Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IFX_CCI_000068h, IFX_CCI_000080h G12 and IFX_CCI_000093h R11 firmware version 80.505.04.1 or 80.511.00.0, optional CryptoSuite v04.08.001, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002 or 06.10.0005, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents
BSI-DSZ-CC-1206-V4-2025
Microcontrôleur sécurisé ST33H768 révision C,Firmware révision 5, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0
ANSSI-CC-2017/01
name IFX_CCI_000068h, IFX_CCI_000080h G12 and IFX_CCI_000093h R11 firmware version 80.505.04.1 or 80.511.00.0, optional CryptoSuite v04.08.001, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002 or 06.10.0005, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents Microcontrôleur sécurisé ST33H768 révision C,Firmware révision 5, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0
scheme DE FR
status active archived
not_valid_after 21.02.2030 30.04.2023
not_valid_before 21.02.2025 10.02.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206V4c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2017_01-S01.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206V4a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_01.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206V4b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible_Lite_2017_01.pdf
manufacturer Infineon Technologies AG STMicroelectronics
manufacturer_web https://www.infineon.com/ https://www.st.com/
security_level EAL6+, ALC_FLR.1 EAL5+, AVA_VAN.5, ALC_DVS.2
dgst 08da8f7e0766dfaa c4ce2941f78fa532
heuristics/cert_id BSI-DSZ-CC-1206-V4-2025 ANSSI-CC-2017/01
heuristics/cert_lab BSI THALES
heuristics/extracted_sars ADV_IMP.2, ADV_SPM.1, ADV_INT.3, ADV_ARC.1, ALC_CMC.5, ADV_TDS.5, ALC_CMS.5, ALC_DVS.2, ATE_COV.3, ADV_FSP.5, ALC_TAT.3, ATE_IND.2, ASE_CCL.1, ALC_DEL.1, ASE_REQ.2, AVA_VAN.5, ASE_OBJ.2, ALC_FLR.1, AGD_PRE.1, ALC_LCD.1, ASE_SPD.1, AGD_OPE.1, ASE_INT.1, ASE_TSS.1, ATE_FUN.2, ASE_ECD.1, ATE_DPT.3 ADV_ARC.1, ATE_FUN.1, ALC_CMS.5, ALC_DVS.2, ADV_TDS.4, ALC_CMC.4, ADV_FSP.5, ATE_IND.2, ASE_CCL.1, ATE_COV.2, ALC_DEL.1, ALC_TAT.2, ADV_IMP.1, ASE_REQ.2, AVA_VAN.5, ASE_OBJ.2, AGD_PRE.1, ALC_LCD.1, ASE_SPD.1, AGD_OPE.1, ASE_INT.1, ASE_TSS.1, ASE_ECD.1, ADV_INT.2, ATE_DPT.3
heuristics/extracted_versions 1.1.1, 1.1.2, 04.08.001, 06.10.0005, 06.10.0002, 02.01.0040, 80.505.04.1, 80.511.00.0, 04.05.0040 4.1, 2.1.0, 4.1.1
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2020/28, ANSSI-CC-2020/40
heuristics/report_references/directly_referencing BSI-DSZ-CC-1206-V3-2024 ANSSI-CC-2015/36
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2020/28, ANSSI-CC-2020/40
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1206-V3-2024, BSI-DSZ-CC-1206-V2-2024, BSI-DSZ-CC-1206-2023 ANSSI-CC-2015/36
heuristics/scheme_data
  • category: Smart Cards and similar devices
  • cert_id: BSI-DSZ-CC-1206-V4-2025
  • certification_date: 21.02.2025
  • enhanced:
    • applicant: Infineon Technologies AG Am Campeon 1-15 85579 Neubiberg
    • assurance_level: EAL6+,ALC_FLR.1
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1206V4c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 21.02.2025
    • description: The TOE is a SmartCard based on a 32-bit Arm v8-M CPU architecture, including documentation and support libraries (firmware version 80.505.04.1, optional HSL version 04.05.0040, optional UMSLC version 02.01.0040). Optionally and in addition to the TOE: NRG™ version 06.10.0002.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1206-V4-2025', 'description': 'The TOE is a SmartCard based on a 32-bit Arm v8-M CPU architecture, including documentation and various cryptographic support libraries. Subject of recertification are updates.'}), frozendict({'id': 'BSI-DSZ-CC-1206-V3-2024', 'description': 'architecture, including documentation and various cryptographic support libraries. Subject of recertification are updates.'}), frozendict({'id': 'BSI-DSZ-CC-1206-V2-2024', 'description': 'SmartCard'}), frozendict({'id': 'BSI-DSZ-CC-1206-2023', 'description': 'Certificate'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 20.02.2030
    • product: IFX_CCI_000068h, IFX_CCI_000080h G12 and IFX_CCI_000093h R11 firmware version 80.505.04.1 or 80.511.00.0, optional CryptoSuite v04.08.001, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002 or 06.10.0005, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1206V4a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1206V4b_pdf.pdf?__blob=publicationFile&v=2
  • product: IFX_CCI_000068h, IFX_CCI_000080h G12 and IFX_CCI_000093h R11 firmware version 80.505.04.1 or 80.511.00.0, optional …
  • subcategory: ICs, Cryptolib
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1206.html
  • vendor: Infineon Technologies AG
heuristics/protection_profiles cf0f01bcd7be3e9c f6d23054061d72ba
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/cert_filename 1206V4c_pdf.pdf certificat ANSSI-CC-2017_01-S01.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1206-V4-2025: 1
  • FR:
    • ANSSI-CC-2017/01-S01: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 5: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
  • EAL:
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/cert_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Federal Office for Information Security
  • /Keywords: Common Criteria, Certification, Zertifizierung, Smartcard, Security IC, Infineon Technologies AG
  • /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, Security IC, Infineon Technologies AG
  • /Title: Certificate BSI-DSZ-CC-1206-V4-2025
  • pdf_file_size_bytes: 234979
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate: D:20201222181624+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20201222181624+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 276071
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 1206V4a_pdf.pdf ANSSI-CC-2017_01.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 20 February 2030 SOGIS Recognition Agreement
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1206-V4-2025
    • cert_item: IFX_CCI_000068h, IFX_CCI_000080h G12 and IFX_CCI_000093h R11 firmware version 80.505.04.1 or 80.511.00.0, optional CryptoSuite v04.08.001, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002 or 06.10.0005, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • FR:
    • cc_security_level: EAL5 Augmenté ALC_DVS.2 et AVA_VAN.5
    • cc_version: CC version 3.1 révision 4
    • cert_id: ANSSI-CC-2017/01
    • cert_item: Microcontrôleur sécurisé ST33H768 révision C, Firmware révision 5, incluant optionnellement la bibliothèque cryptographique Neslib versions 4.1 et 4.1.1 et la bibliothèque MIFARE4Mobile version 2.1.0
    • cert_item_version: Référence maskset K8K0A, révision interne C, firmware révision 5
    • cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
    • developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1206-V3-2024: 2
    • BSI-DSZ-CC-1206-V4-2025: 20
  • FR:
    • ANSSI-CC-2015/36: 1
    • ANSSI-CC-2017/01: 21
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 1
    • EAL 5: 4
    • EAL 6: 4
    • EAL 6 augmented: 3
    • EAL5+: 1
    • EAL6: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 1
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 3
  • AGD:
    • AGD_HRM: 3
    • AGD_PPM: 2
    • AGD_PPUM: 1
    • AGD_PRM: 5
    • AGD_SHA: 3
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ATE:
    • ATE_FUN: 1
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_ITC: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 1
    • Infineon Technologies: 1
    • Infineon Technologies AG: 17
  • STMicroelectronics:
    • STMicroelectronics: 4
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
      • AES-: 1
  • LWC_competition:
    • ASCON:
      • ASCON: 3
      • Ascon: 1
  • constructions:
    • MAC:
      • CMAC: 3
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 1
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 1
      • SHA-256: 2
      • SHA256: 10
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key agreement: 2
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 12
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 4
pdf_data/report_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 1
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NesLib 4.1: 5
    • NesLib 4.1.1: 2
    • NesLib v4.1: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 27: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 37: 1
    • AIS 38: 1
    • AIS 39: 1
    • AIS 41: 1
    • AIS 46: 1
    • AIS 47: 1
  • FIPS:
    • FIPS 186-4: 6
    • FIPS 197: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS180-4: 4
    • FIPS186-4: 7
    • FIPS197: 4
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • NIST SP 800-232: 1
  • PKCS:
    • PKCS #1: 6
    • PKCS#1: 3
    • PKCS#3: 2
  • RFC:
    • RFC5639: 2
  • BSI:
    • AIS 31: 2
    • AIS31: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_keywords/javacard_api_const
  • curves:
    • FRP256V1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Version 1, 2024-09-02, TÜV Informationstechnik GmbH (confidential document) [19] also referred to as [AGD_CS], “CS-SLC21V24 CryptoSuite 32-bit Security Controller User: 1
    • Version 1.1.3, 2023-09-13, Infineon Technologies AG (confidential document) 31 / 35 Certification Report BSI-DSZ-CC-1206-V4-2025 [21] also referred to as [AGD_SHA], “SHA256: 1
    • 1, 2024-12-17, “EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY)”, TÜV Informationstechnik, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • 1.00-3001, 2023-07-26, Infineon Technologies AG (confidential document) [15] also referred to as [AGD_PPUM], “SLC21 (32-bit Security Controller – V24), Production and: 1
    • Application Note (ReadMe_ShaMise-v1.1.2.md)”, Version 1.1.2, 2023-09-13, Infineon Technologies AG (confidential document) 32 / 35 BSI-DSZ-CC-1206-V4-2025 Certification Report C. Excerpts from the Criteria For the: 1
    • Controller – V24), Hardware Reference Manual”, Version 6.0, 2024-06-26, Infineon Technologies AG (confidential document) [13] also referred to as [AGD_PRM], “TEGRION™ SLx2 security controller family, Programmer's: 1
    • Manual, SLx2_DFP”, Version 1.5.0, 2024-11-25, Infineon Technologies AG (confidential document) [14] also referred to as [AGD_SG], “SLC21, 32-bit Security Controller – V24, Security Guidelines: 1
    • Technologies AG (confidential document) [17] also referred to as [AGD_ES]: “TEGRION™ SLC21 (32-bit Security Controller – V24) Errata sheet: 1
    • Technologies AG (confidential document) [18] “SINGLE EVALUATION REPORT ADDENDUM to ETR-Part ADV Cryptographic Standards Compliance: 1
    • Version 4.1, 2024-10-25, Infineon Technologies AG (confidential document) and “TEGRION™ SLC21 (32-bit Security Controller – V34) Errata sheet”, Version 1.0, 2024-10-25: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • manual, Flash Loader V10”, Version 10.01, 2023-06- 28, Infineon Technologies AG (confidential document) [16] also referred to as [AGD_CryptoUM], “Crypto2304T V4, User Manual”, Version 3.0, 2024-06-21: 1
    • manual”, Version 4.08.001, 2024-06-11, Infineon Technologies AG (confidential document) [20] also referred to as [AGD_ASCON], “Ascon-128 MISE Application Note (ReadMe_AsconMise-v1.1.3.md: 1
    • the IFX_CCI_000068h, IFX_CCI_000080h G12 and IFX_CCI_000093h R11”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 0.7, 2024-12-04 (confidential document) [12] also: 1
    • “IFX_CCI_000068h/80h G12 and IFX_CCI_000093h R11 Security Target”, Infineon Technologies AG (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product, Version 1, 2024- 12-17: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: ANSSI-CC-2017_01_LATOUR2M
  • pdf_file_size_bytes: 296793
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename 1206V4b_pdf.pdf Cible_Lite_2017_01.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • BSI:
    • BSI-PP-0035: 71
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6: 2
    • EAL6: 3
    • EAL6 augmented: 1
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 2
    • EAL4: 1
    • EAL5: 17
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 2
    • ADV_FSP.5: 4
    • ADV_IMP.1: 1
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM.1: 2
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMC.5: 3
    • ALC_CMS.4: 2
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 3
    • ASE_CCL.1: 1
    • ASE_ECD: 3
    • ASE_ECD.1: 1
    • ASE_INT: 10
    • ASE_INT.1: 1
    • ASE_OBJ: 5
    • ASE_OBJ.2: 1
    • ASE_REQ: 31
    • ASE_REQ.2: 1
    • ASE_SPD: 4
    • ASE_SPD.1: 1
    • ASE_TSS: 6
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_COV.3: 2
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 3
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 21
    • FCS_CKM.1: 20
    • FCS_CKM.2: 4
    • FCS_CKM.4: 26
    • FCS_CKM.4.1: 1
    • FCS_COP: 52
    • FCS_COP.1: 5
    • FCS_RNG: 26
    • FCS_RNG.1: 11
  • FDP:
    • FDP_ACC: 15
    • FDP_ACC.1: 6
    • FDP_ACC.2: 2
    • FDP_ACF: 14
    • FDP_ACF.1: 12
    • FDP_IFC.1: 8
    • FDP_ITC.1: 20
    • FDP_ITC.2: 20
    • FDP_ITT.1: 6
    • FDP_SDC.1: 5
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 3
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 3
    • FDP_UIT.1: 3
  • FIA:
    • FIA_API: 1
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_UID: 8
    • FIA_UID.1: 5
    • FIA_UID.2: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 5
    • FMT_LIM.2: 5
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.3: 5
    • FMT_MTD: 9
    • FMT_MTD.1: 1
    • FMT_SMF: 19
    • FMT_SMF.1: 5
    • FMT_SMR: 14
    • FMT_SMR.1: 11
  • FPT:
    • FPT_FLS.1: 8
    • FPT_ITT.1: 6
    • FPT_PHP.3: 12
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 4
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 7
  • FCS:
    • FCS_CKM.1: 22
    • FCS_CKM.4: 14
    • FCS_COP.1: 37
    • FCS_RNG: 1
    • FCS_RNG.1: 8
  • FDP:
    • FDP_ACC.1: 46
    • FDP_ACC.2: 13
    • FDP_ACF.1: 52
    • FDP_CKM.2: 1
    • FDP_IFC.1: 19
    • FDP_ITC.1: 15
    • FDP_ITC.2: 14
    • FDP_ITT.1: 11
    • FDP_RIP.1: 10
    • FDP_ROL.1: 10
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
  • FIA:
    • FIA_UAU.2: 10
    • FIA_UAU.5: 11
    • FIA_UID.1: 2
    • FIA_UID.2: 12
  • FMT:
    • FMT_ITC.1: 1
    • FMT_LIM: 1
    • FMT_LIM.1: 20
    • FMT_LIM.2: 19
    • FMT_MSA.1: 39
    • FMT_MSA.2: 1
    • FMT_MSA.3: 51
    • FMT_MTD.1: 10
    • FMT_SMF.1: 30
    • FMT_SMR.1: 23
  • FPR:
    • FPR_UNL.1: 10
  • FPT:
    • FPT_FLS.1: 15
    • FPT_ITT.1: 10
    • FPT_PHP.3: 12
    • FPT_RPL.1: 12
    • FPT_TDC.1: 11
    • FPT_TRP.1: 8
  • FRU:
    • FRU_FLT.2: 13
    • FRU_RSA.2: 10
  • FTP:
    • FTP_ITC.1: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.3: 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 3
    • O.AES-CMAC: 4
    • O.ECC: 4
    • O.FFC: 4
    • O.MISE: 4
    • O.RND: 3
    • O.RSA: 4
  • T:
    • T.RND: 1
  • O:
    • O.RND: 4
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 7
    • Infineon Technologies AG: 9
  • Infineon:
    • Infineon Technologies: 1
  • NXP:
    • NXP: 2
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 9
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 30
  • LWC_competition:
    • ASCON:
      • ASCON: 5
      • Ascon: 4
  • constructions:
    • MAC:
      • CMAC: 6
  • miscellaneous:
    • SM4:
      • SM4: 1
  • AES_competition:
    • AES:
      • AES: 36
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • 3DES: 5
      • Triple-DES: 1
    • DES:
      • DES: 26
  • constructions:
    • MAC:
      • CBC-MAC: 3
      • CMAC: 2
      • HMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 16
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 1
    • SHA2:
      • SHA-2: 3
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
      • SHA2: 1
      • SHA256: 12
  • SHA:
    • SHA1:
      • SHA-1: 10
    • SHA2:
      • SHA-224: 6
      • SHA-256: 9
      • SHA-384: 6
      • SHA-512: 5
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 2
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 4
    • RNG: 41
  • PRNG:
    • DRBG: 8
  • RNG:
    • RND: 7
    • RNG: 6
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 3
  • CFB:
    • CFB: 3
  • CTR:
    • CTR: 3
  • ECB:
    • ECB: 7
  • CBC:
    • CBC: 6
  • ECB:
    • ECB: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • secp256k1: 2
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • NESCRYPT: 3
    • Nescrypt: 3
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NESLIB 4.1: 1
    • NesLib 4.1: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 2
  • SCA:
    • Leak-Inherent: 2
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
    • side-channel: 5
  • other:
    • JIL: 2
  • FI:
    • Malfunction: 13
    • malfunction: 4
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 12
    • Physical Probing: 4
    • physical probing: 3
    • side channel: 6
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 4
    • AIS 31: 11
    • AIS 46: 3
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-4: 6
    • FIPS 186-4: 20
    • FIPS 197: 7
    • FIPS PUB 197: 1
  • ICAO:
    • ICAO: 4
  • NIST:
    • NIST SP 800-186: 1
    • SP 800-108: 3
    • SP 800-186: 2
    • SP 800-22: 3
    • SP 800-38A: 5
    • SP 800-38B: 4
    • SP 800-38C: 3
    • SP 800-56A: 3
    • SP 800-90A: 4
  • PKCS:
    • PKCS#1: 17
    • PKCS#3: 3
  • RFC:
    • RFC 5639: 3
    • RFC 7748: 1
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 40
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS 186-3: 2
    • FIPS PUB 140-2: 5
    • FIPS PUB 180-4: 5
    • FIPS PUB 197: 4
    • FIPS PUB 198-1: 2
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 10116: 7
    • ISO/IEC 14888: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9797: 1
    • ISO/IEC 9797-1: 3
  • NIST:
    • NIST SP 800-38B: 2
    • NIST SP 800-90A: 5
  • PKCS:
    • PKCS #1: 5
pdf_data/st_keywords/javacard_api_const
  • curves:
    • FRP256V1: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 32 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and M4M-DESFire, when they are embedded. 33 The user guidance: 1
    • ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and M4M-DESFire, when they are embedded: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Christiane DROULERS
  • /CreationDate: D:20160909110217Z
  • /Creator: FrameMaker 11.0
  • /ModDate: D:20160909111905+02'00'
  • /Producer: Acrobat Elements 10.0.0 (Windows)
  • /Title: SMD_ST33H_V1_0.book
  • pdf_file_size_bytes: 1717715
  • pdf_hyperlinks: http://www.st.com
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 95
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different