Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HDD Data Encryption Kit E-Series 2.10
JISEC-CC-CRP-C0506
eTravel EAC version 1.0 (version 01 03) on SLE66CLX800PE m1581 e13/a14
ANSSI-CC-2009/17
name HDD Data Encryption Kit E-Series 2.10 eTravel EAC version 1.0 (version 01 03) on SLE66CLX800PE m1581 e13/a14
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 25.04.2021 01.09.2019
not_valid_before 25.04.2016 27.07.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-2009_17fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0506_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2009_17en.pdf
manufacturer Canon Inc. Gemalto - Infineon Technologies AG
manufacturer_web https://www.canon.com/ https://www.gemalto.com/
security_level EAL3 ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2, ALC_FLR.3
dgst 62bf2f602b0262f1 c07b71efd28e0029
heuristics/cert_id JISEC-CC-CRP-C0506 ANSSI-CC-2009/17
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 AVA_VLA.4, ALC_DVS.2, ALC_FLR.3, ADV_IMP.2, AVA_MSU.3
heuristics/extracted_versions 2.10 1.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2012/09, ANSSI-CC-2010/06
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0482-2008, ANSSI-CC-2008/45
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2012/09, ANSSI-CC-2010/06
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0169-2002, ANSSI-CC-2008/45, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0266-2005, ANSSI-CC-2008/28, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0506
  • certification_date: 01.04.2016
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0506_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is an optional hardware product to encrypt data to be stored in the HDD of Canon Multifunctional Product (MFP) and printer. By using this product, data to be stored in the HDD can be encrypted without compromising the scalability or processing performance of the Canon MFP and printer. TOE security functionality The TOE provides the following security functions. - HDD Data Encryption - Cryptographic Key Management - Self-Test
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: HDD Data Encryption Kit E-Series
    • product_type: Cryptographic hardware for MFPs and printers
    • report_link: https://www.ipa.go.jp/en/security/c0506_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0506_est.pdf
    • toe_version: 2.10
    • vendor: Canon Inc.
  • expiration_date: 01.05.2021
  • revalidations: [frozendict({'date': '2017-04', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534_02.html'})]
  • supplier: Canon Inc.
  • toe_japan_name: HDD Data Encryption Kit E-Series 2.10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0506_it5534.html
  • toe_overseas_name: HDD Data Encryption Kit E-Series 2.11
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0482-2008
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0322-2005
pdf_data/report_filename c0506_erpt.pdf anssi-2009_17fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0506-01: 1
    • Certification No. C0506: 1
  • DE:
    • BSI-DSZ-CC-0482-2008: 2
  • FR:
    • ANSSI-2009/17: 21
    • DCSSI-2008/45: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0026: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 3
    • EAL5: 1
    • EAL5+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 et: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_USR: 1
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.3: 1
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.PHYSICAL_ACCESS_MANAGED: 1
  • T:
    • T.HDD_ACCESS: 2
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 34
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 20
    • Infineon Technologies AG: 4
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 4
  • Serma:
    • Serma Technologies: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • BSI:
    • AIS 34: 2
    • AIS34: 1
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 1
pdf_data/report_metadata
  • /CreationDate: D:20160715155737+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160715155828+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 447686
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /Author: duquesnoy
  • /Comments: Developpeur
  • /Company: SGDN/DCSSI
  • /CreationDate: D:20090727181328+02'00'
  • /Creator: Acrobat PDFMaker 8.0 pour Word
  • /Keywords: CER/F/07.5
  • /ModDate: D:20090727181341+02'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /SourceModified: D:20090727161315
  • /Subject: eTravel EAC v1.0
  • /Title: ANSSI-2009/17
  • pdf_file_size_bytes: 232725
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename c0506_est.pdf anssi-cible2009_17en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0482-2008: 1
  • NL:
    • CC-1: 3
    • CC-2: 35
    • CC-3: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
    • BSI-PP-0017: 1
    • BSI-PP-0026: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 5: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_LLD: 1
    • ADV_RCR: 1
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR.3: 2
  • AVA:
    • AVA_MSU.3: 2
    • AVA_VLA.4: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FPT:
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 27
    • FCS_CKM.4: 10
    • FCS_COP: 21
    • FCS_COP.1: 58
    • FCS_RND: 8
    • FCS_RND.1: 14
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 2
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU: 1
    • FDP_DAU.1: 4
    • FDP_UCT: 2
    • FDP_UCT.1: 4
    • FDP_UIT: 2
    • FDP_UIT.1: 6
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 15
    • FIA_API.1: 8
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 26
    • FIA_UAU.1: 2
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 6
    • FIA_UAU.5: 6
    • FIA_UAU.6: 6
    • FIA_UID.1: 2
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 6
    • FMT_LIM.1: 12
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 11
    • FMT_LIM.2.1: 2
    • FMT_MOF.1: 1
    • FMT_MTD: 7
    • FMT_MTD.1: 12
    • FMT_MTD.3: 1
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 3
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 3
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 3
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TST.1: 3
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PHYSICAL_ACCESS_MANAGED: 3
  • O:
    • O.CORRECT_TSF_OPERATION: 4
    • O.CORRECT_TSF_OPETATION: 2
    • O.CRYPTO: 7
  • OE:
    • OE.PHYSICAL_ACCESS_MANAGED: 6
  • T:
    • T.HDD_ACCESS: 3
  • A:
    • A.INSP_SYS: 1
    • A.PERS_AGENT: 1
  • D:
    • D.LDS: 4
    • D.MRTD: 1
  • OE:
    • OE.EXAM_MRTD: 1
    • OE.PASS_AUTH_SIGN: 1
    • OE.PROT_LOGICAL_MRTD: 1
  • OT:
    • OT.AC_PERS: 1
    • OT.DATA_CONF: 1
    • OT.DATA_INT: 1
    • OT.IDENTIFICATION: 1
    • OT.PROT_ABUSE_FUNC: 1
    • OT.PROT_INF_LEAK: 1
    • OT.PROT_MALFUNCTION: 1
    • OT.PROT_PHYS_TAMPER: 1
  • T:
    • T.INFORMATION_LEAKAGE: 1
    • T.MALFUNCTION: 1
    • T.PHYS_TAMPER: 1
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 95
  • Infineon:
    • Infineon: 2
pdf_data/st_keywords/eval_facility
  • Serma:
    • Serma Technologies: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 3
      • Triple-DES: 14
    • DES:
      • DES: 5
  • constructions:
    • MAC:
      • KMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-224: 6
      • SHA-256: 7
      • SHA-384: 6
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 6
  • MAC:
    • MAC: 14
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • Physical Tampering: 2
    • Physical tampering: 3
    • fault injection: 1
    • malfunction: 3
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 4
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 11
    • EF.DG1: 22
    • EF.DG10: 1
    • EF.DG11: 1
    • EF.DG12: 1
    • EF.DG13: 3
    • EF.DG14: 7
    • EF.DG15: 2
    • EF.DG16: 22
    • EF.DG2: 9
    • EF.DG3: 15
    • EF.DG4: 15
    • EF.DG5: 8
    • EF.DG6: 2
    • EF.DG7: 1
    • EF.DG8: 1
    • EF.DG9: 1
    • EF.SOD: 10
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
  • BSI:
    • AIS20: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-2: 8
    • FIPS 46-3: 2
    • FIPS PUB 46-3: 1
    • FIPS180-2: 6
    • FIPS46-3: 2
  • ICAO:
    • ICAO: 17
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 1
  • RFC:
    • RFC3369: 1
pdf_data/st_metadata
  • /Author: Canon Inc.
  • /CreationDate: D:20160715151953+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords:
  • /ModDate: D:20160715151954+09'00'
  • /Producer: Adobe LiveCycle PDFGenerator
  • /Subject:
  • /Title: HDD Data Encryption Kit E-Series Security Target
  • pdf_file_size_bytes: 420636
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 21
  • /Author: Mika Hansson
  • /Category: Specification
  • /Company: Gemalto
  • /CreationDate: D:20090605105724+02'00'
  • /Creator: Acrobat PDFMaker 7.0.7 for Word
  • /Keywords: Security Target, CC, SetCOS 6.0
  • /ModDate: D:20090605110002+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20090602144000
  • /Subject: MRTD
  • /Title: SetCOS 6.0 Security Target
  • /classification-date: 01/12/2005
  • /classification-version: Version 3.6.0
  • /security-level: Private
  • pdf_file_size_bytes: 979762
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 74
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different