| name |
TOSHIBAe-STUDIO5528A/6528Aall of the above with FAX Unit and FIPS Hard Disk KitSYS V1.0 |
Keyper Hardware Security Module (HSM) v2.0:a) Enterprise (Hardware: 9720, Software: 011126)b) Professional (Hardware: 9720, Software: 010405) |
| category |
Multi-Function Devices |
Key Management Systems |
| scheme |
JP |
MY |
| status |
active |
archived |
| not_valid_after |
01.09.2027 |
04.01.2018 |
| not_valid_before |
01.09.2022 |
04.01.2013 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0760_eimg.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0760_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr-ISCB-5-RPT-C037-v1a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0760_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-AEP_Keyper_EAL4_ASE_1_3.pdf |
| manufacturer |
Toshiba TEC Corporation |
AEP Networks Ltd. |
| manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.aepnetworks.com/ |
| security_level |
{} |
EAL4+, AVA_VAN.5 |
| dgst |
ccd47bfefea89539 |
5f49aadb6b4baf28 |
| heuristics/cert_id |
JISEC-CC-CRP-C0760-01-2022 |
ISCB-5-RPT-C037-CR-v1a |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
1.0 |
2.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0760
- certification_date: 01.09.2022
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0760
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000jfc-att/c0760_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan and fax. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Data Encryption Trusted Communication Function TSF Data Protection TSF Self Protection Software Update Verification Audit Function Function which separate PSTN Fax and Network
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: TOSHIBA e-STUDIO5528A/6528A all of the above with FAX Unit and FIPS Hard Disk Kit
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000jfc-att/c0760_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000jfc-att/c0760_est.pdf
- toe_version: SYS V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date:
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: TOSHIBA e-STUDIO5528A / 6528A all of the above with FAX Unit and FIPS Hard Disk KitSYS V1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0760_it2809.html
- toe_overseas_name: TOSHIBA e-STUDIO5528A / 6528A all of the above with FAX Unit and FIPS Hard Disk KitSYS V1.0
|
- cert_no: 2013-001-C037
- certification_date: 04.01.2013
- developer: AEP Networks Ltd.
- enhanced:
- assurance_level: EAL4+ AVA_VAN.5
- category: Key Management System
- cert_id: C037
- certification_date: 04.01.2013
- developer: AEP Networks Ltd. Knaves Beech Business Centre,Loudwater, Buckinghamshire,HP10 9UT,UNITED KINGDOM. URL: http://www.aepnetworks.com/Email: [email protected]: +44 1628 642 600Fax: +44 1628 642 605
- expiration_date: 04.01.2018
- mutual_recognition: CCRA
- product: Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/ISCB-5-RPT-C037-CR-v1a.pdf
- scope: Keyper Hardware Security Module (HSM) v2.0 or the Target of Evaluation (TOE) is a dedicated hardware product which provides secure digital signature services, cryptographic services and key management services to applications that reside on physically separate host computer systems. The TOE is a secure module that is contained within an outer casing. The outer casing includes a Keypad, LCD screen, smart card reader and a number of external ports; they are out of the evaluation scope. The TOE is tamper reactive; and has been validated against the requirements for the FIPS PUB 140-2 at level 4. Keyper Hardware Security Module (HSM) v2.0 is intended for use in a dedicated network with devices and applications that make use of its cryptographic functions. Keyper Hardware Security Module (HSM) v2.0 should be provided appropriate physical and logical protections. The TOE encompasses two models: AEP Keyper Enterprise (Hardware: 9720, Software: 011126) and AEP Keyper Professional (Hardware: 9720, Software: 010405). Both models share the same features and architecture (the only difference is performance), therefore both models shall be considered together. Two additional “High Availability” models also exist, however they are out of the scope of this evaluation. The functions of the TOE that are within the scope of evaluation covering: Secure generation, distribution and destruction of cryptographic keys. Secure storage and management of keys throughout their lifecycle. User authentication to facilitate controlled access to cryptographic key management and TOE management functions by trusted personnel only. Security management to enable role-based management of the core functions of the TOE. Access control for key management functions to ensure that only specified roles are permitted to perform defined tasks. Auditing of security relevant events to provide suitable accountability. Self-test of the core cryptographic functions and algorithms of the TOE. Tamper protection to ensure that the TOE is adequately protected from unauthorised physical access.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C037/AEP_Keyper_EAL4_ASE_1.3.pdf
- type: Web based frontend to the Microsoft Certification Authority (CA) services
- expiration_date: 04.01.2018
- level: EAL4+ AVA_VAN.5
- product: Keyper Hardware Security Module (HSM) v2.0: a) Enterprise (Hardware: 9720, Software: 011126) b) Professional (Hardware: 9720, Software: 010405)
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/98
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
b2cfec7a92fa2940 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
{} |
| pdf_data/cert_filename |
c0760_eimg.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0760-01-2022: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20221202092610+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20221202092713+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 86544
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
|
| pdf_data/report_filename |
c0760_erpt.pdf |
cr-ISCB-5-RPT-C037-v1a.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0760-01-2022: 1
|
- MY:
- ISCB-5-RPT-C037-CR-v1a: 30
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 1
- FCS_COP: 3
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACF: 7
- FDP_RIP.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_SOS.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMF.1.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITC.1: 1
- FPT_ITI.1: 1
- FPT_PHP.2: 1
- FPT_PHP.3: 1
- FPT_RCV.1: 1
- FPT_STM.1: 1
- FPT_TST.1: 1
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
|
| pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-512: 1
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 140-2: 2
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
- PKCS:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20230404160655+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /ModDate: D:20230404161655+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20230329235525
- /Subject:
- /Title:
- pdf_file_size_bytes: 1309626
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /Author: ISCB Department
- /Category: PUBLIC
- /Caveat: FINAL
- /Classification: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20130109091227+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer: AEP Networks
- /Document Type: REPORT
- /Identifier: ISCB-5-RPT-C037-CR-v1a
- /Index: MyCB_TMP_011
- /Keywords: Keyper
- /ModDate: D:20130109091238+08'00'
- /Phase: Release
- /Producer: Adobe PDF Library 10.0
- /Project Code: C037
- /Released: 4 January 2013
- /ST Title: Security Target for the Keyper Hardware Security Module (HSM) v2.0
- /ST Version: v1.3
- /SourceModified: D:20130109011207
- /Sponsor: AEP Networks
- /Subject: Keyper Hardware Security Module (HSM) v2.0
- /TOE Name: Keyper Hardware Security Module (HSM) v2.0
- /TOE Version: version 2.0
- /Title: C037 Certification Report
- /Version: v1a
- pdf_file_size_bytes: 442113
- pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
| pdf_data/st_filename |
c0760_est.pdf |
st-AEP_Keyper_EAL4_ASE_1_3.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 3
- ASE_CCL.1: 1
- ASE_ECD: 3
- ASE_ECD.1: 1
- ASE_INT: 3
- ASE_INT.1: 1
- ASE_OBJ: 3
- ASE_OBJ.2: 1
- ASE_REQ: 8
- ASE_REQ.2: 1
- ASE_SPD: 3
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 14
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 7
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 43
- FCS_CKM.1.1: 2
- FCS_CKM.4: 13
- FCS_CKM.4.1: 2
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.4: 27
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 127
- FCS_COP.1.1: 6
- FCS_ITC.1: 1
- FCS_KDF_EXT: 4
- FCS_KDF_EXT.1: 20
- FCS_KDF_EXT.1.1: 3
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 4
- FCS_PCC_EXT.1: 1
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 35
- FCS_RBG_EXT.1.1: 3
- FCS_RBG_EXT.1.2: 3
- FCS_RGB_EXT.1: 2
- FCS_SMC_EXT: 2
- FCS_SMC_EXT.1: 16
- FCS_SMC_EXT.1.1: 2
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 2
- FCS_TLS_EXT.1: 22
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 2
- FDP_DSK_EXT.1: 8
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 2
- FDP_FXS_EXT.1: 8
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 4
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 18
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 19
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC_EXT.1: 2
- FTP_TRP.1: 27
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FCS:
- FCS_CKM.1: 24
- FCS_CKM.1.1: 1
- FCS_CKM.2: 20
- FCS_CKM.2.1: 1
- FCS_CKM.4: 24
- FCS_CKM.4.1: 1
- FCS_COP: 37
- FCS_COP.1: 4
- FCS_RND: 2
- FCS_RND.1: 15
- FCS_RND.1.1: 2
- FCS_RND.1.2: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 6
- FDP_ACF: 22
- FDP_ACF.1: 4
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 17
- FDP_IFC.1: 6
- FDP_IFF: 21
- FDP_IFF.1: 3
- FDP_IFF.3: 2
- FDP_IFF.4: 2
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.3: 3
- FMT_MTD: 20
- FMT_MTD.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITC: 1
- FPT_ITC.1: 7
- FPT_ITC.1.1: 1
- FPT_ITI.1: 9
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_PHP.1: 1
- FPT_PHP.2: 13
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_RCV.1: 8
- FPT_RCV.1.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST.1: 21
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 12
- O.FAX_NET_SEPARATION: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 3
- O.STORAGE_ENCRYPTION: 8
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 18
- AES-: 1
- AES-256: 2
- constructions:
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 2
- SHA-512: 13
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 45
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- TLS1.2: 3
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 3
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 3
- physical tampering: 7
- SCA:
- Side-channel: 5
- Side-channels: 2
- side channel: 1
- side-channel: 3
- side-channels: 4
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 186-4: 2
- FIPS PUB 197: 1
- FIPS PUB 198-1: 2
- FIPS140-2: 1
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 10118: 4
- ISO/IEC 18031:2011: 6
- ISO/IEC 18033-3: 1
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-132: 1
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-56B: 1
- NIST SP 800-90A: 7
- NIST SP 800-90B: 1
- RFC:
- RFC 2246: 1
- RFC 2818: 3
- RFC 4346: 1
- RFC 5246: 3
- RFC2818: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS 140-2: 2
- FIPS PUB 140-2: 2
- FIPS PUB 186-2: 5
- NIST:
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: TOSHIBA TEC
- /CreationDate: D:20230403180830+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: HCD-PP
- /ModDate: D:20230403180830+09'00'
- /Producer: iText® Core 7.2.3 (AGPL version) ©2000-2022 iText Group NV
- /Subject: セキュリティーターゲット
- /Title: TOSHIBA e-STUDIO5528A/6528A all of the above with FAX Unit and FIPS Hard Disk Kit Security Target
- pdf_file_size_bytes: 1298534
- pdf_hyperlinks: https://www.rambus.com/intel-ivy-bridge-random-number-generator/
- pdf_is_encrypted: True
- pdf_number_of_pages: 86
|
- /Author: Doug Stuart
- /Category: ASE
- /Company: stratsec
- /CreationDate: D:20121218144137+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /DEV_Fullname: AEP Networks
- /DEV_Shortname: AEP
- /DEV_Sponsor: David Miller
- /DOC_Classification: COMMERCIAL-IN-CONFIDENCE
- /DOC_Id: KPR_EAL4_ASE
- /DOC_Phase: DRAFT
- /DOC_Released: 13-DEC-2012
- /DOC_Title: Keyper HSM EAL4 Security Target
- /DOC_Version: 1.3
- /EVAL_CC: 3.1 (Rev 3)
- /EVAL_EAL: EAL4
- /ModDate: D:20121218144151+08'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20121213065300
- /Subject: Security Target
- /TOE_Fullname: Keyper Hardware Security Module Version 2.0
- /TOE_Shortname: Keyper HSM
- /TOE_Version: 2.0
- /Title: Keyper Hardware Security Module (HSM) v2.0
- pdf_file_size_bytes: 737530
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 77
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |