name |
OPPO Find X5 Pro, including ColorOS 12.1, and Qualcomm Snapdragon® 8 Gen 1 Mobile Platform |
Data security kit for digital MFD:AR-FR10 Version S.10 |
category |
Mobility |
Other Devices and Systems |
scheme |
SE |
JP |
status |
active |
archived |
not_valid_after |
31.03.2027 |
10.12.2010 |
not_valid_before |
31.03.2022 |
16.03.2004 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed-CCRA-Certificate%20OPPO%20Find%20X5%20Pro.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20OPPO%20Find%20X5%20Pro.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0006.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OPPO%20Find%20X5%20Pro%20on%20ColorOS%2012.1%20Security%20Target.pdf |
|
manufacturer |
Guangdong OPPO Mobile Telecommunications Corp., Ltd |
Sharp Corporation |
manufacturer_web |
https://www.oppo.com/en/ |
https://sharp-world.com/ |
security_level |
{} |
EAL3+ |
dgst |
95ee9573a6851af4 |
9a44d39dec550888 |
heuristics/cert_id |
CSEC2021007 |
JISEC-CC-CRP-C0006 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
{} |
heuristics/extracted_versions |
12.1 |
10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0004
- certification_date: 01.01.2004
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- description: PRODUCT DESCRIPTION The data security kit for digital MFD, AR-FR4 version M.20 and AR-FR5 version E.20, is firmware which aims to decrease the risk of document data and image data that is temporarily stored inside of digital MFD from being dosclosed. Digital MFD is business equipment which can be configured by adding, as needed units for copy, image scanning or facsimile functions to printer function unit. The data security kit for digital MFD is provided as an upgrading kit for the firmware of hte MFD.
- evaluation_facility: Mizuho Information & Research Institute, Inc.
- product: Data security kit for digital MFD: AR-FR4 version M.20, AR-FR5 version E.20
- product_type: IT product (digital MFD )
- protection_profile: N/A
- vendor: Sharp Corporation
- expiration_date: 01.03.2013
- supplier: Sharp Corporation
- toe_japan_name: Data security kit for digital MFD:AR-FR4 version M.20,AR-FR5 version E.20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0004_it2005.html
- toe_overseas_name: Data security kit for digital MFD:AR-FR4 version M.20,AR-FR5 version E.20
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c40ae795865a0dba, 731bdcc989507942, 83014eb399a802f3, c88af12926be2779 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf |
{} |
pdf_data/cert_filename |
Signed-CCRA-Certificate OPPO Find X5 Pro.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR: 1
- ALC_TSU_EXT.1: 1
- ASE:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20220404080932+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20220404083958+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 1623099
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
Certification Report - OPPO Find X5 Pro.pdf |
c0006.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- Certification No. C0006: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 3
- EAL 1 augmented: 1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 4
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PRECAUTION: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- T:
- T.MALICIOUS_APP: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PERSISTENT_PRESENCE: 1
- T.PHYSICAL_ACCESS: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED: 1
- T.UNDETECTED_ACTIONS: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- X509:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP) Applications loaded onto the Mobile Device may: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /Author: Jerry Johansson
- /CreationDate: D:20220329111443+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220331141336+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 21FMV6272-30:1
- /Title: Certification Report - OPPO Find X5 Pro
- pdf_file_size_bytes: 504386
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /CreationDate: D:20040526154034+09'00'
- /ModDate: D:20040526154034+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13947
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
OPPO Find X5 Pro on ColorOS 12.1 Security Target.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 2
- EAL 1 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ALC_TSU_EXT: 3
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 7
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG: 2
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 22
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM_EXT: 7
- FCS_CKM_EXT.1: 5
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 5
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 6
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 5
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 5
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.8: 7
- FCS_CKM_EXT.8.1: 1
- FCS_COP: 41
- FCS_COP.1: 7
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_SMF_EXT.1: 1
- FCS_SRV_EXT: 1
- FCS_SRV_EXT.1: 5
- FCS_SRV_EXT.1.1: 1
- FCS_STG_EXT: 3
- FCS_STG_EXT.1: 5
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 7
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 5
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC_EXT: 12
- FCS_TLSC_EXT.1: 11
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.2: 4
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.4: 3
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSC_EXT.5: 3
- FCS_TLSC_EXT.5.1: 1
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 3
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACF_EXT: 2
- FDP_ACF_EXT.1: 3
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 1
- FDP_ACF_EXT.2: 3
- FDP_ACF_EXT.2.1: 1
- FDP_DAR_EXT: 2
- FDP_DAR_EXT.1: 5
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 5
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT: 1
- FDP_IFC_EXT.1: 6
- FDP_IFC_EXT.1.1: 1
- FDP_PBA_EXT: 3
- FDP_PBA_EXT.1: 1
- FDP_PBA_EXT.1.1: 1
- FDP_STG_EXT: 1
- FDP_STG_EXT.1: 5
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 4
- FDP_UPC_EXT.1: 2
- FIA:
- FIA_AFL_EXT: 1
- FIA_AFL_EXT.1: 4
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT: 6
- FIA_BLT_EXT.1: 5
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 5
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 3
- FIA_BLT_EXT.3.1: 1
- FIA_BLT_EXT.4: 5
- FIA_BLT_EXT.4.1: 1
- FIA_BLT_EXT.4.2: 1
- FIA_BLT_EXT.6: 5
- FIA_BLT_EXT.6.1: 1
- FIA_BLT_EXT.7: 5
- FIA_BLT_EXT.7.1: 1
- FIA_BMG_EXT: 8
- FIA_BMG_EXT.1: 5
- FIA_PAE_EXT: 1
- FIA_PAE_EXT.1: 5
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 8
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT: 1
- FIA_TRT_EXT.1: 5
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 3
- FIA_UAU.5: 4
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UAU.6.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.1: 5
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 4
- FIA_UAU_EXT.2.2: 1
- FMT:
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 6
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_SMF_EXT: 10
- FMT_SMF_EXT.1: 8
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2: 3
- FMT_SMF_EXT.2.1: 1
- FPT:
- FPT_AEX_EXT: 4
- FPT_AEX_EXT.1: 5
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 5
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 5
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 3
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_JTA_EXT: 1
- FPT_JTA_EXT.1: 5
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT: 3
- FPT_KST_EXT.1: 5
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 5
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 5
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 1
- FPT_NOT_EXT.1: 5
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 13
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 1
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.3: 3
- FPT_TUD_EXT.3.1: 1
- FTA:
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_WSE_EXT: 1
- FTA_WSE_EXT.1: 4
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_BLT_EXT: 12
- FTP_BLT_EXT.1: 5
- FTP_BLT_EXT.1.1: 1
- FTP_BLT_EXT.1.2: 1
- FTP_BLT_EXT.2: 5
- FTP_BLT_EXT.2.1: 1
- FTP_BLT_EXT.3: 3
- FTP_ITC_EXT: 7
- FTP_ITC_EXT.1: 5
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PRECAUTION: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.AUTH: 1
- O.AUTH_COMM: 1
- O.CONFIG: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.INTEGRITY: 1
- O.PRIVACY: 1
- O.PROTECTED_COMMS: 1
- O.STORAGE: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.WIRELESS_ACCESS_POINT_CONNECTION: 1
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_USER: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 2
- T.MALICIOUS_APP: 1
- T.NETWORK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PERSISTENT: 2
- T.PERSISTENT_PRESENCE: 1
- T.PHYSICAL: 2
- T.PHYSICAL_ACCESS: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED: 1
- T.UNDETECTED_ACTIONS: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 28
- AES-: 1
- AES-128: 1
- AES-256: 16
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 6
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 5
- SHA-512: 2
- SHA384: 1
- SHA512: 2
- scrypt:
|
|
pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 1
- Key exchange: 3
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 63
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 8
- secp256r1: 4
- secp384r1: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 4
- FIPS 186-4: 3
- FIPS 197: 4
- FIPS 198-1: 3
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- FIPS186-4: 1
- FIPS198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 186-4: 1
- SP 800-108: 2
- SP 800-38E: 1
- SP 800-90A: 1
- RFC:
- RFC 2246: 1
- RFC 2818: 2
- RFC 3394: 2
- RFC 4346: 2
- RFC 5216: 1
- RFC 5246: 4
- RFC 5280: 3
- RFC 5288: 5
- RFC 5289: 12
- RFC 5746: 2
- RFC 6125: 1
- RFC 6960: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.coloros.ocs.opencapabilityservice: 1
- java:
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP32) Applications loaded onto the Mobile Device: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |