Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J
JISEC-CC-CRP-C0308
NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)PVG with IC Dedicated Software
BSI-DSZ-CC-0837-V2-2014
name TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)PVG with IC Dedicated Software
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 01.09.2016 25.10.2019
not_valid_before 31.08.2011 24.10.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0308_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0837V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0308_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0837V2b_pdf.pdf
manufacturer KYOCERA MITA Corporation NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.kyoceramita.com/ https://www.nxp.com
security_level EAL3 EAL6+, ALC_FLR.1, ASE_TSS.2
dgst bc7181356569d9c6 a8b768bf10dd60b7
heuristics/cert_id JISEC-CC-CRP-C0308 BSI-DSZ-CC-0837-V2-2014
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:h:kyocera:taskalfa_3500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_5500i:-:*:*:*:*:*:*:*, cpe:2.3:h:kyocera:taskalfa_4500i:-:*:*:*:*:*:*:* {}
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, APE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 1.00 052
heuristics/report_references/directly_referenced_by {} NSCIB-CC-12-36243-CR2, ANSSI-CC-2015/64, ANSSI-CC-2016/28, ANSSI-CC-2016/19, ANSSI-CC-2016/34, ANSSI-CC-2016/48, ANSSI-CC-2015/03, ANSSI-CC-2016/46, ANSSI-CC-2016/18, ANSSI-CC-2016/30, ANSSI-CC-2015/65, ANSSI-CC-2015/02, BSI-DSZ-CC-0892-V2-2015, ANSSI-CC-2015/63, ANSSI-CC-2015/01, ANSSI-CC-2015/62, ANSSI-CC-2016/21, ANSSI-CC-2015/04, ANSSI-CC-2015/76, ANSSI-CC-2016/36, ANSSI-CC-2016/35, ANSSI-CC-2016/63, ANSSI-CC-2015/77, ANSSI-CC-2016/47, ANSSI-CC-2015/78, ANSSI-CC-2016/17, ANSSI-CC-2016/20, ANSSI-CC-2015/79, ANSSI-CC-2015/08, ANSSI-CC-2016/45, ANSSI-CC-2016/37
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2015/37, ANSSI-CC-2016/04, NSCIB-CC-12-36243-CR2, ANSSI-CC-2015/64, ANSSI-CC-2016/28, ANSSI-CC-2016/03, ANSSI-CC-2016/19, ANSSI-CC-2016/34, ANSSI-CC-2016/48, ANSSI-CC-2015/03, ANSSI-CC-2016/46, ANSSI-CC-2016/18, ANSSI-CC-2015/44, ANSSI-CC-2016/30, ANSSI-CC-2015/65, ANSSI-CC-2015/02, BSI-DSZ-CC-0892-V2-2015, ANSSI-CC-2015/63, ANSSI-CC-2015/74, ANSSI-CC-2015/01, ANSSI-CC-2015/62, ANSSI-CC-2016/21, ANSSI-CC-2015/04, ANSSI-CC-2015/76, ANSSI-CC-2016/36, ANSSI-CC-2016/35, ANSSI-CC-2015/75, ANSSI-CC-2015/38, ANSSI-CC-2016/63, ANSSI-CC-2015/77, ANSSI-CC-2016/47, ANSSI-CC-2015/78, ANSSI-CC-2016/17, ANSSI-CC-2016/20, ANSSI-CC-2015/79, ANSSI-CC-2015/08, ANSSI-CC-2016/45, ANSSI-CC-2016/37
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0308
  • certification_date: 01.08.2011
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0308_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 3500i - TASKalfa 4500i - TASKalfa 5500i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E)
    • product_type: Data protection function in digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0308_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0308_est.pdf
    • toe_version: V1.00J
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.09.2016
  • supplier: KYOCERA MITA Corporation
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0308_it0326.html
  • toe_japan_name: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) V1.00J
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2015/64, ANSSI-CC-2016/28, ANSSI-CC-2016/19, ANSSI-CC-2016/34, ANSSI-CC-2016/48, ANSSI-CC-2016/46, ANSSI-CC-2016/18, ANSSI-CC-2015/65, ANSSI-CC-2015/63, ANSSI-CC-2015/62, ANSSI-CC-2016/21, ANSSI-CC-2015/76, ANSSI-CC-2016/36, ANSSI-CC-2016/35, ANSSI-CC-2016/63, ANSSI-CC-2015/77, ANSSI-CC-2016/47, ANSSI-CC-2015/78, ANSSI-CC-2016/17, ANSSI-CC-2016/20, ANSSI-CC-2015/79, ANSSI-CC-2016/45, ANSSI-CC-2016/37
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2015/64, ANSSI-CC-2016/28, ANSSI-CC-2016/19, ANSSI-CC-2016/34, ANSSI-CC-2016/48, ANSSI-CC-2016/46, ANSSI-CC-2016/18, ANSSI-CC-2015/65, ANSSI-CC-2015/63, ANSSI-CC-2015/62, ANSSI-CC-2016/21, ANSSI-CC-2015/76, ANSSI-CC-2016/36, ANSSI-CC-2016/35, ANSSI-CC-2016/63, ANSSI-CC-2015/77, ANSSI-CC-2016/47, ANSSI-CC-2015/78, ANSSI-CC-2016/17, ANSSI-CC-2016/20, ANSSI-CC-2015/79, ANSSI-CC-2016/45, ANSSI-CC-2016/37
heuristics/protection_profiles {} f6d23054061d72ba
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/report_filename c0308_erpt.pdf 0837V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 and ASE_TSS.2 SOGIS Recognition Agreement
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0837-V2-2014
    • cert_item: NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)/PVG with IC Dedicated Software
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0308-01: 1
    • Certification No. C0308: 1
  • DE:
    • BSI-DSZ-CC-0837-2013-MA-01: 3
    • BSI-DSZ-CC-0837-V2-2014: 21
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 2: 1
    • EAL 4: 4
    • EAL 5: 3
    • EAL 6: 4
    • EAL 6 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 7
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 2
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 2
    • ADV_SPM: 1
    • ADV_SPM.1: 2
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 2
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 3
    • ALC_FLR.1: 6
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 3
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 2
    • ATE_COV.3: 2
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 3
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 2
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.CE: 1
    • A.LOCATION: 1
    • A.NETWORK: 2
  • O:
    • O.C: 6
  • R:
    • R.O: 6
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • NXP:
    • NXP: 20
    • NXP Semiconductors: 22
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 2
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 6
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • physical probing: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 2
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 01 October 2014, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 1, 02 September 2014, ETR FOR: 1
    • Configuration List, Version 01.50, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60x080/052/040PVC, Customer specific Appendix of the: 1
    • EVALUATION (ETR-COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE: 8 specifically • AIS 25, Version 8, Anwendung der CC auf: 1
    • List, Version 01.40, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60x080/052/040PVC, Appendix of the Configuration List for: 1
    • NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)/PVG Security Target, NXP Semiconductors (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
    • and Operation Manual, Version 1.1, 26 June 2014, NXP Semiconductors, Business Unit Identification (confidential document) 23 / 36 Certification Report BSI-DSZ-CC-0837-V2-2014 This page is intentionally left blank. 24 : 1
    • evaluation, Version 01.40, 05 August 2014, NXP Semiconductors, Business Unit Identification (confidential document) [12] NXP Secure Smart Card Controller P60x040/052/080 VC/VG, Information on Guidance and Operation: 1
pdf_data/report_metadata
  • /CreationDate: D:20111017144607+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20111017144639+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 238454
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141110104311+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard"
  • /ModDate: D:20141111083907+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0837-V2-2014
  • pdf_file_size_bytes: 783130
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename c0308_est.pdf 0837V2b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 5
  • EAL:
    • EAL 6: 2
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL6: 36
    • EAL6 augmented: 3
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.4: 3
    • ADV_FSP.5: 11
    • ADV_IMP: 1
    • ADV_IMP.2: 4
    • ADV_INT.3: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 4
    • ALC_CMC.4: 3
    • ALC_CMC.5: 4
    • ALC_CMS: 4
    • ALC_CMS.4: 3
    • ALC_CMS.5: 5
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FAU:
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.4: 3
    • FCS_COP.1: 23
    • FCS_COP.1.1: 2
    • FCS_RNG.1: 9
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 35
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 32
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_FLS.1: 1
    • FDP_IFC.1: 10
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_ITT: 1
    • FDP_ITT.1: 6
    • FDP_ITT.5: 11
    • FDP_SDI.1: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 4
    • FMT_MSA.1: 25
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
  • FPT:
    • FPT_FLS.1: 7
    • FPT_ITT.1: 14
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 7
  • FRU:
    • FRU_FLT.2: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.CE: 3
    • A.LOCATION: 4
    • A.NETWORK: 4
  • O:
    • O.ENCRYPT: 4
    • O.OVERWRITE: 5
  • OE:
    • OE.CE: 2
    • OE.LOCATION: 2
    • OE.NETWORK: 2
  • O:
    • O.CUST_RECONFIG: 6
    • O.EEPROM_INTEGRITY: 4
    • O.FM_FW: 9
    • O.HW_AES: 7
    • O.INTEGRITY_CHK: 7
    • O.MEM_ACCESS: 9
    • O.RND: 3
    • O.SFR_ACCESS: 9
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • NXP:
    • NXP: 116
    • NXP Semiconductors: 33
  • Philips:
    • Philips: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • AES_competition:
    • AES:
      • AES: 33
  • DES:
    • 3DES:
      • TDEA: 3
      • TDES: 1
      • Triple-DEA: 1
      • Triple-DES: 9
    • DES:
      • DEA: 2
      • DES: 16
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 14
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
    • SmartMX2: 18
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 13
    • fault injection: 3
    • malfunction: 3
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 13
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 197: 3
    • FIPS PUB 46: 1
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 14443: 20
    • ISO/IEC 18092: 2
    • ISO/IEC 7816: 22
    • ISO/IEC 7816-3: 1
pdf_data/st_metadata
  • /Author: KYOCERA MITA Corporation
  • /CreationDate: D:20111007112509+09'00'
  • /Creator: CubePDF
  • /Keywords: Security Target
  • /ModDate: D:20111007112514+09'00'
  • /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
  • /Subject:
  • /Title: TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i Data Security Kit (E) Japan Version Security Target
  • pdf_file_size_bytes: 341566
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
  • /Author: NXP Semiconductors
  • /CreationDate: D:20140821152255+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+
  • /ModDate: D:20140821154606+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: P60x080/052/040PVC(Y/Z/A)/PVG
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 929678
  • pdf_hyperlinks: http://www.nxp.com/, mailto:[email protected]
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 82
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different