Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
TOSHIBA e-STUDIO330AC/400AC Models with FAX unit and FIPS Hard Disk SYS V1.0
JISEC-CC-CRP-C0684-01-2020
ID-One COSMO X (R3 : 093363 ; R4 : 093364 ; R4 patché : 093364 + patch 099441)
ANSSI-CC-2021/29-S01v2
name TOSHIBA e-STUDIO330AC/400AC Models with FAX unit and FIPS Hard Disk SYS V1.0 ID-One COSMO X (R3 : 093363 ; R4 : 093364 ; R4 patché : 093364 + patch 099441)
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 02.10.2025 23.12.2027
not_valid_before 02.10.2020 17.04.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0684_eimg.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2021_29-s01v2.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0684_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_29-s01v2fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0684_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_29-s01v2en.pdf
manufacturer Toshiba TEC Corporation Idemia
manufacturer_web https://www.toshibatec.co.jp/en/ https://www.idemia.com
security_level {} ADV_IMP.2, ALC_FLR.1, ALC_CMC.5, EAL5+, AVA_VAN.5, ATE_COV.3, ALC_TAT.3, ATE_FUN.2, ADV_TDS.5, ALC_DVS.2
dgst e5255e40c05b52dc c980e7ae9f1d605e
heuristics/cert_id JISEC-CC-CRP-C0684-01-2020 ANSSI-CC-2021/29-S01v2
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_REQ.2, ALC_COV.3, ASE_CCL.1, ATE_COV.3
heuristics/extracted_versions 1.0 099441, 093363, 093364
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/36v2, NSCIB-CC-2300058-01-CR, ANSSI-CC-2022/18v2, NSCIB-CC-2300060-01-CR, ANSSI-CC-2022/16v2, ANSSI-CC-2022/14v2, ANSSI-CC-2022/34v2, ANSSI-CC-2022/15v2, NSCIB-CC-2300059-01-CR, ANSSI-CC-2022/17v2
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/36v2, NSCIB-CC-2300058-01-CR, ANSSI-CC-2022/18v2, NSCIB-CC-2300060-01-CR, ANSSI-CC-2022/16v2, ANSSI-CC-2022/14v2, ANSSI-CC-2022/34v2, ANSSI-CC-2022/15v2, NSCIB-CC-2300059-01-CR, ANSSI-CC-2022/17v2
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0684
  • certification_date: 01.10.2020
  • claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
  • enhanced:
    • assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0684
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000boi-att/c0684_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan and fax. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE Security functions The TOE provides the following security features: Identification and Authentication Function Access Control Function Stored Data Encryption Function Network Protection Function Security Management Function Audit Function Software Verification Function Self-testing Function Fax Line Separation Function
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: TOSHIBA e-STUDIO330AC/400AC Models with FAX unit and FIPS Hard Disk
    • product_type: Multifunction Product
    • protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000boi-att/c0684_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/b9ck990000000boi-att/c0684_est.pdf
    • toe_version: SYS V1.0
    • vendor: TOSHIBA TEC CORPORATION
  • expiration_date:
  • supplier: TOSHIBA TEC CORPORATION
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0684_it9734.html
  • toe_overseas_name: TOSHIBA e-STUDIO330AC / 400AC Models with FAX unit and FIPS Hard DiskSYS V1.0
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-V3-2022
heuristics/protection_profiles b2cfec7a92fa2940 94167fd161e87d71
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename c0684_eimg.pdf certificat-cc-2021_29-s01v2.pdf
pdf_data/cert_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0684-01-2020: 1
  • FR:
    • ANSSI-CC-2021/29-S01v2: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 1
    • ADV_TDS.5: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 2
    • ALC_TAT.3: 1
  • ATE:
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Idemia:
    • IDEMIA: 2
pdf_data/cert_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20201106135945+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20201106140255+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 83036
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename c0684_erpt.pdf anssi-cc-2021_29-s01v2fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • JP:
    • JISEC-CC-CRP-C0684-01-2020: 1
  • DE:
    • BSI-DSZ-CC-1107-V3-2022: 2
  • FR:
    • ANSSI-CC-2021/29-S01: 2
    • ANSSI-CC-2021/29-S01v2: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-2017: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_IMP.2: 1
    • ADV_TDS.5: 1
  • AGD:
    • AGD_ALP: 3
    • AGD_BIO: 3
    • AGD_OPE: 5
    • AGD_PRE: 4
  • ALC:
    • ALC_CMC.5: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 2
    • ALC_TAT.3: 1
  • ATE:
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RBG_EXT.1: 1
  • FDP:
    • FDP_DSK_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 9
    • D.USER: 5
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 20
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 10
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
      • HMAC-SHA-512: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 4
      • TLS v1.2: 4
  • PACE:
    • PACE: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
  • /CreationDate: D:20201216095523+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20201216095720+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 767273
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename c0684_est.pdf anssi-cible-cc-2021_29-s01v2en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI_DSZ-CC-1107-V3-2022: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0068-V2: 1
    • BSI-CC-PP-0068-V2-MA-01: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-2017: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 1
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL5 augmented: 2
    • EAL5+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 8
    • ADV_IMP: 1
    • ADV_IMP.1: 6
    • ADV_IMP.2: 12
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 1
    • ADV_TDS.5: 15
  • AGD:
    • AGD_ALP: 3
    • AGD_BIO: 3
    • AGD_OPE: 7
    • AGD_OPE.1: 8
    • AGD_PAPI: 5
    • AGD_PRE: 12
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 10
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_COV.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 14
    • ALC_FLR: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 3
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.3: 11
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 2
    • ATE_COV.3: 10
    • ATE_DPT.1: 2
    • ATE_DPT.3: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 4
    • ATE_FUN.2: 11
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 14
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 14
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 3
    • FAU_STG_EXT.1: 7
    • FAU_STG_EXT.1.1: 2
  • FCS:
    • FCS_CKM.1: 43
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 2
    • FCS_CKM_EXT: 5
    • FCS_CKM_EXT.4: 27
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 126
    • FCS_COP.1.1: 6
    • FCS_ITC.1: 1
    • FCS_KDF_EXT: 4
    • FCS_KDF_EXT.1: 20
    • FCS_KDF_EXT.1.1: 3
    • FCS_KYC_EXT: 4
    • FCS_KYC_EXT.1: 9
    • FCS_KYC_EXT.1.1: 4
    • FCS_PCC_EXT.1: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 36
    • FCS_RBG_EXT.1.1: 3
    • FCS_RBG_EXT.1.2: 3
    • FCS_RGB_EXT.1: 2
