Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller)
JISEC-CC-CRP-C0190
NXP Smart Card Controller P5CD080V0B with Dedicated software: Secured Crypto Library Release 2.0
BSI-DSZ-CC-0417-2008
name bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller) NXP Smart Card Controller P5CD080V0B with Dedicated software: Secured Crypto Library Release 2.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 09.12.2013 01.09.2019
not_valid_before 30.10.2008 13.06.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0190_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0417a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0190_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0417b.pdf
manufacturer Konica Minolta Business Technologies, Inc NXP Semiconductors
manufacturer_web https://www.konicaminolta.com/ https://www.nxp.com/
security_level EAL3 EAL5+, AVA_VLA.4, AVA_MSU.3, ALC_DVS.2
dgst fe2f02fb20d5a072 abcfbd9c65e98dd9
heuristics/cert_id JISEC-CC-CRP-C0190 BSI-DSZ-CC-0417-2008
heuristics/cert_lab [] BSI
heuristics/indirect_transitive_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_FSP.3, ALC_LCD.1, AVA_VLA.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1 ADV_INT.1, ATE_FUN.1, ADV_LLD.1, ADV_IMP.2, ADV_RCR.2, ATE_IND.2, AGD_USR.1, ADV_HLD.3, ADV_FSP.3, ALC_DVS.2, ATE_DPT.2, AVA_VLA.4, ATE_COV.2, AVA_MSU.3, ALC_LCD.2, ADV_SPM.3, AGD_ADM.1, AVA_SOF.1, ALC_TAT.2, AVA_CCA.1
heuristics/extracted_versions 11, 501, 10, 0100, 421, 361 2.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0658-2010, BSI-DSZ-CC-0604-2010, BSI-DSZ-CC-0603-2010, BSI-DSZ-CC-0440-2008, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0643-2010, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0704-2010, BSI-DSZ-CC-0515-2009, BSI-DSZ-CC-0575-2009, BSI-DSZ-CC-0673-2010, BSI-DSZ-CC-0439-2008
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0410-2007
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0604-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0440-2008, BSI-DSZ-CC-0643-2010, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0744-2011, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0661-2011, BSI-DSZ-CC-0603-2010, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0861-2014, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0704-2010, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0673-2010, BSI-DSZ-CC-0694-2012, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0658-2010, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0609-2010, BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0515-2009, BSI-DSZ-CC-0575-2009, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0439-2008
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0190
  • certification_date: 01.10.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0190_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functions TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Zentai Control Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software
    • product_type: Control Software for digital MFP
    • report_link: https://www.ipa.go.jp/en/security/c0190_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0190_est.pdf
    • toe_version: A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
    • vendor: Konica Minolta Business Technologies, Inc.
  • expiration_date: 01.12.2013
  • revalidations: [frozendict({'date': '2009-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0190_it8215_01.html'})]
  • supplier: Konica Minolta Business Technologies, Inc.
  • toe_japan_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Zentai Control Software A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0190_it8215.html
  • toe_overseas_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0604-2010, BSI-DSZ-CC-0603-2010, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0643-2010, BSI-DSZ-CC-0704-2010, BSI-DSZ-CC-0515-2009, BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0673-2010
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0410-2007
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0604-2010, BSI-DSZ-CC-0603-2010, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0643-2010, BSI-DSZ-CC-0704-2010, BSI-DSZ-CC-0515-2009, BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0673-2010
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0410-2007
maintenance_updates
pdf_data/report_filename c0190_erpt.pdf 0417a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0417-2008
    • cert_item: NXP Smart Card Controller P5CD080V0B with IC dedicated software: Secured Crypto Library Release 2.0
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0190-01: 1
    • Certification No. C0190: 1
  • DE:
    • BSI-DSZ-CC-0410-2007: 2
    • BSI-DSZ-CC-0410-2007-MA-01: 1
    • BSI-DSZ-CC-0417-2008: 18
    • BSI-DSZ-CC-410-2007: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0002-2001: 2
    • BSI-CC-PP-0002_2001: 1
    • BSI-PP-0002: 1
    • BSI-PP-0002-2001: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 1: 1
    • EAL 4: 6
    • EAL 5: 4
    • EAL 5 augmented: 4
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 5
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.3: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.3: 1
    • ADV_HLD: 2
    • ADV_HLD.3: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 1
    • ADV_INT: 2
    • ADV_INT.1: 1
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_RCR.2: 1
    • ADV_SPM: 2
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 2
    • ALC_TAT: 2
    • ALC_TAT.2: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_DPT.2: 1
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_CCA.1: 1
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.NETWORK: 1
    • A.SECRET: 1
    • A.SERVICE: 1
    • A.SETTING: 1
  • T:
    • T.ACCESS-GROUP-B: 1
    • T.ACCESS-GROUP-BOX: 1
    • T.ACCESS-NET-SET: 1
    • T.ACCESS-PRIVATE: 1
    • T.ACCESS-PRIVATE-BOX: 1
    • T.ACCESS-PUBLIC-: 1
    • T.ACCESS-PUBLIC-BOX: 1
    • T.ACCESS-SECURE-: 1
    • T.ACCESS-SECURE-PRINT: 1
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTOR: 1
    • T.BACKUP-RESTORE: 1
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STOR: 1
    • T.BRING-OUT-STORAGE: 1
    • T.DISCARD-MFP: 2
    • T.UNEXPECTEC-TRANSMISSION: 1
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Infineon:
    • Infineon Technologies AG: 1
  • NXP:
    • NXP: 13
    • NXP Semiconductors: 26
  • Philips:
    • Philips: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
    • DES:
      • DES: 6
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 13
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 5
      • SHA-256: 5
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 3
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 12
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 2.0: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • Side channel: 1
    • physical probing: 1
    • side channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS 20: 2
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 2
    • AIS 38: 1
  • FIPS:
    • FIPS 180-1: 2
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
  • ConfidentialDocument:
    • 1.1, 07 November 2007, Secured Crypto Library on the P5CD080V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi: 1
    • 36 for the Product Secured Crypto Library on the P5CD080V0B, 3.1, 07 March 2007, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items: 1
    • Technical Report, 3.0, 04 April 2008, Secured Crypto Library on the P5CD080V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8: 1
pdf_data/report_metadata
  • /CreationDate: D:20081211163158+09'00'
  • /ModDate: D:20081211163158+09'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 308979
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20080707143332+02'00'
  • /Creator: Writer
  • /Keywords: "BSI-DSZ-CC-0417-2008, Zertifizierung, NXP Smart Card Controller P5CD080V0Bwith IC dedicated software:Secured Crypto Library Release 2.0, NXP Semiconductors Germany GmbH"
  • /ModDate: D:20080707163834+02'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria Zertifizierung
  • /Title: Zertifizierungsreport BSI-DSZ-CC-0417-2008
  • pdf_file_size_bytes: 561364
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename c0190_est.pdf 0417b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0410: 1
    • BSI-DSZ-CC-0410-: 1
    • BSI-DSZ-CC-0410-2007: 1
    • BSI-DSZ-CC-0417: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002-2001: 9
    • BSI-PP-0002-2001: 8
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 5: 3
    • EAL 5 augmented: 3
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 3
    • EAL5: 30
    • EAL5 augmented: 3
    • EAL5+: 10
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VLA.1: 1
  • ACM:
    • ACM_AUT: 1
    • ACM_AUT.1: 2
    • ACM_CAP: 1
    • ACM_CAP.4: 1
    • ACM_SCP: 1
    • ACM_SCP.3: 3
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 2
    • ADO_IGS: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.3: 3
    • ADV_HLD.3: 2
    • ADV_IMP.2: 4
    • ADV_INT.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.2: 2
    • ADV_SPM.1: 1
    • ADV_SPM.3: 2
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 2
    • AGD_USR: 1
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 6
    • ALC_LCD: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.2: 2
  • ASE:
    • ASE_REQ: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA.1: 2
    • AVA_MSU.3: 5
    • AVA_SOF.1: 5
    • AVA_VLA.4: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
  • FCS:
    • FCS_CAP.1: 2
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 4
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 57
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 41
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ACP.1: 1
    • FDP_IFC.1: 6
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 2
    • FDP_RIP.1: 1
    • FDP_UAU.7: 1
  • FIA:
    • FIA_AFL.1: 61
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 8
    • FIA_ATD.1: 26
    • FIA_ATD.1.1: 1
    • FIA_EID: 2
    • FIA_EID.1: 16
    • FIA_EID.1.1: 3
    • FIA_EID.1.2: 1
    • FIA_NEW.1.2: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 47
    • FIA_SOS.1.1: 6
    • FIA_SOS.2: 9
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_SSL.3: 1
    • FIA_UAU.1: 23
    • FIA_UAU.2: 67
    • FIA_UAU.2.1: 6
    • FIA_UAU.6: 11
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 18
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 31
    • FIA_UID.2: 49
    • FIA_UID.2.1: 7
    • FIA_USB.1: 22
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MAS.1: 1
    • FMT_MOF.1: 31
    • FMT_MOF.1.1: 4
    • FMT_MSA: 3
    • FMT_MSA.1: 32
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 5
    • FMT_MTD.1: 101
    • FMT_MTD.1.1: 12
    • FMT_SMF.1: 107
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 164
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 6
    • FMT_SMS.1: 1
    • FMT_SOS.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 45
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 13
    • FCS_CKM.4: 18
    • FCS_COP: 1
    • FCS_COP.1: 95
    • FCS_COP.1.1: 8
    • FCS_RND: 6
    • FCS_RND.1: 15
    • FCS_RND.1.1: 1
    • FCS_RND.2: 32
    • FCS_RND.2.1: 2
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACF.1: 11
    • FDP_IFC.1: 34
    • FDP_ITC.1: 18
    • FDP_ITT: 1
    • FDP_ITT.1: 35
    • FDP_ITT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM.1: 2
    • FMT_LIM.2: 2
    • FMT_MOF.1: 1
    • FMT_MSA.1: 16
    • FMT_MSA.2: 20
    • FMT_MSA.3: 14
    • FMT_SMF.1: 5
    • FMT_SMR.1: 8
  • FPT:
    • FPT_AMT: 1
    • FPT_AMT.1: 4
    • FPT_FLS.1: 22
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 43
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 6
    • FPT_RND.1: 1
    • FPT_RND.2: 1
    • FPT_RVM: 1
    • FPT_SEP.1: 8
    • FPT_TST: 13
    • FPT_TST.1: 13
    • FPT_TST.2: 36
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 15
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 4
    • A.SECRET: 2
    • A.SERVICE: 2
    • A.SETTING: 3
  • O:
    • O.AUTH-CAPABILITY: 9
    • O.CHECK-CF: 4
    • O.CHECK-HDD: 6
    • O.CONFIG: 11
    • O.CRYPT-KEY: 5
    • O.CRYPTO-CAPABILITY: 4
    • O.CRYPTO-MAIL: 4
    • O.GROUP-BOX: 5
    • O.LOCK-CF-CAPABILITY: 4
    • O.LOCK-HDD-CAPABILITY: 6
    • O.OVERWRITE-ALL: 6
    • O.PRIVATE-BOX: 5
    • O.PUBLIC-BOX: 7
    • O.REGISTERED-USER: 13
    • O.SECURE-PRINT: 7
    • O.TRUSTED-PASS: 6
  • OE:
    • OE.ADMIN: 2
    • OE.CRYPT: 3
    • OE.CRYPTO: 1
    • OE.FEED-BACK: 10
    • OE.LOCK-CF: 3
    • OE.LOCK-HDD: 3
    • OE.NETWORK: 2
    • OE.SECRET: 2
    • OE.SERVER: 5
    • OE.SERVICE: 2
    • OE.SESSION: 2
    • OE.SETTING-SECURITY: 2
  • T:
    • T.ACCESS-GROUP-BOX: 3
    • T.ACCESS-NET-SETTING: 1
    • T.ACCESS-PRIVATE-BOX: 3
    • T.ACCESS-PUBLIC-BOX: 2
    • T.ACCESS-SECURE-PRINT: 2
    • T.ACCESS-SETTING: 2
    • T.BACKUP-RESTORE: 3
    • T.BRING-OUT-CF: 2
    • T.BRING-OUT-STORAGE: 2
    • T.DISCARD-MFP: 3
    • T.UNEXPECTEC-TRANSMISSION: 1
    • T.UNEXPECTED-TRANSMISSION: 1
  • O:
    • O.AES: 6
    • O.CONFIG: 2
    • O.COPY: 6
    • O.ECC: 7
    • O.ECC_DHKA: 2
    • O.ECC_DHKE: 3
    • O.HW_AES: 3
    • O.MEM_ACCESS: 5
    • O.MF_FW: 4
    • O.REUSE: 6
    • O.RND: 14
    • O.RSA: 6
    • O.SFR_ACCESS: 4
    • O.SHA: 7
  • T:
    • T.RND: 6
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • NXP:
    • NXP: 96
    • NXP Semiconductors: 28
  • Philips:
    • Philips: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • AES_competition:
    • AES:
      • AES: 53
  • DES:
    • 3DES:
      • 3DES: 17
      • TDES: 1
      • Triple-DES: 19
    • DES:
      • DEA: 1
      • DES: 42
  • constructions:
    • MAC:
      • CBC-MAC: 16
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 66
  • FF:
    • DH:
      • Diffie-Hellman: 12
  • RSA:
    • RSA-CRT: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 5
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-224: 10
      • SHA-256: 11
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 10
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 21
    • RNG: 102
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 23
  • ECB:
    • ECB: 15
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 126
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 37
    • Malfunction: 12
    • fault induction: 1
    • fault injection: 1
    • malfunction: 2
  • SCA:
    • DPA: 19
    • Leak-Inherent: 12
    • Physical Probing: 2
    • SPA: 27
    • Timing attack: 1
    • Timing attacks: 3
    • side channel: 15
    • side-channel: 7
    • timing attacks: 9
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 186: 1
    • FIPS 186-1: 1
    • FIPS 186-2: 4
    • FIPS PUB 197: 3
  • X509:
    • X.509: 1
  • BSI:
    • AIS20: 2
    • AIS31: 3
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 3
  • FIPS:
    • FIPS 180-2: 2
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 3
    • FIPS PUB 46-3: 2
    • FIPS PUB 81: 3
  • ISO:
    • ISO/IEC 15946-1: 1
    • ISO/IEC 15946-2: 1
  • PKCS:
    • PKCS #1: 6
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • the main body of MFP or through the network. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
pdf_data/st_metadata
  • /Author: e02518
  • /CreationDate: D:20081205143523+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20081205143523+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: Microsoft Word - 【C0190】英文ST掲載用081205.doc
  • pdf_file_size_bytes: 735960
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 108
  • /Alternative descriptive title: Security Target Lite
  • /Author: Andreas Kühn
  • /CertificationID: BSI-DSZ-CC-0417
  • /Chip family: SmartMX
  • /Chip type: P5CD080V0B
  • /Company: NXP Semiconductors
  • /Copyright date: 2007
  • /CreationDate: D:20071107140214+01'00'
  • /Creator: Acrobat PDFMaker 7.0.7 for Word
  • /Descriptive title: Security Target Lite
  • /Division: NXP Semiconductors
  • /Keywords: Crypto Library, SmartMX, P5CD080, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA
  • /ModDate: D:20080624155752+02'00'
  • /Modification date: 7 November 2007
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Revision: Rev. 1.1
  • /Security status: PUBLIC INFORMATION
  • /SourceModified: D:20071107125918
  • /Specification status: Evaluation documentation
  • /Status: Accepted
  • /Subject: Common Criteria Evaluation of Crypto Library on SmartMX
  • /TOE long: Secured Crypto Library on the P5CD080V0B
  • /TOE short: Crypto Library on SmartMX
  • /Template date: 1 October 2006
  • /Template version: 2.8.1
  • /Title: Security Target Lite - Secured Crypto Library on the P5CD080V0B
  • /docpath: I:\P5_CryptoLib\SmxCl\docs\02_sw_req_an
  • /philips_smx_cl_docpath: I:\P5_CryptoLib\SmxCl\docs\02_sw_req_an
  • /relBibilioPath: ..\Bibliography.doc
  • pdf_file_size_bytes: 647161
  • pdf_hyperlinks: http://www.cacr.math.uwaterloo.ca/hac/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 77
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different