name |
Data Security Kit(D) Software V1.00E |
KCOS e-Passport Version 5.0 - BAC and AA on S3D350A Family |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
KR |
status |
archived |
archived |
not_valid_after |
31.01.2013 |
18.06.2024 |
not_valid_before |
31.10.2006 |
18.06.2019 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0057_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-0936-2019_CR_EN.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-0936-2019_ST_EN.pdf |
manufacturer |
KYOCERA MITA Corporation |
KOMSCO |
manufacturer_web |
https://www.kyoceramita.com/ |
https://www.komsco.com |
security_level |
EAL3 |
ALC_DVS.2, EAL4+, ALC_TAT.2, ADV_TDS.4, ADV_INT.2, ATE_DPT.3, ADV_FSP.5, ALC_CMS.5 |
dgst |
e97590283c1ec64c |
fb9c5a401d19139f |
heuristics/cert_id |
JISEC-CC-CRP-C0057 |
KECS-ISIS-0936-2019 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_ARC.1, AGD_OPE.1, ALC_CMC.4, ALC_DVS.2, ASE_OBJ.2, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ADV_FSP.5, AVA_VAN.3, ALC_DEL.1, ATE_FUN.1, ATE_DPT.3, ADV_TDS.4, ATE_COV.2, ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, ADV_INT.2, ALC_CMS.5, ADV_IMP.1, ASE_CCL.1, ALC_TAT.2 |
heuristics/extracted_versions |
1.00 |
5.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2019/01 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2019/01, ANSSI-CC-2017/53, ANSSI-CC-2018/12, ANSSI-CC-2017/11 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0150
- certification_date: 01.03.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0150_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is installed as an option to the MFPs "KM-3050, KM-4050, KM-5050, KM-3050i, KM-4050i, KM-5050i, CS-3050, CS-4050, CS-5050" of KYOCERA MITA Corporation. It is used to protect the image data that exists on HDD during or after each processing the copy function, the print function, the network scanning function, and the fax (sending and receiving) function from an illegal exposure. TOE security functions To defend assets to be protected in relation to the use of the above-mentioned basic functions, this TOE has the following security functions. - Hard disk accumulation data overwrite deletion function - Hard disk accumulation data encryption function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Data Security Kit(C) Software
- product_type: IT Product (data protection function in digital MFP)
- toe_version: V1.40
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.03.2013
- supplier: KYOCERA MITA Corporation
- toe_japan_name: Data Security Kit (C) Software V1.40
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0150_it5063.html
- toe_overseas_name: Data Security Kit (C) Software V1.40
|
- category: e-Passport
- cert_id: KECS-ISIS-0936-2019
- certification_date: 18.06.2019
- enhanced:
- level: EAL4+
- product: KCOS e-Passport Version 5.0 - BAC and AA on S3D350A Family
- product_link: https://itscc.kr/certprod/view.do?product_id=936&product_class=4
- vendor: KOMSCO
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2019/01 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2019/01 |
heuristics/protection_profiles |
{} |
60455fc9564e2545 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0057_ecvr.pdf |
KECS-ISIS-0936-2019_CR_EN.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0057: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL4: 2
- EAL4 augmented: 2
- EAL4+: 2
- EAL5+: 1
- EAL6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 3
- ADV_ARC.1: 2
- ADV_FSP.5: 6
- ADV_IMP.1: 2
- ADV_INT.2: 6
- ADV_TDS.4: 6
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 5
- ALC_DEL.1: 2
- ALC_DVS.2: 6
- ALC_LCD.1: 2
- ALC_TAT.2: 6
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- ATE_COV.2: 3
- ATE_DPT.3: 6
- ATE_FUN.1: 3
- ATE_IND.2: 4
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 2
- ISO/IEC 7816-4: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061102202158+09'00'
- /ModDate: D:20061102202158+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12898
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: 이은경
- /CreationDate: D:20190618095052+09'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20190618095052+09'00'
- /Producer: Microsoft® Word 2013
- /Title: 평가단위보고서(ADV_ARC.1)
- pdf_file_size_bytes: 650174
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
|
KECS-ISIS-0936-2019_ST_EN.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0056-V2-2012: 1
- BSI-CC-PP- 0068-V2-2011: 1
- BSI-CC-PP-0055: 2
- BSI-CC-PP-0056-V2-2011: 1
- BSI-CC-PP-0056-V2-2012: 2
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6+: 3
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.5: 4
- ADV_IMP.1: 1
- ADV_INT.2: 4
- ADV_TDS.4: 5
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 4
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_TAT.2: 4
- ASE:
- ASE_CCL.1: 3
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 4
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 8
- FAU_SAS.1: 8
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 18
- FCS_CKM.1: 22
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 30
- FCS_CKM.4.1: 1
- FCS_COP: 43
- FCS_COP.1: 11
- FCS_RND: 8
- FCS_RND.1: 11
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 3
- FDP_ITC: 2
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 9
- FIA_AFL.1: 4
- FIA_API: 6
- FIA_API.1: 2
- FIA_SOS.2: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 14
- FIA_UAU.4.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 4
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 18
- FMT_LIM.1.1: 3
- FMT_LIM.2: 16
- FMT_LIM.2.1: 4
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 28
- FMT_MTD.1: 8
- FMT_SMF: 1
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 1
- FPT_EMS.1: 2
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST.1: 8
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 4
- Triple-DES: 9
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- AT1:
- AT1 Secure RSA/ECC/SHA Library v2.01: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 6
- physical tampering: 2
- SCA:
- DPA: 3
- SPA: 2
- physical probing: 3
- side-channel: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 9
- EF.DG1: 29
- EF.DG13: 4
- EF.DG14: 2
- EF.DG15: 4
- EF.DG16: 27
- EF.DG2: 11
- EF.DG3: 6
- EF.DG4: 6
- EF.DG5: 9
- EF.SOD: 9
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 197: 2
- FIPS 46-3: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- FIPS186: 1
- FIPS46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 9797:1999: 1
- NIST:
- PKCS:
- RFC:
- RFC 3369: 1
- RFC 5639: 1
- RFC5639: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20190617154739+09'00'
- /Creator: Hancom PDF 1.3.0.480
- /ModDate: D:20190617154739+09'00'
- /PDFVersion: 1.4
- /Producer: Hancom PDF 1.3.0.480
- pdf_file_size_bytes: 861332
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 102
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |