name |
Kyocera ECOSYS MA4000cifx/MA4000cifxG/ MA3500cifx/MA3500cifxG, Kyocera TASKalfa MA4500ci/MA3500ci, Copystar CS MA4500ci, TA Triumph Adler P-C4067i MFP/P3567i MFP/458ci/358ci, UTAX P-C4067i MFP/P3567i MFP/458ci/358ci with SSD and with system firmware: 2Z7_S0IS.C03.002: |
Samsung STRONGV2P0 of S5E9840 with Specific IC Dedicated Software revision 1.1 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
SE |
ES |
status |
active |
active |
not_valid_after |
14.09.2028 |
19.03.2027 |
not_valid_before |
14.09.2023 |
19.03.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRAcertificate_KyoceraMA4000.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-30_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Kyocera%20MA4000_1-0_21FMV6803-26.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-30%20INF-3758.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_ECOSYS_MA4000cifx_v102.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-30%20ST_Lite.pdf |
manufacturer |
KYOCERA Document Solutions Inc. |
Samsung Electronics Co., Ltd. |
manufacturer_web |
https://www.kyoceradocumentsolutions.com/ |
https://www.samsung.com |
security_level |
EAL2+, ALC_FLR.2 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
ad39419f023e12f9 |
72599c19fe609d91 |
heuristics/cert_id |
CSEC2021010 |
2020-30-INF-3758 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
03.002 |
1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Smart Cards and similiar devices
- certification_date: 19.03.2022
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1402
- certification_date: 19.03.2022
- description: The Target of Evaluation (TOE), the STRONGV2P0 secure subsystem is a Hard macro instantiated within an SOC which is composed of a processing unit, security components, hardware circuit for testing purpose during the manufacturing process and volatile and non-volatile memories (hardware). The TOE also includes any IC Designer/Manufacturer proprietary IC Dedicated Software as long as it physically exists in an STRONGV2P0 after being delivered by the IC Manufacturer. Such software (also known as IC bootloader/firmware) is used for providing additional services to facilitate the usage of the hardware and/or to provide additional services, a random number generation library and a random number generator. All other software is called Security IC Embedded Software and is not part of the TOE. The Security IC Embedded Software is initially stored in encrypted form in external NVM (Flash). The SoC S5E9840 is necessary to operate the STRONGV2P0 but it is not TOE hardware.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Samsung Electronics Co., Ltd
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1403
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1401
- type: Product
- manufacturer: Samsung Electronics Co., Ltd
- product: Samsung STRONGV2P0 of S5E9840 with Specific IC Dedicated Software revision 1.1
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/802-samsung-strongv2p0-of-s5e9840-with-specific-ic-dedicated-software-revision-1-1
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
CCRAcertificate_KyoceraMA4000.pdf |
2020-30_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230914141124+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20230914141124+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 2761816
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20220304170813+01'00'
- /ModDate: D:20220304170813+01'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 888641
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
Certification Report Kyocera MA4000_1-0_21FMV6803-26.pdf |
2020-30 INF-3758.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 2
- ASE:
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_DAU: 1
- FDP_IFC.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_SDR.1: 1
- FDP_UIT.1: 1
- FIA:
- FMT:
- FMT_LIM: 4
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_PHP.3: 1
- FRU:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.DADMIN_TRUST: 1
- A.NETWORK: 1
- A.USER_EDUCATION: 1
- T:
- T.IMAGE_DATA: 1
- T.NETWORK: 1
- T.SETTING_DATA: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-512: 1
- SHA384: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Jerry Johansson
- /CreationDate: D:20230913134356+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230913134356+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 21FMV6803-26
- /Title: Certification Report Kyocera MA4000
- pdf_file_size_bytes: 348141
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
|
pdf_data/st_filename |
ST_ECOSYS_MA4000cifx_v102.pdf |
2020-30 ST_Lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084: 1
- BSI-CC-PP-0084-: 1
- BSI-PP-0084: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 7
- EAL2 augmented: 1
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL5: 6
- EAL5 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 28
- FCS_CKM.1.1: 3
- FCS_CKM.2: 3
- FCS_CKM.4: 13
- FCS_COP.1: 27
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 18
- FMT_MSA.1.1: 2
- FMT_MSA.3: 18
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 14
- FMT_MTD.1.1: 2
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 1
- FAU_SAS: 8
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.4: 5
- FCS_COP: 15
- FCS_COP.1: 9
- FCS_RNG: 6
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 8
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 11
- FDP_ACF.1: 19
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 7
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC: 1
- FDP_IFC.1: 23
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT: 1
- FDP_ITT.1: 18
- FDP_ITT.1.1: 1
- FDP_SDC: 11
- FDP_SDC.1: 15
- FDP_SDC.1.1: 2
- FDP_SDI: 8
- FDP_SDI.1: 3
- FDP_SDI.2: 10
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SDR: 6
- FDP_SDR.1: 11
- FDP_SDR.1.1: 2
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FDP_UIT.1: 9
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_URC: 12
- FDP_URC.1: 6
- FDP_URC.1.1: 1
- FDP_URC.1.2: 1
- FIA:
- FIA_API: 6
- FIA_API.1: 12
- FIA_API.1.1: 2
- FIA_UID: 7
- FIA_UID.1: 4
- FMT:
- FMT_LIM: 82
- FMT_LIM.1: 12
- FMT_LIM.1.1: 1
- FMT_LIM.2: 11
- FMT_LIM.2.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_ETD: 1
- FPT_FLS: 1
- FPT_FLS.1: 21
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 16
- FPT_ITT.1.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FPT_RPL: 7
- FPT_RPL.1: 3
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_FLT.2: 16
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 5
- A.DADMIN_TRUST: 4
- A.NETWORK: 3
- A.NETWROK: 1
- A.USER_EDUCATION: 5
- O:
- O.ACCESS_CONTROL: 7
- O.FAX_CONTROL: 6
- O.NETWORK_ENCRYPTION: 6
- O.SETTING_DATA: 6
- O.SSD_ENCRYPTION: 6
- OE:
- OE.ACCESS: 4
- OE.DADMIN_TRUST: 3
- OE.NETWORK_PROTECTION: 3
- OE.USER_EDUCATION: 3
- T:
- T.IMAGE_DATA: 3
- T.NETWORK: 4
- T.SETTING_DATA: 4
|
- O:
- O.AES: 5
- O.MEM_ACCESS: 1
- O.RND: 6
- O.TDES: 7
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 16
- Triple-DES: 6
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 1
- DHE: 2
- Diffie-Hellman: 4
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 3
- SHA-512: 2
|
- SHA:
- SHA2:
- SHA-256: 2
- SHA-512: 2
- SHA2: 1
- SHA384: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- TLS:
- SSL:
- SSL: 1
- SSLv1.0: 1
- SSLv2.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 17
- TLS1.2: 1
- TLS1.3: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
- TLSv1.3: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 26
- malfunction: 10
- physical tampering: 2
- SCA:
- DPA: 3
- Leak-Inherent: 21
- Physical Probing: 4
- Physical probing: 2
- SPA: 2
- physical probing: 9
- side-channel: 2
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 2
- FIPS 197: 4
- FIPS 46-3: 1
- FIPS PUB 180-4: 3
- FIPS PUB 197: 3
- NIST:
- SP 800-135: 3
- SP 800-67: 1
- PKCS:
- RFC:
- RFC 2104: 2
- RFC 2409: 2
- RFC 5114: 1
- RFC2409: 2
- RFC5246: 11
- RFC5288: 4
- RFC5289: 4
- RFC8439: 3
- RFC8446: 3
|
- BSI:
- CC:
- CCMB-2017-04-001: 3
- CCMB-2017-04-002: 3
- CCMB-2017-04-003: 3
- CCMB-2017-04-004: 3
- FIPS:
- FIPS 180-4: 1
- FIPS 197: 1
- FIPS PUB 180-3: 3
- FIPS197: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- in case forwarding to the internal network fails, the TOE would prints the data. In this case it is out of scope of forwarding to the internal network and the security objective is fulfilled. FMT_MSA.1 (b: 1
- out of scope: 1
|
- OutOfScope:
- out of scope: 2
- out of scope) GCM mode (out of scope) 21 TORNADO-H Built-in hardware accelerator for big number calculation: 1
- the security of the crypto service for the user is not in the scope of the evaluation. CTR mode (out of scope) GCM mode (out of scope) 21 TORNADO-H Built-in hardware accelerator for big number calculation: 1
|
pdf_data/st_metadata |
|
- /Author: Samsung
- /CreationDate: D:20220217191933+09'00'
- /Creator: Microsoft® Word 2016
- /Keywords: ST_lite S5E9840_SSP01
- /ModDate: D:20220217192349+09'00'
- /Producer: Microsoft® Word 2016
- /Subject: ST_lite S5E9840_SSP01
- /Title: ST_lite S5E9840_SSP01
- pdf_file_size_bytes: 1193990
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 102
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |