Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Data Security Kit(B) Software V1.10E
JISEC-CC-CRP-C0035
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
BSI-DSZ-CC-0728-2011
name Data Security Kit(B) Software V1.10E Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 07.10.2013 01.09.2019
not_valid_before 09.09.2005 05.05.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0035_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0035_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728b_pdf.pdf
manufacturer KYOCERA MITA Corporation Infineon Technologies AG
manufacturer_web https://www.kyoceramita.com/ https://www.infineon.com/
security_level EAL3 EAL5+, AVA_VAN.5, ALC_DVS.2
dgst 04b252f7910c7505 327502c9e9054739
heuristics/cert_id JISEC-CC-CRP-C0035 BSI-DSZ-CC-0728-2011
heuristics/cert_lab [] BSI
heuristics/direct_transitive_cves {} CVE-2017-15361
heuristics/indirect_transitive_cves {} CVE-2017-15361
heuristics/extracted_sars AVA_MSU.1, AGD_ADM.1, ATE_COV.2, ADV_FSP.1, AVA_VLA.1, ATE_DPT.1, ALC_DVS.1, AGD_USR.1, ATE_IND.2, AVA_SOF.1, ADV_RCR.1, ATE_FUN.1, ADV_HLD.2 ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_INT.2, ATE_IND.2, AGD_PRE.1, ADV_TDS.4, ALC_CMC.4, ALC_TAT.2, AGD_OPE.1, APE_REQ.2, ASE_REQ.2, ASE_ECD.1, ALC_DVS.2, ASE_OBJ.2, ATE_COV.2, ALC_FLR.3, ASE_SPD.1, ALC_CMS.5, ADV_SPM.1, APE_CCL.1, ATE_DPT.3, ADV_FSP.5, ASE_INT.1, ASE_TSS.1, APE_ECD.1, ALC_DEL.1, APE_SPD.1, APE_INT.1, APE_OBJ.2, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1
heuristics/extracted_versions 1.10 1.02.008, 1.01
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0729-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0763-2012, BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0762-2012
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0640-2010
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2013/32, BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0733-2011, ANSSI-CC-2013/42, ANSSI-CC-2016/04, ANSSI-CC-2013/35, BSI-DSZ-CC-0729-2011, ANSSI-CC-2012/41, ANSSI-CC-2013/34, ANSSI-CC-2015/02, ANSSI-CC-2014/07, ANSSI-CC-2015/01, ANSSI-CC-2016/74, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/61, BSI-DSZ-CC-0764-2012, ANSSI-CC-2014/13, BSI-DSZ-CC-0769-2012, ANSSI-CC-2013/55, BSI-DSZ-CC-0760-2013, ANSSI-CC-2014/09, ANSSI-CC-2012/31, ANSSI-CC-2014/48, ANSSI-CC-2015/40, BSI-DSZ-CC-0922-2014, ANSSI-CC-2012/44, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0889-2013, BSI-DSZ-CC-0952-2014, ANSSI-CC-2015/04, ANSSI-CC-2013/39, ANSSI-CC-2015/03, ANSSI-CC-2013/11, ANSSI-CC-2012/40, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2015/38, BSI-DSZ-CC-0763-2012, ANSSI-CC-2012/51, ANSSI-CC-2016/73, ANSSI-CC-2013/10, ANSSI-CC-2015/37, ANSSI-CC-2014/62, ANSSI-CC-2013/64, ANSSI-CC-2012/38, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2015/08, BSI-DSZ-CC-0850-2013, ANSSI-CC-2014/11, ANSSI-CC-2014/14, ANSSI-CC-2012/32, BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, ANSSI-CC-2013/33, BSI-DSZ-CC-0813-2012, ANSSI-CC-2015/25, ANSSI-CC-2014/50, ANSSI-CC-2014/49, ANSSI-CC-2016/03, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0904-2015, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0829-2012, ANSSI-CC-2015/09, ANSSI-CC-2016/75, ANSSI-CC-2013/40, ANSSI-CC-2014/06, BSI-DSZ-CC-0761-2013, ANSSI-CC-2014/08, BSI-DSZ-CC-0818-2013, ANSSI-CC-2015/39, ANSSI-CC-2012/50, CRP290, BSI-DSZ-CC-0829-V2-2015, BSI-DSZ-CC-0941-2016, ANSSI-CC-2015/41, ANSSI-CC-2015/15, ANSSI-CC-2014/12, BSI-DSZ-CC-0880-2013, ANSSI-CC-2012/85, BSI-DSZ-CC-0952-V2-2016, ANSSI-CC-2014/86, ANSSI-CC-2015/30
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0640-2010
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0035
  • certification_date: 01.11.2005
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cert_link: https://www.ipa.go.jp/en/security/c0035_eimg.pdf
    • description: PRODUCT DESCRIPTION This TOE is a software module that is installed on the MFPs "KM-8030/KM-6030, CS-8030/CS-6030" of KYOCERA MITA Corporation, and which provides the ordinary functions, and also security functions for protecting residue data. This TOE is installed on the above-mentioned MFPs and protects image data remaining on the HDDs from unjust exposure, after various copying, printing, and network scanning processings, by providing an HDD overwriting function. And it has the administrator authentication function that identifies and authenticates a TOE machine administrator who sets the HDD overwrite deletion method and operates it.
    • evaluation_facility: Japan Electronics & Information Technology Industries Association, Information Technology Security Center
    • product: Data Security Kit(B) Software
    • product_type: IT Product ( data protection function in Multi Function Device )
    • report_link: https://www.ipa.go.jp/en/security/c0035_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0035_est.pdf
    • toe_version: V1.10E
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.10.2013
  • revalidations: [frozendict({'date': '2009-06', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0035_it4035_01.html'})]
  • supplier: KYOCERA MITA Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0035_it4035.html
  • toe_overseas_name: Data Security Kit(B) Software V2.00E
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0729-2011
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0640-2010
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2012/38, BSI-DSZ-CC-0769-2012, ANSSI-CC-2014/06, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2014/09, ANSSI-CC-2013/32, ANSSI-CC-2014/08, ANSSI-CC-2012/31, BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0818-2013, ANSSI-CC-2014/48, ANSSI-CC-2014/11, ANSSI-CC-2013/35, BSI-DSZ-CC-0729-2011, ANSSI-CC-2012/41, ANSSI-CC-2014/14, ANSSI-CC-2012/32, BSI-DSZ-CC-0922-2014, ANSSI-CC-2013/34, ANSSI-CC-2012/44, ANSSI-CC-2012/50, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0952-2014, ANSSI-CC-2013/33, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2013/39, ANSSI-CC-2012/40, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0904-2015, ANSSI-CC-2014/12, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0829-2012, ANSSI-CC-2016/74, BSI-DSZ-CC-0880-2013, ANSSI-CC-2015/09, ANSSI-CC-2012/51, ANSSI-CC-2016/73, ANSSI-CC-2016/75, ANSSI-CC-2013/10, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/62, ANSSI-CC-2013/40, ANSSI-CC-2014/61, ANSSI-CC-2014/13
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0640-2010
heuristics/protection_profiles {} f6d23054061d72ba
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/report_filename c0035_erpt.pdf 0728a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0728-2011
    • cert_item: Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0035-01: 1
    • Certification No. C0035: 1
  • DE:
    • BSI-DSZ-CC-0640-2010: 3
    • BSI-DSZ-CC-0728-2011: 23
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 4: 3
    • EAL 5: 6
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.CE: 1
    • A.PHYSICAL: 1
  • T:
    • T.AGAIN: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 12
    • Infineon Technologies: 7
    • Infineon Technologies AG: 20
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • 3DES: 3
      • Triple-DES: 2
    • DES:
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • RSA:
    • RSA 1024: 1
    • RSA-2048: 1
    • RSA2048: 1
    • RSA4096: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 17
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • SPA: 3
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS31: 1
  • ISO:
    • ISO/IEC 18092: 6
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • M7820 A11, Version 1, 2011-04-15, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 1: 1
    • TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 including optional Software Libraries RSA – EC –: 1
    • – Toolbox, Version 1.2, 2011-01-26, Infineon Technologies AG (confidential document) [11] SLE/SLM 70 Family Production and Personalization, Version 2010-12-13, 2010-12-13, Infineon: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20051221115430+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /Manager: IPA
  • /ModDate: D:20051221115715+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20051221023637
  • /Title: CRP-e
  • pdf_file_size_bytes: 390269
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110518111733+02'00'
  • /Creator: Writer
  • /Keywords: "Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologies AG, Common Criteria, Certification, Zertifizierung"
  • /ModDate: D:20110518112550+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0728-2011
  • pdf_file_size_bytes: 1212432
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
pdf_data/st_filename c0035_est.pdf 0728b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0640-2010: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 6
  • EAL:
    • EAL 5: 3
    • EAL 5 augmented: 3
    • EAL5: 5
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 3
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_RIP: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_SOS.1: 15
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 4
    • FIA_UAU.2: 16
    • FIA_UAU.7: 15
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 15
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 19
    • FPT_RVM.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 24
    • FCS_CKM.1: 33
    • FCS_CKM.2: 5
    • FCS_CKM.4: 24
    • FCS_COP: 58
    • FCS_COP.1: 28
    • FCS_RNG: 4
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 22
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 15
    • FDP_ITC.1: 18
    • FDP_ITC.2: 18
    • FDP_ITT.1: 18
    • FDP_SDI.1: 17
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 15
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 3
    • FMT_LIM.1: 7
    • FMT_LIM.2: 7
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 21
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 19
    • FPT_ITT.1: 16
    • FPT_LIM.2: 1
    • FPT_PHP.3: 25
    • FPT_TST: 7
    • FPT_TST.1: 11
    • FPT_TST.2: 36
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.CE: 2
    • A.PHYSICA: 1
    • A.PHYSICAL: 2
  • O:
    • O.METHOD: 5
    • O.REMAIN: 6
  • OE:
    • OE.ADMIN: 2
    • OE.CE: 2
    • OE.PHYSICAL: 2
    • OE.POWER: 4
  • T:
    • T.AGAIN: 3
  • O:
    • O.RND: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 5
    • Infineon Technologies: 7
    • Infineon Technologies AG: 15
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 17
      • Triple-DES: 2
    • DES:
      • DES: 6
  • constructions:
    • MAC:
      • HMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 10
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 1
    • RSA4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 61
      • SHA-256: 2
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 6
  • RNG:
    • RND: 2
    • RNG: 3
  • TRNG:
    • TRNG: 13
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CFB:
    • CFB: 4
  • ECB:
    • ECB: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 7
    • Malfunction: 12
    • fault induction: 1
    • malfunction: 1
  • SCA:
    • DPA: 10
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 5
    • physical probing: 1
    • side channel: 6
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 2
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • ISO:
    • ISO/IEC 15408: 6
    • ISO/IEC 15408:1999: 1
  • BSI:
    • AIS 32: 1
    • AIS31: 5
    • AIS32: 4
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
  • FIPS:
    • FIPS PUB 180-3: 2
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 18092: 6
    • ISO/IEC 7816-3: 1
    • ISO/IEC18092: 6
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 1
    • RFC3447: 11
pdf_data/st_metadata
  • /Author:  
  • /Company:  
  • /CreationDate: D:20051221114017+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /ModDate: D:20051221114547+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20051220094657
  • /Subject:  
  • /Title: untitled
  • pdf_file_size_bytes: 886113
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
  • /Author: Hans-Ulrich Buchmüller
  • /CreationDate: D:20110415135116
  • /Creator: SecurityTarget_SLE78_M7820_A11.doc - Microsoft Word
  • /Keywords: Security Target, contactless, dual interface, DCLB, RSA, EC, SHA-2, Toolbox, Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, Elliptic Curve, cryptographic, libraries, PP0035
  • /Producer: Acrobat PDFWriter 5.0 für Windows NT
  • /Subject: Security Target M7820 Integrity Guard
  • /Title: CC EAL5+ Certification Security Target
  • pdf_file_size_bytes: 551119
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different