This page was not yet optimized for use on mobile
devices.
Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a11 and SLE66CLX641P/m1522-a11 both with RSA2048 V1.3 and specific IC Dedicated Software
CSV information
| Status | archived |
|---|---|
| Valid from | 08.11.2005 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Infineon Technologies AG |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_MSU.3, EAL5+, AVA_VLA.4, ALC_DVS.2 |
| Maintenance updates | Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a15 and SLE66CLX641P/m1522-a15 both with RSA2048 V1.3 and specific IC Dedicated Software (26.11.2007) Certification report |
| Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a15 and SLE66CLX641P/m1522-a15 both with RSA2048 V1.3 and specific IC Dedicated Software (08.05.2007) Certification report | |
| Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a12 and SLE66CLX641P/m1522-a12 both with RSA2048 V1.3 and specific IC Dedicated Software (15.12.2005) Certification report | |
| Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a14 and SLE66CLX641P/m1522-a14 both with RSA2048 V1.3 and specific IC Dedicated Software (31.10.2006) Certification report |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0338-2005
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
DES, 3DES, Triple-DESAsymmetric Algorithms
RSA2048, RSA 2048Randomness
RNGBlock cipher modes
ECB, CBCVendor
Infineon, Infineon Technologies AG, Infineon Technologies, PhilipsSecurity level
EAL4, EAL5, EAL 1, EAL 7, EAL 4, EAL5+, EAL1, EAL3, EAL7, EAL2, EAL6, EAL5 augmentedSecurity Assurance Requirements (SAR)
ACM_SCP.3, ACM_AUT.1, ACM_CAP.4, ACM_SCP, ACM_AUT, ACM_CAP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_RCR.2, ADV_SPM.3, ADV_LLD.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_CKM.1, FCS_RND.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_ITT.1, FDP_SDI.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_TST.2, FRU_FLT.2Protection profiles
BSI-PP-0002-2001, BSI-PP- 0002-2001Certificates
BSI-DSZ-CC-0338-2005, BSI-DSZ-CC-0266-2005Evaluation facilities
TÜV InformationstechnikSide-channel analysis
Physical Probing, physical probing, side channel, DPA, SPA, physical tampering, malfunction, Malfunction, DFACertification process
Security Controller) SLE66CLX640P / m1523-a11, SLE66CLX641P / m1522-a11 both with RSA2048 V1.3, (confidential document) [8] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID, AG, Security and Chipcard ICs, SLE66CxxxP, Security Controller Family, Data Book Version 08.04, (confidential document) [10] Confidential Errata and Information Sheet- SLE66CxxxP Products and Bondout, Version 05.05, document) [11] SLE66CxxxP, Security Controller Family, Confidential Instruction Set, 05.01, (confidential document) [12] RSA 2048 bit Support, SLE66CX322P, RSA Interface Specification for Library V1.30, Version 12, confidential document) [13] RSA 2048 bit Support, SLE66CX322P, Arithmetic Library for V1.30, Version 12.04 (confidential, Management Scope (ACM_SCP), Version 1.1, 9. September 2005 (i.e. TOE Configuration List, confidential document) B-28 Certification Report BSI-DSZ-CC-0338-2005 [35] ETR-lite for composition, according to AIS 36, IC (Security Controller) SLE66CLX640P / m1523a11, SLE66CLX641P / m1522a11 both with RSA2048 V1.30 (confidential document) B-29 BSI-DSZ-CC-0338-2005 Certification Report This page is intentionally left blank. B-30Standards
AIS 34, AIS 32, AIS 36, AIS 25, AIS 26, AIS 31, AIS31, ISO/IEC 15408:1999, ISO/IEC15408: 1999Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
| Title | Certification Report BSI-DSZ-CC-0338-2005 |
|---|---|
| Subject | Certification Report |
| Author | Federal Office for Information Security (BSI) |
| Creation date | D:20051223110424+01'00' |
| Modification date | D:20051223110621+01'00' |
| Pages | 52 |
| Creator | Acrobat PDFMaker 7.0.5 für Word |
| Producer | Acrobat Distiller 7.0.5 (Windows) |
Frontpage
| Certificate ID | BSI-DSZ-CC-0338-2005 |
|---|---|
| Certified item | Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a11 and SLE66CLX641P/m1522-a11 both with RSA2048 V1.3 and specific IC Dedicated Software |
| Certification lab | BSI |
| Developer | Infineon Technologies AG |
References
Outgoing- BSI-DSZ-CC-0266-2005 - archived - Infineon Smart Card IC (Security Controller) SLE66CX322P/m1484b14 and m1484f18 with RSA 2048 V1.30 and specific IC Dedicated Software
- ANSSI-CC-2005/52 - archived - jTOP e-Passport - Composant SLE66CLX641P masqué par l'application jTOP e-Passport version 8.05
- BSI-DSZ-CC-0354-2006 - archived - Infineon Smart Card IC (Security Controller) SLE66CL80P/m1457-a14 and SLE66CL81P/m1436-a14 with specific IC Dedicated Software
- BSI-DSZ-CC-0316-2005 - archived - TCOS Passport Version 1.01 / P5CT072 and TCOS Passport Version 1.01/ SLE66CLX641P
Security target
Extracted keywords
Symmetric Algorithms
DES, 3DES, Triple-DESAsymmetric Algorithms
RSA2048Randomness
RNG, RNDVendor
Infineon Technologies AG, InfineonSecurity level
EAL5, EAL 5, EAL5 augmented, EAL 5 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_SCP, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP, ADV_FSP.2, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_SOFSecurity Functional Requirements (SFR)
FAU_SAS.1, FCS_RND, FCS_RND.1, FCS_COP.1, FCS_CKM.1, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FCS_RND.1.1, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.1, FDP_ACC.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACF.1.1, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_CKM.2, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1.1, FMT_MSA.2, FMT_MSA.2.1, FPT_TST.2, FPT_FLS.1, FPT_SEP.1, FPT_PHP.3, FPT_ITT.1, FPT_TST.1, FPT_TST.2.1, FPT_AMT.1, FPT_TDC.1, FPT_TST, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0002Side-channel analysis
Leak-Inherent, Physical Probing, SPA, DPA, Malfunction, malfunction, DFA, reverse engineeringCertification process
out of scope, single DES is out of scope of the evaluation, key length below 1024 bit are out of scope of the evaluation, smart card applications, • data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation), • data encryption according to RSA standard with 512 to 2048 bits key length, length below 1024 bit are out of scope of the evaluation), • security sensors and physical countermeasures (e.g. shielding), • true randomStandards
FIPS PUB 46-3, AIS31, ISO/IEC 7816-3, ISO/IEC 14443, ISO/IEC 9796-1, ISO/IEC 7816File metadata
| Title | SLE66CLX640P+CLX641P_SecurityTarget_1.3 |
|---|---|
| Author | grans |
| Creation date | D:20050920162017+02'00' |
| Pages | 48 |
| Creator | pdfFactory Pro www.pdffactory.com |
| Producer | pdfFactory Pro 2.38 (Windows XP Professional German) |
References
Incoming- BSI-DSZ-CC-0316-2005 - archived - TCOS Passport Version 1.01 / P5CT072 and TCOS Passport Version 1.01/ SLE66CLX641P
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0338-2005Extracted SARs
ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4Similar certificates
Showing 5 out of 103.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "0ef74107bfa2ce33",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0338-2005",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_CCA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2005/52",
"BSI-DSZ-CC-0354-2006",
"BSI-DSZ-CC-0316-2005"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0266-2005"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2005/52",
"BSI-DSZ-CC-0401-2006",
"BSI-DSZ-CC-0354-2006",
"BSI-DSZ-CC-0316-2005"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0223-2003",
"BSI-DSZ-CC-0266-2005",
"BSI-DSZ-CC-0169-2002"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0316-2005"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0316-2005"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2005-12-15",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0338_ma1.pdf",
"maintenance_st_link": null,
"maintenance_title": "Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a12 and SLE66CLX641P/m1522-a12 both with RSA2048 V1.3 and specific IC Dedicated Software"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2007-05-08",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0338_ma3.pdf",
"maintenance_st_link": null,
"maintenance_title": "Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a15 and SLE66CLX641P/m1522-a15 both with RSA2048 V1.3 and specific IC Dedicated Software"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2007-11-26",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0338_ma4.pdf",
"maintenance_st_link": null,
"maintenance_title": "Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a15 and SLE66CLX641P/m1522-a15 both with RSA2048 V1.3 and specific IC Dedicated Software"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2006-10-31",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0338_ma2.pdf",
"maintenance_st_link": null,
"maintenance_title": "Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a14 and SLE66CLX641P/m1522-a14 both with RSA2048 V1.3 and specific IC Dedicated Software"
}
]
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a11 and SLE66CLX641P/m1522-a11 both with RSA2048 V1.3 and specific IC Dedicated Software",
"not_valid_after": "2019-09-01",
"not_valid_before": "2005-11-08",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0338a.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0338-2005",
"cert_item": "Infineon Smart Card IC (Security Controller) SLE66CLX640P/m1523-a11 and SLE66CLX641P/m1522-a11 both with RSA2048 V1.3 and specific IC Dedicated Software",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 2048": 5,
"RSA2048": 31
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0266-2005": 2,
"BSI-DSZ-CC-0338-2005": 24
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0002-2001": 1,
"BSI-PP-0002-2001": 4
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 2,
"ACM_CAP": 2,
"ACM_CAP.4": 2,
"ACM_SCP": 3,
"ACM_SCP.3": 3
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.3": 2,
"ADV_HLD": 2,
"ADV_HLD.3": 2,
"ADV_IMP": 2,
"ADV_IMP.2": 2,
"ADV_INT": 2,
"ADV_INT.1": 2,
"ADV_LLD": 2,
"ADV_LLD.1": 1,
"ADV_RCR": 2,
"ADV_RCR.2": 2,
"ADV_SPM": 2,
"ADV_SPM.3": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 1,
"AGD_USR": 2,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.2": 3,
"ALC_TAT": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_DPT": 2,
"ATE_DPT.2": 2,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_IND": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 2,
"AVA_CCA.1": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 4,
"AVA_SOF.1": 1,
"AVA_VLA": 4,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 1,
"EAL 7": 1,
"EAL1": 6,
"EAL2": 3,
"EAL3": 5,
"EAL4": 10,
"EAL5": 11,
"EAL5 augmented": 3,
"EAL5+": 2,
"EAL6": 3,
"EAL7": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_COP.1": 2,
"FCS_RND.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_IFC.1": 1,
"FDP_ITT.1": 1,
"FDP_SDI.1": 1
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA.1": 1,
"FMT_MSA.3": 1,
"FMT_SMF.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_SEP.1": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"AG, Security and Chipcard ICs, SLE66CxxxP, Security Controller Family, Data Book Version 08.04, (confidential document) [10] Confidential Errata and Information Sheet- SLE66CxxxP Products and Bondout, Version 05.05": 1,
"IC (Security Controller) SLE66CLX640P / m1523a11, SLE66CLX641P / m1522a11 both with RSA2048 V1.30 (confidential document) B-29 BSI-DSZ-CC-0338-2005 Certification Report This page is intentionally left blank. B-30": 1,
"Management Scope (ACM_SCP), Version 1.1, 9. September 2005 (i.e. TOE Configuration List, confidential document) B-28 Certification Report BSI-DSZ-CC-0338-2005 [35] ETR-lite for composition, according to AIS 36": 1,
"Security Controller) SLE66CLX640P / m1523-a11, SLE66CLX641P / m1522-a11 both with RSA2048 V1.3, (confidential document) [8] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID": 1,
"confidential document) [13] RSA 2048 bit Support, SLE66CX322P, Arithmetic Library for V1.30, Version 12.04 (confidential": 1,
"document) [11] SLE66CxxxP, Security Controller Family, Confidential Instruction Set, 05.01, (confidential document) [12] RSA 2048 bit Support, SLE66CX322P, RSA Interface Specification for Library V1.30, Version 12": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 6
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"Malfunction": 1,
"malfunction": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 5,
"Physical Probing": 1,
"SPA": 2,
"physical probing": 2,
"side channel": 1
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 3,
"AIS 31": 3,
"AIS 32": 2,
"AIS 34": 3,
"AIS 36": 4,
"AIS31": 1
},
"ISO": {
"ISO/IEC 15408:1999": 1,
"ISO/IEC15408: 1999": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 1,
"Triple-DES": 3
},
"DES": {
"DES": 10
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 31,
"Infineon Technologies": 2,
"Infineon Technologies AG": 15
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Federal Office for Information Security (BSI)",
"/Company": "BSI, Postfach 200363, 53133 Bonn",
"/CreationDate": "D:20051223110424+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0.5 f\u00fcr Word",
"/ModDate": "D:20051223110621+01\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/SourceModified": "D:20051223100406",
"/Subject": "Certification Report",
"/Title": "Certification Report BSI-DSZ-CC-0338-2005",
"pdf_file_size_bytes": 393284,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 52
},
"st_filename": "0338b.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA2048": 8
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 1
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 2
}
},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 2,
"ACM_CAP.4": 1,
"ACM_SCP": 3,
"ACM_SCP.2": 1,
"ACM_SCP.3": 5
},
"ADO": {
"ADO_DEL.2": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 5,
"ADV_HLD.3": 3,
"ADV_IMP.2": 3,
"ADV_INT.1": 3,
"ADV_LLD.1": 3,
"ADV_RCR.2": 3,
"ADV_SPM.1": 2,
"ADV_SPM.3": 2
},
"AGD": {
"AGD_ADM.1": 2,
"AGD_USR.1": 2
},
"ALC": {
"ALC_DVS.2": 4,
"ALC_LCD.2": 1,
"ALC_TAT.2": 2
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.2": 1,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_CCA.1": 2,
"AVA_MSU.3": 3,
"AVA_SOF": 4,
"AVA_SOF.1": 2,
"AVA_VLA.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 4,
"EAL 5 augmented": 4,
"EAL5": 4,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 4
},
"FCS": {
"FCS_CKM.1": 33,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 4,
"FCS_CKM.4": 20,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 27,
"FCS_COP.1.1": 2,
"FCS_RND": 2,
"FCS_RND.1": 4,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC.1": 22,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 15,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_CKM.2": 1,
"FDP_IFC.1": 11,
"FDP_ITC.1": 17,
"FDP_ITC.1.1": 2,
"FDP_ITC.1.2": 2,
"FDP_ITC.1.3": 2,
"FDP_ITC.2": 16,
"FDP_ITC.2.1": 2,
"FDP_ITC.2.2": 2,
"FDP_ITC.2.3": 2,
"FDP_ITC.2.4": 2,
"FDP_ITC.2.5": 2,
"FDP_ITT.1": 3,
"FDP_SDI.1": 15,
"FDP_SDI.1.1": 1
},
"FMT": {
"FMT_LIM.1": 4,
"FMT_LIM.2": 4,
"FMT_MSA.1": 14,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 21,
"FMT_MSA.2.1": 2,
"FMT_MSA.3": 15,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 8,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 8
},
"FPT": {
"FPT_AMT.1": 4,
"FPT_FLS.1": 5,
"FPT_ITT.1": 3,
"FPT_PHP.3": 7,
"FPT_SEP.1": 6,
"FPT_TDC.1": 2,
"FPT_TST": 2,
"FPT_TST.1": 11,
"FPT_TST.2": 26,
"FPT_TST.2.1": 2
},
"FRU": {
"FRU_FLT.2": 5
},
"FTP": {
"FTP_ITC.1": 2,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"key length below 1024 bit are out of scope of the evaluation": 1,
"length below 1024 bit are out of scope of the evaluation), \u2022 security sensors and physical countermeasures (e.g. shielding), \u2022 true random": 1,
"out of scope": 2,
"single DES is out of scope of the evaluation": 1,
"smart card applications, \u2022 data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation), \u2022 data encryption according to RSA standard with 512 to 2048 bits key length": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 6
}
},
"side_channel_analysis": {
"FI": {
"DFA": 3,
"Malfunction": 12,
"malfunction": 2
},
"SCA": {
"DPA": 5,
"Leak-Inherent": 10,
"Physical Probing": 2,
"SPA": 3
},
"other": {
"reverse engineering": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 7
},
"FIPS": {
"FIPS PUB 46-3": 2
},
"ISO": {
"ISO/IEC 14443": 4,
"ISO/IEC 7816": 4,
"ISO/IEC 7816-3": 1,
"ISO/IEC 9796-1": 3
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 19,
"Triple-DES": 1
},
"DES": {
"DES": 11
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 4,
"Infineon Technologies AG": 7
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "grans",
"/CreationDate": "D:20050920162017+02\u002700\u0027",
"/Creator": "pdfFactory Pro www.pdffactory.com",
"/Producer": "pdfFactory Pro 2.38 (Windows XP Professional German)",
"/Title": "SLE66CLX640P+CLX641P_SecurityTarget_1.3",
"pdf_file_size_bytes": 272276,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 48
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0338a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_VLA.4",
"AVA_MSU.3",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0338b.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0bf082b189f43144052bb2ae5dfef6f5b6a0667902a9be437b94445f33227ba9",
"txt_hash": "9ba9c1d187c18eaa6aeafce4f4687e2096eb3ec16f66e3421ef63a48a36a5113"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "478446af22238b6e7337347799554c904cdae908abe05d1a1c6a54a74e6b3c5a",
"txt_hash": "db5ff4b796078c22f11912126007e8a1af1733267f33b86de80ec5b82879f587"
}
},
"status": "archived"
}