-90A: 3
- PKCS:
- RFC:
- RFC 2407: 1
- RFC 3602: 7
- RFC 4106: 2
- RFC 4109: 2
- RFC 4301: 3
- RFC 4303: 3
- RFC 4304: 3
- RFC 4868: 5
- RFC 5282: 1
- RFC3602: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: skheo
- /Company: 인증팀
- /CreationDate: D:20090320144218+09'00'
- /Creator: Word용 Acrobat PDFMaker 8.0
- /ModDate: D:20090320144338+09'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- /Title: Common Crieria 보증문서
- /_TOE: AhnLab Suhoshin Absolute v3.0
- /모델명: AhnLab Suhoshin Absolute
- /문서명: 보안목표명세서
- /문서버전: -001
- /버전: v1.0
- /작성일: 2007년 3월 30일
- /평가등급: Evaluation Assurance Level 4+
- /형상식별자: Absolute-STD
- /회사명-en: Ahnlab Inc.
- /회사명-kr: (주)안철수연구소
- pdf_file_size_bytes: 2009600
- pdf_hyperlinks:
|