Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Hitachi Unified Storage VM Control Program 73-03-09-00/00(H7-03-10_Z)
JISEC-CC-CRP-C0513
Philips Secure Smart Card Controller P5CT072V0P, P5CC072V0P,P5CD072V0P and P5CD036V0P each with specific IC Dedicated Software
BSI-DSZ-CC-0348-2006
name Hitachi Unified Storage VM Control Program 73-03-09-00/00(H7-03-10_Z) Philips Secure Smart Card Controller P5CT072V0P, P5CC072V0P,P5CD072V0P and P5CD036V0P each with specific IC Dedicated Software
category Access Control Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 01.06.2021 01.09.2019
not_valid_before 01.06.2016 01.01.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0513_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0513_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348b.pdf
manufacturer Hitachi, Ltd. Philips Semiconductors GmbH
manufacturer_web https://www.hitachi.com/ https://www.philips.com/
security_level EAL2+, ALC_FLR.1 AVA_MSU.3, EAL5+, AVA_VLA.4, ALC_DVS.2
dgst 39aad7a04c77c692 0f88fe08d16a1edc
heuristics/cert_id JISEC-CC-CRP-C0513 BSI-DSZ-CC-0348-2006
heuristics/cert_lab [] BSI
heuristics/extracted_sars ALC_FLR.1, AGD_OPE.1, ASE_ECD.1, ADV_FSP.2, ALC_DEL.1, ALC_CMS.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_IND.2, ADV_TDS.1, ASE_TSS.1, ATE_FUN.1, AGD_PRE.1, ALC_CMC.2 AGD_USR.1, ALC_TAT.2, ADV_INT.1, ADV_SPM.3, ADV_FSP.3, ADV_RCR.2, AVA_MSU.3, ADV_HLD.3, ADV_IMP.2, ASE_INT.1, ASE_SRE.1, ATE_IND.2, ASE_REQ.1, ASE_TSS.1, ASE_PPC.1, ALC_LCD.2, ATE_COV.2, ATE_FUN.1, AVA_CCA.1, ALC_DVS.2, AVA_SOF.1, ASE_OBJ.1, AVA_VLA.4, ADV_LLD.1, ASE_DES.1, ASE_ENV.1, AGD_ADM.1, ATE_DPT.2
heuristics/extracted_versions 09, 03, 00, 73 -
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0349-2006, ANSSI-CC-2007/06, ANSSI-CC-2007/02, BSI-DSZ-CC-0375-2007, BSI-DSZ-CC-0426-2007, ANSSI-CC-2007/16, ANSSI-CC-2006/13, BSI-DSZ-CC-0294-2006
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0384-2007, ANSSI-CC-2006/23, BSI-DSZ-CC-0506-2008, BSI-DSZ-CC-0349-2006, ANSSI-CC-2007/06, BSI-DSZ-CC-0445-2007, ANSSI-CC-2007/02, ANSSI-CC-2006/28, BSI-DSZ-CC-0375-2007, BSI-DSZ-CC-0426-2007, ANSSI-CC-2007/16, BSI-DSZ-CC-0362-2006, ANSSI-CC-2006/13, BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0507-2008
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0513
  • certification_date: 01.06.2016
  • claim: EAL2+ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0513_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM". This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Hitachi Unified Storage VM Control Program
    • product_type: Control Program for storage system
    • report_link: https://www.ipa.go.jp/en/security/c0513_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0513_est.pdf
    • toe_version: 73-03-09-00/00(H7-03-10_Z)
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.07.2021
  • supplier: Hitachi, Ltd.
