Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
BSI-DSZ-CC-0926-2014
Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
BSI-DSZ-CC-0827-V2-2014
name Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
not_valid_before 2014-04-04 2014-04-30
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2a_pdf.pdf
state/report/pdf_hash 1ad1faaa140c23deb38634a484ac3386fd37a81793fc0acff9afe29d71d726db 73e1e36ac72df9017049ff5ab8e33e80dd1e25214a4ec4a8af40d094af3f3357
state/report/txt_hash 491a0d7e8452fe86b82642ee58055cd9c79b34f8091203a996e6f42c8670f017 8f78cd6183c4d8f47c68b63a8435382a0a4267dea897d90aa83107a82140d853
state/st/pdf_hash 11c0370e555b2ace6c4c2340d24bb9d9b56222472a9c69b0443800f6307e8a0f 36c632f0e7e97ad990a45b8a94dfa9f36d1535b9b87537d8da20ce9156ae76fe
state/st/txt_hash 3a6011041186c7f721ac7f33c38153ecc2ce2e2d7ff389c8e6d9163b3106fb57 91b00be9da132d9f06300e5b6e13f667a810a9760bfb8e06324d9d0aaa59034d
heuristics/cert_id BSI-DSZ-CC-0926-2014 BSI-DSZ-CC-0827-V2-2014
heuristics/cpe_matches cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* None
heuristics/direct_transitive_cves CVE-2017-15361 None
heuristics/extracted_versions 1.02.010, 1.02.013, 2.00.002 1.01.0008, 1.03.006
heuristics/indirect_transitive_cves CVE-2017-15361 None
heuristics/related_cves CVE-2017-15361 None
heuristics/report_references/directly_referenced_by ANSSI-CC-2015/73, BSI-DSZ-CC-0926-V2-2017 BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-2014
heuristics/report_references/directly_referencing BSI-DSZ-CC-0907-2013 BSI-DSZ-CC-0827-2013
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2016/06, ANSSI-CC-2016/24, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-V2-2017, ANSSI-CC-2016/23 CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1069-2018, ANSSI-CC-2019/38, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V7-2018
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013 BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012
heuristics/st_references/directly_referenced_by ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/23 None
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/23 None
pdf_data/report_filename 0926a_pdf.pdf 0827V2a_pdf.pdf
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0926-2014 BSI-DSZ-CC-0827-V2-2014
pdf_data/report_frontpage/DE/cert_item Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 9 5
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0926-2014: 26
  • BSI-DSZ-CC-0907-2013: 3
  • BSI-DSZ-CC-S-0023-2013: 1
  • BSI-DSZ-CC-S-0015-2012: 1
  • BSI-DSZ-CC-0827-V2-2014: 23
  • BSI-DSZ-CC-0827-2013: 3
  • BSI-DSZ-CC-S-0023-2013: 1
  • BSI-DSZ-CC-S-0015-2012: 1
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.5 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.2 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.4 1 2
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 7 8
pdf_data/report_keywords/cc_security_level/EAL/EAL5 7 6
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • optional Software Libraries RSA – EC – Toolbox, Version 2.0, 2014-02-12, Infineon Technologies AG (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
  • BSI-DSZ-CC-0926-2014, M7793 A12 and G12, Version 2, 2014-03-27, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7793 A12 and G12, Version 2: 1
  • 2014-03-27, TÜV Informationstechnik GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
  • optional Software Libraries RSA – EC – Toolbox, Version 1.3, 2013-11-11, Infineon Technologies AG (confidential document) [12] M7793 Security Guidelines User’s Manual, 2013-08-07, Infineon Technologies AG [13] SLx 70: 1
  • Software Libraries RSA - EC – Toolbox – FTL, Version 1.6, 2014-02-21, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900 A22 and G11 including optional Software Libraries RSA – EC –: 1
  • the M9900 A22 and G11 with Crypto Libraries, Version 4, 2014-04-02, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M9900 A21, Version 4, 2014-04-02: 1
  • Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
  • optional Software Libraries RSA - EC – Toolbox – FTL, Version 0.6, 2014-01-27, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006),2012-08-16: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 3
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 28
pdf_data/report_keywords/randomness/TRNG/TRNG 2 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS 34: 2
    • AIS 31: 2
    • AIS 36: 3
    • AIS31: 2
    • AIS 35: 2
    • AIS 20: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 2
  • RFC:
    • RFC 5639: 1
  • FIPS:
    • FIPS186-4: 4
    • FIPS197: 3
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • BSI:
    • AIS32: 1
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 36: 3
    • AIS31: 2
    • AIS 35: 2
    • AIS 20: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 2
  • RFC:
    • RFC5639: 5
    • RFC 5639: 1
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS31: 2
  • AIS 35: 2
  • AIS 20: 1
  • AIS 25: 1
  • AIS 26: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 2
  • AIS32: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 3
  • AIS 36: 3
  • AIS31: 2
  • AIS 35: 2
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 2
pdf_data/report_keywords/standard_id/BSI/AIS 25 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 26 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 31 2 3
pdf_data/report_keywords/standard_id/FIPS
  • FIPS PUB 197: 1
  • FIPS186-4: 4
  • FIPS197: 3
  • FIPS 186-4: 1
  • FIPS PUB 186-4: 1
pdf_data/report_keywords/standard_id/RFC
  • RFC 5639: 1
  • RFC5639: 5
  • RFC 5639: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 7 8
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES 2 3
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 2 3
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 4 3
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 4 5
pdf_data/report_metadata//CreationDate D:20140424155624+02'00' D:20140519170621+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software, Infineon Technologies AG" "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20140424160045+02'00' D:20140519171035+02'00'
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0926-2014 Certification Report BSI-DSZ-CC-0827-V2-2014
pdf_data/report_metadata/pdf_file_size_bytes 1231840 1267084
pdf_data/st_filename 0926b_pdf.pdf 0827V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 10 20
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 4 6
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 12 14
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 4 5
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 1 2
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 1 2
pdf_data/st_keywords/cc_claims/O/O.RND 3 1
pdf_data/st_keywords/cc_claims/T/T.RND 3 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 4 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_CMS: 1
  • ALC_CMS.4: 1
  • ALC_DVS.1: 1
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 3
  • ALC_CMS: 1
  • ALC_TAT: 1
  • ALC_CMS.4: 1
  • ALC_TAT.1: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 1 3
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 4
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 1 4
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 3 4
pdf_data/st_keywords/cc_security_level/EAL/EAL5 5 7
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 3
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS 5 4
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 8 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 18 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 33 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 34 47
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 32 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 14 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 26 30
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 19
  • FDP_ACF.1: 15
  • FDP_SDI.1: 12
  • FDP_SDI.2: 12
  • FDP_ITT.1: 4
  • FDP_IFC.1: 6
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 17
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_ACC.1: 23
  • FDP_ACF.1: 20
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ITT.1: 13
  • FDP_IFC.1: 10
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 17
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_PHP.3: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 19 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 15 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 6 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 4 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 12 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 12 15
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 14
  • FMT_MSA.3: 15
  • FMT_SMF.1: 12
  • FMT_LIM: 3
  • FMT_LIM.1: 5
  • FMT_LIM.2: 5
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 9
  • FMT_MSA.1: 18
  • FMT_MSA.3: 19
  • FMT_SMF.1: 15
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 14 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 15 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 12 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST: 7
  • FPT_TST.2: 31
  • FPT_TST.1: 11
  • FPT_FLS.1: 5
  • FPT_PHP.3: 4
  • FPT_ITT.1: 4
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_TST: 7
  • FPT_TST.2: 36
  • FPT_TST.1: 11
  • FPT_FLS.1: 16
  • FPT_PHP.3: 14
  • FPT_ITT.1: 13
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_FLS: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 4 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 4 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 31 36
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 5 8
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 7
  • CBC:
    • CBC: 7
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/st_keywords/ecc_curve/NIST
  • K-163: 2
  • P-192: 4
  • K-163: 2
pdf_data/st_keywords/hash_function/MD/MD5/MD5 15 47
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 15 47
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 15 47
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 6
  • PRNG:
    • PRNG: 5
  • RNG:
    • RND: 6
    • RNG: 9
  • TRNG:
    • TRNG: 14
  • RNG:
    • RNG: 11
    • RND: 2
pdf_data/st_keywords/randomness/RNG/RND 6 2
pdf_data/st_keywords/randomness/RNG/RNG 9 11
pdf_data/st_keywords/randomness/TRNG/TRNG 6 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • side channel: 1
    • SPA: 4
    • DPA: 6
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 6
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 6
    • Side-channel: 1
    • SPA: 6
    • DPA: 7
    • Timing Attack: 1
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI/DFA 6 7
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 10
  • Physical Probing: 2
  • side channel: 1
  • SPA: 4
  • DPA: 6
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 6
  • Side-channel: 1
  • SPA: 6
  • DPA: 7
  • Timing Attack: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 6 7
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 4 6
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 1 6
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
  • BSI:
    • AIS31: 3
  • RFC:
    • RFC3447: 6
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 197: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • RFC:
    • RFC3447: 11
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 3
  • AIS31: 5
  • AIS32: 4
pdf_data/st_keywords/standard_id/BSI/AIS31 3 5
pdf_data/st_keywords/standard_id/RFC/RFC3447 6 11
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 15 27
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 9 17
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA 1 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 2 4
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 2
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 4 5
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/vendor/Infineon/Infineon 3 6
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 12 7
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 17 20
pdf_data/st_metadata//Author Steffen Heinkel Jürgen Noller
pdf_data/st_metadata//CreationDate D:20140218111402+01'00' D:20140305150457Z
pdf_data/st_metadata//Creator Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Keywords M7793, EAL5+, attack potential high, AVA_VAN.5 Dresden, TSMC, Infineon, RSA, Eliptic Curve, Library, multi interface, high end security controler, ARM CPU, ARM Core, robust, CCv3.1, EAL5+, secure controller, EAL5+, augmented, high attack potential, AVA_VAN.5, PP0035
pdf_data/st_metadata//ModDate D:20140424162835+02'00' D:20140520092728+02'00'
pdf_data/st_metadata//Producer Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Subject Security Target Lite M7793 Security Target Lite A22 and G11
pdf_data/st_metadata//Title Public Security Target Lite Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 931877 964080
pdf_data/st_metadata/pdf_number_of_pages 74 84
dgst 02c1c81d0bf1270c 5d83a59f8c44527c