Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.4.R11
CSEC2019023
EPSON LX-10050MF/LX-10050KF/LX-7550MF/LX-6050MF/WF-C21000/WF-C20750/WF-C20600 with FAX 2.00
JISEC-CC-CRP-C0700-01-2021
name Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.4.R11 EPSON LX-10050MF/LX-10050KF/LX-7550MF/LX-6050MF/WF-C21000/WF-C20750/WF-C20600 with FAX 2.00
category Network and Network-Related Devices and Systems Multi-Function Devices
scheme SE JP
not_valid_after 17.02.2026 26.01.2026
not_valid_before 17.02.2021 26.01.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20-%20ALE%20Enterprise.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0700_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Alcatel-Lucent%20Enterprise%20OmniSwitch%20series%206465,%206560,%206860,%206865,%206900,%209900%20with%20AOS%208.6.4.R11.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0700_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Alcatel-Lucent%20Enterprise%20OmniSwitch%20with%20AOS%208.6.R11%20Security%20Target%20for%20EAL2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0700_est.pdf
manufacturer ALE USA Inc SEIKO EPSON CORPORATION
manufacturer_web https://www.al-enterprise.com/ https://www.epson.com/
dgst d5fa8a7a4ee69ffd 727e9aeadc392384
heuristics/cert_id CSEC2019023 JISEC-CC-CRP-C0700-01-2021
heuristics/extracted_versions 8.6.4 2.00
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0700
  • certification_date: 01.01.2021
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0700
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000015ma-att/c0700_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral(MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE Security functions The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: EPSON LX-10050MF/LX-10050KF/ LX-7550MF/LX-6050MF/WF-C21000/ WF-C20750/WF-C20600 with FAX
    • product_type: Multifunction Peripheral
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000015ma-att/c0700_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck9900000015ma-att/c0700_est.pdf
    • toe_version: 2.00
    • vendor: SEIKO EPSON CORPORATION
  • expiration_date:
  • supplier: SEIKO EPSON CORPORATION
  • toe_japan_name: EPSON LX-10050MF / LX-10050KF / LX-7550MF / LX-6050MF / WF-C21000 / WF-C20750 / WF-C20600 with FAX2.00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0700_it0740.html
  • toe_overseas_name: EPSON LX-10050MF / LX-10050KF / LX-7550MF / LX-6050MF / WF-C21000 / WF-C20750 / WF-C20600 with FAX2.00
heuristics/protection_profiles {} 43ce79b420f23a00
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/cert_filename CCRA - ALE Enterprise.pdf c0700_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • SE:
    • CSEC2019023: 1
  • JP:
    • JISEC-CC-CRP-C0700-01-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2+: 1
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/eval_facility
  • atsec:
    • atsec: 1
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210905105009+02'00'
  • /Creator: RICOH MP C4504ex
  • /ModDate: D:20210905113053+02'00'
  • /Producer: RICOH MP C4504ex
  • pdf_file_size_bytes: 911543
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20210316093833+09'00'
  • /Creator: Microsoft® Word for Office 365
  • /ModDate: D:20210316095049+09'00'
  • /Producer: Microsoft® Word for Office 365
  • pdf_file_size_bytes: 131374
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename Certification Report - Alcatel-Lucent Enterprise OmniSwitch series 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.6.4.R11.pdf c0700_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • SE:
    • CSEC2019023: 22
  • JP:
    • JISEC-CC-CRP-C0700-01-2021: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 2
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.SERVICES_RELIABLE: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.INFORMATION_FLOW_POLICY_VIOLATION: 1
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 2
  • Microsoft:
    • Microsoft: 13
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 8
    • SSHv2: 5
  • TLS:
    • SSL:
      • SSL: 1
      • SSLv2.0: 1
      • SSLv3.0: 1
    • TLS:
      • TLS: 6
      • TLS 1.2: 1
      • TLSv1.0: 1
      • TLSv1.1: 5
      • TLSv1.2: 5
  • IPsec:
    • IPsec: 4
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_metadata
  • /Author: MAAVA
  • /CreationDate: D:20210218173433+01'00'
  • /ModDate: D:20210218173433+01'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - Certification Report ALE Omniswitch v2
  • pdf_file_size_bytes: 766005
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author:
  • /CreationDate: D:20210511131831+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /ModDate: D:20210511132137+09'00'
  • /Producer: Adobe PDF Library 15.0
  • /SourceModified: D:20210511032544
  • pdf_file_size_bytes: 338575
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
pdf_data/st_filename Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.R11 Security Target for EAL2.pdf c0700_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 115
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT.1: 8
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP: 62
    • FCS_COP.1: 5
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 13
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT: 9
    • FCS_SSHC_EXT.1: 8
    • FCS_SSHS_EXT: 8
    • FCS_SSHS_EXT.1: 9
    • FCS_TLSC_EXT: 5
    • FCS_TLSC_EXT.2: 9
    • FCS_TLSS_EXT: 6
    • FCS_TLSS_EXT.2: 9
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC: 18
    • FDP_IFC.1: 5
    • FDP_IFC.1.1: 2
    • FDP_IFF: 14
    • FDP_IFF.1: 4
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT.1: 9
    • FIA_PMG_EXT.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 9
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 13
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 20
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 3
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 15
    • FMT_MTD.1: 2
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.2: 17
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 9
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 9
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT.1: 12
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT.1: 9
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 9
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 8
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 9
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 10
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 24
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 24
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 12
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 3
    • A.LIMITED_FUNCTIONALITY: 3
    • A.PHYSICAL_PROTECTION: 3
    • A.REGULAR_UPDATES: 3
    • A.RESIDUAL_INFORMATION: 3
    • A.SERVICES_RELIABLE: 3
    • A.TRUSTED_ADMINISTRATOR: 3
  • O:
    • O.ACCESS_BANNER: 4
    • O.ADMIN_ACCESS: 14
    • O.ADMIN_SESSION: 7
    • O.AUDIT: 12
    • O.COMMUNICATION_CHANNELS: 15
    • O.CRYPTOGRAPHY: 12
    • O.MEDIATE: 16
    • O.SELF_TESTS: 5
    • O.STRONG_PASSWORDS: 8
    • O.TRUSTED_UPDATES: 8
    • O.TSF_DATA_PROTECTION: 10
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 2
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.PHYSICAL: 2
    • OE.RESIDUAL_INFORMATION: 2
    • OE.SERVICES_RELIABLE: 2
    • OE.TRUSTED_ADMIN: 2
    • OE.UPDATES: 2
  • T:
    • T.INFORMATION_FLOW_POLICY_VIOLATION: 2
    • T.PASSWORD_CRACKING: 3
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
    • T.UNDETECTED_ACTIVITY: 3
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
    • T.UPDATE_COMPROMISE: 3
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 2
    • T.WEAK_CRYPTOGRAPHY: 3
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 11
    • D.DOC: 42
    • D.FUNC: 26
    • D.PROT: 8
  • O:
    • O.AUDIT: 5
    • O.AUDIT_ACCESS: 4
    • O.AUDIT_STORAGE: 4
    • O.CONF: 10
    • O.DOC: 10
    • O.FUNC: 5
    • O.INTERFACE: 5
    • O.PROT: 5
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_STORAGE: 2
    • OE.INTERFACE: 3
    • OE.PHISICAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 10
  • Microsoft:
    • Microsoft: 7
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 110
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 5
      • HMAC-SHA-384: 4
      • HMAC-SHA-512: 4
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 18
  • FF:
    • DH:
      • Diffie-Hellman: 13
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-2: 3
      • SHA-256: 18
      • SHA-384: 8
      • SHA-512: 11
      • SHA256: 2
      • SHA384: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 28
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • SSH:
    • SSH: 64
    • SSHv2: 61
  • TLS:
    • SSL:
      • SSL: 4
      • SSL 2.0: 1
      • SSL 3.0: 1
      • SSLv2.0: 2
      • SSLv3.0: 2
    • TLS:
      • TLS: 81
      • TLS 1.0: 1
      • TLS 1.1: 2
      • TLS 1.2: 2
      • TLSv1.0: 2
      • TLSv1.1: 30
      • TLSv1.2: 30
  • IPsec:
    • IPsec: 18
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 15
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CTR:
    • CTR: 5
  • GCM:
    • GCM: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • P-224: 2
    • P-256: 15
    • P-384: 16
    • P-521: 16
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 35
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 186-4: 4
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 3
  • RFC:
    • RFC 6125: 1
    • RFC2986: 3
    • RFC3268: 5
    • RFC3411: 2
    • RFC3526: 4
    • RFC4251: 3
    • RFC4252: 4
    • RFC4253: 4
    • RFC4254: 2
    • RFC4344: 2
    • RFC4346: 3
    • RFC4492: 10
    • RFC5246: 7
    • RFC5280: 5
    • RFC5288: 5
    • RFC5289: 17
    • RFC5591: 2
    • RFC5656: 2
    • RFC5759: 3
    • RFC5953: 2
    • RFC6125: 2
    • RFC6668: 2
    • RFC6960: 3
    • RFC8017: 2
    • RFC8332: 2
    • RFC8422: 2
  • X509:
    • X.509: 18
pdf_data/st_metadata
  • /Author: 0086205
  • /CreationDate: D:20210510172238+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20210510172238+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - ST_en修正.docx
  • pdf_file_size_bytes: 847659
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different