Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Red Hat Enterprise Linux (RHEL) Advanced Server (AS) Version 3 Update 5 Running on Unisys ES7000 Hardware models 405, 410, 420, 430, and 440
CCEVS-VR-0006-2007
KOMSCO JK41 V1.0 ESS on S3FT9PE/PS
KECS-ISIS-0797-2017
name Red Hat Enterprise Linux (RHEL) Advanced Server (AS) Version 3 Update 5 Running on Unisys ES7000 Hardware models 405, 410, 420, 430, and 440 KOMSCO JK41 V1.0 ESS on S3FT9PE/PS
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US KR
not_valid_after 06.09.2012 21.06.2022
not_valid_before 29.01.2007 21.06.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10062-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-17-33%20KOMSCO%20JK41%20V1.0%20ESS%20on%20S3FT9PEPS(eng).pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10062-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK41-TR-0006]%20Security%20Target(ESS)-Lite-e-v1.0.pdf
manufacturer Unisys Corporation KOMSCO
manufacturer_web https://www.unisys.com/unisys/ https://www.komsco.com
security_level EAL3+, ALC_FLR.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst ac9bd8fbd81973af ec4ccf2743d93323
heuristics/cert_id CCEVS-VR-0006-2007 KECS-ISIS-0797-2017
heuristics/cert_lab US []
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1, ALC_FLR.2 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 405, 440, 410, 430, 3, 420, 5 1.0
heuristics/report_references/directly_referencing {} ANSSI-CC-2014/59, ANSSI-CC-2014/58
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2014/37, ANSSI-CC-2014/58, ANSSI-CC-2013/23, ANSSI-CC-2013/46, ANSSI-CC-2014/59
heuristics/scheme_data
  • category: Operating System
  • certification_date: 29.01.2007
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID10062
  • product: Red Hat Enterprise Linux (RHEL) Advanced Server (AS) Version 3 Update 5 Running on Unisys ES7000 Hardware models 405, 410, 420, 430, and 440
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10062
  • vendor: Unisys
heuristics/st_references/directly_referencing {} ANSSI-CC-2014/59
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2014/59
heuristics/protection_profiles {} 17c3a7837f653cc7
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/[KECS-PP-0097a-2008] (CC V3.1R3) Smart Card Open Platform PP V2.2.pdf
pdf_data/report_filename st_vid10062-vr.pdf KECS-CR-17-33 KOMSCO JK41 V1.0 ESS on S3FT9PEPS(eng).pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-07-0006
    • cert_item: Unisys Corporation, Unisys Way, Blue Bell, PA 19424 Red Hat Enterprise Linux (RHEL) Advanced Server (AS), Version 3 Update 5 Running on ES7000 Hardware
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-07-0006: 1
  • FR:
    • ANSSI-CC-2014/58: 4
    • ANSSI-CC-2014/58-S02: 1
    • ANSSI-CC-2014/59: 4
    • ANSSI-CC-2014/59-S02: 1
  • KR:
    • KECS-ISIS-0797-2017: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 3
    • EAL 3 augmented: 3
    • EAL3: 14
    • EAL3 augmented: 1
  • EAL:
    • EAL 5+: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC: 3
    • ADV_ARC.1: 2
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.3: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 9
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 7
pdf_data/report_keywords/eval_facility
  • TTA:
    • TTA: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • TDES: 2
      • Triple-DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/randomness
  • TRNG:
    • DTRNG: 1
    • TRNG: 3
pdf_data/report_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 7816: 4
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/report_metadata
  • /Author: mt21130
  • /CreationDate: D:20070216114434-05'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070216114541-05'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070216164226
  • /Title: Validation Report for Unisys RHEL3
  • /_AdHocReviewCycleID: -846940914
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Franklin Haskell
  • /_EmailSubject: Validation Report Template (MS Word)
  • pdf_file_size_bytes: 149474
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /Author: 이은경
  • /CreationDate: D:20170621104552+09'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20170621104552+09'00'
  • /Producer: Microsoft® Word 2013
  • /Title: 평가단위보고서(ADV_ARC.1)
  • pdf_file_size_bytes: 456735
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename st_vid10062-st.pdf [JK41-TR-0006] Security Target(ESS)-Lite-e-v1.0.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2014/59: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 14
    • EAL 3 augmented: 14
    • EAL3: 4
    • EAL3 augmented: 3
  • EAL:
    • EAL 5+: 1
    • EAL4: 2
    • EAL5: 12
    • EAL5+: 14
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP: 1
    • ACM_CAP.3: 19
    • ACM_SCP: 1
    • ACM_SCP.1: 6
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.1: 7
    • ADO_IGS: 1
    • ADO_IGS.1: 9
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 22
    • ADV_HLD: 1
    • ADV_HLD.1: 3
    • ADV_HLD.2: 17
    • ADV_RCR: 1
    • ADV_RCR.1: 8
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 20
    • AGD_USR: 1
    • AGD_USR.1: 17
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.1: 9
    • ALC_FLR: 1
    • ALC_FLR.2: 32
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 7
    • ATE_DPT: 1
    • ATE_DPT.1: 5
    • ATE_FUN: 1
    • ATE_FUN.1: 16
    • ATE_IND: 1
    • ATE_IND.2: 9
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.1: 11
    • AVA_SOF: 1
    • AVA_SOF.1: 8
    • AVA_VLA: 1
    • AVA_VLA.1: 10
  • ADV:
    • ADV_ARC.1: 15
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 19
    • ADV_IMP.1: 13
    • ADV_INT.2: 11
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 20
  • AGD:
    • AGD_OPE.1: 17
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC.4: 17
    • ALC_CMS.1: 1
    • ALC_CMS.5: 10
    • ALC_DEL.1: 7
    • ALC_DVS.1: 1
    • ALC_DVS.2: 18
    • ALC_LCD.1: 9
    • ALC_TAT.1: 2
    • ALC_TAT.2: 13
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 14
    • ASE_INT.1: 16
    • ASE_OBJ.2: 13
    • ASE_REQ.1: 2
    • ASE_REQ.2: 15
    • ASE_SPD.1: 10
    • ASE_TSS.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 7
    • ATE_DPT.1: 2
    • ATE_DPT.3: 10
    • ATE_FUN.1: 13
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN.5: 20
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_SAR: 6
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 2
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 3
    • FAU_SAR.3.1: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 2
    • FAU_SEL.1.1: 1
    • FAU_STG: 6
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 2
    • FAU_STG.3.1: 1
    • FAU_STG.4: 3
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 3
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_RIP: 12
  • FIA:
    • FIA_ATD: 2
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS: 2
    • FIA_SOS.1: 4
    • FIA_SOS.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.1: 5
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 7
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
    • FIA_USB: 2
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 4
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 25
    • FMT_MTD.1: 2
    • FMT_REV: 14
    • FMT_SMF: 2
    • FMT_SMF.1: 11
    • FMT_SMR: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT: 2
    • FPT_AMT.1: 3
    • FPT_AMT.1.1: 1
    • FPT_RVM: 2
    • FPT_RVM.1: 3
    • FPT_RVM.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 3
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM: 2
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_ARP.1: 6
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FCS:
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 32
    • FCS_COP.1.1: 6
    • FCS_RNG: 1
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.2: 12
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 8
    • FDP_ITC.1: 11
    • FDP_ITC.2: 11
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 6
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 5
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 5
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_RCV.2: 1
    • FPT_RCV.3: 5
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 4
    • FPT_RCV.4.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT: 1
    • A.COOP: 1
    • A.LOCATE: 1
    • A.MANAGE: 1
    • A.NO_EVIL_ADM: 1
    • A.PEER: 1
    • A.PROTECT: 1
  • O:
    • O.AUDITING: 1
    • O.AUTHORIZATION: 1
    • O.CREDEN: 1
    • O.DISCRETIONARY_ACCESS: 1
    • O.ENFORCEMENT: 1
    • O.INSTALL: 1
    • O.MANAGE: 1
    • O.PHYSICAL: 1
    • O.RESIDUAL_INFORMATION: 1
  • D:
    • D.APP_CODE: 1
    • D.APP_DATA: 1
    • D.CRYPTO: 1
    • D.PIN: 1
    • D.SEC_DATA: 1
    • D.TS_CODE: 1
    • D.TS_DATA: 1
  • O:
    • O.IC: 5
  • OP:
    • OP.ARRAY_ACCESS: 5
    • OP.CREATE: 3
    • OP.DELETE: 8
    • OP.INSTALL: 8
    • OP.INSTANCE_FIELD: 5
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 5
    • OP.JAVA: 3
    • OP.LOAD: 9
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 7
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
  • DES:
    • 3DES:
      • TDES: 17
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
  • miscellaneous:
    • ARIA:
      • ARIA: 8
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 16
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 3
      • SHA-256: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • MAC:
    • MAC: 9
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • DTRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • GCM:
    • GCM: 2
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 197: 2
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 15946-: 1
  • NIST:
    • NIST SP 800-67: 1
  • PKCS:
    • PKCS#1: 4
  • SCP:
    • SCP 02: 1
    • SCP02: 17
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the application although it is possible to load the application on the FLASH of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE The TOE is the Javacard Platform that supports the analysis: 1
pdf_data/st_metadata
  • /Author: SAIC CCTL
  • /Company: Unisys Corporation
  • /CreationDate: D:20070216115637-05'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070216115834-05'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070208154200
  • /Subject: RHEL4 EAL4 Security Target
  • /Title: Red Hat Enterprise Linux (RHEL) Advanced Server (AS) Version 4 Running on Unisys ES7000 Hardware Security Target
  • pdf_file_size_bytes: 367758
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 37
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different