Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CypherNET Multi-Protocol Encryptor
Certificate Number: 2008/46
Hitachi Storage Command Suite Common Component Version: 6.0.0-01
JISEC-CC-CRP-C0199
name CypherNET Multi-Protocol Encryptor Hitachi Storage Command Suite Common Component Version: 6.0.0-01
category Network and Network-Related Devices and Systems Access Control Devices and Systems
scheme AU JP
not_valid_after 01.09.2019 08.04.2014
not_valid_before 06.06.2008 24.12.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Senetas_CypherNet_CR_1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0199_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Senetas_CypherNet_ST_1.18.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0199_est.pdf
manufacturer Senetas Corporation Ltd, Distributed by Thales SA (SafeNet) Hitachi, Ltd.
manufacturer_web https://www.senetas.com/ https://www.hitachi.com/
security_level EAL4 EAL2+, ALC_FLR.1
dgst f5dc68d06d0b7de8 a8a4d61467d0612f
heuristics/cert_id Certificate Number: 2008/46 JISEC-CC-CRP-C0199
heuristics/extracted_sars ADV_LLD.1, AGD_ADM.1, ATE_DPT.1, ADV_SPM.1, ALC_DVS.1, AVA_MSU.2, ADV_RCR.1, ADV_HLD.2, AVA_VLA.2, ATE_COV.2, ALC_TAT.1, ATE_IND.2, ATE_FUN.1, AGD_USR.1, ADV_FSP.2, ALC_LCD.1, ADV_IMP.1, AVA_SOF.1 AGD_ADM.1, AVA_VLA.1, ATE_COV.1, ADV_RCR.1, ADV_FSP.1, ADV_HLD.1, ATE_IND.2, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_SOF.1
heuristics/extracted_versions - 6.0.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0199
  • certification_date: 01.12.2008
  • claim: EAL2+ ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 2.3
    • description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides some kinds of storage management software that manage a plural of storage devices that are connected through SAN with common functions. Storage management software is such as Hitachi Device Manager Software, Hitachi Replication Manager Software and Hitachi Tiered Storage Manager Software. Hitachi Storage Command Suite is the general term for these software and TOE. TOE is provided customers as built-in module included in each software package. TOE security functions TOE has the following security functions. - Identification/authentication (Authentication function of external authentication server can be used as substitute.) - Privilege information management (Privilege information is attached to each user's information and it decides each user's role for storage management software.) - Warning banner
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Hitachi Storage Command Suite Common Component
    • product_type: IT Product (Foundational Module Software)
    • report_link: https://www.ipa.go.jp/en/security/c0199_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0199_est.pdf
    • toe_version: 6.0.0-01
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.04.2014
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0199_it8223.html
  • toe_japan_name: Hitachi Storage Command Suite Common Component 6.0.0-01
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename Senetas_CypherNet_CR_1.0.pdf c0199_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • AU:
    • Certificate Number: 2008/46: 1
  • JP:
    • CRP-C0199-01: 1
    • Certification No. C0199: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 7
    • EAL4: 2
  • EAL:
    • EAL2: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 1
    • A.CLIENTS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 1
    • A.SECURE_CHANNEL: 1
    • A.TOKEN: 1
  • T:
    • T.ILLEGAL_ACCESS: 1
    • T.UNAUTHORISED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS PUB 140-2: 1
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • was identified it required significant time and effort to exploit and was therefore considered out of scope for an EAL 4 evaluation. 48 The evaluators focused their efforts on the 1G Ethernet Encryptors: 1
pdf_data/report_metadata
  • /AISEF: CSC Australia
  • /Author: AISEP Certification Authority
  • /Category: Report
  • /Cert_Level: EAL 4
  • /Company: Australasian Information Security Evaluation Program
  • /CreationDate: D:20080611100719+10'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /Developer: Senetas
  • /IssueDate: 6 June 2008
  • /ModDate: D:20080611101433+10'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Product: Cyphernet Multifunction Encryptor - Product
  • /SourceModified: D:20080606065101
  • /Subject: Certificate Number: 2008/46
  • /Title: Certification Report
  • /docVersion: 1.0
  • pdf_file_size_bytes: 158443
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /CreationDate: D:20090622183039+09'00'
  • /ModDate: D:20090622183039+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 89546
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename Senetas_CypherNet_ST_1.18.pdf c0199_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 11
  • EAL:
    • EAL2: 6
    • EAL2 augmented: 4
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 9
    • ACM_CAP.4: 18
    • ACM_SCP.2: 6
  • ADO:
    • ADO_DEL.2: 8
    • ADO_IGS.1: 5
  • ADV:
    • ADV_FSP.2: 9
    • ADV_HLD.2: 13
    • ADV_IMP.1: 6
    • ADV_LLD.1: 14
    • ADV_RCR.1: 5
    • ADV_SPM.1: 17
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 11
    • AGD_USR.1: 10
  • ALC:
    • ALC_DVS.1: 6
    • ALC_LCD.1: 7
    • ALC_TAT.1: 8
  • ATE:
    • ATE_COV.2: 6
    • ATE_DPT.1: 5
    • ATE_FUN.1: 10
    • ATE_IND.2: 6
  • AVA:
    • AVA_MSU.2: 10
    • AVA_SOF.1: 6
    • AVA_VLA.2: 7
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_FLR.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 9
    • FAU_GEN.1.2: 7
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 8
    • FAU_SAR.1.2: 6
  • FCS:
    • FCS_CKM.1: 25
    • FCS_CKM.1.1: 24
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 8
    • FCS_CKM.4: 23
    • FCS_CKM.4.1: 12
    • FCS_COP.1: 23
    • FCS_COP.1.1: 57
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 8
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 8
    • FDP_DAU.1: 5
    • FDP_DAU.1.1: 9
    • FDP_DAU.1.2: 7
    • FDP_IFC.1: 11
    • FDP_IFC.1.1: 8
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 6
    • FDP_IFF.1.2: 8
    • FDP_IFF.1.3: 6
    • FDP_IFF.1.4: 8
    • FDP_IFF.1.5: 6
    • FDP_IFF.1.6: 8
    • FDP_UCT.1: 4
    • FDP_UCT.1.1: 8
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 8
    • FIA_AFL.1.2: 6
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 10
    • FIA_UID.1: 3
    • FIA_UID.2: 7
    • FIA_UID.2.1: 5
  • FMT:
    • FMT_MSA.1: 16
    • FMT_MSA.1.1: 16
    • FMT_MSA.2: 30
    • FMT_MSA.2.1: 23
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 16
    • FMT_MSA.3.2: 16
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 10
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 6
    • FMT_SMR.1.2: 7
  • FPT:
    • FPT_AMT.1: 6
    • FPT_AMT.1.1: 8
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 5
    • FPT_ITT.1: 4
    • FPT_ITT.1.1: 8
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 16
    • FPT_STM.1: 6
    • FPT_STM.1.1: 9
    • FPT_TST.1: 5
    • FPT_TST.1.1: 8
    • FPT_TST.1.2: 6
    • FPT_TST.1.3: 8
  • FTA:
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 8
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 8
    • FTP_ITC.1.2: 6
    • FTP_ITC.1.3: 7
  • FAU:
    • FAU_GEN.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_SOS: 7
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 2
    • FIA_TAB: 5
    • FIA_TAB.1: 5
    • FIA_UAU: 5
    • FIA_UAU.1: 16
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC.1: 5
    • FPT_ITC.1.1: 1
    • FPT_RVM: 1
    • FPT_RVM.1: 15
    • FPT_RVM.1.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 11
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 3
    • FTA_TAB.1.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.AUDIT: 3
    • A.CYPHERMANAGER: 3
    • A.INSTALL: 3
    • A.LOCATE: 3
    • A.PRIVATEKEY: 3
  • O:
    • O.ADMIN: 11
    • O.AUDIT: 9
    • O.AUDITLOG: 9
    • O.AUTHDATA: 5
    • O.CERTGEN: 11
    • O.CONNECT: 2
    • O.ENCRYPT: 9
    • O.FAILSAFE: 6
    • O.IDENT: 9
    • O.INFOFLOW: 10
    • O.INSTALL: 7
    • O.KEYMAN: 10
    • O.PERSONNEL: 7
    • O.PHYSICAL: 4
    • O.REMOTEMGT: 9
    • O.ROLEMGT: 5
    • O.ROLES: 6
    • O.TAMPER: 8
  • T:
    • T.ABUSE: 3
    • T.ATTACK: 3
    • T.CAPTURE: 3
    • T.CONNECT: 3
    • T.IMPERSON: 3
    • T.LINK: 3
    • T.MAL: 3
    • T.OBSERVE: 3
    • T.PHYSICAL: 3
    • T.PRIVILEGE: 3
  • A:
    • A.ADMINISTRATORS: 3
    • A.ADMINISTROTORS: 1
    • A.CLIENTS: 4
    • A.NETWORKS: 3
    • A.PASSWORD: 3
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.TOKEN: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 7
    • O.PASSWORD: 7
  • OE:
    • OE.AUTH: 6
    • OE.BANNER: 7
    • OE.PASSWORD: 6
    • OE.SECURE_CHANNE: 1
    • OE.SECURE_CHANNEL: 6
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
    • E2:
      • E2: 2
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 22
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
  • MD:
    • MD5:
      • MD5: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CFB:
    • CFB: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 3
    • FIPS PUB 140-2: 5
    • FIPS PUB 180-1: 3
    • FIPS PUB 186-2: 3
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 2
    • FIPS PUB 81: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS 12: 1
    • PKCS#1: 2
  • RFC:
    • RFC 1661: 1
    • RFC 1968: 1
    • RFC 1969: 1
    • RFC 2246: 1
    • RFC 2401: 1
    • RFC 2402: 1
    • RFC 2403: 1
    • RFC 2404: 1
    • RFC 2405: 1
    • RFC 2406: 1
    • RFC 2408: 1
    • RFC 2409: 1
    • RFC 2412: 1
    • RFC 2459: 1
    • RFC 2574: 1
    • RFC2574: 2
  • X509:
    • X.509: 50
pdf_data/st_metadata
  • /Author: Peter Sim
  • /Company:
  • /CreationDate: D:20080313112226+11'00'
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /Date: 28-Mar-07
  • /ModDate: D:20080313113304+11'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20080313002134
  • /Title: CypherNET
  • /Version: 1.17
  • pdf_file_size_bytes: 1578004
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 95
  • /Author: k-fujii
  • /Company: 株式会社日立製作所
  • /CreationDate: D:20090608174647+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20090608174751+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20090608084535
  • /Title: HiCommand Suite Common Component
  • pdf_file_size_bytes: 559113
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 60
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different