name |
bizhub C754 / bizhub C654 PKI Card System Control Software Version:A2X00Y0-0100-G00-53pki |
Crypto Library V2.7/2.9 on SmartMX P5Cx128/P5Cx145 V0v/ VOB(s) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
13.11.2017 |
01.09.2019 |
not_valid_before |
29.10.2012 |
16.07.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0375_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0750V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0375_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0750V2b_pdf.pdf |
manufacturer |
Konica Minolta Business Technologies, Inc |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.konicaminolta.com/ |
https://www.nxp.com |
security_level |
EAL3 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
e0441e33d942395b |
f05965bff4895d84 |
heuristics/cert_id |
JISEC-CC-CRP-C0375 |
BSI-DSZ-CC-0750-V2-2014 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:konicaminolta:bizhub_c754:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c654:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/indirect_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
0100 |
2.7, 2.9 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0914-2014, BSI-DSZ-CC-0913-2014, BSI-DSZ-CC-0912-2014, NSCIB-CC-13-37760-CR2, BSI-DSZ-CC-0911-2014 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0858-2013 |
heuristics/report_references/indirectly_referenced_by |
{} |
OCSI/CERT/CCL/09/2022/RC, BSI-DSZ-CC-0914-2014, OCSI/CERT/SYS/02/2016/RC, BSI-DSZ-CC-0913-2014, BSI-DSZ-CC-0911-2014, BSI-DSZ-CC-0912-2014, OCSI/CERT/SYS/04/2015/RC, OCSI/CERT/SYS/06/2016/RC, OCSI/CERT/SYS/05/2015/RC, OCSI/CERT/CCL/05/2021/RC, NSCIB-CC-13-37760-CR2, OCSI/CERT/CCL/06/2021/RC, OCSI/CERT/SYS/03/2016/RC, OCSI/CERT/SYS/05/2016/RC |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0858-2013 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0375
- certification_date: 01.10.2012
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0375_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as “MFP”), including the operation control processing and the image data management triggered by the panel of the main body of MFP or through the network. TOE security functionality This TOE mainly provides the following security functions. - Encryption Print Function The function that receives the encrypted print data and can print the print data only with a right IC card. - S/MIME Encryption Function The function to encrypt an image data when transmitting it by e-mail. - Digital Signature Function The function to add the digital signature by using the function of IC card when transmitting an image data by e-mail. - HDD Encryption Function The function to encrypt the data written in HDD by using the function of ASIC. - All Area Overwrite Deletion Function The function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards. - Fax Unit Control Function The function to prevent accessing the internal network using FAX as steppingstone.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: bizhub C754 / bizhub C654 PKI Card System Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0375_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0375_est.pdf
- toe_version: A2X00Y0-0100-G00-53pki
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.11.2017
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub C754 / bizhub C654 PKI Card System Control Software A2X00Y0-0100-G00-53pki
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0375_it1385.html
- toe_overseas_name: bizhub C754 / bizhub C654 PKI Card System Control Software A2X00Y0-0100-G00-53pki
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0914-2014, OCSI/CERT/SYS/02/2016/RC, BSI-DSZ-CC-0913-2014, BSI-DSZ-CC-0912-2014, OCSI/CERT/SYS/04/2015/RC, BSI-DSZ-CC-0911-2014 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0914-2014, OCSI/CERT/SYS/02/2016/RC, BSI-DSZ-CC-0913-2014, BSI-DSZ-CC-0912-2014, OCSI/CERT/SYS/04/2015/RC, BSI-DSZ-CC-0911-2014 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0375_erpt.pdf |
0750V2a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0750-V2-2014
- cert_item: Crypto Library V2.7/2.9 on SmartMX P5Cx128/P5Cx145 V0v/ V0B(s
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0375-01: 1
- Certification No. C0375: 1
|
- DE:
- BSI-DSZ-CC-0750-2011-MA-02: 3
- BSI-DSZ-CC-0750-V2-2014: 23
- BSI-DSZ-CC-0858-2013: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 5: 7
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 2
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 7
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.IC-CARD: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- T:
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 2
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 11
- NXP Semiconductors: 11
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Generic:
- Crypto Library 2.7: 4
- Crypto Library 2.9: 4
- Crypto Library v2.7: 1
- Crypto Library v2.9: 1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- physical probing: 1
- side channel: 1
- side-channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 4
- AIS 37: 1
- AIS 38: 1
- AIS36: 2
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 1
- FIPS 46-3: 7
- FIPS197: 2
- NIST:
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- or through the network. The TOE provides the protection function for the disclosure of the highly confidential documents stored in MFP. This TOE does not support the audit log function. Moreover, against the danger of: 1
|
- ConfidentialDocument:
- Crypto Library V2.7/V2.9 on SmartMX P5Cx128/P5Cx145 according to AIS36, Brightsight (confidential document) [11] Configuration list: • List of Configuration Items for Crypto Library v2.7 on P5Cx128/P5Cx145: 1
- Report Crypto Library V2.7/2.9 on SmartMX P5Cx128/P5Cx145 V0v/ V0B(s) EAL5+, Brightsight, (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 1.0, 26 June 2014, ETR for: 1
- V2.7/2.9 on SmartMX P5Cx128/P5Cx145 V0v/ V0B(s), NXP Semiconductors, Business Unit Identification (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20130123112443+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20130123112510+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 375974
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20140904101745+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, smartcard, Crypto Library V2.7/2.9 on SmartMX P5Cx128/P5Cx145 V0v/ V0B(s), NXP Semiconductors Germany GmbH"
- /ModDate: D:20140904104428+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0750-V2-2014
- pdf_file_size_bytes: 1233357
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
c0375_est.pdf |
0750V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL4: 1
- EAL4+: 2
- EAL5: 29
- EAL5 augmented: 1
- EAL5+: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 2
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 2
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 1
- FCS_CKM: 1
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 5
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 23
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_SOS.1: 16
- FIA_SOS.1.1: 3
- FIA_SSL.3: 1
- FIA_UAU.1: 9
- FIA_UAU.2: 18
- FIA_UAU.2.1: 2
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID.1: 11
- FIA_UID.2: 18
- FIA_UID.2.1: 3
- FMT:
- FMT_MOF.1: 17
- FMT_MOF.1.1: 3
- FMT_MSA: 1
- FMT_MSA.3: 2
- FMT_MTD.1: 27
- FMT_MTD.1.1: 3
- FMT_SMF.1: 37
- FMT_SMF.1.1: 1
- FMT_SMR.1: 53
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 20
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 16
- FCS_CKM.4.1: 1
- FCS_COP.1: 42
- FCS_COP.1.1: 9
- FCS_RNG.1: 12
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 5
- FDP_ACF.1: 5
- FDP_IFC.1: 21
- FDP_ITC.1: 10
- FDP_ITC.2: 10
- FDP_ITT.1: 12
- FDP_RIP: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FMT_MSA.1: 5
- FMT_MSA.3: 5
- FMT_SMF.1: 3
- FPT:
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_ITT.1: 21
- FPT_PHP.3: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 5
- A.IC: 2
- A.IC-CARD: 1
- A.NETWORK: 5
- A.SECRET: 2
- A.SERVICE: 4
- O:
- O.CRYPT: 4
- O.CRYPTO: 1
- O.CRYPTO-CAPABILITY: 2
- O.CRYPTO-KEY: 4
- O.DECRYPT: 2
- O.DECRYPT-PRINT: 4
- O.FAX: 2
- O.FAX-CONTROL: 3
- O.MAIL: 5
- O.MAIL-CRYPTO: 2
- O.MAIL-SIGN: 4
- O.OVERWRITE: 3
- O.OVERWRITE-ALL: 2
- O.PKI: 2
- O.PKI-CAPABILITY: 8
- OE:
- OE.ADMIN: 3
- OE.CARD-USER: 2
- OE.DRIVER: 4
- OE.FAX: 2
- OE.FAX-UNIT: 2
- OE.IC: 2
- OE.IC-CARD: 5
- OE.NETWORK: 4
- OE.SECRET: 3
- OE.SERVICE: 3
- OE.SETTING: 3
- OE.SETTING-SECURITY: 3
- OE.SIGN: 2
- T:
- T.BRING: 3
- T.DISCARD: 3
- T.DISCARD-MFP: 1
|
- O:
- O.AES: 5
- O.ECC: 5
- O.ECC_DHKE: 4
- O.HW_AES: 3
- O.MEM_ACCESS: 4
- O.MF_FW: 4
- O.REUSE: 6
- O.RND: 12
- O.RSA: 5
- O.SFR_ACCESS: 4
- O.SHA: 5
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 71
- NXP Semiconductors: 31
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 14
- TDES: 1
- Triple-DES: 18
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library 2.7: 1
- Crypto Library 2.9: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 27
- Malfunction: 13
- fault induction: 1
- fault injection: 1
- malfunction: 3
- SCA:
- DPA: 17
- Leak-Inherent: 13
- Physical Probing: 2
- SPA: 21
- Timing attacks: 4
- side channel: 8
- side-channel: 9
- timing attacks: 5
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 180: 4
- FIPS 180-2: 2
- FIPS 186: 2
- FIPS 186-2: 4
- FIPS PUB 197: 2
- FIPS186-2: 1
|
- BSI:
- CC:
- FIPS:
- FIPS 180-3: 2
- FIPS PUB 180-3: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 3
- FIPS PUB 46-3: 2
- FIPS PUB 81: 3
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 9797-1: 2
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- that encryption print for a printer data transmitted to MFP from client PC among the highly confidential document transmitted between MFP and client PC. Also, it provides a function of protecting the scanned image: 1
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20130116104113+09'00'
- /Creator: CubePDF
- /Keywords:
- /ModDate: D:20130116104116+09'00'
- /Producer: GPL Ghostscript 9.02; modified using iTextSharp 5.0.6 (c) 1T3XT BVBA
- /Subject:
- /Title:
- pdf_file_size_bytes: 527921
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 56
|
- /Alternative descriptive title: Security Target Lite
- /Author: Andreas Kühn
- /CertificationID: BSI-DSZ-CC-0750-V2
- /Chip family: SmartMX
- /Chip type: P5Cx128/P5Cx145 V0v/ V0B(s)
- /Chip type long: P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/ V0B(s)
- /Comments:
- /Company: NXP Semiconductors / Brightsight
- /Copyright date: 2014
- /CreationDate: D:20140627172321+02'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Descriptive title: Security Target Lite
- /Division: NXP Semiconductors
- /Keywords: Crypto Library, SmartMX, P5CD145V0A, P5CC145V0A, P5CD128V0A, P5CC128V0A, NXP, EAL5+, AVA_VAN.5, Security Target, AES, DES, RSA, ECC over GF(p), SHA
- /ModDate: D:20140627172337+02'00'
- /Modification date: 26 June 2014
- /Producer: Adobe PDF Library 10.0
- /Revision: Rev. 1.7
- /Security status: PUBLIC INFORMATION
- /SourceModified: D:20140627152128
- /Specification status: Evaluation documentation
- /Status: approved
- /Subject: Common Criteria Evaluation of Crypto Library on SmartMX
- /TOE long: Crypto Library V2.7/2.9
- /TOE short: Crypto Library on SmartMX
- /Template date: 1 October 2006
- /Template version: 2.8.1
- /Title: Security Target - Crypto Library V2.7 on P5CD145V0A, MSO / P5CC145V0A, MSO / P5CD128V0A, MSO / P5CC128V0A, MSO
- /docpath: I:\Workspace\CryptoLibP5\SmxCl\docs\02_sw_req_an
- /philips_smx_cl_docpath: I:\SmartMX\P5_CryptoLib\SmxCl\docs\02_sw_req_an
- /relBibilioPath: ..\Bibliography.doc
- pdf_file_size_bytes: 397615
- pdf_hyperlinks: http://www.cacr.math.uwaterloo.ca/hac/, http://www.nxp.com/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |