Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J
JISEC-CC-CRP-C0308
Logiciel Mistral IP version 2.1.2
ANSSI-CC-2016/42
name TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J Logiciel Mistral IP version 2.1.2
category Other Devices and Systems Boundary Protection Devices and Systems
scheme JP FR
not_valid_after 01.09.2016 22.07.2021
not_valid_before 31.08.2011 22.07.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0308_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_42.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0308_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20Lite%202016-42.pdf
manufacturer KYOCERA MITA Corporation Thales Communications & Security
manufacturer_web https://www.kyoceramita.com/ https://www.thalescommuninc.com
security_level EAL3 EAL3+, AVA_VAN.3, ALC_FLR.3
dgst bc7181356569d9c6 0ef53661a4c000d4
heuristics/cert_id JISEC-CC-CRP-C0308 ANSSI-CC-2016/42
heuristics/cpe_matches cpe:2.3:h:kyocera:taskalfa_3500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_5500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_4500i:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 1.00 2.1.2
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0308
  • certification_date: 01.08.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0308_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 3500i - TASKalfa 4500i - TASKalfa 5500i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E)
    • product_type: Data protection function in digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0308_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0308_est.pdf
    • toe_version: V1.00J
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.09.2016
  • supplier: KYOCERA MITA Corporation
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0308_it0326.html
  • toe_japan_name: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename c0308_erpt.pdf ANSSI-CC-2016_42.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0308-01: 1
    • Certification No. C0308: 1
  • FR:
    • ANSSI-CC-2016/42: 17
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 3
    • EAL 5: 1
    • EAL 7: 1
    • EAL3: 2
    • EAL4: 2
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 4
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.3: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.CE: 1
    • A.LOCATION: 1
    • A.NETWORK: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Thales:
    • Thales: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKEv2: 1
  • IPsec:
    • IPsec: 1
  • VPN:
    • VPN: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 2
pdf_data/report_metadata
  • /CreationDate: D:20111017144607+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20111017144639+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 238454
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: ANSSI-CC-2016_42
  • pdf_file_size_bytes: 780613
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename c0308_est.pdf Cible Lite 2016-42.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 5
  • EAL:
    • EAL3: 4
    • EAL3 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.3: 9
    • ADV_FSP.4: 3
    • ADV_IMP.1: 3
    • ADV_TDS.1: 2
    • ADV_TDS.2: 3
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.3: 2
    • ALC_CMS.1: 1
    • ALC_CMS.3: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 3
    • ALC_FLR.3: 8
    • ALC_LCD.1: 4
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 5
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 4
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 4
    • ATE_DPT.1: 3
    • ATE_FUN.1: 6
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 11
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FAU:
    • FAU_GEN: 9
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 2
    • FAU_GEN_EXT.3: 13
    • FAU_GEN_EXT.3.1: 2
    • FAU_SEG.1: 2
    • FAU_STG.1: 1
    • FAU_STG.3: 1
    • FAU_STG_EXT.1: 16
    • FAU_STG_EXT.1.1: 3
    • FAU_STG_EXT.3: 13
    • FAU_STG_EXT.3.1: 2
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 1
    • FCS_CKM.3: 1
    • FCS_CKM.4: 16
    • FCS_CKM_EXT: 50
    • FCS_CKM_EXT.4: 15
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.5: 23
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.5.3: 1
    • FCS_COP: 96
    • FCS_COP.1: 23
    • FCS_COP.1.1: 4
    • FCS_IPS_EXT: 4
    • FCS_IPS_EXT.1: 23
    • FCS_IPS_EXT.1.1: 4
    • FCS_IPS_EXT.1.2: 3
    • FCS_IPS_EXT.1.3: 3
    • FCS_IPS_EXT.1.4: 3
    • FCS_IPS_EXT.1.5: 3
    • FCS_IPS_EXT.1.6: 3
    • FCS_IPS_EXT.1.7: 3
    • FCS_IPS_EXT.1.8: 4
    • FCS_RBG_EXT: 5
    • FCS_RBG_EXT.1: 17
    • FCS_RBG_EXT.1.1: 3
    • FCS_RBG_EXT.1.2: 3
  • FDP:
    • FDP_ACC.1: 8
    • FDP_ETC: 8
    • FDP_ETC.2: 4
    • FDP_IFC: 35
    • FDP_IFC.1: 14
    • FDP_IFF: 32
    • FDP_IFF.1: 21
    • FDP_ITC: 43
    • FDP_ITC.1: 32
    • FDP_ITC.2: 44
    • FDP_RIP.2: 6
    • FDP_RIP.2.1: 2
    • FDP_UCT: 14
    • FDP_UCT.1: 2
    • FDP_UIT: 18
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 8
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 1
    • FIA_PMG_EXT: 10
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU: 15
    • FIA_UAU.1: 4
    • FIA_UAU.6: 1
    • FIA_UAU.7: 1
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 6
    • FIA_UAU_EXT.2: 9
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA: 1
    • FIA_UIA_EXT: 16
    • FIA_UIA_EXT.1: 7
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID: 10
    • FIA_UID.1: 4
    • FIA_UID.2: 2
  • FMT:
    • FMT_MDT: 1
    • FMT_MOF: 5
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 21
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 52
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SKP_EXT.1: 1
    • FMT_SMF.1: 30
    • FMT_SMF.1.1: 2
    • FMT_SMR: 23
    • FMT_SMR.1: 16
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 4
    • FPT_APW_EXT.1: 10
    • FPT_APW_EXT.1.1: 3
    • FPT_APW_EXT.1.2: 3
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_SDP_EXT: 3
    • FPT_SDP_EXT.1: 5
    • FPT_SDP_EXT.1.1: 1
    • FPT_SDP_EXT.2: 10
    • FPT_SDP_EXT.2.1: 2
    • FPT_SDP_EXT.2.2: 2
    • FPT_SIE_EXT: 9
    • FPT_SIE_EXT.1: 6
    • FPT_SIE_EXT.1.1: 1
    • FPT_SIE_EXT.2: 4
    • FPT_SIE_EXT.2.1: 1
    • FPT_SKP_EXT: 4
    • FPT_SKP_EXT.1: 9
    • FPT_SKP_EXT.1.1: 3
    • FPT_STM.1: 19
    • FPT_STM.1.1: 2
    • FPT_TDC: 8
    • FPT_TDC.1: 5
    • FPT_TST.1: 6
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 20
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 2
  • FTA:
    • FTA_SSL: 6
    • FTA_SSL.1: 2
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 1
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 6
    • FTA_SSL_EXT.1: 9
    • FTA_SSL_EXT.1.1: 2
    • FTA_TAB: 7
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.CE: 3
    • A.LOCATION: 4
    • A.NETWORK: 4
  • O:
    • O.ENCRYPT: 4
    • O.OVERWRITE: 5
  • OE:
    • OE.CE: 2
    • OE.LOCATION: 2
    • OE.NETWORK: 2
  • A:
    • A.ACCESS_CONTROL_MANAGEMENT_DEVICES: 3
    • A.ALARM: 3
    • A.AUDIT: 3
    • A.CEC_CRYPTO_REGULATION: 3
    • A.CONFIGURATION_CONTROL: 3
    • A.KEY_TRANSPORTATION: 3
    • A.NO_GENERAL_PURPOSE: 4
    • A.PHYSICAL: 1
    • A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES: 3
    • A.PHYSICAL_ENVIRONMENT_TOE: 3
    • A.POLICIES_CONTINUITY: 3
    • A.SECURED_MANAGEMENT_DEVICES: 3
    • A.SGC_TO_FRONT-END: 3
    • A.STAND_ALONE_CEC: 3
    • A.SW_PROTECTION: 3
    • A.TRUSTED_ADMIN: 4
    • A.TRUSTED_NETWORKS: 4
  • D:
    • D.APPLICATIVE_DATA: 7
    • D.AUDIT: 3
    • D.AUTHENTICATION_DATA: 11
    • D.CONFIG_PARAM: 22
    • D.CRYPTO_KEY: 4
    • D.CRYPTO_KEYS: 18
    • D.CRYPTO_KEYS_PROTECTION_PWD: 3
    • D.SECURITY_POLICIES: 23
    • D.SOFTWARE: 4
    • D.SOFTWARES: 3
    • D.SUPERVISION_DATA: 3
    • D.SWUPDATE_PUBLICKEYS: 5
    • D.TIME_BASE: 8
    • D.TOPOLOGIC_INFO: 5
  • O:
    • O.AUDIT: 12
    • O.AUDIT_PROTECTION: 6
    • O.AUTHENTICATION_FAILURE: 4
    • O.CRYPTOPERIOD: 4
    • O.CRYPTO_REGULATION: 7
    • O.DATA_ERASURE: 6
    • O.DISPLAY_BANNER: 6
    • O.FLOW_PARTITIONING: 5
    • O.KEYS_INJECTION: 5
    • O.LED: 1
    • O.LOCAL_DATA_PROTECTION: 11
    • O.MANAGEMENT: 7
    • O.POL_ENFORCEMENT: 6
    • O.POL_VIEW: 7
    • O.PROTECTED_COMMUNICATIONS: 11
    • O.RESIDUAL_INFORMATION_CLEAR: 6
    • O.ROLES: 4
    • O.SELF_TEST: 7
    • O.SESSION_LOCK: 6
    • O.SOFTWARE_UPDATES: 5
    • O.SUPERVISION: 5
    • O.SUPERVISION_IMPACT: 4
    • O.SYSTEM_MONITORING: 1
    • O.TIME_BASE: 5
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
    • O.VIEW: 5
    • O.VISUAL: 1
    • O.VISUAL_ALARMS: 5
  • OE:
    • OE.ACCESS_CONTROL_CEC: 3
    • OE.ACCESS_CONTROL_FPD: 3
    • OE.ACCESS_CONTROL_NTP_SERVER: 2
    • OE.ACCESS_CONTROL_SF: 2
    • OE.ACCESS_CONTROL_SGC: 3
    • OE.ACCESS_CONTROL_SGL: 2
    • OE.ALARM: 3
    • OE.AUDIT_ANALYSIS: 2
    • OE.AUDIT_MNGT: 3
    • OE.AUDIT_RECORD_SGC: 5
    • OE.CEC_CRYPTO_REGULATION: 6
    • OE.DISPLAY_BANNER_SGC: 3
    • OE.KEYS_TRANSPORTATION: 1
    • OE.KEY_TRANSPORTATION: 2
    • OE.LINUX_GUIDANCE: 3
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NTP_SERVER_LOCATION: 2
    • OE.PHYSICAL: 1
    • OE.PHYSICAL_ENVIRONMENT_CEC: 3
    • OE.PHYSICAL_ENVIRONMENT_FPD: 3
    • OE.PHYSICAL_ENVIRONMENT_NTP_SERVER: 2
    • OE.PHYSICAL_ENVIRONMENT_SF: 2
    • OE.PHYSICAL_ENVIRONMENT_SGC: 3
    • OE.PHYSICAL_ENVIRONMENT_SGL: 2
    • OE.PHYSICAL_ENVIRONMENT_TOE: 3
    • OE.POLICIES_CONTINUITY: 3
    • OE.SECURED_CEC: 3
    • OE.SECURED_FPD: 2
    • OE.SECURED_NTP_SERVER: 3
    • OE.SECURED_SGC: 3
    • OE.SECURED_SGL: 2
    • OE.SGC_TO_FRONT-END: 3
    • OE.SGL_CONNECTION: 4
    • OE.STAND_ALONE_CEC: 3
    • OE.SW_PROTECTION: 3
    • OE.SW_UPDATE_KEY: 3
    • OE.TOE_INTEGRITY: 8
    • OE.TOE_TRANSPORTATION: 3
    • OE.TRUSTED_ADMIN: 6
    • OE.TRUSTED_NETWORKS: 5
  • R:
    • R.ADMINISTRATOR: 13
    • R.OPERATOR: 6
    • R.SGC: 8
    • R.SGL: 1
  • T:
    • T.ADMIN_ERROR: 4
    • T.RESIDUAL_DATA: 3
    • T.TIME_BASE: 3
    • T.TSF_FAILURE: 4
    • T.UNAUTHORISED_ACCESS: 3
    • T.UNAUTHORISED_UPDATE: 3
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 4
    • T.USER_DATA_REUSE: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Thales:
    • Thales: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • AES_competition:
    • AES:
      • AES: 17
      • AES-128: 1
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 6
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-384: 2
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 2
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 71
    • IKEv1: 8
    • IKEv2: 27
  • IPsec:
    • IPsec: 5
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 41
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RBG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • GCM:
    • GCM: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • FIPS:
    • FIPS 180-3: 4
    • FIPS 186-4: 1
    • FIPS 197: 4
    • FIPS 198-1: 2
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 2
    • SP 800-107: 1
  • RFC:
    • RFC 1042: 1
    • RFC 1213: 1
    • RFC 2408: 1
    • RFC 2409: 1
    • RFC 3566: 4
    • RFC 3602: 3
    • RFC 4106: 1
    • RFC 4109: 1
    • RFC 4303: 2
    • RFC 4868: 3
    • RFC 5639: 1
    • RFC 5903: 1
    • RFC 5996: 4
    • RFC 894: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: KYOCERA MITA Corporation
  • /CreationDate: D:20111007112509+09'00'
  • /Creator: CubePDF
  • /Keywords: Security Target
  • /ModDate: D:20111007112514+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) Japan Version Security Target
  • pdf_file_size_bytes: 341566
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.3
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.04
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 942738
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 128
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different