name |
Philips Secure Smart Card Controller P5CT072V0P, P5CC072V0P,P5CD072V0P and P5CD036V0P each with specific IC Dedicated Software
|
Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2007-01-01
|
2014-04-30
|
not_valid_after |
2019-09-01
|
2019-09-01
|
scheme |
DE
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348b.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2b_pdf.pdf
|
status |
archived
|
archived
|
manufacturer |
Philips Semiconductors GmbH
|
Infineon Technologies AG
|
manufacturer_web |
https://www.philips.com/
|
https://www.infineon.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348a.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2a_pdf.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2006, 6, 20), 'maintenance_title': 'Philips Secure Smart Card Controller P5CD072V0P, P5CD036V0P, P5CN072V0P and P5CN036V0P each with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348_ma1.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 6, 29), 'maintenance_title': 'NXP Smart Card Controller P5CT072V0S, P5CN072V0S, P5CC072V0S P5CD072V0S, P5CD036V0S and P5CN036V0S each with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348_ma3a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348_ma3b.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 1, 18), 'maintenance_title': 'NXP Secure Smart Card Controller P5CT072V0S, P5CC072V0S, P5CD072V0S and P5CD036V0S each with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348_ma4a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348_ma4b.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 6, 26), 'maintenance_title': 'NXP Secure Smart Card Controller P5CT072V0P, P5CC072V0P, P5CD072V0P and P5CD036V0P each with IC specific Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348_ma2a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0348_ma2b.pdf'}) |
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
e869f33617ce2d542c5bfc5aac2770c0809c99fabec6063cf21f0c18c937d293
|
73e1e36ac72df9017049ff5ab8e33e80dd1e25214a4ec4a8af40d094af3f3357
|
state/report/txt_hash |
64dec7a7d6412b7111c277df8a182e5635dd3a3efc1187d6ed12101e47b15d54
|
8f78cd6183c4d8f47c68b63a8435382a0a4267dea897d90aa83107a82140d853
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
c7af8a71400d30586df3cf3e3ebccfc8efc75f1e2cd8b1095af081010e389595
|
36c632f0e7e97ad990a45b8a94dfa9f36d1535b9b87537d8da20ce9156ae76fe
|
state/st/txt_hash |
ce49d2c816e7310df14cdedd004009acfda3e6796f377d30c733abca3e80685e
|
91b00be9da132d9f06300e5b6e13f667a810a9760bfb8e06324d9d0aaa59034d
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-0348-2006
|
BSI-DSZ-CC-0827-V2-2014
|
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
- |
1.01.0008, 1.03.006 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0349-2006, ANSSI-CC-2007/02, BSI-DSZ-CC-0375-2007, BSI-DSZ-CC-0426-2007, ANSSI-CC-2007/16, ANSSI-CC-2006/13 |
BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-2014 |
heuristics/report_references/directly_referencing |
None
|
BSI-DSZ-CC-0827-2013 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2006/23, BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0362-2006, ANSSI-CC-2006/28, BSI-DSZ-CC-0506-2008, BSI-DSZ-CC-0445-2007, BSI-DSZ-CC-0349-2006, ANSSI-CC-2007/02, BSI-DSZ-CC-0375-2007, BSI-DSZ-CC-0426-2007, BSI-DSZ-CC-0507-2008, ANSSI-CC-2007/16, ANSSI-CC-2006/13, BSI-DSZ-CC-0384-2007 |
CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1069-2018, ANSSI-CC-2019/38, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V7-2018 |
heuristics/report_references/indirectly_referencing |
None
|
BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012 |
heuristics/scheme_data |
None
|
None
|
heuristics/st_references/directly_referenced_by |
BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0426-2007, ANSSI-CC-2007/16 |
None
|
heuristics/st_references/directly_referencing |
None
|
None
|
heuristics/st_references/indirectly_referenced_by |
BSI-DSZ-CC-0294-2006, BSI-DSZ-CC-0426-2007, ANSSI-CC-2007/16 |
None
|
heuristics/st_references/indirectly_referencing |
None
|
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
0348a.pdf
|
0827V2a_pdf.pdf
|
pdf_data/report_frontpage/DE/cert_id |
BSI-DSZ-CC-0348-2006
|
BSI-DSZ-CC-0827-V2-2014
|
pdf_data/report_frontpage/DE/cert_item |
Philips Secure Smart Card Controller P5CT072V0P, P5CC072V0P, P5CD072V0P and P5CD036V0P each with specific IC Dedicated Software
|
Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
|
pdf_data/report_frontpage/DE/cert_lab |
BSI
|
BSI
|
pdf_data/report_frontpage/DE/developer |
Philips Semiconductors GmbH Business Line Identification Certification Report V1.0 ZS-01-01-F-330 V3.23 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 228 9582-0, Fax +49 228 9582-455, Infoline +49 228 9582-111
|
Infineon Technologies AG
|
pdf_data/report_frontpage/DE/match_rules |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
pdf_data/report_keywords/asymmetric_crypto |
|
- RSA:
- RSA-2048:
1
- RSA2048:
2
- RSA4096:
2
- ECC:
- FF:
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0348-2006:
25
- BSI-DSZ-CC-0348:
3
- NL:
|
- DE:
- BSI-DSZ-CC-0827-V2-2014:
23
- BSI-DSZ-CC-0827-2013:
3
- BSI-DSZ-CC-S-0023-2013:
1
- BSI-DSZ-CC-S-0015-2012:
1
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0348-2006:
25
- BSI-DSZ-CC-0348:
3
|
- BSI-DSZ-CC-0827-V2-2014:
23
- BSI-DSZ-CC-0827-2013:
3
- BSI-DSZ-CC-S-0023-2013:
1
- BSI-DSZ-CC-S-0015-2012:
1
|
pdf_data/report_keywords/cc_claims/O/O.C |
1
|
2
|
pdf_data/report_keywords/cc_claims/R/R.O |
1
|
2
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0002-2001:
3
- BSI-PP- 0002-2001:
1
- BSI-PP-0002-:
1
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_SCP.3:
3
- ACM_AUT.1:
2
- ACM_CAP.4:
2
- ACM_AUT:
2
- ACM_CAP:
2
- ACM_SCP:
2
- ADO:
- ADO_DEL.2:
2
- ADO_IGS.1:
2
- ADO_DEL:
2
- ADO_IGS:
2
- ADV:
- ADV_FSP.3:
2
- ADV_HLD.3:
2
- ADV_IMP.2:
2
- ADV_INT.1:
2
- ADV_RCR.2:
2
- ADV_SPM.3:
2
- ADV_LLD.1:
1
- ADV_FSP:
2
- ADV_HLD:
2
- ADV_IMP:
2
- ADV_INT:
2
- ADV_LLD:
2
- ADV_RCR:
2
- ADV_SPM:
2
- AGD:
- AGD_ADM.1:
1
- AGD_USR.1:
1
- AGD_ADM:
2
- AGD_USR:
2
- ALC:
- ALC_DVS.2:
6
- ALC_LCD.2:
3
- ALC_TAT.2:
3
- ALC_DVS:
2
- ALC_FLR:
2
- ALC_LCD:
1
- ALC_TAT:
2
- ATE:
- ATE_DPT.2:
2
- ATE_COV.2:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- ATE_COV:
2
- ATE_DPT:
2
- ATE_FUN:
2
- ATE_IND:
2
- AVA:
- AVA_MSU.3:
5
- AVA_VLA.4:
6
- AVA_CCA.1:
2
- AVA_SOF.1:
1
- AVA_CCA:
2
- AVA_MSU:
2
- AVA_SOF:
4
- AVA_VLA:
4
- AVA_VLA.2:
1
- AVA_VLA.3:
1
- ASE:
- ASE_DES.1:
1
- ASE_ENV.1:
1
- ASE_INT.1:
1
- ASE_OBJ.1:
1
- ASE_PPC.1:
1
- ASE_REQ.1:
1
- ASE_SRE.1:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_FSP.5:
2
- ADV_INT.2:
2
- ADV_TDS.4:
2
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_DVS.2:
7
- ALC_CMS.5:
3
- ALC_TAT.2:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
2
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
2
- ALC_DVS.1:
1
- ALC_FLR.1:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
2
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_FLR:
1
- ALC_TAT:
1
- ATE:
- ATE_DPT.3:
2
- ATE_COV.1:
1
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.5:
6
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_FSP.3:
2
- ADV_HLD.3: 2
- ADV_IMP.2:
2
- ADV_INT.1:
2
- ADV_RCR.2: 2
- ADV_SPM.3: 2
- ADV_LLD.1: 1
- ADV_FSP:
2
- ADV_HLD: 2
- ADV_IMP:
2
- ADV_INT:
2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM:
2
|
- ADV_FSP.5: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- ADV_ARC.1: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3:
1
- ADV_FSP.4: 1
- ADV_FSP.6: 1
- ADV_IMP.1: 1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.3: 1
- ADV_SPM.1: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- ADV_ARC: 1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS: 1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.3 |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP.2 |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_INT |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.1 |
2
|
1
|
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM |
2
|
1
|
pdf_data/report_keywords/cc_sar/AGD |
- AGD_ADM.1:
1
- AGD_USR.1:
1
- AGD_ADM:
2
- AGD_USR:
2
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
6
- ALC_LCD.2:
3
- ALC_TAT.2:
3
- ALC_DVS:
2
- ALC_FLR:
2
- ALC_LCD: 1
- ALC_TAT:
2
|
- ALC_DVS.2:
7
- ALC_CMS.5: 3
- ALC_TAT.2:
3
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2:
1
- ALC_TAT.1: 1
- ALC_TAT.3: 1
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS:
1
- ALC_FLR:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
6
|
7
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.2 |
3
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 |
3
|
3
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1:
1
- ASE_OBJ.1:
1
- ASE_PPC.1: 1
- ASE_REQ.1:
1
- ASE_SRE.1: 1
- ASE_TSS.1:
1
|
- ASE_INT.1:
1
- ASE_CCL.1: 1
- ASE_SPD.1: 1
- ASE_OBJ.1:
1
- ASE_OBJ.2: 1
- ASE_ECD.1: 1
- ASE_REQ.1:
1
- ASE_REQ.2: 1
- ASE_TSS.1:
1
- ASE_TSS.2: 1
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_SPD: 1
- ASE_TSS: 1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_OBJ.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_REQ.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_DPT.2:
2
- ATE_COV.2:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- ATE_COV:
2
- ATE_DPT:
2
- ATE_FUN:
2
- ATE_IND:
2
|
- ATE_DPT.3: 2
- ATE_COV.1: 1
- ATE_COV.2:
1
- ATE_COV.3: 1
- ATE_DPT.1: 1
- ATE_DPT.2:
1
- ATE_DPT.4: 1
- ATE_FUN.1:
1
- ATE_FUN.2: 1
- ATE_IND.1: 1
- ATE_IND.2:
1
- ATE_IND.3: 1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.2 |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND |
2
|
1
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
- AVA_MSU.3:
5
- AVA_VLA.4:
6
- AVA_CCA.1:
2
- AVA_SOF.1:
1
- AVA_CCA:
2
- AVA_MSU:
2
- AVA_SOF:
4
- AVA_VLA:
4
- AVA_VLA.2:
1
- AVA_VLA.3:
1
|
- AVA_VAN.5:
6
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN:
2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL4:
10
- EAL5:
9
- EAL 1:
1
- EAL 7:
1
- EAL 4:
1
- EAL 5:
2
- EAL5+:
1
- EAL1:
5
- EAL3:
4
- EAL7:
4
- EAL2:
3
- EAL6:
3
- EAL 5 augmented:
2
- EAL5 augmented:
1
|
- EAL:
- EAL 5:
8
- EAL 4:
2
- EAL1:
7
- EAL4:
7
- EAL5+:
1
- EAL6:
4
- EAL3:
4
- EAL5:
6
- EAL7:
4
- EAL2:
3
- EAL 5 augmented:
3
- ITSEC:
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL4:
10
- EAL5:
9
- EAL 1: 1
- EAL 7: 1
- EAL 4:
1
- EAL 5:
2
- EAL5+:
1
- EAL1:
5
- EAL3:
4
- EAL7:
4
- EAL2:
3
- EAL6:
3
- EAL 5 augmented:
2
- EAL5 augmented: 1
|
- EAL 5:
8
- EAL 4:
2
- EAL1:
7
- EAL4:
7
- EAL5+:
1
- EAL6:
4
- EAL3:
4
- EAL5:
6
- EAL7:
4
- EAL2:
3
- EAL 5 augmented:
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
1
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
2
|
8
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 augmented |
2
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL1 |
5
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
3
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL3 |
4
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL4 |
10
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL5 |
9
|
6
|
pdf_data/report_keywords/cc_security_level/EAL/EAL5+ |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6 |
3
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
4
|
4
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1:
3
- FCS_RND.1:
1
- FCS_CKM.1:
1
- FCS_CKM.4:
1
- FDP:
- FDP_ACC.1:
3
- FDP_ACF.1:
3
- FDP_IFC.1:
1
- FDP_ITT.1:
1
- FDP_ITC.1:
1
- FMT:
- FMT_MSA.1:
3
- FMT_MSA.3:
3
- FMT_SMF.1:
1
- FMT_LIM.1:
1
- FMT_LIM.2:
1
- FMT_MSA.2:
1
- FMT_SMR.1:
1
- FPT:
- FPT_FLS.1:
1
- FPT_ITT.1:
1
- FPT_PHP.3:
1
- FPT_SEP.1:
2
- FRU:
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
- P5CC072V0P, P5CD072V0P and P5CD036V0P Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0348, Version 1.2, 17 January 2006, Evaluation of Philips:
1
- Technical Report, Philips P5CT072V0P Secure Smart Card Controller, Version 1.1, 3. March 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German:
1
- to AIS 36, Version 1.1, 3. March 2006 for Philips P5CT072V0P Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CT072V0P and P5CT072V0Q, Version 1.1:
1
- Semiconductors, 13 January 2006 (confidential document) B-26 BSI-DSZ-CC-0348-2006 Certification Report [12] Data Sheet, P5CT072V0P/V0Q, SmartMX, Secure:
1
- Controller, Preliminary Specification, Philips Semiconductors, Revision 2.0, September 14th, 2005 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD:
1
- the P5CT072V0P/Q, BSI-DSZ-CC-0348/0349, Version 1.2, Philips Semiconductors, February 9th, 2006 (confidential document) [15] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification:
1
- P5CC072V0P, Product Specification, Philips Semiconductors, Revision 3.0, November 24th, 2005 (confidential document) [19] Data Sheet, P5CD072V0P/V0Q, SmartMX, Secure Dual Interface PKI Smart Card Controller:
1
|
- Software Libraries RSA - EC – Toolbox – FTL, Version 1.6, 2014-02-21, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900 A22 and G11 including optional Software Libraries RSA – EC –:
1
- the M9900 A22 and G11 with Crypto Libraries, Version 4, 2014-04-02, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M9900 A21, Version 4, 2014-04-02:
1
- Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für:
1
- optional Software Libraries RSA - EC – Toolbox – FTL, Version 0.6, 2014-01-27, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006),2012-08-16:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik:
4
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG |
4
|
3
|
pdf_data/report_keywords/side_channel_analysis |
- SCA:
- physical probing:
2
- Physical Probing:
1
- side channel:
1
- timing attacks:
1
- FI:
- physical tampering:
1
- Malfunction:
1
|
- SCA:
- physical probing:
1
- SPA:
5
- DPA:
6
- FI:
- physical tampering:
1
- DFA:
6
- other:
|
pdf_data/report_keywords/side_channel_analysis/FI |
- physical tampering:
1
- Malfunction: 1
|
- physical tampering:
1
- DFA: 6
|
pdf_data/report_keywords/side_channel_analysis/FI/physical tampering |
1
|
1
|
pdf_data/report_keywords/side_channel_analysis/SCA |
- physical probing:
2
- Physical Probing: 1
- side channel: 1
- timing attacks: 1
|
- physical probing:
1
- SPA: 5
- DPA: 6
|
pdf_data/report_keywords/side_channel_analysis/SCA/physical probing |
2
|
1
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3:
3
- FIPS PUB 197:
2
- BSI:
- AIS 34:
3
- AIS 32:
3
- AIS 36:
6
- AIS 25:
2
- AIS 26:
3
- AIS 31:
4
- ISO:
- ISO/IEC 15408:1999:
1
- ISO/IEC15408: 1999:
1
|
- FIPS:
- FIPS186-4:
4
- FIPS197:
3
- FIPS 186-4:
1
- FIPS PUB 186-4:
1
- PKCS:
- BSI:
- AIS32:
1
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 31:
3
- AIS 36:
3
- AIS31:
2
- AIS 35:
2
- AIS 20:
1
- AIS 32:
1
- AIS 38:
1
- AIS47:
2
- RFC:
|
pdf_data/report_keywords/standard_id/BSI |
- AIS 34:
3
- AIS 32:
3
- AIS 36:
6
- AIS 25:
2
- AIS 26:
3
- AIS 31:
4
|
- AIS32: 1
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 31:
3
- AIS 36:
3
- AIS31: 2
- AIS 35: 2
- AIS 20: 1
- AIS 32:
1
- AIS 38: 1
- AIS47: 2
|
pdf_data/report_keywords/standard_id/BSI/AIS 25 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 26 |
3
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 |
4
|
3
|
pdf_data/report_keywords/standard_id/BSI/AIS 32 |
3
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 34 |
3
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 36 |
6
|
3
|
pdf_data/report_keywords/standard_id/FIPS |
- FIPS PUB 46-3:
3
- FIPS PUB 197:
2
|
- FIPS186-4:
4
- FIPS197:
3
- FIPS 186-4:
1
- FIPS PUB 186-4:
1
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
21
|
8
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
- Triple-DES:
3
- TDES: 3
- TDEA:
1
- 3DES: 1
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDEA |
2
|
1
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES |
11
|
3
|
pdf_data/report_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES |
3
|
3
|
pdf_data/report_keywords/technical_report_id/BSI |
- BSI 7125:
2
- BSI 7148:
1
- BSI 7149: 1
|
- BSI TR-02102: 1
- BSI 7125:
2
- BSI 7148:
1
|
pdf_data/report_keywords/technical_report_id/BSI/BSI 7125 |
2
|
2
|
pdf_data/report_keywords/technical_report_id/BSI/BSI 7148 |
1
|
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies:
17
- Infineon Technologies AG:
21
- Infineon:
5
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
415971
- pdf_is_encrypted:
False
- pdf_number_of_pages:
50
- /CreationDate:
D:20060329122212+02'00'
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Creator:
Acrobat PDFMaker 7.0.7 für Word
- /Keywords:
Common Criteria, Smartcard, Zertifizierung, Certification
- /Producer:
Acrobat Distiller 7.0.5 (Windows)
- /ModDate:
D:20060329122407+02'00'
- /Company: BSI, Postfach 200363, 53133 Bonn
- /SourceModified: D:20060329102148
- /Category: Common Criteria Zertifizierung
- /Title:
Certification Report BSI-DSZ-CC-0348-2006
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1267084
- pdf_is_encrypted:
False
- pdf_number_of_pages:
44
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20140519170621+02'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG"
- /ModDate:
D:20140519171035+02'00'
- /Producer:
LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-0827-V2-2014
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20060329122212+02'00'
|
D:20140519170621+02'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 7.0.7 für Word
|
Writer
|
pdf_data/report_metadata//Keywords |
Common Criteria, Smartcard, Zertifizierung, Certification
|
"Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG"
|
pdf_data/report_metadata//ModDate |
D:20060329122407+02'00'
|
D:20140519171035+02'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 7.0.5 (Windows)
|
LibreOffice 3.6
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-0348-2006
|
Certification Report BSI-DSZ-CC-0827-V2-2014
|
pdf_data/report_metadata/pdf_file_size_bytes |
415971
|
1267084
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
50
|
44
|
pdf_data/st_filename |
0348b.pdf
|
0827V2b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
- RSA:
- RSA2048:
2
- RSA4096:
2
- RSA-2048:
1
- ECC:
- FF:
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
2
|
20
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/O |
- O.CONFIG: 8
- O.RND:
3
- O.HW_AES: 10
- O.MF_FW: 7
- O.MEM_ACCESS: 9
- O.SFR_ACCESS: 7
|
|
pdf_data/st_keywords/cc_claims/O/O.RND |
3
|
1
|
pdf_data/st_keywords/cc_claims/T/T.RND |
2
|
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1:
1
- ACM_CAP.4:
2
- ACM_SCP.3:
5
- ACM_SCP.2:
4
- ACM_SCP:
3
- ACM_AUT:
1
- ACM_CAP:
1
- ADO:
- ADO_DEL.2:
2
- ADO_IGS.1:
2
- ADO_IGS:
2
- ADO_DEL:
2
- ADV:
- ADV_FSP.3:
6
- ADV_HLD.3:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_LLD.1:
1
- ADV_RCR.2:
1
- ADV_SPM.3:
1
- ADV_FSP.2:
4
- ADV_FSP:
3
- ADV_RCR:
4
- ADV_SPM:
1
- ADV_HLD:
1
- ADV_LLD:
1
- ADV_INT:
1
- ADV_IMP:
1
- AGD:
- AGD_ADM.1:
2
- AGD_USR.1:
2
- AGD_ADM:
2
- AGD_USR:
2
- ALC:
- ALC_DVS.2:
2
- ALC_LCD.2:
1
- ALC_TAT.2:
1
- ALC_DVS:
1
- ALC_LCD:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.2:
2
- ATE_DPT.2:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- AVA_VLA.4:
3
- AVA_CCA.1:
1
- AVA_MSU.3:
1
- AVA_SOF.1:
2
- AVA_MSU:
2
|
- ADV:
- ADV_ARC.1:
2
- ADV_FSP.5:
3
- ADV_IMP.1:
2
- ADV_INT.2:
1
- ADV_TDS.4:
1
- ADV_FSP:
1
- ADV_FSP.4:
1
- ADV_FSP.2:
1
- ADV_TDS.3:
1
- AGD:
- AGD_OPE.1:
2
- AGD_PRE.1:
2
- ALC:
- ALC_DVS:
1
- ALC_DVS.2:
9
- ALC_CMC.4:
1
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.2:
3
- ALC_CMS:
1
- ALC_TAT:
1
- ALC_CMS.4:
1
- ALC_TAT.1:
1
- ALC_DVS.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.3:
4
- ATE_FUN.1:
1
- ATE_IND.2:
1
- ATE_DPT.2:
1
- AVA:
- ASE:
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_OBJ:
2
- ASE_ECD:
2
- ASE_REQ:
2
- ASE_TSS:
2
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP.3: 6
- ADV_HLD.3: 1
- ADV_IMP.2: 1
- ADV_INT.1: 1
- ADV_LLD.1: 1
- ADV_RCR.2: 1
- ADV_SPM.3: 1
- ADV_FSP.2:
4
- ADV_FSP:
3
- ADV_RCR: 4
- ADV_SPM: 1
- ADV_HLD: 1
- ADV_LLD: 1
- ADV_INT: 1
- ADV_IMP: 1
|
- ADV_ARC.1: 2
- ADV_FSP.5: 3
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ADV_FSP:
1
- ADV_FSP.4: 1
- ADV_FSP.2:
1
- ADV_TDS.3: 1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP |
3
|
1
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 |
4
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_ADM.1:
2
- AGD_USR.1:
2
- AGD_ADM:
2
- AGD_USR:
2
|
- AGD_OPE.1:
2
- AGD_PRE.1:
2
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_LCD.2: 1
- ALC_TAT.2:
1
- ALC_DVS:
1
- ALC_LCD: 1
- ALC_TAT:
1
|
- ALC_DVS:
1
- ALC_DVS.2:
9
- ALC_CMC.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_LCD.1: 1
- ALC_TAT.2:
3
- ALC_CMS: 1
- ALC_TAT:
1
- ALC_CMS.4: 1
- ALC_TAT.1: 1
- ALC_DVS.1: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
2
|
9
|
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 |
1
|
3
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2:
2
- ATE_DPT.2:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.2:
1
- ATE_DPT.3: 4
- ATE_FUN.1:
1
- ATE_IND.2:
1
- ATE_DPT.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 |
2
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_VLA.4:
3
- AVA_CCA.1:
1
- AVA_MSU.3:
1
- AVA_SOF.1:
2
- AVA_MSU:
2
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL5:
34
- EAL 5:
4
- EAL4: 4
- EAL5+:
1
- EAL4+: 1
- EAL5 augmented:
1
- EAL 5 augmented:
2
- EAL4 augmented: 1
|
- EAL5:
7
- EAL5+:
1
- EAL 5:
4
- EAL5 augmented:
3
- EAL 5 augmented:
3
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 |
4
|
4
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented |
2
|
3
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 |
34
|
7
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented |
1
|
3
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5+ |
1
|
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_RND.1:
5
- FCS_RND.1.1:
1
- FCS_COP.1:
28
- FCS_COP.1.1:
2
- FCS_CKM.1:
6
- FCS_CKM.4:
4
- FCS_CKM:
1
- FDP:
- FDP_IFC.1:
10
- FDP_ITT.1:
6
- FDP_ITC.1:
6
- FDP_ACC.1:
34
- FDP_ACC.1.1:
2
- FDP_ACF.1:
30
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_SDI.1:
1
- FMT:
- FMT_LIM.1:
3
- FMT_LIM.2:
3
- FMT_MSA.2:
6
- FMT_MSA.3:
22
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.1:
29
- FMT_SMR.1:
8
- FMT_MSA.1.1:
2
- FMT_SMF.1:
14
- FMT_SMF.1.1:
1
- FPT:
- FPT_SEP.1:
16
- FPT_FLS.1:
7
- FPT_ITT.1:
6
- FPT_PHP.3:
7
- FPT_SEP.1.1:
1
- FPT_SEP.1.2:
1
- FPT_AMT.1:
1
- FRU:
|
- FAU:
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG:
12
- FCS_RNG.1:
30
- FCS_COP.1:
27
- FCS_CKM.1:
31
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP:
47
- FCS_CKM.4:
23
- FCS_CKM:
23
- FCS_CKM.2:
5
- FDP:
- FDP_ACC.1:
23
- FDP_ACF.1:
20
- FDP_SDI.1:
17
- FDP_SDI.2:
15
- FDP_ITT.1:
13
- FDP_IFC.1:
10
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
17
- FDP_ITC.2:
17
- FDP_SDI.1.1:
1
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FDP_PHP.3:
1
- FIA:
- FIA_SOS.2:
3
- FIA_SOS.2.1:
1
- FIA_SOS.2.2:
2
- FMT:
- FMT_MSA.1:
18
- FMT_MSA.3:
19
- FMT_SMF.1:
15
- FMT_LIM:
3
- FMT_LIM.1:
7
- FMT_LIM.2:
7
- FMT_SMR.1:
6
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FPT:
- FPT_TST:
7
- FPT_TST.2:
36
- FPT_TST.1:
11
- FPT_FLS.1:
16
- FPT_PHP.3:
14
- FPT_ITT.1:
13
- FPT_TST.2.1:
1
- FPT_AMT.1:
1
- FPT_LIM.2:
1
- FPT_FLS:
1
- FRU:
|
pdf_data/st_keywords/cc_sfr/FAU |
|
- FAU_SAS.1:
10
- FAU_SAS: 4
- FAU_GEN: 1
- FAU_SAS.1.1: 1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 |
4
|
10
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FCS_COP.1:
28
- FCS_COP.1.1: 2
- FCS_CKM.1:
6
- FCS_CKM.4:
4
- FCS_CKM:
1
|
- FCS_RNG: 12
- FCS_RNG.1: 30
- FCS_COP.1:
27
- FCS_CKM.1:
31
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_COP: 47
- FCS_CKM.4:
23
- FCS_CKM:
23
- FCS_CKM.2: 5
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
1
|
23
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
6
|
31
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
4
|
23
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
28
|
27
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_IFC.1:
10
- FDP_ITT.1:
6
- FDP_ITC.1:
6
- FDP_ACC.1:
34
- FDP_ACC.1.1:
2
- FDP_ACF.1:
30
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_SDI.1:
1
|
- FDP_ACC.1:
23
- FDP_ACF.1:
20
- FDP_SDI.1:
17
- FDP_SDI.2: 15
- FDP_ITT.1:
13
- FDP_IFC.1:
10
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
17
- FDP_ITC.2: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_PHP.3: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
34
|
23
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
30
|
20
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
6
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 |
6
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 |
1
|
17
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM.1:
3
- FMT_LIM.2:
3
- FMT_MSA.2: 6
- FMT_MSA.3:
22
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.1:
29
- FMT_SMR.1:
8
- FMT_MSA.1.1:
2
- FMT_SMF.1:
14
- FMT_SMF.1.1:
1
|
- FMT_MSA.1:
18
- FMT_MSA.3:
19
- FMT_SMF.1:
15
- FMT_LIM: 3
- FMT_LIM.1:
7
- FMT_LIM.2:
7
- FMT_SMR.1:
6
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
3
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
29
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
22
|
19
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
14
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
8
|
6
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_SEP.1: 16
- FPT_FLS.1:
7
- FPT_ITT.1:
6
- FPT_PHP.3:
7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_AMT.1:
1
|
- FPT_TST: 7
- FPT_TST.2: 36
- FPT_TST.1: 11
- FPT_FLS.1:
16
- FPT_PHP.3:
14
- FPT_ITT.1:
13
- FPT_TST.2.1: 1
- FPT_AMT.1:
1
- FPT_LIM.2: 1
- FPT_FLS: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_AMT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
7
|
16
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 |
6
|
13
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
7
|
14
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 |
7
|
8
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
5
|
2
|
pdf_data/st_keywords/randomness/RNG/RNG |
12
|
11
|
pdf_data/st_keywords/randomness/TRNG/TRNG |
1
|
14
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
15
- Physical Probing:
2
- physical probing:
1
- DPA:
1
- timing attacks:
2
- FI:
- physical tampering:
1
- Malfunction:
10
- malfunction:
1
- fault injection:
3
|
- SCA:
- Leak-Inherent:
10
- Physical Probing:
2
- physical probing:
1
- side channel:
6
- Side-channel:
1
- SPA:
6
- DPA:
7
- Timing Attack:
1
- FI:
- Malfunction:
12
- malfunction:
1
- DFA:
7
- other:
|
pdf_data/st_keywords/side_channel_analysis/FI |
- physical tampering: 1
- Malfunction:
10
- malfunction:
1
- fault injection: 3
|
- Malfunction:
12
- malfunction:
1
- DFA: 7
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
10
|
12
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent:
15
- Physical Probing:
2
- physical probing:
1
- DPA:
1
- timing attacks: 2
|
- Leak-Inherent:
10
- Physical Probing:
2
- physical probing:
1
- side channel: 6
- Side-channel: 1
- SPA: 6
- DPA:
7
- Timing Attack: 1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
1
|
7
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
15
|
10
|
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
1
|
1
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3:
3
- FIPS PUB 197:
3
- FIPS PUB 46:
1
- BSI:
|
- FIPS:
- PKCS:
- BSI:
- RFC:
- ISO:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 |
3
|
5
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS PUB 46-3: 3
- FIPS PUB 197:
3
- FIPS PUB 46: 1
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
3
|
2
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
67
|
27
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
- Triple-DES:
10
- TDEA:
3
- Triple-DEA: 1
|
- 3DES: 17
- Triple-DES:
2
- TDES: 4
- TDEA:
2
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA |
3
|
2
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
10
|
2
|
pdf_data/st_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
29
|
5
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG:
20
- Infineon Technologies:
7
- Infineon:
6
- Microsoft:
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
741132
- pdf_is_encrypted:
False
- pdf_number_of_pages:
86
- /ModDate:
D:20060117165552+01'00'
- /CreationDate:
D:20060117165340+01'00'
- /Title:
Security Target
- /Creator:
Acrobat PDFMaker 6.0 for Word
- /Producer:
Acrobat Distiller 6.0 (Windows)
- /Author:
HGA
- /Company: Philips Semiconductors BL ID
- /SourceModified: D:20060117155305
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
964080
- pdf_is_encrypted:
False
- pdf_number_of_pages:
84
- /Author:
Jürgen Noller
- /CreationDate:
D:20140305150457Z
- /Creator:
Microsoft® Office Word 2007
- /Keywords: Dresden, TSMC, Infineon, RSA, Eliptic Curve, Library, multi interface, high end security controler, ARM CPU, ARM Core, robust, CCv3.1, EAL5+, secure controller, EAL5+, augmented, high attack potential, AVA_VAN.5, PP0035
- /ModDate:
D:20140520092728+02'00'
- /Producer:
Microsoft® Office Word 2007
- /Subject: Security Target Lite A22 and G11
- /Title:
Security Target Lite
- pdf_hyperlinks:
http://www.bsi.bund.de/, http://www.infineon.com/
|
pdf_data/st_metadata//Author |
HGA
|
Jürgen Noller
|
pdf_data/st_metadata//CreationDate |
D:20060117165340+01'00'
|
D:20140305150457Z
|
pdf_data/st_metadata//Creator |
Acrobat PDFMaker 6.0 for Word
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//ModDate |
D:20060117165552+01'00'
|
D:20140520092728+02'00'
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 6.0 (Windows)
|
Microsoft® Office Word 2007
|
pdf_data/st_metadata//Title |
Security Target
|
Security Target Lite
|
pdf_data/st_metadata/pdf_file_size_bytes |
741132
|
964080
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://www.bsi.bund.de/, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
86
|
84
|
dgst |
0f88fe08d16a1edc
|
5d83a59f8c44527c
|