Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00
JISEC-CC-CRP-C0265
Crypto Library Cobalt on N7021 VA
BSI-DSZ-CC-1019-2017
name bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software, Version A1UD0Y0-0100-GM0-00 Crypto Library Cobalt on N7021 VA
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 01.09.2015 24.11.2022
not_valid_before 31.08.2010 24.11.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1019a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0265_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1019b_pdf.pdf
manufacturer Konica Minolta Business Technologies, Inc NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.konicaminolta.com/ https://www.nxp.com
security_level EAL3 EAL6+, ASE_TSS.2, ALC_FLR.1
dgst e1cef4b86461e7ab 490f7a35d49fbf8c
heuristics/cert_id JISEC-CC-CRP-C0265 BSI-DSZ-CC-1019-2017
heuristics/cert_lab [] BSI
heuristics/extracted_sars AVA_VLA.2, ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 283, 423, 7828, 0100, 00, 363, 223 -
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-1019-V2-2019
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0977-2017
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-1019-V2-2019
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0977-2017
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0265
  • certification_date: 01.08.2010
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0265_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is the software that controls the entire operation of MFP, including the operation control processing and the image data management triggered by the panel of the main body of digital multi-function products (Multi Functional Peripheral. Hereinafter referred to as 溺FP・ or through the network, and provides the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in MFP, TOE can encrypt all the data written in HDD including image data using ASIC (Application Specific Integrated Circuit). Besides, TOE provides the function that deletes all the data of HDD completely by deletion method compliant with various overwrite deletion standards, and the function that controls the access from the public telephone line against the danger using Fax function as a steppingstone to access internal network. TOE security functionality TOE provides the following security functions. - Administrator function - SNMP administrator function - Service mode function - User function - User box function - Secure print function - ID & print function - All area overwrite deletion function - Encryption key generation function - Authentication Failure Frequency Reset function - Trusted Channel function - S/MIME encryption processing function - External Server authentication operation support function - ASIC support function - WebDAV administrator function - Fax unit control function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software English : bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0265_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0265_est.pdf
    • toe_version: A1UD0Y0-0100-GM0-00
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.04.2011
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Zentai Seigyo Software A1UD0Y0-0100-GM0-00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0265_it9283.html
  • toe_overseas_name: bizhub 423 / bizhub 363 / bizhub 283 / bizhub 223 / bizhub 7828 / ineo 423 / ineo 363 / ineo 283 / ineo 223 Control Software A1UD0Y0-0100-GM0-00
heuristics/st_references/directly_referenced_by {} 21.0.03/TSE-CCCS-59
heuristics/st_references/indirectly_referenced_by {} 21.0.03/TSE-CCCS-59
heuristics/protection_profiles {} cf0f01bcd7be3e9c
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/report_filename c0265_erpt.pdf 1019a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2 and ALC_FLR.1
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1019-2017
    • cert_item: Crypto Library Cobalt on N7021 VA
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0265-01: 1
    • Certification No. C0265: 1
  • DE:
    • BSI-DSZ-CC-0977-2017: 1
    • BSI-DSZ-CC-1019: 2
    • BSI-DSZ-CC-1019-2017: 15
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 1
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 5
    • EAL 6 augmented: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_TSS.2: 4
  • ATE:
    • ATE_COV.3: 1
    • ATE_DPT.3: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-BOX: 2
    • T.ACCESS-PRIVATE-BO: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRI: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 2
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 2
    • T.UNEXPECTED-TRANS: 1
    • T.UNEXPECTED-TRANSMISSION: 1
  • O:
    • O.C: 6
  • R:
    • R.O: 6
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 9
    • NXP Semiconductors: 17
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • Diffie-Hellman: 3
  • RSA:
    • RSA-CRT: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 3
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 3
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX3: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 1
    • side-channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 4
    • AIS 37: 2
    • AIS 38: 1
    • AIS 41: 1
    • AIS 46: 1
    • AIS 47: 1
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS #1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • of MFP or through the network. TOE supports the protection function from exposure of the highly confidential documents stored in the MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data: 1
  • ConfidentialDocument:
    • 0 on N7021 VA, Life Cycle (confidential document) • Version 1.0, 07 March 2017, P71D320 Crypto Library, Configuration Item List, Evaluation: 1
    • 16 September 2016, N7021 Crypto Library RSA Key Generation Library (confidential document) • AIS 34, Version 3, Evaluation Methodology for CC Assurance Classes for EAL 5+ (CCv2.3 & CCv3.1: 1
    • Cobalt on N7021 VA Security Target, BSI-DSZ-CC-1019, Version 1.2, 5 July 2017, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 20 October 2017, EVALUATION TECHNICAL REPORT SUMMARY: 1
    • EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: • Version 1.3, 07 March 2017, Crypto Library Iron / Cobalt: 1
    • N7021 VA Information on Guidance and Operation (confidential document) • Version 1.2, 19 January 2017, N7021 Crypto Library ECC over GF(p) Library (confidential document: 1
    • Report BSI-DSZ-CC-1019-2017 • Version 1.0, 29 September 2016, N7021 Crypto Library SHA Library (confidential document) • Version 1.0, 28 November 2016, N7021 Crypto Library UtilsAsym Library (confidential document: 1
    • SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • confidential document) [12] Guidance documentation for the TOE: • Version 1.7, 19 April 2017, Crypto Library Cobalt V1.0: 1
    • family N7021 Wafer and delivery specification, Version 1.1, 05 August 2016, NXP Semiconductors (confidential document) 26 / 31 BSI-DSZ-CC-1019-2017 Certification Report C. Excerpts from the Criteria For the meaning: 1
    • for Composite Evaluation for the N7021 VA, Version 2, 30 June 2017, TÜV Informationstechnik GmbH (confidential document) [15] NXP Secure Smart Card Controller N7021 VA Security Target Lite, BSI-DSZ-CC- 0977-2017: 1
    • • Version 1.0, 29 September 2016, N7021 Crypto Library HASH Library (confidential document) • Version 1.3, 12 April 2017, N7021 Crypto Library RSA Library (confidential document) • Version 1: 1
pdf_data/report_metadata
  • /CreationDate: D:20101213141346+09'00'
  • /ModDate: D:20101213141346+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 235716
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename c0265_est.pdf 1019b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1019: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 1
    • EAL4+: 2
    • EAL6: 32
    • EAL6 augmented: 2
    • EAL6+: 6
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VLA.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM.1: 2
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.5: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 3
  • ATE:
    • ATE_COV.3: 2
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 72
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 55
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ACP.1: 1
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 71
    • FIA_AFL.1.1: 9
    • FIA_AFL.1.2: 9
    • FIA_ATD.1: 29
    • FIA_ATD.1.1: 1
    • FIA_MSA.3: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 44
    • FIA_SOS.1.1: 5
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 43
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 44
    • FIA_UAU.2.1: 4
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 48
    • FIA_UID.2.1: 7
    • FIA_USB.1: 26
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 3
    • FMT_MSA: 5
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 42
    • FMT_MSA.3.1: 6
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 119
    • FMT_MTD.1.1: 13
    • FMT_SMF.1: 110
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 171
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SMS.1: 1
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 11
    • FCS_CKM.2: 2
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP: 25
    • FCS_COP.1: 8
  • FDP:
    • FDP_IFC.1: 8
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_ITT.1: 1
    • FDP_RIP.1: 9
  • FPT:
    • FPT_FLS.1: 8
    • FPT_ITT.1: 8
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 4
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.AUTH-CAPABILITY: 7
    • O.CONFIG: 11
    • O.CRYPT-KEY: 1
    • O.CRYPTO-CAPABILITY: 7
    • O.CRYPTO-KEY: 3
    • O.CRYPTO-MAIL: 4
    • O.FAX-CONTROL: 7
    • O.GROUP-BOX: 5
    • O.OVERWRITE-ALL: 7
    • O.PRIVATE-BOX: 5
    • O.PUBLIC-BOX: 8
    • O.REGISTERED-USER: 14
    • O.SECURE-PRINT: 8
    • O.TRUSTED-PASS: 7
  • OE:
    • OE.ADMIN: 3
    • OE.FAX-UNIT: 3
    • OE.FEED-BACK: 10
    • OE.NETWORK: 3
    • OE.SECRET: 3
    • OE.SERVER: 6
    • OE.SERVICE: 3
    • OE.SESSION: 10
    • OE.SETTING-SECURITY: 3
  • T:
    • T.ACCESS-GROUP-BOX: 3
    • T.ACCESS-PRIVATE-BOX: 3
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
    • T.UNEXPECTED-TRANSMISSION: 3
  • O:
    • O.ECC_DHKE: 4
    • O.ECDSA: 5
    • O.RSA: 5
    • O.SHA: 5
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 49
    • NXP Semiconductors: 17
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • 3DES: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 33
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 21
  • FF:
    • DH:
      • Diffie-Hellman: 5
  • RSA:
    • RSA-CRT: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-224: 8
      • SHA-256: 8
      • SHA-384: 8
      • SHA-512: 8
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library ..................................................15: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • Malfunction: 1
    • malfunction: 1
  • SCA:
    • DPA: 3
    • Leak-Inherent: 1
    • template attacks: 2
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 186-2: 6
    • FIPS PUB 197: 3
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 180-4: 2
    • FIPS 186-4: 2
  • ISO:
    • ISO/IEC 15946-1: 2
    • ISO/IEC 15946-2: 2
    • ISO/IEC 15946-3: 1
  • PKCS:
    • PKCS #1: 8
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • main body of MFP or through the network. TOE supports the protection from exposure of the highly confidential documents stored in MFP. Moreover, for the danger of illegally bringing out HDD, which stores image data in: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20101202154851+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20101202155121+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - C0265_ASE.doc
  • /_AdHocReviewCycleID: -379351262
  • /_PreviousAdHocReviewCycleID: 467482879
  • pdf_file_size_bytes: 772548
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 111
  • /Author: NXP Semiconductors
  • /CreationDate: D:20171212162609+01'00'
  • /Creator: DITA Open Toolkit
  • /Keywords: Common Criteria, Security Target Lite, Crypto Library Cobalt, EAL6+, N7021 VA
  • /ModDate: D:20171212171615+01'00'
  • /PDFVersion: 1.4
  • /Producer: Apache FOP Version 1.1
  • /Subject: Crypto Library Cobalt on N7021 VA
  • /Title: Crypto Library Cobalt Security Target Lite
  • pdf_file_size_bytes: 219892
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different