This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software BSI-DSZ-CC-0926-2014 |
Infineon smart card IC (Security Controller) IFX_CCI_000011h, IFX_CCI_00001Bh, IFX_CCI_00001Eh, IFX_CCI_000025h, design step G12 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-1025-V4-2021 |
|
---|---|---|
name | Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software | Infineon smart card IC (Security Controller) IFX_CCI_000011h, IFX_CCI_00001Bh, IFX_CCI_00001Eh, IFX_CCI_000025h, design step G12 with optional libraries and with specific IC dedicated software |
not_valid_before | 2014-04-04 | 2021-11-26 |
not_valid_after | 2019-09-01 | 2026-11-26 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V4b_pdf.pdf |
status | archived | active |
security_level | EAL5+, AVA_VAN.5, ALC_DVS.2 | ALC_FLR.1, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V4a_pdf.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V4c_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | c85c41c5e85a751791b0d966ebbe0bb549d8347504dd16075acd1c7a568dd821 |
state/cert/txt_hash | None | e4590f6e4ff6cf956e1a4836180a7a86cb6d0c34c845e4fd3f60d0cb51de0292 |
state/report/pdf_hash | 1ad1faaa140c23deb38634a484ac3386fd37a81793fc0acff9afe29d71d726db | a89aba234870bca52f7e081c9ef5e581a199778865b3e4d4172db359f4e318a8 |
state/report/txt_hash | 491a0d7e8452fe86b82642ee58055cd9c79b34f8091203a996e6f42c8670f017 | 727ba9387b372f535124ace2e68ed267d4f05000f13b7bfe330cbb08e76634c8 |
state/st/pdf_hash | 11c0370e555b2ace6c4c2340d24bb9d9b56222472a9c69b0443800f6307e8a0f | 3ea4c630e587f36bb3e04cb1f414c73a73c164724c0de247aec4c329dbcc41a4 |
state/st/txt_hash | 3a6011041186c7f721ac7f33c38153ecc2ce2e2d7ff389c8e6d9163b3106fb57 | 3d83bb95e0c0c73afe8c68954db45a4c9eff9e0e5594bf9c224d0b74672d2575 |
heuristics/cert_id | BSI-DSZ-CC-0926-2014 | BSI-DSZ-CC-1025-V4-2021 |
heuristics/cpe_matches | cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* | None |
heuristics/direct_transitive_cves | CVE-2017-15361 | None |
heuristics/extracted_versions | 1.02.010, 1.02.013, 2.00.002 | - |
heuristics/indirect_transitive_cves | CVE-2017-15361 | None |
heuristics/related_cves | CVE-2017-15361 | None |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2015/73, BSI-DSZ-CC-0926-V2-2017 | BSI-DSZ-CC-1025-V5-2023 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0907-2013 | BSI-DSZ-CC-1025-V3-2020 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2016/06, ANSSI-CC-2016/24, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-V2-2017, ANSSI-CC-2016/23 | BSI-DSZ-CC-1025-V5-2023 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013 | BSI-DSZ-CC-1025-V2-2019, BSI-DSZ-CC-1025-V3-2020, BSI-DSZ-CC-1025-2018 |
heuristics/st_references/directly_referenced_by | ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/23 | None |
heuristics/st_references/indirectly_referenced_by | ANSSI-CC-2016/24, ANSSI-CC-2015/73, ANSSI-CC-2016/23 | None |
pdf_data/cert_filename | None | 1025V4c_pdf.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | 0926a_pdf.pdf | 1025V4a_pdf.pdf |
pdf_data/report_frontpage/DE |
|
|
pdf_data/report_frontpage/DE/cert_id | BSI-DSZ-CC-0926-2014 | BSI-DSZ-CC-1025-V4-2021 |
pdf_data/report_frontpage/DE/cert_item | Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software | IFX_CCI_000011h, IFX_CCI_00001Bh, IFX_CCI_00001Eh, IFX_CCI_000025h, design step G12 with optional libraries and with specific IC dedicated software |
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 9 | 3 |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 3 | 1 |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 7 | 3 |
pdf_data/report_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 | 2 | 1 |
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA4096 | 2 | 1 |
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 | 3 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 7 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 1 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 | 1 | 4 |
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 | 2 | 1 |
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 2 | 1 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 7 | 4 |
pdf_data/report_keywords/cc_sfr | |
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik | 4 | 7 |
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 3 | 2 |
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/side_channel_analysis/SCA |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS31 | 2 | 5 |
pdf_data/report_keywords/standard_id/FIPS |
|
|
pdf_data/report_keywords/standard_id/RFC |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 7 | 9 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES | 2 | 3 |
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES | 2 | 1 |
pdf_data/report_keywords/technical_report_id/BSI |
|
|
pdf_data/report_keywords/vendor/Infineon/Infineon | 4 | 3 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies | 17 | 1 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG | 21 | 22 |
pdf_data/report_metadata//CreationDate | D:20140424155624+02'00' | D:20211201084151+01'00' |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.010 or v1.02.013 or v2.00.002, EC v1.02.010 or v1.02.013 or v2.00.002 and Toolbox v1.02.010 or v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software, Infineon Technologies AG" | """Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, PP-0084, Security IC, Smart Card""" |
pdf_data/report_metadata//ModDate | D:20140424160045+02'00' | D:20211201090112+01'00' |
pdf_data/report_metadata//Producer | LibreOffice 3.6 | LibreOffice 6.3 |
pdf_data/report_metadata//Subject | Common Criteria Certification | BSI-DSZ-CC-1025-V3-2020, Common Criteria, IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0926-2014 | Certification Report BSI-DSZ-CC-1025-V4 |
pdf_data/report_metadata/pdf_file_size_bytes | 1231840 | 853723 |
pdf_data/report_metadata/pdf_number_of_pages | 44 | 34 |
pdf_data/st_filename | 0926b_pdf.pdf | 1025V4b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 10 | 17 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 4 | 6 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 12 | 23 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 4 | 9 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 | 1 | 6 |
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 | 1 | 6 |
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 3 | 4 |
pdf_data/st_keywords/cc_claims/T/T.RND | 3 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 | 1 | 4 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 | 4 | 3 |
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 9 | 4 |
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL | 2 | 9 |
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD | 2 | 4 |
pdf_data/st_keywords/cc_sar/ASE/ASE_INT | 2 | 18 |
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ | 2 | 9 |
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ | 2 | 50 |
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD | 2 | 8 |
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS | 2 | 17 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 11 | 5 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 5 | 3 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 8 | 12 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 18 | 103 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 33 | 41 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 5 | 6 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 23 | 36 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 34 | 195 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 32 | 31 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 14 | 47 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 26 | 16 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 19 | 27 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 15 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 6 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 17 | 31 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 17 | 31 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 4 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 12 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 12 | 13 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2 | 3 | 2 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 3 | 29 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 5 | 12 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 5 | 11 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 14 | 17 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 15 | 20 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 12 | 15 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 5 | 20 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 4 | 15 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 4 | 17 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST | 7 | 5 |
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 5 | 9 |
pdf_data/st_keywords/certification_process | |
|
pdf_data/st_keywords/cipher_mode | |
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/KA |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/hash_function/MD/MD5/MD5 | 15 | 20 |
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 | 15 | 20 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 | 15 | 11 |
pdf_data/st_keywords/randomness/PRNG/PRNG | 5 | 1 |
pdf_data/st_keywords/randomness/RNG/RND | 6 | 5 |
pdf_data/st_keywords/randomness/RNG/RNG | 9 | 25 |
pdf_data/st_keywords/randomness/TRNG/TRNG | 6 | 3 |
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 6 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 6 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 10 | 12 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 4 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 1 | 11 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 3 | 13 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 15 | 54 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA | 1 | 3 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 2 | 35 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 1 | 4 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 4 | 23 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vendor/Infineon/Infineon | 3 | 13 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies | 12 | 10 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG | 17 | 32 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Steffen Heinkel | Jürgen Noller |
pdf_data/st_metadata//CreationDate | D:20140218111402+01'00' | D:20211105105354+01'00' |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Microsoft® Word 2016 |
pdf_data/st_metadata//Keywords | M7793, EAL5+, attack potential high, AVA_VAN.5 | Infineon |
pdf_data/st_metadata//ModDate | D:20140424162835+02'00' | D:20211105105354+01'00' |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Microsoft® Word 2016 |
pdf_data/st_metadata//Title | Public Security Target Lite | Confidential Security Target IFX_CCI_11h |
pdf_data/st_metadata/pdf_file_size_bytes | 931877 | 1962206 |
pdf_data/st_metadata/pdf_number_of_pages | 74 | 130 |
dgst | 02c1c81d0bf1270c | aebe852b75407c9a |