This page was not yet optimized for use on mobile
devices.
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software
CSV information
| Status | archived |
|---|---|
| Valid from | 06.07.2020 |
| Valid until | 06.07.2025 |
| Scheme | 🇩🇪 DE |
| Manufacturer | Infineon Technologies AG |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5+, AVA_VAN.5, ALC_DVS.2 |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0827-V8-2020
Certificate
Extracted keywords
Asymmetric Algorithms
RSA2048, RSA4096Vendor
Infineon Technologies, Infineon Technologies AGSecurity level
EAL 5, EAL 2, EAL 5 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, AVA_VAN.5Protection profiles
BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0827-V8-2020Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
| Title | Certificate BSI-DSZ-CC-0827-V8-2020 |
|---|---|
| Subject | BSI-DSZ-CC-0827-V8-2020, Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22,M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base,SCL, HCL, PSL and with specific IC dedicated software, Common Criteria |
| Keywords | Common Criteria, Certification, Zertifizierung, Security IC, SmartCard, Infineon Technologies AG, Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22,M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base,SCL, HCL, PSL and with specific IC dedicated software |
| Author | Bundesamt fĂĽr Sicherheit in der Informationstechnik |
| Creation date | D:20200709150508+02'00' |
| Modification date | D:20200709150806+02'00' |
| Pages | 1 |
| Creator | Writer |
| Producer | LibreOffice 6.2 |
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TDEA, CMAC, CBC-MACAsymmetric Algorithms
RSA2048, RSA4096, ECDH, ECDSA, ECCHash functions
SHA-1, SHA-2Schemes
MAC, Key AgreementRandomness
RNGLibraries
Crypto Library 2.01.011Elliptic Curves
B-163Block cipher modes
ECB, CBC, CTR, CFBVendor
Infineon Technologies, Infineon Technologies AG, Infineon, G&D, Giesecke & DevrientSecurity level
EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL5+, EAL6, EAL 5 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0035-2007, BSI-CC-PP- 0035-2007Certificates
BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-0827-, BSI-DSZ-CC-0827-V7-2018Evaluation facilities
TĂśV InformationstechnikSide-channel analysis
physical probing, SPA, DPA, physical tampering, DFACertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Target M9900, M9905, M9906 including optional Software Libraries RSA-EC-SCL-HCL-PSL”, Infineon (confidential document) [7] Evaluation Technical Report, BSI-DSZ-CC-0827-V8-2020 Version 2, 2020-05-19, “EVALUATION, REPORT SUMMARY (ETR SUMMARY)”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9, “EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, v1.4, 2018-06-06, “Configuration Management Scope M9900, M9906 including optional Software Libraries RSA-EC-SCL-PSL”, Infineon (confidential document) [12] to [24]: See table 2 in section B.2. [25] SINGLE EVALUATION REPORT ADDENDUM to ETR-Part ASE, ADV, Cryptographic Standards Compliance Verification, v1, 2020-02-03, TÜV Informationstechnik GmbH (confidential document) 7 See section 9.1 for a detailed list of used AIS and supporting documents 31 / 35 CertificationStandards
FIPS186-4, FIPS197, FIPS180-4, FIPS PUB 186-4, FIPS PUB 180-4, PKCS #1, AIS 34, AIS 1, AIS 14, AIS 19, AIS 20, AIS 23, AIS 25, AIS 26, AIS 31, AIS 32, AIS 35, AIS 36, AIS 37, AIS 38, AIS 41, AIS 46, AIS31, RFC5639, RFC 5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0827-V8-2020 |
|---|---|
| Subject | BSI-DSZ-CC-0827-V8-2020, Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22,M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base,SCL, HCL, PSL and with specific IC dedicated software, Common Criteria |
| Keywords | Common Criteria, Certification, Zertifizierung, Security IC, SmartCard, Infineon Technologies AG, Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22,M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base,SCL, HCL, PSL and with specific IC dedicated software |
| Author | Bundesamt fĂĽr Sicherheit in der Informationstechnik |
| Creation date | D:20200709142438+02'00' |
| Modification date | D:20200709150315+02'00' |
| Pages | 35 |
| Creator | Writer |
| Producer | LibreOffice 6.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0827-V8-2020 |
|---|---|
| Certified item | Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software |
| Certification lab | BSI |
| Developer | Infineon Technologies AG |
References
Outgoing- BSI-DSZ-CC-0827 - active - Infineon Technologies Security Controller M9905 A11 with optional ACL v2.07.003 and v2.09.002
- BSI-DSZ-CC-0827-V7-2018 - archived - Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software
- BSI-DSZ-CC-1158-2020 - archived - Digital Tachograph DTCO 1381, Release 4.0e
- BSI-DSZ-CC-0827-V9-2024 - archived - Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TDEA, CMACAsymmetric Algorithms
RSA2048, RSA4096, RSA-2048, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA256, SHA-2, MD5Schemes
MAC, Key AgreementRandomness
TRNG, RNG, RNDLibraries
Crypto Library 2.02.010, Crypto Library 2.04.003, Crypto Library 39Block cipher modes
ECB, CBC, CTR, CFBTrusted Execution Environments
SSCVendor
Infineon Technologies, Infineon, Infineon Technologies AGSecurity level
EAL5, EAL5+, EAL 5, EAL5 augmented, EAL 5 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP, ADV_FSP.4, ADV_FSP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS, ALC_TAT, ALC_CMS.4, ALC_TAT.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.2, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_COP.1, FCS_CKM.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FDP_ACC.1, FDP_ACF.1, FDP_SDI.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_SDI.1.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_PHP.3, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FMT_SMF.1.1, FPT_TST, FPT_TST.2, FPT_TST.1, FPT_TST.2.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_FLS, FRU_FLT.2Protection profiles
BSI-PP-0035, BSI-CC-PP-0035-2007Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, Side-channel, SPA, DPA, Timing Attack, template attacks, Malfunction, malfunction, DFA, reverse engineeringCertification process
out of scope, FTL) libraries are additionally supported software which is 4 out of scope of this certification, Toolbox and Flash Translation Layer (FTL) libraries are additionally supported software which is 4 out of scope of this certification. 5 The Toolbox library does not provide cryptographic support or additionalStandards
FIPS 180-4, FIPS PUB 197, PKCS#1, AIS31, RFC 5639, ISO/IEC 7816-3, ISO/IEC14443-3, SCP 10, SCP 27, SCP 26, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Keywords | Infineon |
|---|---|
| Author | Urian Rainer (IFAG CCS SQM PS) |
| Creation date | D:20200514104824+02'00' |
| Modification date | D:20200514104824+02'00' |
| Pages | 98 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0827-V8-2020Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 187.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V8c_pdf.pdf",
"dgst": "a7f664bb79fd34df",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0827-V8-2020",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"f6d23054061d72ba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V9-2024",
"BSI-DSZ-CC-1158-2020"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827",
"BSI-DSZ-CC-0827-V7-2018"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1158-V3-2025",
"BSI-DSZ-CC-0827",
"BSI-DSZ-CC-1158-V4-2025",
"BSI-DSZ-CC-0827-V9-2024",
"BSI-DSZ-CC-0827-V8-2020",
"BSI-DSZ-CC-1158-V2-2023",
"BSI-DSZ-CC-1158-2020"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0827-V6-2017",
"BSI-DSZ-CC-0827-V5-2017",
"BSI-DSZ-CC-0827-V3-2015",
"BSI-DSZ-CC-0827",
"BSI-DSZ-CC-0791-2012",
"BSI-DSZ-CC-0827-V9-2024",
"BSI-DSZ-CC-0827-V8-2020",
"BSI-DSZ-CC-0827-V2-2014",
"BSI-DSZ-CC-0827-V4-2016",
"BSI-DSZ-CC-0827-2013",
"BSI-DSZ-CC-0827-V7-2018"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Infineon Technologies AG",
"manufacturer_web": "https://www.infineon.com/",
"name": "Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software",
"not_valid_after": "2025-07-06",
"not_valid_before": "2020-07-06",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "0827V8c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA2048": 1,
"RSA4096": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-V8-2020": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 5": 2,
"EAL 5 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies": 1,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20200709150508+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Certification, Zertifizierung, Security IC, SmartCard, Infineon Technologies AG, Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22,M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base,SCL, HCL, PSL and with specific IC dedicated software",
"/ModDate": "D:20200709150806+02\u002700\u0027",
"/Producer": "LibreOffice 6.2",
"/Subject": "BSI-DSZ-CC-0827-V8-2020, Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22,M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base,SCL, HCL, PSL and with specific IC dedicated software, Common Criteria",
"/Title": "Certificate BSI-DSZ-CC-0827-V8-2020",
"pdf_file_size_bytes": 290489,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "0827V8a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2, AVA_VAN.5",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0827-V8-2020",
"cert_item": "Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software",
"cert_lab": "BSI",
"developer": "Infineon Technologies AG",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 6
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 2
}
},
"RSA": {
"RSA2048": 11,
"RSA4096": 11
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0827-": 1,
"BSI-DSZ-CC-0827-V7-2018": 1,
"BSI-DSZ-CC-0827-V8-2020": 21
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0035-2007": 1,
"BSI-CC-PP-0035-2007": 2
}
},
"cc_sar": {
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 3,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 1,
"EAL 5": 8,
"EAL 5 augmented": 3,
"EAL5+": 1,
"EAL6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"ADV, Cryptographic Standards Compliance Verification, v1, 2020-02-03, T\u00dcV Informationstechnik GmbH (confidential document) 7 See section 9.1 for a detailed list of used AIS and supporting documents 31 / 35 Certification": 1,
"M9906 including optional Software Libraries RSA-EC-SCL-PSL\u201d, Infineon (confidential document) [12] to [24]: See table 2 in section B.2. [25] SINGLE EVALUATION REPORT ADDENDUM to ETR-Part ASE": 1,
"REPORT SUMMARY (ETR SUMMARY)\u201d, T\u00dcV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9": 1,
"Target M9900, M9905, M9906 including optional Software Libraries RSA-EC-SCL-HCL-PSL\u201d, Infineon (confidential document) [7] Evaluation Technical Report, BSI-DSZ-CC-0827-V8-2020 Version 2, 2020-05-19, \u201cEVALUATION": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"\u201cEVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)\u201d, T\u00dcV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, v1.4, 2018-06-06, \u201cConfiguration Management Scope M9900": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CFB": {
"CFB": 2
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library 2.01.011": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"B-163": 1
}
},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 5
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 2,
"physical probing": 1
}
},
"standard_id": {
"BSI": {
"AIS 1": 1,
"AIS 14": 1,
"AIS 19": 1,
"AIS 20": 1,
"AIS 23": 1,
"AIS 25": 1,
"AIS 26": 1,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 3,
"AIS 37": 1,
"AIS 38": 1,
"AIS 41": 1,
"AIS 46": 1,
"AIS31": 2
},
"FIPS": {
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 1,
"FIPS180-4": 3,
"FIPS186-4": 3,
"FIPS197": 8
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS #1": 3
},
"RFC": {
"RFC 5639": 1,
"RFC5639": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 16
}
},
"DES": {
"3DES": {
"3DES": 6,
"TDEA": 1,
"Triple-DES": 2
},
"DES": {
"DES": 7
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"CMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 2,
"Giesecke \u0026 Devrient": 1
},
"Infineon": {
"Infineon": 6,
"Infineon Technologies": 9,
"Infineon Technologies AG": 8
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20200709142438+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Certification, Zertifizierung, Security IC, SmartCard, Infineon Technologies AG, Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22,M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base,SCL, HCL, PSL and with specific IC dedicated software",
"/ModDate": "D:20200709150315+02\u002700\u0027",
"/Producer": "LibreOffice 6.2",
"/Subject": "BSI-DSZ-CC-0827-V8-2020, Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22,M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base,SCL, HCL, PSL and with specific IC dedicated software, Common Criteria",
"/Title": "Certification Report BSI-DSZ-CC-0827-V8-2020",
"pdf_file_size_bytes": 936097,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/AIS",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"http://www.commoncriteriaportal.org/cc/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 35
},
"st_filename": "0827V8b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 50
},
"ECDH": {
"ECDH": 6
},
"ECDSA": {
"ECDSA": 15
}
},
"FF": {
"DH": {
"Diffie-Hellman": 7
},
"DSA": {
"DSA": 2
}
},
"RSA": {
"RSA-2048": 1,
"RSA2048": 3,
"RSA4096": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.RND": 1
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1,
"BSI-PP-0035": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP": 1,
"ADV_FSP.2": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 3,
"ADV_IMP.1": 2,
"ADV_INT.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 9,
"ALC_LCD.1": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL": 2,
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT": 2,
"ASE_INT.1": 1,
"ASE_OBJ": 2,
"ASE_OBJ.2": 1,
"ASE_REQ": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 2,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 4,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 11
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 4,
"EAL 5 augmented": 3,
"EAL5": 7,
"EAL5 augmented": 3,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 5,
"FAU_SAS.1": 10,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 33,
"FCS_CKM.1": 51,
"FCS_CKM.2": 6,
"FCS_CKM.4": 41,
"FCS_COP": 194,
"FCS_COP.1": 45,
"FCS_RNG": 29,
"FCS_RNG.1": 25,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 23,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 19,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 14,
"FDP_ITC.1": 34,
"FDP_ITC.2": 34,
"FDP_ITT.1": 11,
"FDP_PHP.3": 1,
"FDP_SDI.1": 17,
"FDP_SDI.1.1": 1,
"FDP_SDI.2": 14,
"FDP_SDI.2.1": 2,
"FDP_SDI.2.2": 2
},
"FIA": {
"FIA_SOS.2": 3,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 2
},
"FMT": {
"FMT_LIM": 3,
"FMT_LIM.1": 7,
"FMT_LIM.2": 8,
"FMT_MSA.1": 17,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 19,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 15,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_FLS": 1,
"FPT_FLS.1": 18,
"FPT_ITT.1": 13,
"FPT_PHP.3": 14,
"FPT_TST": 5,
"FPT_TST.1": 12,
"FPT_TST.2": 34,
"FPT_TST.2.1": 2
},
"FRU": {
"FRU_FLT.2": 8
}
},
"certification_process": {
"OutOfScope": {
"FTL) libraries are additionally supported software which is 4 out of scope of this certification": 1,
"Toolbox and Flash Translation Layer (FTL) libraries are additionally supported software which is 4 out of scope of this certification. 5 The Toolbox library does not provide cryptographic support or additional": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 17
},
"CFB": {
"CFB": 6
},
"CTR": {
"CTR": 8
},
"ECB": {
"ECB": 12
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library 2.02.010": 1,
"Crypto Library 2.04.003": 1,
"Crypto Library 39": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
},
"MAC": {
"MAC": 20
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 28
}
},
"SHA": {
"SHA1": {
"SHA-1": 8,
"SHA1": 28
},
"SHA2": {
"SHA-2": 4,
"SHA-224": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2,
"SHA256": 28
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 16
},
"TRNG": {
"TRNG": 14
}
},
"side_channel_analysis": {
"FI": {
"DFA": 7,
"Malfunction": 12,
"malfunction": 1
},
"SCA": {
"DPA": 7,
"Leak-Inherent": 10,
"Physical Probing": 2,
"SPA": 8,
"Side-channel": 1,
"Timing Attack": 1,
"physical probing": 1,
"side channel": 8,
"template attacks": 3
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 5
},
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 180-4": 2,
"FIPS PUB 197": 1
},
"ISO": {
"ISO/IEC 7816-3": 1,
"ISO/IEC14443-3": 1
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 5639": 1
},
"SCP": {
"SCP 10": 1,
"SCP 26": 1,
"SCP 27": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 47
}
},
"DES": {
"3DES": {
"3DES": 32,
"TDEA": 1,
"Triple-DES": 3
},
"DES": {
"DES": 9
}
},
"constructions": {
"MAC": {
"CMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 4
}
},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 9,
"Infineon Technologies": 13,
"Infineon Technologies AG": 18
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Urian Rainer (IFAG CCS SQM PS)",
"/CreationDate": "D:20200514104824+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/Keywords": "Infineon",
"/ModDate": "D:20200514104824+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 1352401,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ietf.org/rfc/rfc5639.txt",
"http://www.infineon.com/",
"mailto:[email protected];[email protected]?subject=Document%20question%20"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 98
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V8a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V8b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "017344ae474421c2ea55d05d081dcff910591a72a987c93d54f19ef804f01490",
"txt_hash": "541e7039cfa2d4b1ca71d9e89bc5bd4e9bbbc92f7501247db8e343d943eb1986"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "5accec9d57ead490df4af32be67d3d615de33bd176b5e7c718c6440a55fbfff9",
"txt_hash": "c8c82e375727fdc960a9aeb733c03c686d1134900b2464822ccbd0cbab51b1ff"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "3856a87beac4ae478c65cd3d800456a998b898ee811d1849a977066c8733a064",
"txt_hash": "2fbc3474ac9a32cc62ea2b12ff20e503f255d81a7e85ac53fb24a3a042f81a00"
}
},
"status": "archived"
}