name |
Data Security Kit (E) Software Type II V1.00J |
MISTRAL VS9 (Software v9.2.3.5 / Hardware IP9001 & IP9010) (ANSSI-CC-2025/06) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
active |
not_valid_after |
01.10.2015 |
12.02.2030 |
not_valid_before |
28.09.2010 |
12.02.2025 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_06fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0268_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_06fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0268_est-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_06en.pdf |
manufacturer |
KYOCERA MITA Corporation |
Thales |
manufacturer_web |
https://www.kyoceramita.com/ |
|
security_level |
EAL3 |
EAL4+, ALC_FLR.3 |
dgst |
dfd674b20f0de202 |
d8b3b6188c1ed69c |
heuristics/cert_id |
JISEC-CC-CRP-C0268 |
ANSSI-CC-2025/06 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.00 |
9.2.3.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0268
- certification_date: 01.09.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0268_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 520i - TASKalfa 420i This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Data Security Kit (E) Software Type II
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0268_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0268_est.pdf
- toe_version: V1.00J
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2015
- supplier: KYOCERA MITA Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0268_it9265.html
- toe_japan_name: Data Security Kit (E) Software Type II V1.00J
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
Certificat-ANSSI-CC-2025_06fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20250213160255+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20250213160309+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 143188
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0268_erpt.pdf |
ANSSI-CC-2025_06fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0268-01: 1
- Certification No. C0268: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
- T:
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20101215173625+09'00'
- /ModDate: D:20101215173625+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 183868
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
|
pdf_data/st_filename |
c0268_est-1.pdf |
ANSSI-Cible-CC-2025_06en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- NL:
- CC-01: 1
- CC-02: 2
- CC-03: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL3: 1
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 10
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 5
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 1
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_FLR.3: 7
- ALC_LCD.1: 4
- ALC_TAT.1: 4
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 4
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
- FAU:
- FAU_GEN: 16
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 6
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG_EXT: 10
- FAU_STG_EXT.1: 13
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 4
- FAU_STG_EXT.2: 2
- FCO:
- FCO_CPC_EXT: 14
- FCO_CPC_EXT.1: 12
- FCO_CPC_EXT.1.1: 2
- FCO_CPC_EXT.1.2: 2
- FCO_CPC_EXT.1.3: 2
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 54
- FCS_CKM.1.1: 1
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 26
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 13
- FCS_CKM_EXT.5: 17
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.5.3: 1
- FCS_COP: 120
- FCS_COP.1: 21
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 21
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 10
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.2: 2
- FCS_TLSC_EXT.2.3: 2
- FCS_TLSC_EXT.2.4: 2
- FCS_TLSC_EXT.2.5: 2
- FCS_TLSS_EXT: 4
- FCS_TLSS_EXT.2: 6
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 2
- FCS_TLSS_EXT.2.3: 2
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 2
- FCS_TLSS_EXT.2.6: 2
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC: 6
- FDP_ETC.2: 4
- FDP_IFC: 19
- FDP_IFC.1: 9
- FDP_IFF: 16
- FDP_IFF.1: 14
- FDP_ITC: 13
- FDP_ITC.1: 19
- FDP_ITC.2: 29
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 2
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 10
- FIA_UAU_EXT.2.1: 2
- FIA_UIA: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 14
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 5
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 10
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_PTD: 1
- FPT_RCV.1: 5
- FPT_RCV.1.1: 1
- FPT_RCV.2: 5
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_SDP_EXT: 3
- FPT_SDP_EXT.2: 10
- FPT_SDP_EXT.2.1: 2
- FPT_SDP_EXT.2.2: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 3
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 16
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TDC: 11
- FPT_TDC.1: 7
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 11
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 18
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 10
- FTP_TRP.1: 11
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 4
- A.LOCATION: 5
- A.NETWORK: 5
- O:
- OE:
- OE.CE: 3
- OE.LOCATION: 3
- OE.NETWORK: 3
- T:
|
- A:
- A.ACCESS_CONTROL_MANAGEMENT_DEVICES: 1
- A.ADMINISTRATION_NETWORK: 1
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.ALARM: 1
- A.AUDIT: 2
- A.BIOS_PASSWORD: 2
- A.DATA_TRANSPORTATION: 2
- A.EXTERNAL_KEYS: 1
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PERSISTENT_ASSETS_PROTECTION: 2
- A.PHYSICAL_ENV_MANAGEMENT_DEVIC: 1
- A.PHYSICAL_ENV_MANAGEMENT_DEVICES: 1
- A.PHYSICAL_PROTECTION: 1
- A.POLICIES_CONTINUITY: 2
- A.REGULAR_UPDATES: 2
- A.SECURED_MANAGEMENT_DEVICES: 2
- A.SENSITIVE_DATA_ERASURE: 1
- A.SS_MMC_TO_TOE: 1
- A.TRUSTED_ADMINISTRATOR: 2
- O:
- O.AUDIT: 15
- O.AUDIT_PROTECTION: 5
- O.AUTHENTICATION_FAILURE: 10
- O.BOOT_CONTROL: 5
- O.CERTIFICATE_INJECTION: 4
- O.CRYPTO_PERIOD: 9
- O.CRYPTO_REGULATION: 7
- O.DATA_ERASURE: 9
- O.DISPLAY_BANNER: 6
- O.LOCAL_DATA_PROTECTION: 15
- O.MANAGEMENT: 7
- O.POL_DEFAULT: 13
- O.POL_FILTERING: 8
- O.PROTECTED_COMMUNICATION: 3
- O.PROTECTED_COMMUNICATIONS: 13
- O.RESIDUAL_INFORMATION_CLEA: 1
- O.RESIDUAL_INFORMATION_CLEAR: 4
- O.ROLES: 12
- O.SELF_TEST: 12
- O.SESSION_LOCK: 4
- O.SOFTWARE_UPDATES: 9
- O.SUPERVISION: 6
- O.SUPERVISION_IMPACT: 9
- O.TIME_BASE: 4
- O.TOE_REDUNDANCY: 4
- O.VIEW_RULES: 12
- OE:
- OE.ACCESS_CONTROL_MANAGE: 1
- OE.ACCESS_CONTROL_MANAGEMENT_DEVICE: 2
- OE.ACCESS_CONTROL_MANAGEMENT_DEVICES: 3
- OE.ADMIN_CREDENTIALS_SECUR: 1
- OE.ADMIN_CREDENTIALS_SECURE: 3
- OE.ALARM: 3
- OE.AUDIT: 2
- OE.AUDIT_RECORD: 3
- OE.BIOS_PASSWORD: 2
- OE.DATA_TRANSPORTATION: 5
- OE.EXTERNAL_KEYS: 2
- OE.LMGT_CONNECTION: 5
- OE.NO_GENERAL_PURPOSE: 2
- OE.NO_THRU_TRAFFIC_PROTECTION: 2
- OE.PHYSICAL: 2
- OE.PHYSICAL_ENV_MANAGEMEN: 1
- OE.PHYSICAL_ENV_MANAGEMENT_DEVICES: 4
- OE.POLICIES_CONTINUITY: 2
- OE.SECURED_MANAGEMENT_DE: 1
- OE.SECURED_MANAGEMENT_DEVICES: 4
- OE.SECURE_PERSISTENT_ASSET: 2
- OE.SS_MMC_TO_TOE: 5
- OE.TIME_TOE: 3
- OE.TOE_DATA_ERASURE: 5
- OE.TOE_INTEGRITY: 7
- OE.TOE_PRODUCTION: 3
- OE.TRUSTED_ADMIN: 3
- OE.UPDATES: 4
- T:
- T.MISUSE: 5
- T.PASSWORD_CRACKING: 5
- T.RESIDUAL_DATA: 5
- T.SECURITY_FUNCTIONALITY: 2
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 3
- T.SECURITY_FUNCTIONALITY_FAILURE: 3
- T.TIME_BASE: 3
- T.TOE_CAPTURE: 5
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
- T.UNDETECTED_ACTIVITY: 5
- T.UNTRUSTED_COMMUNICATI: 2
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 3
- T.UPDATE_COMPROMISE: 5
- T.USER_DATA_REUSE: 3
- T.WEAK_AUTHENTICATION_EN: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 3
- T.WEAK_CRYPTOGRAPHY: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA256: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 24
- IKEv1: 5
- IKEv2: 23
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 4
- SSL 2.0: 1
- SSL 3.0: 2
- SSL2.0: 1
- TLS:
- TLS: 55
- TLS 1.0: 2
- TLS 1.1: 4
- TLS 1.2: 5
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- NIST:
- secp256r1: 11
- secp384r1: 2
- secp521r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 3
- PKCS:
- RFC:
- RFC 2131: 2
- RFC 2986: 2
- RFC 4106: 2
- RFC 4109: 1
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 1
- RFC 4346: 2
- RFC 4868: 3
- RFC 4945: 2
- RFC 5246: 4
- RFC 5280: 5
- RFC 5282: 2
- RFC 5759: 2
- RFC 6125: 2
- RFC 6960: 4
- RFC 7296: 3
- RFC5289: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Out of scope: 1
- System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9 MISTRAL VS9 IPSEC GATEWAY SOFTWARE DUAL USE: 1
- of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. The Mistral Management Center device: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20101129104216+09'00'
- /Creator: CubePDF
- /ModDate: D:20101129104216+09'00'
- /Producer: CubePDF
- /Title: Data Security Kit (E) Software Type II Japan Security Target
- pdf_file_size_bytes: 325118
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: ERIC AUGE
- /CreationDate: D:20250128123410+01'00'
- /ModDate: D:20250128123410+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - ST_lite_GATEWAY_IPSEC_MISTRAL_VS9_63535113lite-306_AF
- pdf_file_size_bytes: 2522320
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 134
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |