name |
MX-6150FN / 6150FV / 5150FN / 5150FV / 4150FN / 4150FV / 3650FN / 3650FV / 3150FN / 3150FV / 2650FN / 2650FV with MX-FR51U; MX-3630FN / 2630FN with MX-FR51U and MX-PK13; and MX-6050N / 6050V / 5050N / 5050V / 4050N / 4050V / 3550N / 3550V / 3050N / 3050V / 2630N with MX-FR51U, MX-FX15 and MX-PK13 0700Kc00 |
M7892 Design Step G12, with specific IC dedicated firmware |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
27.10.2022 |
08.07.2029 |
not_valid_before |
27.10.2017 |
08.07.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0580_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V7c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0580_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V7a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0580_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V7b_pdf.pdf |
manufacturer |
Sharp Corporation |
Infineon Technologies AG |
manufacturer_web |
https://sharp-world.com/ |
https://www.infineon.com/ |
security_level |
{} |
EAL6+, ALC_FLR.1 |
dgst |
a67e8b913adcb0f1 |
ed8d5b7c2e3faee5 |
heuristics/cert_id |
JISEC-CC-CRP-C0580-01-2017 |
BSI-DSZ-CC-0891-V7-2024 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:sharp:mx-3050n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-5050v:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-6050n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-4050n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3550n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3550v:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-2630n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-5050n:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-3050v:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-4050v:-:*:*:*:*:*:*:*, cpe:2.3:h:sharp:mx-6050v:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2020/42-R01, ANSSI-CC-2020/44-R01, ANSSI-CC-2020/45-R01, ANSSI-CC-2020/49-R01, ANSSI-CC-2020/43-R01 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V6-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/42-R01, ANSSI-CC-2020/44-R01, ANSSI-CC-2020/45-R01, ANSSI-CC-2020/49-R01, ANSSI-CC-2020/43-R01 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0580
- certification_date: 01.10.2017
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release4
- cert_id: JISEC-CC-CRP-C0580
- cert_link: https://www.ipa.go.jp/en/security/c0580_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Device (MFD) that has the functions, such as copy, print, scan, fax and filing. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: - Identification and Authentication Function - Access Control Function - Stored Data Encryption Function - Network Protection Function - Security Management Function - Audit Function - Software Verification Function - Fax Line Separation Function - Self-testing Function - Residual Data Overwrite Function - Data Purging Function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-6150FN / 6150FV / 5150FN / 5150FV / 4150FN / 4150FV / 3650FN / 3650FV / 3150FN / 3150FV / 2650FN / 2650FV with MX-FR51U; MX-3630FN / 2630FN with MX-FR51U and MX-PK13; and MX-6050N / 6050V / 5050N / 5050V / 4050N / 4050V / 3550N / 3550V / 3050N / 3050V / 2630N with MX-FR51U, MX-FX15 and MX-PK13
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/c0580_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0580_est.pdf
- toe_version: 0700Kc00
- vendor: SHARP CORPORATION
- expiration_date: 01.11.2022
- supplier: SHARP CORPORATION
- toe_japan_name: MX-6150FN / 6150FV / 5150FN / 5150FV / 4150FN / 4150FV / 3650FN / 3650FV / 3150FN / 3150FV / 2650FN / 2650FV with MX-FR51U; MX-3630FN / 2630FN with MX-FR51U and MX-PK13; and MX-6050N / 6050V / 5050N / 5050V / 4050N / 4050V / 3550N / 3550V / 3050N / 3050V / 2630N with MX-FR51U, MX-FX15 and MX-PK130700Kc00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0580_it7640.html
- toe_overseas_name: MX-6150FN / 6150FV / 5150FN / 5150FV / 4150FN / 4150FV / 3650FN / 3650FV / 3150FN / 3150FV / 2650FN / 2650FV with MX-FR51U; MX-3630FN / 2630FN with MX-FR51U and MX-PK13; and MX-6050N / 6050V / 5050N / 5050V / 4050N / 4050V / 3550N / 3550V / 3050N / 3050V / 2630N with MX-FR51U, MX-FX15 and MX-PK130700Kc00
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2020/42-R01, ANSSI-CC-2020/44-R01, ANSSI-CC-2020/45-R01, ANSSI-CC-2020/49-R01, ANSSI-CC-2020/43-R01 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/42-R01, ANSSI-CC-2020/44-R01, ANSSI-CC-2020/45-R01, ANSSI-CC-2020/49-R01, ANSSI-CC-2020/43-R01 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
b2cfec7a92fa2940 |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
c0580_eimg.pdf |
0891V7c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0580-01-2017: 1
|
- DE:
- BSI-DSZ-CC-0891-V7-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20171122112227+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20171122112427+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 85177
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0891-V7-2024
- pdf_file_size_bytes: 231422
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0580_erpt.pdf |
0891V7a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 7 July 2029 SOGIS Recognition Agreement
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0891-V7-2024
- cert_item: M7892 Design Step G12, with specific IC dedicated firmware
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0580-01-2017: 1
|
- DE:
- BSI-DSZ-CC-0891-: 1
- BSI-DSZ-CC-0891-V6-2021: 2
- BSI-DSZ-CC-0891-V7-2024: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 5
- EAL 6 augmented: 3
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 2
