cert_id |
4014 |
4455 |
dgst |
346f05a48032ec2d |
dec1ab2f6d6e994c |
heuristics/algorithms |
AES#C1892, ECDSA#C1892, RSA#C1892, HMAC#C1892, SHS#C1892, AES#C1933, KBKDF#C1892, KTS#C1892, DRBG#C1892, CVL#C1892 |
ECDSA#C1892, AES#C1892, RSA#C1892, HMAC#C1892, SHS#C1892, KBKDF#C1892, AES#C1933, KTS#C1892, DRBG#C1892 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
3.2, 2.2.18, 2.1.10 |
3.2, 2.2.18, 2.1.10 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES key 256: 1
- AES-256: 4
- HMAC- SHA-256: 4
- HMAC- SHA-512: 1
- HMAC-SHA- 256: 2
- HMAC-SHA- 384: 2
- HMAC-SHA-1: 4
- HMAC-SHA-224: 6
- HMAC-SHA-256: 8
- HMAC-SHA-384: 4
- HMAC-SHA-512: 2
- PKCS#1: 8
- SHA- 256: 5
- SHA- 384: 2
- SHA-1: 7
- SHA-2: 2
- SHA-224: 8
- SHA-256: 11
- SHA-384: 6
- SHA-512: 9
|
- Certlike:
- AES key 256: 1
- AES-256: 2
- HMAC- SHA-256: 2
- HMAC- SHA-512: 1
- HMAC-SHA- 256: 2
- HMAC-SHA- 384: 2
- HMAC-SHA-1: 4
- HMAC-SHA-224: 6
- HMAC-SHA-256: 10
- HMAC-SHA-384: 4
- HMAC-SHA-512: 2
- PKCS#1: 8
- SHA- 256: 5
- SHA- 384: 2
- SHA-1: 7
- SHA-2: 2
- SHA-224: 8
- SHA-256: 9
- SHA-384: 6
- SHA-512: 9
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 55
- AES-: 3
- AES-256: 4
- DES:
- constructions:
- MAC:
- CMAC: 6
- HMAC: 11
- HMAC-SHA-224: 3
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
- AES_competition:
- AES:
- AES: 55
- AES-: 4
- AES-256: 2
- DES:
- constructions:
- MAC:
- CMAC: 6
- HMAC: 11
- HMAC-SHA-224: 3
- HMAC-SHA-256: 5
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 8
- SHA-256: 11
- SHA-384: 6
- SHA-512: 9
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 8
- SHA-256: 9
- SHA-384: 6
- SHA-512: 9
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- NIST P-224: 3
- NIST P-256: 1
- P-192: 4
- P-224: 27
- P-256: 29
- P-384: 10
- P-521: 24
|
- NIST:
- NIST P-224: 2
- NIST P-256: 1
- P-192: 14
- P-224: 32
- P-256: 29
- P-384: 18
- P-521: 30
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 11
- FIPS PUB 140-2: 2
- FIPS140-2: 1
- FIPS180-4: 3
- FIPS186-4: 6
- FIPS197: 2
- FIPS198-1: 5
- NIST:
- NIST SP 800-38F: 1
- SP 800-90A: 1
- PKCS:
- RFC:
|
- FIPS:
- FIPS 140-2: 11
- FIPS PUB 140-2: 2
- FIPS140-2: 1
- FIPS180-4: 3
- FIPS186-4: 6
- FIPS197: 2
- FIPS198-1: 5
- NIST:
- NIST SP 800-38F: 1
- SP 800-90A: 1
- PKCS:
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /AAPL:Keywords: []
- /Author: Marylene Palard
- /CreationDate: D:20210816184340Z00'00'
- /Creator: Word
- /Keywords:
- /ModDate: D:20210816184340Z00'00'
- /Producer: macOS Version 10.14.6 (Build 18G95) Quartz PDFContext
- /Subject:
- /Title: Kyocera_SecurityPolicy_v1_6
- pdf_file_size_bytes: 2094238
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
- /Author: Marylene Palard
- /CreationDate: D:20220616230822Z00'00'
- /Creator: Word
- /ModDate: D:20220616230822Z00'00'
- /Producer: macOS Version 11.5.2 (Build 20G95) Quartz PDFContext
- /Title: Kyocera_SecurityPolicy_v1_7
- pdf_file_size_bytes: 2181283
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode and installed, initialized and configured as specified in Section 10.3 of the Security Policy |
When operated in FIPS mode and installed, initialized and configured as specified in Section 10.3 of the Security Policy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/August 2021_010921_0733.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/March 2023_030423_0646.pdf |
web_data/date_sunset |
|
23.08.2026 |
web_data/description |
MFP Cryptographic Module(A) is a cryptographic security chip for encrypting data written to a storage device and other security function of Kyocera multifunction printer. Secure key generation and fast AES encryption/decryption are offered through SATA interface. SecureBoot verifies the integrity of the firmware when the product starts up. |
MFP Cryptographic Module(A) is a cryptographic security chip for encrypting data written to a storage device and other security function of Kyocera multifunction printer. Secure key generation and fast AES encryption/decryption are offered through SATA interface. SecureBoot verifies the integrity of the firmware when the product starts up. |
web_data/embodiment |
Single Chip |
Single Chip |
web_data/exceptions |
Mitigation of Other Attacks: N/A |
Mitigation of Other Attacks: N/A |
web_data/fw_versions |
2, ., 2, ., 1, 8 |
2, ., 2, ., 1, 8 |
web_data/historical_reason |
SP 800-56Arev3 transition - replaced by certificate #4455 |
|
web_data/hw_versions |
V, a, u, l, t, I, P, -, 2, ., 1, ., 1, 0, , a, n, d, , E, I, P, 3, 8, -, 3, ., 2 |
V, a, u, l, t, I, P, -, 2, ., 1, ., 1, 0, , a, n, d, , E, I, P, 3, 8, -, 3, ., 2 |
web_data/level |
2 |
2 |
web_data/mentioned_certs |
|
|
web_data/module_name |
MFP Cryptographic Module(A) |
MFP Cryptographic Module(A) |
web_data/module_type |
Hardware |
Hardware |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
active |
web_data/sw_versions |
None |
None |
web_data/tested_conf |
Kyocera SCH114C |
Kyocera SCH114C |
web_data/validation_history |
- date: 24.08.2021
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
- date: 22.03.2023
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
web_data/vendor |
Kyocera Document Solutions Inc. |
Kyocera Document Solutions Inc. |
web_data/vendor_url |
http://www.kyoceradocumentsolutions.com |
http://www.kyoceradocumentsolutions.com |