Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
BSI-DSZ-CC-0926-2014
Infineon Security Controller IFX_CCI_00000Fh, IFX_CCI_000010h, IFX_CCI_000026h, IFX_CCI_000027h, IFX_CCI_000028h, IFX_CCI_000029h, IFX_CCI_00002Ah, IFX_CCI_00002Bh, IFX_CCI_00002Ch in the design step G12 and including optional software libraries and dedicated firmware
BSI-DSZ-CC-1079-V4-2023
name Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software Infineon Security Controller IFX_CCI_00000Fh, IFX_CCI_000010h, IFX_CCI_000026h, IFX_CCI_000027h, IFX_CCI_000028h, IFX_CCI_000029h, IFX_CCI_00002Ah, IFX_CCI_00002Bh, IFX_CCI_00002Ch in the design step G12 and including optional software libraries and dedicated firmware
not_valid_before 2014-04-04 2023-07-13
not_valid_after 2019-09-01 2028-07-13
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1079V4b_pdf.pdf
status archived active
security_level EAL5+, AVA_VAN.5, ALC_DVS.2 ALC_FLR.1, EAL6+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1079V4a_pdf.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1079V4c_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None e0180a7ba8514b957b8995c622a1acd682474bfe6f88bd7caaceea270b7b2946
state/cert/txt_hash None 1434fb73bf426d7fde1fab1de79f324a62607499a709a60fd176f2e5cd190644
state/report/pdf_hash 1ad1faaa140c23deb38634a484ac3386fd37a81793fc0acff9afe29d71d726db 04022a221365e425f73a57386e9bba2b9b2df37564a64c04eb35c97bcc488684
state/report/txt_hash 491a0d7e8452fe86b82642ee58055cd9c79b34f8091203a996e6f42c8670f017 67c28cd2cee5eaf793d3b6657c38922c685b4a2f2ffa20813cd101a6d583a40e
state/st/pdf_hash 11c0370e555b2ace6c4c2340d24bb9d9b56222472a9c69b0443800f6307e8a0f c142b31513e18c5907f5bb7cad8e0db8458607993e74ad0ae6ac2c4fe9f3996a
state/st/txt_hash 3a6011041186c7f721ac7f33c38153ecc2ce2e2d7ff389c8e6d9163b3106fb57 ac6c676c6a9525bd72f46745da2d2ef7056aef65158bdc47934d49a738dfaf9f
heuristics/cert_id BSI-DSZ-CC-0926-2014 BSI-DSZ-CC-1079-V4-2023
heuristics/cpe_matches cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* None
heuristics/direct_transitive_cves CVE-2017-15361 None
heuristics/extracted_versions 1.02.010, 1.02.013, 2.00.002 -
heuristics/indirect_transitive_cves CVE-2017-15361 None
heuristics/related_cves CVE-2017-15361 None
heuristics/report_references/directly_referenced_by ANSSI-CC-2015/73, BSI-DSZ-CC-0926-V2-2017 None
heuristics/report_references/directly_referencing BSI-DSZ-CC-0907-2013 BSI-DSZ-CC-1079-V3-2021
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2016/06, ANSSI-CC-2016/24, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-V2-2017, ANSSI-CC-2016/23 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013 BSI-DSZ-CC-1079-V3-2021, BSI-DSZ-CC-1079-V2-2020
heuristics/scheme_data None
  • cert_id: BSI-DSZ-CC-1079-V5-2024
  • product: Infineon Security Controller IFX_CCI_00000Fh, IFX_CCI_000010h, IFX_CCI_000026h, IFX_CCI_000027h, IFX_CCI_000028h, …
  • vendor: Infineon Technologies AG
  • certification_date: 08.10.2024
  • category: Smart Cards and similar devices
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1079.html
  • enhanced:
    • product: Infineon Security Controller IFX_CCI_00000Fh, IFX_CCI_000010h, IFX_CCI_000026h, IFX_CCI_000027h, IFX_CCI_000028h, IFX_CCI_000029h, IFX_CCI_00002Ah, IFX_CCI_00002Bh, IFX_CCI_00002Ch in the design step G12
    • applicant: Infineon Technologies AG Am Campeon 1-15 85579 Neubiberg
    • evaluation_facility: TÜV Informationstechnik GmbH
    • assurance_level: EAL6+,ALC_FLR.1
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
    • certification_date: 08.10.2024
    • expiration_date: 12.07.2028
    • entries: frozendict({'id': 'BSI-DSZ-CC-1079-V5-2024 (Ausstellungsdatum / Certification Date 08.10.2024, gültig bis / valid until 12.07.2028)\nZertifizierungsreport / Certification Report', 'description': 'documentation were conducted.'}), frozendict({'id': 'BSI-DSZ-CC-1079-V4-2023 (Ausstellungsdatum / Certification Date 13.07.2023, gültig bis / valid until 12.07.2028)\nZertifizierungsreport / Certification Report', 'description': 'forerunner, the documentation was changed also a variety of improved Penetration Tests has been conducted, leading to restrictions in the guidance.'}), frozendict({'id': 'BSI-DSZ-CC-1079-V3-2021 (Ausstellungsdatum / Certification Date 12.11.2021, gültig bis / valid until 11.11.2026)', 'description': 'Software'}), frozendict({'id': 'BSI-DSZ-CC-1079-V2-2020 (Ausstellungsdatum / Certification Date 16.06.2020, gültig bis / valid until 15.06.2025)', 'description': 'configurations were added, Software libraries added and documentation was changed.'}), frozendict({'id': 'BSI-DSZ-CC-1079-2018-MA-01 (Ausstellungsdatum / Certification Date 03.12.2018)', 'description': 'Prüfergebnis'}), frozendict({'id': 'BSI-DSZ-CC-1079-2018 (Ausstellungsdatum / Certification Date 26.09.2018, gültig bis / valid until 25.09.2023)', 'description': 'Certificate'})
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1079V5a_pdf.pdf?__blob=publicationFile&v=3
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1079V5b_pdf.pdf?__blob=publicationFile&v=3
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1079V5c_pdf.pdf?__blob=publicationFile&v=3
    • description: The TOE provides a real 16-bit CPU-architecture and is compatible to the Intel 80251 architecture. The major components of the core system are the two CPUs (Central Processing Units), the MMU (Memory Management Unit) and MED (Memory Encryption/Decryption Unit). The dual interface controller is able to communicate using either the contact based or the contactless interface. This TOE is intended to be used in smart cards for particular security relevant applications and as a developing platform for smart card operating systems. The term smartcard embedded software is used in the following for all operating systems and applications stored and executed on the TOE. The TOE is the platform for the smartcard embedded software. Depending on the blocking configuration a product can have e.g. different user available memory sizes and can come with or without individual accessible cryptographic coprocessors. All products are identical in regard to module design, layout and footprint.
  • subcategory: ICs, Cryptolib
heuristics/st_references/directly_referenced_by ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/23 None
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/23 None
pdf_data/cert_filename None 1079V4c_pdf.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • DE:
      • BSI-DSZ-CC-1079-V4-2023: 1
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0084-2014: 1
  • cc_security_level:
    • EAL:
      • EAL 6: 1
      • EAL 5: 1
      • EAL 4: 1
      • EAL 2: 1
      • EAL 6 augmented: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.1: 1
      • ALC_FLR: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • Infineon:
      • Infineon: 1
      • Infineon Technologies AG: 1
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ISO:
      • ISO/IEC 15408: 2
      • ISO/IEC 18045: 2
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 233830
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, BSI-DSZ-CC-1079-V4-2023"
  • /Subject: Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, BSI-DSZ-CC-1079-V4-2023
  • /Title: Certificate BSI-DSZ-CC-1079-V4-2023
  • pdf_hyperlinks:
pdf_data/report_filename 0926a_pdf.pdf 1079V4a_pdf.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0926-2014
  • cert_item: Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-1079-V4-2023
  • cert_item: Infineon Security Controller IFX_CCI_00000Fh, IFX_CCI_000010h, IFX_CCI_000026h, IFX_CCI_000027h, IFX_CCI_000028h, IFX_CCI_000029h, IFX_CCI_00002Ah, IFX_CCI_00002Bh, IFX_CCI_00002Ch in the design step G12 and including optional software libraries and dedicated firmware
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 12 July 2028
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0926-2014 BSI-DSZ-CC-1079-V4-2023
pdf_data/report_frontpage/DE/cert_item Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software Infineon Security Controller IFX_CCI_00000Fh, IFX_CCI_000010h, IFX_CCI_000026h, IFX_CCI_000027h, IFX_CCI_000028h, IFX_CCI_000029h, IFX_CCI_00002Ah, IFX_CCI_00002Bh, IFX_CCI_00002Ch in the design step G12 and including optional software libraries and dedicated firmware
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
  • ECC:
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
    • ECC:
      • ECC: 9
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 4
    • ECC:
      • ECC: 2
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 9 2
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDH/ECDH 3 1
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 7 4
pdf_data/report_keywords/asymmetric_crypto/RSA
  • RSA-2048: 1
  • RSA2048: 2
  • RSA4096: 2
  • RSA2048: 1
  • RSA4096: 1
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 2 1
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA4096 2 1
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0926-2014: 26
  • BSI-DSZ-CC-0907-2013: 3
  • BSI-DSZ-CC-S-0023-2013: 1
  • BSI-DSZ-CC-S-0015-2012: 1
  • BSI-DSZ-CC-1079-V4-2023: 21
  • BSI-DSZ-CC-1079-V3-: 1
  • BSI-DSZ-CC-1079-V3-2021: 2
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0035-2007: 4
  • BSI-CC-PP-0084-2014: 3
  • BSI-CC-PP-0084-: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 7
    • ALC_TAT.2: 3
    • ALC_CMS.5: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_DPT.3: 2
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 6
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ALC:
    • ALC_FLR.1: 4
    • ALC_FLR: 3
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 7
  • ALC_TAT.2: 3
  • ALC_CMS.5: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 2
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 2
  • ALC_DVS.1: 1
  • ALC_FLR.1: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 2
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.3: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_FLR: 1
  • ALC_TAT: 1
  • ALC_FLR.1: 4
  • ALC_FLR: 3
  • ALC_CMC.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.4 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 7 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 1 4
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 3 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 7
    • EAL 4: 2
    • EAL1: 7
    • EAL4: 7
    • EAL5: 7
    • EAL5+: 1
    • EAL6: 4
    • EAL3: 4
    • EAL7: 4
    • EAL2: 3
    • EAL 5 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 6: 4
    • EAL 5: 4
    • EAL 4: 2
    • EAL 2: 3
    • EAL 1: 1
    • EAL5+: 1
    • EAL6: 4
    • EAL6+: 3
    • EAL 6 augmented: 3
    • EAL6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 7
  • EAL 4: 2
  • EAL1: 7
  • EAL4: 7
  • EAL5: 7
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL7: 4
  • EAL2: 3
  • EAL 5 augmented: 3
  • EAL 6: 4
  • EAL 5: 4
  • EAL 4: 2
  • EAL 2: 3
  • EAL 1: 1
  • EAL5+: 1
  • EAL6: 4
  • EAL6+: 3
  • EAL 6 augmented: 3
  • EAL6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 7 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • optional Software Libraries RSA – EC – Toolbox, Version 2.0, 2014-02-12, Infineon Technologies AG (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
    • BSI-DSZ-CC-0926-2014, M7793 A12 and G12, Version 2, 2014-03-27, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7793 A12 and G12, Version 2: 1
    • 2014-03-27, TÜV Informationstechnik GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
    • optional Software Libraries RSA – EC – Toolbox, Version 1.3, 2013-11-11, Infineon Technologies AG (confidential document) [12] M7793 Security Guidelines User’s Manual, 2013-08-07, Infineon Technologies AG [13] SLx 70: 1
  • OutOfScope:
    • out of scope: 2
    • 1976 – 4096 (note: TOE supports larger and smaller key sizes, which are generally out of scope of evaluation in BSI scheme: 2
    • 8.1.3.1]. 1976 – 4096 (note: TOE supports larger and smaller key sizes, which are generally out of scope of evaluation in BSI scheme) yes 14. RSA key generation using CryptoGeneratePri meMask (ACL v2.07: 1
    • 8.1.3.1]. 1976 – 4096 (note: TOE supports larger and smaller key sizes, which are generally out of scope of evaluation in BSI scheme) yes 16. EC key generation using ECC_ECDSAKey Gen (ACL v2.07.003, v2.08: 1
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • IFX_CCI_000029h IFX_CCI_00002Ah IFX_CCI_00002Bh IFX_CCI_00002Ch G12, Infineon Technologies AG (confidential document) 7 See section 9.1 for detailed list of used AIS 32 / 36 BSI-DSZ-CC-1079-V4-2023 Certification: 1
    • Version 3, 2023-06-26, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • IFX_CCI_000028h, IFX_CCI_000029h, IFX_CCI_00002Ah, IFX_CCI_00002Bh, IFX_CCI_00002Ch G12, (confidential document), TÜV Informationstechnik GmbH [11] Configuration list for the TOE, 0.8, 2021-05-06, “Life Cycle: 1
    • Libraries Flash Loader – 3x ACL – 2xHSL –2x SCL HCL - – CCL – NRG”, Infineon Technologies AG (confidential document) [12] 16-bit Security Controller Family – V05, Hardware Reference Manual, Version 5.0, 2019-06-14: 1
    • Standards Compliance Verification, Version 1, 2022-11-07, TÜV Informationstechnik GmbH (confidential document) C. Excerpts from the Criteria For the meaning of the assurance components and levels the following: 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • optional Software Libraries RSA – EC – Toolbox, Version 2.0, 2014-02-12, Infineon Technologies AG (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
  • BSI-DSZ-CC-0926-2014, M7793 A12 and G12, Version 2, 2014-03-27, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7793 A12 and G12, Version 2: 1
  • 2014-03-27, TÜV Informationstechnik GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
  • optional Software Libraries RSA – EC – Toolbox, Version 1.3, 2013-11-11, Infineon Technologies AG (confidential document) [12] M7793 Security Guidelines User’s Manual, 2013-08-07, Infineon Technologies AG [13] SLx 70: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • IFX_CCI_000029h IFX_CCI_00002Ah IFX_CCI_00002Bh IFX_CCI_00002Ch G12, Infineon Technologies AG (confidential document) 7 See section 9.1 for detailed list of used AIS 32 / 36 BSI-DSZ-CC-1079-V4-2023 Certification: 1
  • Version 3, 2023-06-26, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • IFX_CCI_000028h, IFX_CCI_000029h, IFX_CCI_00002Ah, IFX_CCI_00002Bh, IFX_CCI_00002Ch G12, (confidential document), TÜV Informationstechnik GmbH [11] Configuration list for the TOE, 0.8, 2021-05-06, “Life Cycle: 1
  • Libraries Flash Loader – 3x ACL – 2xHSL –2x SCL HCL - – CCL – NRG”, Infineon Technologies AG (confidential document) [12] 16-bit Security Controller Family – V05, Hardware Reference Manual, Version 5.0, 2019-06-14: 1
  • Standards Compliance Verification, Version 1, 2022-11-07, TÜV Informationstechnik GmbH (confidential document) C. Excerpts from the Criteria For the meaning of the assurance components and levels the following: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 3
  • CFB:
    • CFB: 3
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 28
pdf_data/report_keywords/crypto_scheme/KA
  • Key Agreement: 2
  • Key agreement: 1
  • Key Agreement: 3
pdf_data/report_keywords/crypto_scheme/KA/Key Agreement 2 3
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-192: 4
    • K-163: 2
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 4 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 2
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 2
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 3
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 4
pdf_data/report_keywords/randomness/RNG/RNG 3 4
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • SPA: 5
    • DPA: 6
  • FI:
    • physical tampering: 1
    • DFA: 6
  • other:
    • JIL: 4
  • SCA:
    • physical probing: 1
    • SPA: 3
    • DPA: 3
  • FI:
    • physical tampering: 1
    • DFA: 3
pdf_data/report_keywords/side_channel_analysis/FI/DFA 6 3
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 6 3
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 5 3
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS 34: 2
    • AIS 31: 2
    • AIS 36: 3
    • AIS31: 2
    • AIS 35: 2
    • AIS 20: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 2
  • RFC:
    • RFC 5639: 1
  • FIPS:
    • FIPS186-4: 4
    • FIPS197: 5
    • FIPS180-4: 2
  • NIST:
    • NIST SP 800-38B: 1
  • PKCS:
    • PKCS #1: 3
  • BSI:
    • AIS 34: 2
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 31: 2
    • AIS 32: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 37: 1
    • AIS 38: 1
    • AIS 41: 1
    • AIS 46: 1
    • AIS 47: 1
    • AIS31: 5
  • RFC:
    • RFC5639: 4
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS31: 2
  • AIS 35: 2
  • AIS 20: 1
  • AIS 25: 1
  • AIS 26: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 2
  • AIS 34: 2
  • AIS 1: 1
  • AIS 14: 1
  • AIS 19: 1
  • AIS 20: 1
  • AIS 23: 1
  • AIS 25: 1
  • AIS 26: 1
  • AIS 31: 2
  • AIS 32: 2
  • AIS 35: 2
  • AIS 36: 3
  • AIS 37: 1
  • AIS 38: 1
  • AIS 41: 1
  • AIS 46: 1
  • AIS 47: 1
  • AIS31: 5
pdf_data/report_keywords/standard_id/BSI/AIS 32 1 2
pdf_data/report_keywords/standard_id/BSI/AIS31 2 5
pdf_data/report_keywords/standard_id/FIPS
  • FIPS PUB 197: 1
  • FIPS186-4: 4
  • FIPS197: 5
  • FIPS180-4: 2
pdf_data/report_keywords/standard_id/RFC
  • RFC 5639: 1
  • RFC5639: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 4
    • 3DES:
      • Triple-DES: 2
      • TDES: 2
      • 3DES: 1
      • TDEA: 1
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • DES:
      • DES: 4
    • 3DES:
      • TDES: 4
      • Triple-DES: 2
      • TDEA: 1
      • 3DES: 1
  • constructions:
    • MAC:
      • CBC-MAC: 3
      • CMAC: 5
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 7 12
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES 2 4
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI TR-02102: 1
  • BSI 15: 1
  • BSI 7148: 1
pdf_data/report_keywords/vendor/Infineon
  • Infineon Technologies: 17
  • Infineon Technologies AG: 21
  • Infineon: 4
  • Infineon: 9
  • Infineon Technologies AG: 23
pdf_data/report_keywords/vendor/Infineon/Infineon 4 9
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 21 23
pdf_data/report_metadata
  • pdf_file_size_bytes: 1231840
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20140424155624+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software, Infineon Technologies AG"
  • /ModDate: D:20140424160045+02'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0926-2014
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
  • pdf_file_size_bytes: 599985
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, BSI-DSZ-CC-1079-V4-2023"
  • /Subject: Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, BSI-DSZ-CC-1079-V4-2023
  • /Title: Certification Report BSI-DSZ-CC-1079-V4-2023
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software, Infineon Technologies AG" "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, BSI-DSZ-CC-1079-V4-2023"
pdf_data/report_metadata//Subject Common Criteria Certification Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, BSI-DSZ-CC-1079-V4-2023
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0926-2014 Certification Report BSI-DSZ-CC-1079-V4-2023
pdf_data/report_metadata/pdf_file_size_bytes 1231840 599985
pdf_data/report_metadata/pdf_number_of_pages 44 36
pdf_data/st_filename 0926b_pdf.pdf 1079V4b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 10 19
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 4 10
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 12 26
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 4 10
pdf_data/st_keywords/asymmetric_crypto/RSA
  • RSA2048: 1
  • RSA4096: 1
  • RSA-2048: 1
  • RSA2048: 1
  • RSA4096: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 3
  • O.TDES: 7
  • O.AES: 8
  • O.RND: 4
pdf_data/st_keywords/cc_claims/O/O.RND 3 4
pdf_data/st_keywords/cc_claims/T/T.RND 3 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 2
  • BSI-CC-PP-0084-2014: 3
  • BSI-CC-PP-0084-: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.5: 4
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
  • ADV_SPM.1: 10
  • ADV_ARC.1: 1
  • ADV_FSP.5: 3
  • ADV_IMP.2: 2
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_IMP: 1
  • ADV_IMP.1: 2
  • ADV_FSP: 1
  • ADV_FSP.4: 4
  • ADV_SPM: 1
  • ADV_CMC.5: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 1 4
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 4 3
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 2 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_CMS: 1
  • ALC_CMS.4: 1
  • ALC_DVS.1: 1
  • ALC_DVS: 2
  • ALC_DVS.2: 4
  • ALC_FLR.1: 10
  • ALC_CMC.5: 2
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS: 2
  • ALC_CMS.4: 3
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_DVS.1: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 1 3
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 9 4
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL 2 7
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD 2 4
pdf_data/st_keywords/cc_sar/ASE/ASE_INT 2 19
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ 2 13
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ 2 58
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD 2 8
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS 2 25
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.3: 4
  • ATE_DPT.3: 1
  • ATE_FUN.2: 1
  • ATE_IND.2: 1
  • ATE_COV: 1
  • ATE_COV.2: 3
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 1 3
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 11
  • AVA_VAN.5: 4
  • AVA_VAN: 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 11 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 1
  • EAL5: 5
  • EAL 5: 3
  • EAL5 augmented: 1
  • EAL 5 augmented: 3
  • EAL6: 157
  • EAL6+: 153
  • EAL 6: 1
  • EAL6 augmented: 153
  • EAL 6 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 8
    • FAU_SAS: 5
    • FAU_GEN: 1
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG: 14
    • FCS_RNG.1: 26
    • FCS_COP.1: 32
    • FCS_CKM.1: 33
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_COP: 34
    • FCS_CKM.4: 23
    • FCS_CKM: 18
    • FCS_CKM.2: 5
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACF.1: 15
    • FDP_SDI.1: 12
    • FDP_SDI.2: 12
    • FDP_ITT.1: 4
    • FDP_IFC.1: 6
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 17
    • FDP_ITC.2: 17
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_MSA.1: 14
    • FMT_MSA.3: 15
    • FMT_SMF.1: 12
    • FMT_LIM: 3
    • FMT_LIM.1: 5
    • FMT_LIM.2: 5
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 9
  • FPT:
    • FPT_TST: 7
    • FPT_TST.2: 31
    • FPT_TST.1: 11
    • FPT_FLS.1: 5
    • FPT_PHP.3: 4
    • FPT_ITT.1: 4
    • FPT_TST.2.1: 1
    • FPT_AMT.1: 1
  • FRU:
    • FRU_FLT.2: 5
  • FAU:
    • FAU_SAS.1: 11
    • FAU_SAS: 3
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_RNG: 41
    • FCS_CKM: 192
    • FCS_COP: 238
    • FCS_COP.1: 45
    • FCS_CKM.4: 45
    • FCS_CKM.1: 46
    • FCS_CKM.2: 6
  • FDP:
    • FDP_SDI: 2
    • FDP_SDC: 3
    • FDP_SDC.1: 9
    • FDP_ACC.1: 29
    • FDP_ACC: 14
    • FDP_ACF.1: 26
    • FDP_ACF: 14
    • FDP_IFC.1: 19
    • FDP_ITT.1: 21
    • FDP_SDI.2: 22
    • FDP_UCT.1: 12
    • FDP_UIT.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 36
    • FDP_ITC.2: 36
    • FDP_SDI.1: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SDC.1.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
  • FIA:
    • FIA_API.1: 14
    • FIA_API: 3
    • FIA_API.1.1: 1
  • FMT:
    • FMT_LIM: 33
    • FMT_LIM.1: 9
    • FMT_LIM.2: 8
    • FMT_MSA.1: 18
    • FMT_MSA.3: 22
    • FMT_SMF.1: 16
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 3
  • FPT:
    • FPT_TST.2: 31
    • FPT_TST: 5
    • FPT_FLS.1: 34
    • FPT_TST.1: 11
    • FPT_ITT.1: 22
    • FPT_PHP.3: 33
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 3
    • FTP_ACF: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 8
  • FAU_SAS: 5
  • FAU_GEN: 1
  • FAU_SAS.1.1: 1
  • FAU_SAS.1: 11
  • FAU_SAS: 3
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS 5 3
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 8 11
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 14
  • FCS_RNG.1: 26
  • FCS_COP.1: 32
  • FCS_CKM.1: 33
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_COP: 34
  • FCS_CKM.4: 23
  • FCS_CKM: 18
  • FCS_CKM.2: 5
  • FCS_RNG.1: 15
  • FCS_RNG: 41
  • FCS_CKM: 192
  • FCS_COP: 238
  • FCS_COP.1: 45
  • FCS_CKM.4: 45
  • FCS_CKM.1: 46
  • FCS_CKM.2: 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 18 192
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 33 46
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 5 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 23 45
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 34 238
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 32 45
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 14 41
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 26 15
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 19
  • FDP_ACF.1: 15
  • FDP_SDI.1: 12
  • FDP_SDI.2: 12
  • FDP_ITT.1: 4
  • FDP_IFC.1: 6
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 17
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_SDI: 2
  • FDP_SDC: 3
  • FDP_SDC.1: 9
  • FDP_ACC.1: 29
  • FDP_ACC: 14
  • FDP_ACF.1: 26
  • FDP_ACF: 14
  • FDP_IFC.1: 19
  • FDP_ITT.1: 21
  • FDP_SDI.2: 22
  • FDP_UCT.1: 12
  • FDP_UIT.1: 12
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 36
  • FDP_ITC.2: 36
  • FDP_SDI.1: 1
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_SDC.1.1: 1
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 19 29
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 15 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 6 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 17 36
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 17 36
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 4 21
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 12 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 12 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 2 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_SOS.2: 3
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 2
  • FIA_API.1: 14
  • FIA_API: 3
  • FIA_API.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 3 33
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 5 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 5 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 14 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 9 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 15 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 12 16
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST: 7
  • FPT_TST.2: 31
  • FPT_TST.1: 11
  • FPT_FLS.1: 5
  • FPT_PHP.3: 4
  • FPT_ITT.1: 4
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_TST.2: 31
  • FPT_TST: 5
  • FPT_FLS.1: 34
  • FPT_TST.1: 11
  • FPT_ITT.1: 22
  • FPT_PHP.3: 33
  • FPT_TST.2.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 34
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 4 22
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 4 33
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 7 5
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 5 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • certification. The user operating system and further applications implemented on the TOE are also out of scope of this certification. To summarize, if used with the PCD software the certification view equals to: 1
    • is enabled to communicate via the selected interfaces. The surrounding environment is in both cases out of scope. The CIPURSE™ CL is delivered as object code and in this way integrated in the user software. The: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 17
  • CBC:
    • CBC: 14
  • CTR:
    • CTR: 8
  • CFB:
    • CFB: 8
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 7
  • KA:
    • Key agreement: 2
    • Key Agreement: 2
pdf_data/st_keywords/crypto_scheme/KA
  • Key Agreement: 2
  • Key agreement: 2
  • Key Agreement: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • K-163: 2
pdf_data/st_keywords/hash_function/MD/MD5/MD5 15 30
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA1: 15
  • SHA-1: 30
  • SHA1: 2
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 15 2
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA256: 15
  • SHA-256: 28
  • SHA256: 2
  • SHA-2: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 15 2
pdf_data/st_keywords/randomness/PRNG/PRNG 5 1
pdf_data/st_keywords/randomness/RNG/RND 6 5
pdf_data/st_keywords/randomness/RNG/RNG 9 25
pdf_data/st_keywords/randomness/TRNG
  • TRNG: 6
  • TRNG: 3
  • DTRNG: 1
pdf_data/st_keywords/randomness/TRNG/TRNG 6 3
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • side channel: 1
    • SPA: 4
    • DPA: 6
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 6
  • SCA:
    • Leak-Inherent: 12
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 17
    • DPA: 2
    • SPA: 1
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 3
    • fault induction: 1
    • fault injection: 5
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 12
  • malfunction: 1
  • DFA: 6
  • Malfunction: 12
  • malfunction: 1
  • DFA: 3
  • fault induction: 1
  • fault injection: 5
pdf_data/st_keywords/side_channel_analysis/FI/DFA 6 3
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 10
  • Physical Probing: 2
  • side channel: 1
  • SPA: 4
  • DPA: 6
  • Leak-Inherent: 12
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 17
  • DPA: 2
  • SPA: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 6 2
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 10 12
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 4 1
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 1 17
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
  • BSI:
    • AIS31: 3
  • RFC:
    • RFC3447: 6
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 180-4: 2
    • FIPS 197: 2
    • FIPS PUB 186-4: 1
  • NIST:
    • SP 800-38A: 16
    • SP 800-67: 4
    • SP 800-38B: 4
    • SP 800-22: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS #1: 2
  • BSI:
    • AIS32: 8
    • AIS31: 24
    • AIS 31: 1
  • RFC:
    • RFC 5639: 2
  • ISO:
    • ISO/IEC 14443-3: 9
    • ISO/IEC 14443-4: 3
    • ISO/IEC 18092: 2
    • ISO/IEC 18033-3: 8
    • ISO/IEC 9797-1: 7
    • ISO/IEC 9798-2: 2
    • ISO/IEC 14888-3: 1
    • ISO/IEC 11770-3: 1
    • ISO/IEC 18033: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 3
  • AIS32: 8
  • AIS31: 24
  • AIS 31: 1
pdf_data/st_keywords/standard_id/BSI/AIS31 3 24
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 2
  • FIPS PUB 197: 2
  • FIPS PUB 180-4: 2
  • FIPS 197: 2
  • FIPS PUB 186-4: 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816-3: 1
  • ISO/IEC 14443-3: 9
  • ISO/IEC 14443-4: 3
  • ISO/IEC 18092: 2
  • ISO/IEC 18033-3: 8
  • ISO/IEC 9797-1: 7
  • ISO/IEC 9798-2: 2
  • ISO/IEC 14888-3: 1
  • ISO/IEC 11770-3: 1
  • ISO/IEC 18033: 2
pdf_data/st_keywords/standard_id/RFC
  • RFC3447: 6
  • RFC 5639: 1
  • RFC 5639: 2
pdf_data/st_keywords/standard_id/RFC/RFC 5639 1 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
  • DES:
    • DES:
      • DES: 4
    • 3DES:
      • 3DES: 9
      • TDES: 2
      • Triple-DES: 1
      • TDEA: 1
  • AES_competition:
    • AES:
      • AES: 86
      • AES-128: 3
  • DES:
    • DES:
      • DES: 32
    • 3DES:
      • TDES: 58
      • 3DES: 7
      • TDEA: 3
      • TripleDES: 2
      • Triple-DES: 3
  • constructions:
    • MAC:
      • CMAC: 39
      • CBC-MAC: 6
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES: 15
  • AES: 86
  • AES-128: 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 15 86
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 9
  • TDES: 2
  • Triple-DES: 1
  • TDEA: 1
  • TDES: 58
  • 3DES: 7
  • TDEA: 3
  • TripleDES: 2
  • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 9 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA 1 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 2 58
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 3
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 4 32
pdf_data/st_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI TR-02102: 1
  • BSI TR-03111: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 17
    • Infineon Technologies: 12
    • Infineon: 3
  • Microsoft:
    • Microsoft Corporation: 1
  • Infineon:
    • Infineon Technologies AG: 18
    • Infineon: 17
    • Infineon Technologies: 22
pdf_data/st_keywords/vendor/Infineon/Infineon 3 17
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 12 22
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 17 18
pdf_data/st_metadata
  • pdf_file_size_bytes: 931877
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 74
  • /Author: Steffen Heinkel
  • /CreationDate: D:20140218111402+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: M7793, EAL5+, attack potential high, AVA_VAN.5
  • /ModDate: D:20140424162835+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Security Target Lite M7793
  • /Title: Public Security Target Lite
  • pdf_hyperlinks: http://www.bsi.bund.de/, http://www.infineon.com/
  • pdf_file_size_bytes: 1514020
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 153
  • /Author: heinkel
  • /Title: Pub_SecurityTarget_IFX_CCI_Fh.docx
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Steffen Heinkel heinkel
pdf_data/st_metadata//Title Public Security Target Lite Pub_SecurityTarget_IFX_CCI_Fh.docx
pdf_data/st_metadata/pdf_file_size_bytes 931877 1514020
pdf_data/st_metadata/pdf_hyperlinks http://www.bsi.bund.de/, http://www.infineon.com/
pdf_data/st_metadata/pdf_number_of_pages 74 153
dgst 02c1c81d0bf1270c 648a105832c576c3