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.1: 4
- ALC_CMS.1: 4
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.1: 4
- ASE_REQ.1: 4
- ASE_SPD.1: 4
- ASE_TSS.1: 4
- ATE:
- AVA:
|
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 1
- Infineon Technologies: 7
- Infineon Technologies AG: 8
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- TUV:
- TÜV Informationstechnik: 6
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 1
- AIS 23: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 4
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS31: 3
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Version 3, 2024-05-17, TÜV Informationstechnik GmbH (confidential document) [19] “SITE TECHNICAL AUDIT REPORT (STAR) Amkor Technology Philippines”, Version 3, 2024-05-28, TÜV: 1
- Certification Report COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) [11] M7892 SOLID FLASH Controller for Security Applications Hardware Reference Manual, Version 3.0: 1
- GmbH (confidential document) [20] “SITE TECHNICAL AUDIT REPORT (STAR) PacTech - Packaging Technologies GmbH”, Version 2: 1
- TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- Target Common Criteria EAL6 augmented / EAL6+ M7892 Design Step G12”, Infineon Technologies (confidential document) [7] Evaluation Technical Report for certification BSI-DSZ-CC-0891-V7-2024, Version 2, 2024-06-21: 1
- Technologies AG, Regensburg, Germany”, Version 3, 2024-05-17, TÜV Informationstechnik GmbH (confidential document) [18] “SITE TECHNICAL AUDIT REPORT (STAR) DHL Supply Chain Singapore Pte Ltd., Advanced Regional: 1
- TÜV Informationstechnik GmbH (confidential document) 23 / 26 Certification Report BSI-DSZ-CC-0891-V7-2024 C. Excerpts from the Criteria For the: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20180209141023+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180209141319+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 314490
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung"
- /Subject: Common Criteria, Certification, Zertifizierung
- /Title: Certification Report BSI-DSZ-CC-0891-V7-2024
- pdf_file_size_bytes: 533141
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
c0580_est.pdf |
0891V7b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4+: 1
- EAL6: 7
- EAL6 augmented: 4
- EAL6+: 5
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.4: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_SPM: 2
- ADV_SPM.1: 6
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 3
- ALC_CMC.5: 3
- ALC_CMS: 2
- ALC_CMS.4: 2
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_FLR.1: 11
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 3
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 15
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 40
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 3
- FCS_CKM_EXT.4: 28
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 98
- FCS_COP.1.1: 6
- FCS_KDF_EXT.1: 4
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 3
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 25
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SMC_EXT.1: 4
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 3
- FCS_TLS_EXT.1: 25
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 3
- FDP_DSK_EXT.1: 9
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 3
- FDP_FXS_EXT.1: 6
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.1: 8
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 3
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 16
- FTP_TRP.1.1: 4
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 18
- FCS_CKM.1: 10
- FCS_CKM.4: 10
- FCS_COP: 16
- FCS_COP.1: 8
- FCS_RNG: 7
- FCS_RNG.1: 13
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 25
- FDP_ACC.1.1: 1
- FDP_ACF.1: 20
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 16
- FDP_ITC.1: 10
- FDP_ITC.2: 10
- FDP_ITT.1: 18
- FDP_SDC: 2
- FDP_SDC.1: 9
- FDP_SDC.1.1: 1
- FDP_SDI.1: 15
- FDP_SDI.1.1: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 6
- FMT_LIM.2: 5
- FMT_MSA.1: 18
- FMT_MSA.1.1: 1
- FMT_MSA.3: 21
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FPT:
- FPT_FLS.1: 18
- FPT_ITT: 3
- FPT_ITT.1: 14
- FPT_PHP.3: 24
- FPT_TST: 5
- FPT_TST.1: 11
- FPT_TST.2: 33
- FPT_TST.2.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS_CONTROL: 7
- O.ADMIN_ROLES: 4
- O.AUDIT: 4
- O.COMMS_PROTECTION: 11
- O.FAX_NET_SEPARATION: 1
- O.IMAGE_OVERWRITE: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 3
- O.STORAGE_ENCRYPTION: 6
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
- O:
- O.AES: 6
- O.RND: 3
- O.TDES: 7
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 6
- Infineon Technologies: 4
- Infineon Technologies AG: 19
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 18
- AES-128: 1
- AES-256: 2
- Rijndael:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 39
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 5
- TLS v1.2: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Malfunction: 7
- fault induction: 1
- SCA:
- DPA: 2
- Leak-Inherent: 8
- Physical Probing: 2
- SPA: 1
- physical probing: 1
- side channel: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 2
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116: 6
- ISO/IEC 18031:2011: 3
- ISO/IEC 18033-3: 3
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-90A: 5
- NIST SP 800-90B: 1
- RFC:
- RFC 2246: 1
- RFC 2818: 4
- RFC 4346: 1
- RFC 5246: 3
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 2
- FIPS PUB 197: 2
- ISO:
- ISO/IEC 18033: 2
- ISO/IEC 18092: 4
- ISO/IEC 9798-2: 1
- ISO/IEC14443-3: 1
- NIST:
- SP 800-38A: 5
- SP 800-67: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |