Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
383-4-172
IAIK-JCE CC Core 3.15
JISEC-CC-CRP-C0107
name EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™ IAIK-JCE CC Core 3.15
category Other Devices and Systems Products for Digital Signatures
scheme CA JP
not_valid_after 15.05.2017 07.10.2013
not_valid_before 30.05.2011 27.06.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v531-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0107_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v531-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0107_est.pdf
manufacturer EMC Corporation Stiftung Secure Information and Communication Technologies SIC
manufacturer_web https://www.emc.com/ https://jce.iaik.tugraz.at/
security_level EAL3+, ALC_FLR.2 EAL3
dgst 5c135ac1bf057d70 ee01e752b230504e
heuristics/cert_id 383-4-172 JISEC-CC-CRP-C0107
heuristics/cert_lab CANADA []
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1
heuristics/extracted_versions 7.0, 5.31 3.15
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0107
  • certification_date: 01.06.2007
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0107_eimg.pdf
    • description: PRODUCT DESCRIPTION The IAIK-JCE CC Core is a set of APIs and implementations of cryptographic functionality. Including: - hash functions - signature schemes - block ciphers - stream ciphers - asymmetric ciphers - message authentication codes - random number generators It supplements the security functionality of the default Java Runtime Environment. The IAIK-JCE CC Core is delivered to the customer as part of the IAIK-JCE toolkit, which extends the CC Core by additional algorithms, features and protocols.
    • evaluation_facility: TÜV Informationstechnik GmbH Evaluation Body for IT-Security
    • product: IAIK-JCE CC Core
    • product_type: IT Product (cryptographic library)
    • report_link: https://www.ipa.go.jp/en/security/c0107_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0107_est.pdf
    • toe_version: 3.15
    • vendor: Stiftung Secure Information and Communication Technologies SIC
  • expiration_date: 01.10.2013
  • supplier: Stiftung Secure Information and Communication Technologies SIC
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0107_it6096.html
  • toe_overseas_name: IAIK-JCE CC Core 3.15
pdf_data/report_filename emc-vnx-v531-cert-eng.pdf c0107_erpt.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-172-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-172: 1
    • 383-4-172-CR: 1
  • JP:
    • CRP-C0107-01: 1
    • Certification No. C0107: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 4
    • EAL 3+: 3
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/cc_claims
  • O:
    • O.MAC: 3
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 3
  • TUV:
    • TÜV Informationstechnik: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
    • RC:
      • RC2: 3
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 4
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
    • RSA-OAEP: 1
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 4
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 7
      • SHA-384: 6
      • SHA-512: 7
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 1
  • OFB:
    • OFB: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • BSI:
    • AIS 20: 1
    • AIS20: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • FIPS:
    • FIPS 46-3: 2
    • FIPS PUB 180-1: 5
    • FIPS PUB 180-2: 11
    • FIPS PUB 197: 3
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 10118-3: 4
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • PKCS:
    • PKCS#1: 2
  • RFC:
    • RFC 2268: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • secret. A.KeyManagement The IT-Environment is responsible for key management. Key management is out of scope of the TOE. O.PrivateKey and O.SecretKey, needed for computation of O.CipherText, O.MAC and O: 1
pdf_data/report_metadata
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: sjackson
  • /CC Version: 3.1R3
  • /CC date: July 2009
  • /CEM Version: 3.1R3
  • /CEM date: July 2009
  • /CR_Date: TBD
  • /CR_Version: 1.0
  • /Client City: Hopkinton
  • /Client Country: USA
  • /Client Full Name: EMC Corporation
  • /Client Postal Code: 01748
  • /Client Short Name: EMC
  • /Client State: MA
  • /Client Street: 171 South Street
  • /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
  • /Company: Hewlett-Packard
  • /CreationDate: D:20110708105045-04'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer Long Name: EMC Corporation
  • /Developer Short Name: EMC
  • /EAL Level: 3+
  • /EAL Level Base: 3
  • /EAL Level Text: 3 augmented
  • /EAL Long: EAL 3 Augmented
  • /EAL Short: EAL 3+
  • /ER Document Date: 15 September 2010
  • /ER Version: Version 1.0
  • /ETPlan_Doc#: 1683-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 1.0
  • /ETPlan_date: 7 April 2011
  • /ETProcRes_Date: 7 April 2011
  • /ETProcRes_Doc#: 1683-000-D004
  • /ETProcRes_Title: Evaluation Test Procedures and Test results
  • /ETProcRes_Version: 1.0
  • /ETProc_Date: 7 April 2011
  • /ETProc_Doc#: 1683-000-D004
  • /ETProc_Title: Evaluation Test Procedures and Test results
  • /ETProc_Version: 1.0
  • /ETReport_Date: 30 May 2011
  • /ETReport_Doc#: 1683-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_TitleShort: ETR
  • /ETReport_Version: 1.2
  • /EWP_Date: 12 November 2010
  • /EWP_Doc#: 1683-000-D001
  • /EWP_Title: Evaluation Work Plan
  • /EWP_Version: 1.0
  • /Eval number: 383-4-172
  • /Eval_End_Date: 1 July 2011
  • /Eval_Start_Date: 2 August 2010
  • /Keywords:
  • /LeadEvaluator: Greg Lague
  • /LeadEvaluatorInitials: GL
  • /ModDate: D:20110708105130-04'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ProjectManager: M. Gauvreau
  • /ProjectManagerInitials: MG
  • /ProjectNumber: 1683
  • /ST_Date: 27 May 2011
  • /ST_Title: EMC® VNX OE for Block v5.31 with Unisphere™ running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE (VNX for File v7.0 and VNX for Block v5.31) with Unisphere™ running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
  • /ST_Version: 0.8
  • /SVC_Date: 9 December 2009
  • /SVC_Doc#: 1683-000-D007
  • /SVC_Title: Site Visit Checklist
  • /SVC_Version: 0.1
  • /SVR_Date: 7 April 2011
  • /SVR_Doc#: 1683-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: 1.0
  • /SV_City: Hopkinton, MA
  • /Security Classification: EWA-Canada & EMC Proprietary
  • /SourceModified: D:20110708141631
  • /Sponsor: EMC
  • /Sponsor City: Hopkinton
  • /Sponsor Country: USA
  • /Sponsor Postal Code: 01748
  • /Sponsor State: MA
  • /Sponsor Street: 171 South Street
  • /Subject:
  • /TOE: EMC® VNX OE for Block v5.31 with Unisphere™ running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE (VNX for File v7.0 and VNX for Block v5.31) with Unisphere™ running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
  • /TOE Short: EMC® VNX OE
  • /TOE Short with version: EMC® VNX OE
  • /TOE Short-NoTM: EMC® VNX OE
  • /TOE Version: Block v5.31 and File v7.0
  • /TOE with version: EMC® VNX OE for Block v5.31 and File v7.0 with Unisphere™ running on VNX Series Hardware
  • /TOE-NoTM: EMC VNX OE for Block v5.31 and File v7.0 with Unisphere running on VNX Series Hardware
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • pdf_file_size_bytes: 89946
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 12
  • /CreationDate: D:20080207191148+09'00'
  • /ModDate: D:20080207191148+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 132396
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename emc-vnx-v531-sec-eng.pdf c0107_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL3+: 4
  • EAL:
    • EAL 3: 2
    • EAL3: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_CAP.3: 4
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 4
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 11
    • ADV_HLD.1: 3
    • ADV_HLD.2: 3
    • ADV_RCR.1: 4
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 5
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 1
    • ATE_FUN.1: 6
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 4
    • AVA_SOF.1: 2
    • AVA_VLA.1: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 2
    • FDP_ACF: 17
    • FDP_ACF.1: 8
    • FDP_SDI.1: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 32
    • FMT_MSA.1: 2
    • FMT_MSA.3: 4
    • FMT_MTD: 18
    • FMT_MTD.1: 3
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FCS:
    • FCS_CKM: 87
    • FCS_CKM.1: 4
    • FCS_CKM.2: 9
    • FCS_CKM.4: 26
    • FCS_CKM.4.1: 2
    • FCS_COP: 123
    • FCS_COP.1: 9
    • FCS_RND: 21
    • FCS_RND.1: 5
    • FCS_RND.1.1: 1
    • FCS_RND.1.2: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 2
    • FDP_ITC: 13
    • FDP_ITC.1: 41
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 22
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 2
  • FMT:
    • FMT_MSA: 6
    • FMT_MSA.2: 32
    • FMT_MSA.3: 2
  • FPT:
    • FPT_TST: 2
    • FPT_TST.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.PROTECT: 2
    • A.TIMESTAMP: 2
  • O:
    • O.ADMIN: 23
    • O.AUDIT: 4
    • O.AUDIT_REVIEW: 4
    • O.BYPASS: 7
    • O.PROTECT: 16
  • OE:
    • OE.PROPER_NAME_ASSIGNME: 2
    • OE.PROPER_NAME_ASSIGNMEN: 1
    • OE.SECURE_COMMUNICATIO: 6
    • OE.SECURE_COMMUNICATION: 1
    • OE.SECURE_SERVERS: 7
    • OE.TIME: 3
  • T:
    • T.DATA_CORRUPTION: 2
    • T.IMPROPER_CONFIG: 2
    • T.IMPROPER_SERVER: 2
    • T.MEDIATE_ACCESS: 2
    • T.UNAUTH: 2
  • A:
    • A.XXX: 1
  • O:
    • O.MAC: 8
    • O.XXX: 1
  • OE:
    • OE.XXX: 1
  • OT:
    • OT.XXX: 1
  • T:
    • T.XXX: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
    • RC:
      • RC2: 7
  • DES:
    • 3DES:
      • Triple-DES: 3
      • TripleDES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 8
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 1
    • RSA-OAEP: 1
    • RSA-PSS: 1
pdf_data/st_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 11
  • SHA:
    • SHA1:
      • SHA-1: 28
    • SHA2:
      • SHA-256: 17
      • SHA-384: 14
      • SHA-512: 17
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 22
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 4
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CFB:
    • CFB: 2
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 2
  • OFB:
    • OFB: 2
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • side channel: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 2
    • AIS20: 7
    • AIS31: 1
  • FIPS:
    • FIPS 46-3: 4
    • FIPS PUB 180-1: 11
    • FIPS PUB 180-2: 29
    • FIPS PUB 186-2: 2
    • FIPS PUB 197: 5
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 10118-3: 8
  • PKCS:
    • PKCS#1: 14
    • PKCS#11: 1
  • RFC:
    • RFC 2104: 5
    • RFC 2268: 5
    • RFC2104: 1
    • RFC2268: 1
  • X509:
    • X.509: 1
pdf_data/st_keywords/javacard_packages
  • java:
    • java.security: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Key Management. The IT-Environment is responsible for key management. Key management is out of scope of the TOE. O.PrivateKey and O.SecretKey, needed for computation of O.CipherText, O.MAC and O: 1
    • its own key pad for entering this authentication data. Displaying data to be signed or verified is out of scope of the TOE. • Conventional Signatures. The TOE is used without hardware support to create: 1
    • out of scope: 3
    • several algorithms that can be used for data encryption and decryption. Key management is out of scope of the TOE. The application provides the keys to the TOE. The TOE does not modify the keys it gets: 1
pdf_data/st_metadata
  • /Author: Greg Milliken
  • /CreationDate: D:20110527131502Z
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110621111006-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
  • /Title: Security Target
  • pdf_file_size_bytes: 887892
  • pdf_hyperlinks: mailto:[email protected], http://www.corsec.com/, http://www.emc.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different