    • FCS_SMC_EXT: 3
    • FCS_SMC_EXT.1: 15
    • FCS_SMC_EXT.1.1: 2
    • FCS_SNI_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_TLS_EXT: 2
    • FCS_TLS_EXT.1: 22
    • FCS_TLS_EXT.1.1: 2
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DSK_EXT: 2
    • FDP_DSK_EXT.1: 8
    • FDP_DSK_EXT.1.1: 2
    • FDP_DSK_EXT.1.2: 2
    • FDP_FXS_EXT: 2
    • FDP_FXS_EXT.1: 8
    • FDP_FXS_EXT.1.1: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 6
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 18
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_KYP_EXT: 2
    • FPT_KYP_EXT.1: 7
    • FPT_KYP_EXT.1.1: 2
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 9
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 8
    • FPT_TST_EXT.1.1: 2
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.1.3: 3
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC_EXT.1: 2
    • FTP_TRP: 2
    • FTP_TRP.1: 25
    • FTP_TRP.1.1: 3
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_ARP.1: 20
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 2
    • FAU_SAA.1: 3
    • FAU_STG.2: 8
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
  • FCO:
    • FCO_NRO: 14
    • FCO_NRO.2: 8
  • FCS:
    • FCS_CKM: 73
    • FCS_CKM.1: 28
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.4: 41
    • FCS_CKM.4.1: 1
    • FCS_COP: 114
    • FCS_COP.1: 26
    • FCS_COP.1.1: 1
    • FCS_RND: 12
    • FCS_RND.1: 3
    • FCS_RND.1.1: 1
    • FCS_RNG: 2
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 104
    • FDP_ACC.1: 30
    • FDP_ACC.2: 17
    • FDP_ACF: 85
    • FDP_ACF.1: 44
    • FDP_IFC: 31
    • FDP_IFC.1: 25
    • FDP_IFC.2: 2
    • FDP_IFF: 25
    • FDP_IFF.1: 16
    • FDP_ITC: 30
    • FDP_ITC.1: 14
    • FDP_ITC.2: 20
    • FDP_RIP: 202
    • FDP_RIP.1: 13
    • FDP_ROL: 21
    • FDP_ROL.1: 6
    • FDP_SDI: 28
    • FDP_SDI.2: 6
    • FDP_UCT: 14
    • FDP_UCT.1: 1
    • FDP_UIT: 20
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 58
    • FIA_AFL.1: 12
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UAU: 155
    • FIA_UAU.1: 18
    • FIA_UAU.4: 4
    • FIA_UAU.5: 5
    • FIA_UAU.6: 2
    • FIA_UAU.7: 2
    • FIA_UID: 61
    • FIA_UID.1: 23
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 15
    • FMT_LIM.1: 5
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 5
    • FMT_LIM.2.1: 1
    • FMT_MOF: 19
    • FMT_MOF.1: 2
    • FMT_MSA: 224
    • FMT_MSA.1: 25
    • FMT_MSA.2: 6
    • FMT_MSA.3: 33
    • FMT_MSA.4: 1
    • FMT_MTD: 109
    • FMT_MTD.1: 12
    • FMT_MTD.2: 2
    • FMT_MTD.3: 1
    • FMT_SMF: 93
    • FMT_SMF.1: 45
    • FMT_SMF.1.1: 1
    • FMT_SMR: 93
    • FMT_SMR.1: 74
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR.2: 6
  • FPR:
    • FPR_UNO: 17
    • FPR_UNO.1: 18
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 10
    • FPT_EMS.1: 6
    • FPT_EMS.1.1: 2
    • FPT_EMS.1.2: 2
    • FPT_FLS: 54
    • FPT_FLS.1: 25
    • FPT_FLS.1.1: 2
    • FPT_PHP: 12
    • FPT_PHP.3: 1
    • FPT_RCV: 25
    • FPT_RCV.3: 7
    • FPT_RCV.4: 1
    • FPT_TDC: 9
    • FPT_TDC.1: 10
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 21
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 6
    • FRU_FLT.1: 1
  • FTP:
    • FTP_ITC: 30
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.PHYSICAL: 1
    • A.TRAINED_USERS: 1
    • A.TRUSTED_ADMIN: 1
  • D:
    • D.TSF: 8
    • D.USER: 32
  • O:
    • O.ACCESS: 1
    • O.ACCESS_CONTROL: 6
    • O.ADMIN_ROLES: 4
    • O.AUDIT: 5
    • O.COMMS_PROTECTION: 12
    • O.FAX_NET_SEPARATION: 1
    • O.KEY_MATERIAL: 1
    • O.PURGE_DATA: 3
    • O.STORAGE_ENCRYPTION: 8
    • O.TSF_SELF_TEST: 1
    • O.UPDATE_VERIFICATION: 2
    • O.USER_AUTHORIZATION: 7
  • OE:
    • OE.ADMIN_TRAINING: 1
    • OE.ADMIN_TRUST: 1
    • OE.NETWORK_PROTECTION: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.USER_TRAINING: 1
  • T:
    • T.NET_COMPROMISE: 1
    • T.TSF_COMPROMISE: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
  • A:
    • A.CAP_FILE: 5
    • A.DELETION: 3
    • A.VERIFICATION: 5
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 7
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 6
    • D.ARRAY: 3
    • D.BIO: 11
    • D.CLFDB-DK: 1
    • D.CONFIG: 4
    • D.CRYPTO: 5
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.JCS_KEY: 1
    • D.JCS_KEYS: 7
    • D.MODULES: 2
    • D.NB_REMAINTRYGLB: 1
    • D.PERSO_DUMP: 4
    • D.PIN: 11
    • D.SEC_DATA: 7
    • D.SENSITIVE_DATA: 5
  • O:
    • O.ALARM: 22
    • O.APPLET: 16
    • O.ARRAY_VIEWS_CONFID: 8
    • O.ARRAY_VIEWS_INTEG: 9
    • O.BIO-: 3
    • O.BIO-MNGT: 22
    • O.CARD-MANAGEMENT: 1
    • O.CARD_MANAGEMENT: 65
    • O.CIPHER: 26
    • O.CLFDB_DECIPHER: 13
    • O.CODE_PKG: 22
    • O.DBI-: 1
    • O.DBI-MNGT: 24
    • O.DELETION: 15
    • O.DUMP_PERSO: 22
    • O.FIREWALL: 64
    • O.FLEXICODE: 19
    • O.GLOBAL_ARRAYS_CONFID: 20
    • O.GLOBAL_ARRAYS_INTEG: 11
    • O.INSTALL: 16
    • O.JAVAOBJECT: 54
    • O.KEY-MNGT: 31
    • O.LOAD: 18
    • O.MTC-: 8
    • O.MTC-CTR-: 2
    • O.MTC-CTR-MNGT: 8
    • O.NATIVE: 18
    • O.OBJ-: 1
    • O.OBJ-DELETION: 7
    • O.OPERATE: 40
    • O.PATCH_LOADING: 23
    • O.PIN-: 2
    • O.PIN-MNGT: 27
    • O.REALLOCATION: 17
    • O.RESIDENT_APPLICATION: 35
    • O.RESOURCES: 24
    • O.RNG: 10
    • O.SCP: 68
    • O.SECURE_COMPARE: 9
    • O.SENSITIVE_ARRAYS_INTEG: 8
    • O.SID: 33
    • O.TRANSACTION: 20
  • OE:
    • OE.APPLET: 2
    • OE.CAP_FILE: 10
    • OE.CARD-MANAGEMENT: 1
    • OE.CARD_MANAGEMENT: 3
    • OE.CLFDB_ENC: 7
    • OE.CODE-EVIDENCE: 21
    • OE.NATIVE: 1
    • OE.SCP: 12
    • OE.VERIFICATION: 39
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 9
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 1
    • OP.ARRAY_T_ASTORE: 1
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.FLOW: 3
    • OP.IMPORT_KEY: 2
    • OP.INSTANCE_FIELD: 5
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.LOCAL_STACK_ACCESS: 3
    • OP.NATIVE: 1
    • OP.NATIVE_ACCESS: 3
    • OP.NATIVE_INTERFACE_CALL: 1
    • OP.OPERAND_STACK_ACCESS: 3
    • OP.PUT: 6
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.STATIC_FIELD: 3
    • OP.THROW: 5
    • OP.TPL: 1
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.CLFDB_ENC: 4
    • OSP.VERIFICATION: 6
  • R:
    • R.JAVA: 12
  • T:
    • T.CLFDB-DISC: 5
    • T.CONFID-APPLI-DATA: 21
    • T.CONFID-JCS-CODE: 7
    • T.CONFID-JCS-DATA: 12
    • T.CONFIGURATION: 4
    • T.CONF_DATA_APPLET: 4
    • T.DELETION: 6
    • T.EXE-: 1
    • T.EXE-CODE: 8
    • T.FLEXICODE: 5
    • T.INSTALL: 6
    • T.INTEG-: 2
    • T.INTEG-APPLI-: 3
    • T.INTEG-APPLI-CODE: 13
    • T.INTEG-APPLI-DATA: 26
    • T.INTEG-JCS-CODE: 7
    • T.INTEG-JCS-DATA: 12
    • T.NATIVE: 7
    • T.OBJ-DELETION: 4
    • T.PATCH_LOADING: 4
    • T.PERSO_DUMP: 5
    • T.PHYSICAL: 5
    • T.RESOURCES: 8
    • T.SID: 18
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 257
  • Infineon:
    • Infineon: 7
    • Infineon Technologies AG: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 19
      • HMAC-SHA-512: 3
  • AES_competition:
    • AES:
      • AES: 31
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 11
      • Triple-DES: 6
    • DES:
      • DES: 14
  • constructions:
    • MAC:
      • CMAC: 5
      • HMAC: 10
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 7
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 8
      • SHA-384: 2
      • SHA-512: 13
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-2: 1
      • SHA-224: 3
      • SHA-256: 5
      • SHA-384: 3
      • SHA-512: 1
      • SHA256: 2
    • SHA3:
      • SHA-3: 2
      • SHA3: 6
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 2
    • Key agreement: 1
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 45
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
      • TLS1.2: 3
  • PACE:
    • PACE: 181
  • PGP:
    • PGP: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 12
    • PRNG: 6
  • RNG:
    • RBG: 4
    • RNG: 3
  • RNG:
    • RNG: 24
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 11
  • ECB:
    • ECB: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Malfunction: 1
    • Physical Tampering: 3
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 2
  • SCA:
    • DPA: 3
    • SPA: 2
    • physical probing: 6
    • timing attack: 1
    • timing attacks: 1
  • other:
    • JIL: 2
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.ChipSecurity: 1
    • EF.DG1: 5
    • EF.DG16: 5
    • EF.DG3: 2
    • EF.DG4: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-4: 2
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 2
    • FIPS140-2: 1
    • FIPSPUB 180-3: 1
  • ISO:
    • ISO/IEC 10116: 2
    • ISO/IEC 10118: 4
    • ISO/IEC 18031:2011: 6
  • NIST:
    • NIST SP 800-108: 2
    • NIST SP 800-132: 1
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-56B: 1
    • NIST SP 800-90A: 7
    • NIST SP 800-90B: 1
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 3
    • RFC 4346: 1
    • RFC 5246: 3
    • RFC2818: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 140-3: 1
    • FIPS 198: 1
    • FIPS PUB 180-3: 3
    • FIPS PUB 186-3: 1
    • FIPS PUB 197: 8
    • FIPS PUB 46-3: 6
    • FIPS PUB 81: 10
    • FIPS1: 3
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 14443-3: 1
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-6: 1
    • ISO/IEC 9796-1: 2
    • ISO/IEC 9797: 16
    • ISO/IEC 9797-1: 1
  • NIST:
    • NIST SP 800-90: 1
  • PKCS:
    • PKCS#1: 3
    • PKCS#3: 2
  • RFC:
    • RFC 5639: 4
  • SCP:
    • SCP02: 4
    • SCP03: 4
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 6
pdf_data/st_keywords/javacard_api_const
  • curves:
    • BRAINPOOLP192R1: 2
    • BRAINPOOLP192T1: 2
    • BRAINPOOLP224R1: 2
    • BRAINPOOLP224T1: 2
    • BRAINPOOLP256R1: 2
    • BRAINPOOLP256T1: 2
    • BRAINPOOLP320R1: 2
    • BRAINPOOLP320T1: 2
    • BRAINPOOLP384R1: 2
    • BRAINPOOLP384T1: 2
    • BRAINPOOLP512R1: 2
    • BRAINPOOLP512T1: 2
    • FRP256V1: 2
    • SECP192R1: 2
    • SECP224R1: 2
    • SECP256R1: 2
    • SECP384R1: 2
    • SECP521R1: 2
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • com:
    • com.oberthurcs.javacard: 1
  • javacard:
    • javacard.framework: 6
    • javacard.security: 5
  • javacardx:
    • javacardx.biometry: 1
    • javacardx.crypto: 4
    • javacardx.framework.util: 1
    • javacardx.security: 3
    • javacardx.security.util: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: TOSHIBA TEC CORPORATION
  • /CreationDate: D:20201211130420+09'00'
  • /Creator:
  • /Keywords: HCD-PP
  • /ModDate: D:20201211130421+09'00'
  • /Producer: iTextSharp™ 5.5.13 ©2000-2018 iText Group NV (AGPL-version); modified using iTextSharp™ 5.5.13 ©2000-2018 iText Group NV (AGPL-version)
  • /Subject:
  • /Title: Security Target for e-STUDIO400AC Series
  • pdf_file_size_bytes: 890629
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 86
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/extract_ok True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different