  • toe_japan_name: Hitachi Unified Storage VM Control Program73-03-09-00/00(H7-03-10_Z)
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0513_it4503.html
  • toe_overseas_name: Hitachi Unified Storage VM Control Program73-03-09-00/00(H7-03-10_Z)
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0426-2007, ANSSI-CC-2007/16
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0426-2007, ANSSI-CC-2007/16
maintenance_updates


pdf_data/report_filename c0513_erpt.pdf 0348a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0348-2006
    • cert_item: Philips Secure Smart Card Controller P5CT072V0P, P5CC072V0P, P5CD072V0P and P5CD036V0P each with specific IC Dedicated Software
    • cert_lab: BSI
    • developer: Philips Semiconductors GmbH Business Line Identification Certification Report V1.0 ZS-01-01-F-330 V3.23 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 228 9582-0, Fax +49 228 9582-455, Infoline +49 228 9582-111
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0513-01: 1
    • Certification No. C0513: 1
  • DE:
    • BSI-DSZ-CC-0348: 3
    • BSI-DSZ-CC-0348-2006: 25
  • NL:
    • CC-0227-2004: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002-2001: 1
    • BSI-PP-0002-: 1
    • BSI-PP-0002-2001: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 5: 2
    • EAL 5 augmented: 2
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 10
    • EAL5: 9
    • EAL5 augmented: 1
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 2
    • ACM_CAP: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 2
    • ACM_SCP.3: 3
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.3: 2
    • ADV_HLD: 2
    • ADV_HLD.3: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 2
    • ADV_INT: 2
    • ADV_INT.1: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.2: 2
    • ADV_SPM: 2
    • ADV_SPM.3: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 3
    • ALC_TAT: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.2: 2
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_CCA.1: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 3
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF.1: 3
    • FDP_IFC.1: 1
    • FDP_ITC.1: 1
    • FDP_ITT.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 3
    • FMT_MSA.2: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_SEP.1: 2
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 1
    • A.EXTERNAL_SERVER: 1
    • A.MAINTENCE_PC: 1
    • A.MANAGEMENT_PC: 1
    • A.MANAGE_SECRET: 1
    • A.NOEVIL: 1
    • A.PHYSICAL_SEC: 1
  • T:
    • T.CHG_CONFIG: 1
    • T.HDD_REUSE: 1
    • T.HDD_THEFT: 1
    • T.LP_LEAK: 1
    • T.TSF_COMP: 1
  • O:
    • O.C: 1
  • R:
    • R.O: 1
pdf_data/report_keywords/vendor
  • Philips:
    • Philips: 53
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 21
  • DES:
    • 3DES:
      • TDEA: 2
      • Triple-DES: 11
    • DES:
      • DEA: 1
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 8
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 4
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 8
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • physical tampering: 1
  • SCA:
    • Physical Probing: 1
    • physical probing: 2
    • side channel: 1
    • timing attacks: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • BSI:
    • AIS 25: 2
    • AIS 26: 3
    • AIS 31: 4
    • AIS 32: 3
    • AIS 34: 3
    • AIS 36: 6
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 15408:1999: 1
    • ISO/IEC15408: 1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Controller, Preliminary Specification, Philips Semiconductors, Revision 2.0, September 14th, 2005 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD: 1
    • P5CC072V0P, P5CD072V0P and P5CD036V0P Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0348, Version 1.2, 17 January 2006, Evaluation of Philips: 1
    • P5CC072V0P, Product Specification, Philips Semiconductors, Revision 3.0, November 24th, 2005 (confidential document) [19] Data Sheet, P5CD072V0P/V0Q, SmartMX, Secure Dual Interface PKI Smart Card Controller: 1
    • Semiconductors, 13 January 2006 (confidential document) B-26 BSI-DSZ-CC-0348-2006 Certification Report [12] Data Sheet, P5CT072V0P/V0Q, SmartMX, Secure: 1
    • Technical Report, Philips P5CT072V0P Secure Smart Card Controller, Version 1.1, 3. March 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German: 1
    • the P5CT072V0P/Q, BSI-DSZ-CC-0348/0349, Version 1.2, Philips Semiconductors, February 9th, 2006 (confidential document) [15] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification: 1
    • to AIS 36, Version 1.1, 3. March 2006 for Philips P5CT072V0P Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CT072V0P and P5CT072V0Q, Version 1.1: 1
pdf_data/report_metadata
  • /CreationDate: D:20160906162526+09'00'
  • /Creator: Microsof Word 2010
  • /ModDate: D:20160906162545+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 886854
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Category: Common Criteria Zertifizierung
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20060329122212+02'00'
  • /Creator: Acrobat PDFMaker 7.0.7 für Word
  • /Keywords: Common Criteria, Smartcard, Zertifizierung, Certification
  • /ModDate: D:20060329122407+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20060329102148
  • /Title: Certification Report BSI-DSZ-CC-0348-2006
  • pdf_file_size_bytes: 415971
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
pdf_data/st_filename c0513_est.pdf 0348b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0348: 88
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 2
    • EAL4: 4
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL5: 34
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT: 1
    • ACM_AUT.1: 1
    • ACM_CAP: 1
    • ACM_CAP.4: 2
    • ACM_SCP: 3
    • ACM_SCP.2: 4
    • ACM_SCP.3: 5
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 2
    • ADO_IGS: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 3
    • ADV_FSP.2: 4
    • ADV_FSP.3: 6
    • ADV_HLD: 1
    • ADV_HLD.3: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_LLD: 1
    • ADV_LLD.1: 1
    • ADV_RCR: 4
    • ADV_RCR.2: 1
    • ADV_SPM: 1
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 2
    • AGD_USR: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA.1: 1
    • AVA_MSU: 2
    • AVA_MSU.3: 1
    • AVA_SOF.1: 2
    • AVA_VLA.4: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 19
    • FIA_ATD.1: 6
    • FIA_SOS: 20
    • FIA_SOS.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 18
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 18
    • FIA_UID.2.1: 1
    • FIA_USB: 19
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 10
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 9
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 6
    • FCS_CKM.4: 4
    • FCS_COP.1: 28
    • FCS_COP.1.1: 2
    • FCS_RND.1: 5
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 34
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 30
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 10
    • FDP_ITC.1: 6
    • FDP_ITT.1: 6
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MSA.1: 29
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 6
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 7
    • FPT_ITT.1: 6
    • FPT_PHP.3: 7
    • FPT_SEP.1: 16
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FRU:
    • FRU_FLT.2: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 3
    • A.EXTERNAL_SERVER: 3
    • A.MAINTENANCE_PC: 3
    • A.MANAGEMENT_PC: 3
    • A.MANAGE_SECRET: 3
    • A.NOEVIL: 3
    • A.PHYSICAL_SEC: 3
  • O:
    • O.ADM_AUTH: 8
    • O.ADM_ROLE: 5
    • O.AUD_GEN: 7
    • O.HDD_: 2
    • O.HDD_ENC: 6
    • O.HDD_SHRED: 3
    • O.HOST_ACCESS: 8
    • O.SEC_COMM: 8
    • O.SWITCH_AUTH: 6
  • OE:
    • OE.CONNECT_STORAGE: 2
    • OE.EXTERNAL_SERVER: 3
    • OE.FC-SP_HBA: 3
    • OE.HDD_ENC: 2
    • OE.MAINTENANCE_PC: 3
    • OE.MANAGEMENT_PC: 2
    • OE.MANAGE_SECRET: 3
    • OE.NOEVIL: 2
    • OE.PHYSICAL_SEC: 3
  • T:
    • T.CHG_CONFIG: 3
    • T.HDD_REUSE: 3
    • T.HDD_THEFT: 3
    • T.LP_LEAK: 3
    • T.TSF_COMP: 3
  • O:
    • O.CONFIG: 8
    • O.HW_AES: 10
    • O.MEM_ACCESS: 9
    • O.MF_FW: 7
    • O.RND: 3
    • O.SFR_ACCESS: 7
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Philips:
    • Philips: 123
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
  • AES_competition:
    • AES:
      • AES: 67
  • DES:
    • 3DES:
      • TDEA: 3
      • Triple-DEA: 1
      • Triple-DES: 10
    • DES:
      • DEA: 2
      • DES: 29
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 512: 1
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
    • TLS:
      • TLS: 2
      • TLSv1.0: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 12
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 10
    • fault injection: 3
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 15
    • Physical Probing: 2
    • physical probing: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
  • RFC:
    • RFC2865: 2
  • BSI:
    • AIS31: 3
  • FIPS:
    • FIPS PUB 197: 3
    • FIPS PUB 46: 1
    • FIPS PUB 46-3: 3
pdf_data/st_metadata
  • /Author: 八木
  • /CreationDate: D:20160901154345+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160901154345+09'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: CC EAL2 Security Target
  • /Title: USP_V ST
  • pdf_file_size_bytes: 1329681
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 77
  • /Author: HGA
  • /Company: Philips Semiconductors BL ID
  • /CreationDate: D:20060117165340+01'00'
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /ModDate: D:20060117165552+01'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20060117155305
  • /Title: Security Target
  • pdf_file_size_bytes: 741132
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different