Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ST19SF02AD Component embedded by O.C.S. B0' V3 application (reference ST19SF02AD/RRR)
ANSSI-CC-2002/06
SHARP BP-30C25 fax standard model with BP-FR10U; and BP-30C25 fax option model with BP-FR10U, MX-PK13 and MX-FX15 0110Uc00
JISEC-CC-CRP-C0694-01-2020
name ST19SF02AD Component embedded by O.C.S. B0' V3 application (reference ST19SF02AD/RRR) SHARP BP-30C25 fax standard model with BP-FR10U; and BP-30C25 fax option model with BP-FR10U, MX-PK13 and MX-FX15 0110Uc00
category ICs, Smart Cards and Smart Card-Related Devices and Systems Multi-Function Devices
scheme FR JP
not_valid_after 01.09.2019 03.06.2024
not_valid_before 01.01.2002 04.12.2020
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2002_06.pdf https://www.commoncriteriaportal.org/files/epfiles/c0694_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2002_06.pdf https://www.commoncriteriaportal.org/files/epfiles/c0694_est.pdf
manufacturer STMicroelectronics, Oberthur Card Systems Sharp Corporation
manufacturer_web https://www.st.com
security_level ADV_IMP.2, EAL4+, ALC_DVS.2, AVA_VLA.4 {}
dgst a2c997d4c1cf254f de1d28e7fbb9d000
heuristics/cert_id ANSSI-CC-2002/06 JISEC-CC-CRP-C0694-01-2020
heuristics/cpe_matches {} cpe:2.3:h:sharp:bp-30c25:-:*:*:*:*:*:*:*
heuristics/extracted_sars ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0694
  • certification_date: 01.12.2020
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0694
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000014om-att/c0694_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan, fax and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Fax Line Separation Function
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: SHARP BP-30C25 fax standard model with BP-FR10U; and BP-30C25 fax option model with BP-FR10U, MX-PK13 and MX-FX15
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000014om-att/c0694_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000014om-att/c0694_est.pdf
    • toe_version: 0110Uc00
    • vendor: SHARP CORPORATION
  • expiration_date: 01.06.2024
  • supplier: SHARP CORPORATION
  • toe_japan_name: SHARP BP-30C25 fax standard model with BP-FR10U; and BP-30C25 fax option model with BP-FR10U, MX-PK13 and MX-FX150110Uc00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0694_it0743.html
  • toe_overseas_name: SHARP BP-30C25 fax standard model with BP-FR10U; and BP-30C25 fax option model with BP-FR10U, MX-PK13 and MX-FX150110Uc00
protection_profile_links {} {}
pdf_data/report_filename 2002_06.pdf c0694_erpt.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • Rapport de certification 2002/06: 4
  • JP:
    • JISEC-CC-CRP-C0694-01-2020: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.2: 5
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.2: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.4: 6
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 5
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 3
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Oberthur:
    • Oberthur Card Systems: 7
  • STMicroelectronics:
    • STMicroelectronics: 4
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 2
  • Serma:
    • Serma Technologies: 2
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
      • AES-: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 8
      • TLS 1.2: 6
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_metadata
  • /Author: bousson
  • /CreationDate: D:20020604090355
  • /Creator: FrameMaker 6.0
  • /ModDate: D:20020604095101+02'00'
  • /Producer: Acrobat Distiller 4.05 for Windows
  • /Title: RapportCertification.book
  • pdf_file_size_bytes: 89932
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /CreationDate: D:20210203153609+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20210203153815+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 512645
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename cible2002_06.pdf c0694_est.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 1
    • CC-2: 3
    • CC-3: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL4: 2
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.2: 10
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.2: 10
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 2
    • AVA_VLA.4: 15
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_SAA.1: 4
    • FAU_SAA.1.1: 2
    • FAU_SAA.1.2: 2
    • FAU_SAR.1: 3
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCO:
    • FCO_NRO.1: 3
    • FCO_NRO.1.1: 1
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 1
  • FCS:
    • FCS_CKM.3: 4
    • FCS_CKM.3.1: 2
    • FCS_CKM.4: 4
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 2
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.2: 4
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_DAU.1: 2
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ETC.1: 4
    • FDP_ETC.1.1: 2
    • FDP_ETC.1.2: 2
    • FDP_IFC.1: 5
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 5
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
    • FDP_ITC.1: 4
    • FDP_ITC.1.1: 2
    • FDP_ITC.1.2: 2
    • FDP_ITC.1.3: 2
    • FDP_RIP.1: 4
    • FDP_RIP.1.1: 2
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.3: 4
    • FIA_UAU.3.1: 2
    • FIA_UAU.3.2: 2
    • FIA_UAU.4: 4
    • FIA_UAU.4.1: 2
    • FIA_UID.1: 4
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_USB.1: 4
    • FIA_USB.1.1: 2
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 2
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 2
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 2
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 2
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 4
    • FPR_UNO.1.1: 2
  • FPT:
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 2
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 2
    • FPT_SEP.1: 4
    • FPT_SEP.1.1: 2
    • FPT_SEP.1.2: 2
    • FPT_TDC.1: 4
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 2
    • FPT_TST.1: 4
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FAU:
    • FAU_GEN: 15
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 4
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 41
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 4
    • FCS_CKM_EXT.4: 27
    • FCS_CKM_EXT.4.1: 2
    • FCS_COP.1: 102
    • FCS_COP.1.1: 6
    • FCS_KDF_EXT.1: 4
    • FCS_KYC_EXT: 5
    • FCS_KYC_EXT.1: 9
    • FCS_KYC_EXT.1.1: 3
    • FCS_RBG_EXT: 4
    • FCS_RBG_EXT.1: 25
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_SMC_EXT.1: 4
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT: 7
    • FCS_TLS_EXT.1: 24
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 4
    • FDP_DSK_EXT.1: 9
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_FXS_EXT: 4
    • FDP_FXS_EXT.1: 6
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_PMG: 4
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 16
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 3
    • FPT_KYP_EXT.1: 4
    • FPT_KYP_EXT.1.1: 1
    • FPT_SKP_EXT: 4
    • FPT_SKP_EXT.1: 6
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 4
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 5
    • FPT_TUD_EXT.1: 10
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 20
    • FTP_TRP.1.1: 4
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.TERM: 1
    • A.V: 3
  • O:
    • O.C: 3
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 3
    • D.USER: 13
  • O:
    • O.ACCESS_CONTROL: 7
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 4
    • O.COMMS_PROTECTION: 11
    • O.FAX_NET_SEPARATION: 1
    • O.KEY_MATERIAL: 1
    • O.PURGE_DATA: 2
    • O.STORAGE_ENCRYPTION: 6
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/st_keywords/vendor
  • Oberthur:
    • OBERTHUR: 1
    • Oberthur: 1
    • Oberthur Card Systems: 82
  • STMicroelectronics:
    • STM: 2
    • STMicroelectronics: 4
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 7
  • AES_competition:
    • AES:
      • AES: 18
      • AES-128: 1
      • AES-256: 2
    • Rijndael:
      • Rijndael: 2
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DSA:
      • DSA: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 11
      • SHA-384: 7
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 40
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 7
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 13
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 5
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 2
    • FIPS PUB 197: 2
    • FIPS PUB 198-1: 2
  • ISO:
    • ISO/IEC 10116: 6
    • ISO/IEC 10118-: 1
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 18033-3: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-90A: 5
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 4
    • RFC 4346: 1
    • RFC 5246: 3
pdf_data/st_metadata
  • /CreationDate: D:20020603151111
  • /ModDate: D:20020603151111+02'00'
  • /Producer: Acrobat Distiller 4.0 for Windows
  • pdf_file_size_bytes: 821687
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 81
  • /Author:
  • /CreationDate: D:20210125120334+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 20
  • /ModDate: D:20210125120408+09'00'
  • /Producer: Adobe PDF Library 20.9.95
  • /Title:
  • pdf_file_size_bytes: 988009
  • pdf_hyperlinks: http://csrc.nist.gov/archive/aes/katmct/katmct.htm
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 66
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different