Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SENETAS CN SERIES APPLICATION SOFTWARE V3.0.1 & SENETAS CM MANAGEMENT APPLICATION SOFTWARE V7.6.1
Certificate Number: 2017/113
IAIK-JCE CC Core 3.15
JISEC-CC-CRP-C0107
name SENETAS CN SERIES APPLICATION SOFTWARE V3.0.1 & SENETAS CM MANAGEMENT APPLICATION SOFTWARE V7.6.1 IAIK-JCE CC Core 3.15
category Network and Network-Related Devices and Systems Products for Digital Signatures
scheme AU JP
not_valid_after 12.12.2022 07.10.2013
not_valid_before 12.12.2017 27.06.2007
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFC-T087%20EPL%20Certificate%202017-113.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFC-T087%20Certification%20Report%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0107_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/T0087-500-034-Senetas%20CN%20Series%20-%20SecurityTarget%20v2.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0107_est.pdf
manufacturer Senetas Security Pty Ltd Stiftung Secure Information and Communication Technologies SIC
manufacturer_web https://www.senetas.com https://jce.iaik.tugraz.at/
security_level EAL2+, ALC_FLR.2 EAL3
dgst 56f44d82b00a4c0f ee01e752b230504e
heuristics/cert_id Certificate Number: 2017/113 JISEC-CC-CRP-C0107
heuristics/extracted_sars ALC_FLR.2 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1
heuristics/extracted_versions 7.6.1, 3.0.1 3.15
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0107
  • certification_date: 01.06.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0107_eimg.pdf
    • description: PRODUCT DESCRIPTION The IAIK-JCE CC Core is a set of APIs and implementations of cryptographic functionality. Including: - hash functions - signature schemes - block ciphers - stream ciphers - asymmetric ciphers - message authentication codes - random number generators It supplements the security functionality of the default Java Runtime Environment. The IAIK-JCE CC Core is delivered to the customer as part of the IAIK-JCE toolkit, which extends the CC Core by additional algorithms, features and protocols.
    • evaluation_facility: TÜV Informationstechnik GmbH Evaluation Body for IT-Security
    • product: IAIK-JCE CC Core
    • product_type: IT Product (cryptographic library)
    • report_link: https://www.ipa.go.jp/en/security/c0107_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0107_est.pdf
    • toe_version: 3.15
    • vendor: Stiftung Secure Information and Communication Technologies SIC
  • expiration_date: 01.10.2013
  • supplier: Stiftung Secure Information and Communication Technologies SIC
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0107_it6096.html
  • toe_overseas_name: IAIK-JCE CC Core 3.15
maintenance_updates
pdf_data/cert_filename EFC-T087 EPL Certificate 2017-113.pdf
pdf_data/cert_keywords/cc_cert_id
  • AU:
    • Certificate Number: 2017/113: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20171220113351+10'00'
  • /Creator: KM_C364e
  • /ModDate: D:20171220113351+10'00'
  • /Producer: KONICA MINOLTA bizhub C364e
  • /Title: KM_C364e-20171220113351
  • pdf_file_size_bytes: 883044
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename EFC-T087 Certification Report v1.0.pdf c0107_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • AU:
    • Certification Report 2017/113: 1
  • FR:
    • Certification Report 2017/113: 1
  • JP:
    • CRP-C0107-01: 1
    • Certification No. C0107: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL2: 6
    • EAL2 augmented: 3
    • EAL2+: 2
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.CM: 1
  • O:
    • O.MAC: 3
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 5
    • RC:
      • RC2: 3
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
    • RSA-OAEP: 1
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 4
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 7
      • SHA-384: 6
      • SHA-512: 7
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/cipher_mode
  • CFB:
    • CFB: 3
  • CBC:
    • CBC: 1
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 1
  • OFB:
    • OFB: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 6
  • BSI:
    • AIS 20: 1
    • AIS20: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 46-3: 2
    • FIPS PUB 180-1: 5
    • FIPS PUB 180-2: 11
    • FIPS PUB 197: 3
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 10118-3: 4
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • PKCS:
    • PKCS#1: 2
  • RFC:
    • RFC 2268: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • secret. A.KeyManagement The IT-Environment is responsible for key management. Key management is out of scope of the TOE. O.PrivateKey and O.SecretKey, needed for computation of O.CipherText, O.MAC and O: 1
pdf_data/report_metadata
  • /Author: ACA
  • /Comments:
  • /Company: Department of Defence
  • /CreationDate: D:20171214103015+11'00'
  • /Creator: Acrobat PDFMaker 15 for Word
  • /Keywords:
  • /ModDate: D:20171214103018+11'00'
  • /Objective-Caveats:
  • /Objective-Classification: [Inherited - Unclassified]
  • /Objective-Comment:
  • /Objective-CreationStamp: D:20171201
  • /Objective-DatePublished:
  • /Objective-Document Type [system]:
  • /Objective-FileNumber:
  • /Objective-Id: R32415130
  • /Objective-IsApproved: 0
  • /Objective-IsPublished: 0
  • /Objective-ModificationStamp: D:20171213
  • /Objective-Owner: Chan, Hin (Mr)(I&S ASD)
  • /Objective-Parent: Certification
  • /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Strategic Policy and Intelligence Group:ASD : Australian Signals Directorate:CISD:ASCS:CS-PD1:Evaluations:ACA:Australasn Certn Auth:Certification:Operations:AISEP Certification Records:EFC-T087 Senetas
  • /Objective-State: Being Edited
  • /Objective-Title: EFC-T087 Certification Report v0.1
  • /Objective-Version: 0.9
  • /Objective-VersionComment:
  • /Objective-VersionNumber: 9
  • /Producer: Adobe PDF Library 15.0
  • /SourceModified: D:20171213232958
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 145037
  • pdf_hyperlinks: http://www.asd.gov.au/, https://www.gcsb.govt.nz/publications/the-nz-information-security-manual/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /CreationDate: D:20080207191148+09'00'
  • /ModDate: D:20080207191148+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 132396
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename T0087-500-034-Senetas CN Series - SecurityTarget v2.3.pdf c0107_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 3
    • EAL2+: 4
  • EAL:
    • EAL 3: 2
    • EAL3: 5
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 5
  • ACM:
    • ACM_CAP.3: 4
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 4
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 11
    • ADV_HLD.1: 3
    • ADV_HLD.2: 3
    • ADV_RCR.1: 4
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 5
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 4
    • AVA_SOF.1: 2
    • AVA_VLA.1: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 2
    • FAU_GEN.1.1: 6
    • FAU_GEN.1.2: 4
    • FAU_SAR.1: 2
    • FAU_SAR.1.1: 5
    • FAU_SAR.1.2: 3
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 18
    • FCS_CKM.2: 2
    • FCS_CKM.2.1: 7
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 8
    • FCS_COP.1: 12
    • FCS_COP.1.1: 35
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 4
    • FDP_ACC.1.1: 5
    • FDP_ACF.1: 3
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 6
    • FDP_DAU.1: 2
    • FDP_DAU.1.1: 6
    • FDP_DAU.1.2: 4
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 5
    • FDP_IFF.1: 3
    • FDP_IFF.1.1: 6
    • FDP_IFF.1.2: 5
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 5
    • FDP_IFF.1.5: 3
    • FDP_IFF.1.6: 1
    • FDP_UCT.1: 3
    • FDP_UCT.1.1: 5
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 5
    • FIA_AFL.1.2: 3
    • FIA_UAU.1: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 5
    • FIA_UAU.5: 1
    • FIA_UAU.5.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 3
    • FIA_UID.2.1: 3
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 12
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 10
    • FMT_MSA.3.2: 10
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 7
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 4
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 5
  • FPT:
    • FPT_FLS.1: 3
    • FPT_FLS.1.1: 5
    • FPT_ITT.1: 2
    • FPT_ITT.1.1: 5
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 9
    • FPT_STM.1: 4
    • FPT_STM.1.1: 5
    • FPT_TST.1: 3
    • FPT_TST.1.1: 4
    • FPT_TST.1.2: 4
    • FPT_TST.1.3: 4
  • FTA:
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 5
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 5
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
