Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HDD Data Encryption Kit E-Series 2.10
JISEC-CC-CRP-C0506
Cybertrust UniCERT v5.2.1
Certificate Number: 2006/39
name HDD Data Encryption Kit E-Series 2.10 Cybertrust UniCERT v5.2.1
category Other Devices and Systems Products for Digital Signatures
scheme JP AU
not_valid_after 25.04.2021 13.07.2017
not_valid_before 25.04.2016 25.10.2006
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFAT028_Certification_Report_V1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cybertrust_UniCERT_5.2.1_ST.pdf
manufacturer Canon Inc. Cybertrust
manufacturer_web https://www.canon.com/ https://www.cybertrust.com/
security_level EAL3 EAL4+, ALC_FLR.2
dgst 62bf2f602b0262f1 6780328fff5788c0
heuristics/cert_id JISEC-CC-CRP-C0506 Certificate Number: 2006/39
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_ENV.1, ADV_RCR.1, AVA_VLA.2, AGD_AGD.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions 2.10 5.2.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0506
  • certification_date: 01.04.2016
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0506_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is an optional hardware product to encrypt data to be stored in the HDD of Canon Multifunctional Product (MFP) and printer. By using this product, data to be stored in the HDD can be encrypted without compromising the scalability or processing performance of the Canon MFP and printer. TOE security functionality The TOE provides the following security functions. - HDD Data Encryption - Cryptographic Key Management - Self-Test
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: HDD Data Encryption Kit E-Series
    • product_type: Cryptographic hardware for MFPs and printers
    • report_link: https://www.ipa.go.jp/en/security/c0506_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0506_est.pdf
    • toe_version: 2.10
    • vendor: Canon Inc.
  • expiration_date: 01.05.2021
  • revalidations: [frozendict({'date': '2017-04', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534_02.html'})]
  • supplier: Canon Inc.
  • toe_japan_name: HDD Data Encryption Kit E-Series 2.10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534.html
  • toe_overseas_name: HDD Data Encryption Kit E-Series 2.11
pdf_data/report_filename c0506_erpt.pdf EFAT028_Certification_Report_V1.0.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0506-01: 1
    • Certification No. C0506: 1
  • AU:
    • Certificate Number: 2006/39: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL4: 2
    • EAL4+: 6
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.PHYSICAL_ACCESS_MANAGED: 1
  • T:
    • T.HDD_ACCESS: 2
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 1
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 3
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • PKCS:
    • PKCS#11: 3
    • PKCS#12: 2
    • PKCS#7: 1
  • X509:
    • X.509: 3
pdf_data/report_metadata
  • /CreationDate: D:20160715155737+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160715155828+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 447686
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /CreationDate: D:20061222014212+11'00'
  • /Creator: AdobePS5.dll Version 5.2
  • /ModDate: D:20061222014212+11'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Microsoft Word - EFAT028 Certification Report V1.0.doc
  • pdf_file_size_bytes: 184977
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename c0506_est.pdf Cybertrust_UniCERT_5.2.1_ST.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 1
    • EAL 4+: 1
    • EAL4: 8
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT: 1
    • ACM_AUT.1: 10
    • ACM_CAP: 1
    • ACM_CAP.4: 18
    • ACM_SCP: 1
    • ACM_SCP.2: 6
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 9
    • ADO_IGS.1: 8
  • ADV:
    • ADV_FSP.2: 9
    • ADV_HLD: 1
    • ADV_HLD.2: 12
    • ADV_IMP.1: 6
    • ADV_LLD: 1
    • ADV_LLD.1: 13
    • ADV_RCR: 1
    • ADV_RCR.1: 4
    • ADV_SPM: 1
    • ADV_SPM.1: 10
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 15
    • AGD_AGD.1: 1
    • AGD_USR: 1
    • AGD_USR.1: 13
  • ALC:
    • ALC_DVS.1: 7
    • ALC_FLR: 2
    • ALC_FLR.2: 19
    • ALC_LCD.1: 8
    • ALC_TAT.1: 9
  • ASE:
    • ASE_DES.1: 2
    • ASE_ENV.1: 2
    • ASE_INT.1: 2
    • ASE_OBJ.1: 2
    • ASE_PPC.1: 2
    • ASE_REQ.1: 2
    • ASE_SRE.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 7
    • ATE_DPT.1: 6
    • ATE_FUN.1: 11
    • ATE_IND.2: 7
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.2: 9
    • AVA_SOF.1: 6
    • AVA_VLA: 1
    • AVA_VLA.2: 10
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FPT:
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FAU:
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCO:
    • FCO_NRO.2: 9
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM: 7
    • FCS_CKM.1: 22
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 2
    • FCS_CKM.3: 12
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 28
    • FCS_CKM.4.1: 1
    • FCS_COP: 90
    • FCS_COP.1: 10
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU: 24
    • FDP_DAU.2: 16
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC.1: 23
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 21
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 16
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 12
    • FDP_ITT.1.1: 1
    • FDP_ITT.3: 12
    • FDP_ITT.3.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 13
    • FIA_SOS.1.1: 1
    • FIA_UAU: 45
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 2
    • FIA_UID: 47
    • FIA_UID.1: 32
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 2
    • FIA_USB.1: 11
    • FIA_USB.1.1: 1
  • FMT:
    • FMT_MOF.1: 19
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 17
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 32
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 18
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 6
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV.1: 11
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SAE: 1
    • FMT_SAE.1: 12
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC: 10
    • FPT_ITC.1: 1
    • FPT_ITI.1: 12
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_ITT: 10
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 1
    • FPT_PHP.1: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_SAE: 1
    • FPT_SSP: 2
    • FPT_SSP.1: 5
    • FPT_SSP.1.1: 1
    • FPT_STM.1: 5
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PHYSICAL_ACCESS_MANAGED: 3
  • O:
    • O.CORRECT_TSF_OPERATION: 4
    • O.CORRECT_TSF_OPETATION: 2
    • O.CRYPTO: 7
  • OE:
    • OE.PHYSICAL_ACCESS_MANAGED: 6
  • T:
    • T.HDD_ACCESS: 3
  • A:
    • A.CPS: 3
  • O:
    • O.CPS: 3
  • OE:
    • OE.CPS: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 3
  • Microsoft:
    • Microsoft: 1
  • Oberthur:
    • Oberthur Card Systems: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 5
    • DES:
      • DES: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DSA:
      • DSA: 20
  • RSA:
    • RSA 1024: 8
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 14
  • SHA:
    • SHA1:
      • SHA-1: 35
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
  • VPN:
    • VPN: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
  • FIPS:
    • FIPS 180: 1
    • FIPS 186: 1
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 15408: 4
  • PKCS:
    • PKCS #11: 1
    • PKCS #7: 1
    • PKCS 1: 1
    • PKCS#11: 4
    • PKCS#12: 5
    • PKCS#7: 3
    • PKCS11: 4
    • PKCS12: 3
    • PKCS7: 3
  • RFC:
    • RFC 13: 1
    • RFC1321: 6
    • RFC3280: 1
  • X509:
    • X.509: 52
pdf_data/st_keywords/javacard_packages
  • java:
    • java.dll: 1
    • java.exe: 1
    • java.js: 4
    • java.policy: 1
    • java.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The assessment of the algorithmic strength used by these functions is out of scope of the evaluation, being assessed by the National Authority: 1
    • are cryptographic in nature and therefore the assessment of their algorithmic strength is out of scope of the evaluation, being assessed by the National Authority. However one mechanism does require a: 1
    • out of scope: 4
    • protocol handlers: Web Handler, email Handler, SCEP Handler, and CMP Handler (the CMP Handler is out of scope of the evaluation.) · Web RA Operator (WebRAO) The relationship between these components is shown: 1
    • the CMP Handler is out of scope of the evaluation: 1
    • to cryptographic SFRs). The assessment of the algorithmic strength used by these functions is out of scope of the evaluation, being assessed by the National Authority. However one mechanism does require a: 1
    • users who have no role in the PKI, but have certificates issued by the PKI. Their activities are out of scope of the evaluation. 9.3 Information Flow Control Policy This ST contains one information flow: 1
pdf_data/st_metadata
  • /Author: Canon Inc.
  • /CreationDate: D:20160715151953+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords:
  • /ModDate: D:20160715151954+09'00'
  • /Producer: Adobe LiveCycle PDFGenerator
  • /Subject:
  • /Title: HDD Data Encryption Kit E-Series Security Target
  • pdf_file_size_bytes: 420636
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 21
  • /CreationDate: D:20061222014648+11'00'
  • /Creator: AdobePS5.dll Version 5.2
  • /ModDate: D:20061222014648+11'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Microsoft Word - Baltimore UniCERT 5 Security Target v5.0ab2.doc
  • pdf_file_size_bytes: 1406278
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 266
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different