Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Ziperase Drive Erasure Software v3.0.2
Certificate Number: 2024/153
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
ANSSI-CC-2023/42
name Ziperase Drive Erasure Software v3.0.2 Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme AU FR
not_valid_after 06.09.2029 29.09.2028
not_valid_before 06.09.2024 29.09.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP_Certificate_2024_153_Ziperase%20Drive%20Erasure%20Software%20v3.0.2_EFT-T042_os.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_42fr.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AISEP-CC-CR-2024-EFT-T042-CR-V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Ziperase%20Drive%20Erasure%20Software%20v3.0.2%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_42en.pdf
manufacturer Ziperase THALES DIS FRANCE SA
manufacturer_web https://ziperase.com https://www.thalesgroup.com/en/europe/france
security_level EAL2 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst a70fb46e83111512 5f61ebf23c6ad99d
heuristics/cert_id Certificate Number: 2024/153 ANSSI-CC-2023/42
heuristics/extracted_sars ALC_CMS.2, ASE_TSS.1, ADV_TDS.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, AGD_OPE.1, ADV_ARC.1, AVA_VAN.2, ASE_REQ.2, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions 3.0.2 5.1, 3.1, 5.2.1
heuristics/report_references/directly_referencing {} ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/protection_profiles {} d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 27abdb9c6ab375a7
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf
pdf_data/cert_filename AISEP_Certificate_2024_153_Ziperase Drive Erasure Software v3.0.2_EFT-T042_os.pdf Certificat-CC-2023_42fr.pdf
pdf_data/cert_keywords/cc_cert_id
  • AU:
    • Certificate Number: 2024/153: 1
  • FR:
    • ANSSI-CC-2023/42: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.C: 1
    • A.O: 1
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20250116000321+11'00'
  • /ModDate: D:20250116000321+11'00'
  • pdf_file_size_bytes: 232175
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20230929173949+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20230929174206+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 158885
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename AISEP-CC-CR-2024-EFT-T042-CR-V1.0.pdf ANSSI-CC-2023_42fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/01: 2
    • ANSSI-CC-2023/31: 3
    • ANSSI-CC-2023/42: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
  • other:
    • PP-SSCD-: 1
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL1: 1
    • EAL2: 5
  • EAL:
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.C: 4
    • A.O: 4
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
pdf_data/report_keywords/eval_facility
  • Teron:
    • Teron Labs: 4
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 3
      • SHA512: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_metadata
pdf_data/st_filename Ziperase Drive Erasure Software v3.0.2 Security Target v1.0.pdf ANSSI-cible-2023_42en.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 2
    • CC-2: 2
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0099-V2-2020: 1
  • other:
    • PP-SSCD: 4
    • PP-SSCD-KG: 37
    • PP-SSCD-KI: 28
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 4
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP: 8
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP: 6
    • FDP_RIP.1: 1
  • FIA:
    • FIA_UID.1: 5
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMF.3: 1
    • FMT_SMR.1: 4
  • FPT:
    • FPT_RCV.1: 5
    • FPT_RCV.1.1: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
    • FPT_TEE: 8
    • FPT_TEE.1: 5
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 59
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 2
    • FCS_COP: 35
    • FCS_COP.1: 6
    • FCS_COP.1.1: 2
    • FCS_RNG: 1
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 55
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 4
    • FDP_ACF: 43
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_AFC: 1
    • FDP_DAU: 11
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 9
    • FDP_IFF: 2
    • FDP_ITC: 11
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 6
    • FDP_RIP.1: 17
    • FDP_RIP.1.1: 1
    • FDP_SDI: 22
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 11
    • FDP_UCT.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 20
    • FIA_AFL.1: 4
    • FIA_API: 5
    • FIA_API.1: 14
    • FIA_API.1.1: 2
    • FIA_ATD: 2
    • FIA_UAU: 28
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 25
    • FIA_UID.1: 14
    • FIA_USB: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 80
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.4: 3
    • FMT_MTD: 25
    • FMT_MTD.1: 3
    • FMT_SMF: 6
    • FMT_SMF.1: 27
    • FMT_SMF.1.1: 1
    • FMT_SMR: 7
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS: 6
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
    • FPT_RCV: 2
    • FPT_TST: 2
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 42
    • FTP_ITC.1: 16
    • FTP_TRP: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.JURISDICTION: 4
  • O:
    • O.COMPLETE_ERASE: 3
    • O.COMPLETE_ERASURE: 4
    • O.CONFIG: 5
    • O.HOST_TESTING: 5
    • O.SECURE_ERASE: 4
    • O.SECURE_ERASURE: 2
  • OE:
    • OE.ENVIRONMENT: 4
    • OE.LEGIT_ERASURE: 4
    • OE.NETWORK: 4
    • OE.TOE_AUTHENTICITY: 4
    • OE.TOE_INTEGRITY: 1
    • OE.USER: 4
  • OSP:
    • OSP.ENVIRONMENT: 1
    • OSP.ERASURE_LIMITS: 1
    • OSP.TRUSTED_USER: 1
  • T:
    • T.ILLEGITIMATE_CONFIG: 2
    • T.INCOMPLETE_ERASURE: 4
    • T.INSECURE_ERASURE: 2
    • T.TOE_INTEGRITY: 2
    • T.UNAUTHENTIC_HOST: 3
  • A:
    • A.C: 5
    • A.CAP_FILE: 4
    • A.CGA: 3
    • A.CSP: 3
    • A.O: 5
    • A.SCA: 3
    • A.VERIFICATION: 4
  • O:
    • O.ALARM: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.CONFID-OS-UPDATE: 2
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RNG: 1
    • O.SCP: 3
    • O.SECURE_AC_ACTIVATION: 2
    • O.SECURE_LOAD_ACODE: 2
    • O.SID: 1
    • O.TOE_IDENTIFICATION: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 5
    • OE.HID_VAD: 3
    • OE.PERSONALISATION: 2
    • OE.PROT_LOGICAL_DATA: 1
    • OE.SCP: 2
    • OE.TERMINAL: 2
    • OE.USER_OBLIGATIONS: 1
    • OE.VERIFICATION: 7
pdf_data/st_keywords/vendor
  • Thales:
    • Thales: 75
pdf_data/st_keywords/eval_facility
  • Teron:
    • Teron Labs: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 16
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault induction: 1
    • fault injection: 1
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-4: 1
  • CC:
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS197: 2
  • ICAO:
    • ICAO: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • by authorized users. The functionalities of IAS Classic 5.2.1 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1.1 application) provides biometry recognition with: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20240719001731+10'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240719001731+10'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 393496
  • pdf_hyperlinks: http://www.teronlabs.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /Author: Emmanuel BACHIMON
  • /CreationDate: D:20230504155302+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230504155302+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: IAS Classic v5.2 on MultiApp V5.1- Security Target
  • pdf_file_size_bytes: 2282348
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different