  • FCS:
    • FCS_CKM: 87
    • FCS_CKM.1: 4
    • FCS_CKM.2: 9
    • FCS_CKM.4: 26
    • FCS_CKM.4.1: 2
    • FCS_COP: 123
    • FCS_COP.1: 9
    • FCS_RND: 21
    • FCS_RND.1: 5
    • FCS_RND.1.1: 1
    • FCS_RND.1.2: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 2
    • FDP_ITC: 13
    • FDP_ITC.1: 41
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 22
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 2
  • FMT:
    • FMT_MSA: 6
    • FMT_MSA.2: 32
    • FMT_MSA.3: 2
  • FPT:
    • FPT_TST: 2
    • FPT_TST.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.AUDIT: 3
    • A.CM: 3
    • A.INSTALL: 3
    • A.LOCATE: 3
    • A.PRIVATEKEY: 3
  • O:
    • O.ADMIN: 10
    • O.AUDIT: 9
    • O.AUDITLOG: 8
    • O.AUTHDATA: 5
    • O.CERTGEN: 10
    • O.CONNECT: 2
    • O.ENCRYPT: 9
    • O.FAILSAFE: 6
    • O.IDENT: 9
    • O.INFOFLOW: 9
    • O.INSTALL: 6
    • O.KEYMAN: 11
    • O.PERSONNEL: 6
    • O.PHYSICAL: 4
    • O.REMOTEMGT: 8
    • O.ROLEMGT: 5
    • O.ROLES: 6
    • O.TAMPER: 7
  • T:
    • T.ABUSE: 3
    • T.ATTACK: 3
    • T.CAPTURE: 3
    • T.CONNECT: 3
    • T.IMPERSON: 3
    • T.LINK: 3
    • T.MAL: 3
    • T.OBSERVE: 3
    • T.PHYSICAL: 3
    • T.PRIVILEGE: 3
  • A:
    • A.XXX: 1
  • O:
    • O.MAC: 8
    • O.XXX: 1
  • OE:
    • OE.XXX: 1
  • OT:
    • OT.XXX: 1
  • T:
    • T.XXX: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
  • DES:
    • 3DES:
      • 3DES: 3
    • DES:
      • DES: 7
  • AES_competition:
    • AES:
      • AES: 7
    • RC:
      • RC2: 7
  • DES:
    • 3DES:
      • Triple-DES: 3
      • TripleDES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 8
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • Diffie-Hellman: 5
  • RSA:
    • RSA 1024: 1
    • RSA-OAEP: 1
    • RSA-PSS: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 3
  • RIPEMD:
    • RIPEMD-160: 11
  • SHA:
    • SHA1:
      • SHA-1: 28
    • SHA2:
      • SHA-256: 17
      • SHA-384: 14
      • SHA-512: 17
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 6
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 22
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 11
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CFB:
    • CFB: 5
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 5
  • CBC:
    • CBC: 2
  • CFB:
    • CFB: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 2
  • OFB:
    • OFB: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 2
    • P-256: 20
    • P-384: 22
    • P-521: 16
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • SCA:
    • side channel: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 3
    • FIPS PUB 140-2: 5
    • FIPS PUB 180-1: 2
    • FIPS PUB 186-2: 4
    • FIPS PUB 186-4: 3
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
    • FIPS PUB 81: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS #3: 2
    • PKCS 12: 1
    • PKCS#1: 2
  • RFC:
    • RFC 2459: 1
    • RFC 2574: 1
    • RFC2574: 1
  • X509:
    • X.509: 44
  • BSI:
    • AIS 20: 1
    • AIS 31: 2
    • AIS20: 7
    • AIS31: 1
  • FIPS:
    • FIPS 46-3: 4
    • FIPS PUB 180-1: 11
    • FIPS PUB 180-2: 29
    • FIPS PUB 186-2: 2
    • FIPS PUB 197: 5
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 10118-3: 8
  • PKCS:
    • PKCS#1: 14
    • PKCS#11: 1
  • RFC:
    • RFC 2104: 5
    • RFC 2268: 5
    • RFC2104: 1
    • RFC2268: 1
  • X509:
    • X.509: 1
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Key Management. The IT-Environment is responsible for key management. Key management is out of scope of the TOE. O.PrivateKey and O.SecretKey, needed for computation of O.CipherText, O.MAC and O: 1
    • its own key pad for entering this authentication data. Displaying data to be signed or verified is out of scope of the TOE. • Conventional Signatures. The TOE is used without hardware support to create: 1
    • out of scope: 3
    • several algorithms that can be used for data encryption and decryption. Key management is out of scope of the TOE. The application provides the keys to the TOE. The TOE does not modify the keys it gets: 1
pdf_data/st_metadata
  • /Author: Ben King
  • /CreationDate: D:20171130095659+11'00'
  • /Creator: Microsof Word 2016
  • /ModDate: D:20171130095659+11'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1041097
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different