This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure Libraries including specific IC Dedicated software (Référence : S3FV9RR_20200925) ANSSI-CC-2021/09 |
Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software BSI-DSZ-CC-0523-2008 |
|
---|---|---|
name | S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure Libraries including specific IC Dedicated software (Référence : S3FV9RR_20200925) | Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software |
not_valid_before | 2021-03-22 | 2008-11-06 |
not_valid_after | 2026-03-22 | 2019-09-01 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021_09en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523b.pdf |
status | active | archived |
manufacturer | Samsung Electronics Co., Ltd. | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
security_level | ASE_TSS.2, EAL6+ | EAL5+, ALC_DVS.2, AVA_VLA.4, AVA_MSU.3 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021-09fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523a.pdf |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2021_09fr.pdf | None |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 6, 9), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a13, SLE66CLX1600PE / m1596-a13, SLE66CLX1600PES / m1597-a13, SLE66CX1600PE / m1598-a13, SLE66CLX1440PEM / m2090-a13, SLE66CLX1440PE / m2091-a13, SLE66CLX1440PES / m2092-a13, SLE66CX1440PE / m2093-a13, SLE66CLX1280PEM / m2094-a13, SLE66CLX1280PE / m2095-a13,SLE66CLX1280PES / m2096-a13, SLE66CX1280PE / m2097-a13 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523_ma1.pdf', 'maintenance_st_link': None}) | |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | 1e6f69e164b69ed2b90cd7c2b31d47e9f69023539d57d9ed7f5e6e2631700935 | None |
state/cert/txt_hash | 7bf935bd6fc6a237d5d1d9c50355a44e23f52ce256f98a309dc8aee5fc3a5144 | None |
state/report/pdf_hash | 09a58fcbc2e99bf7f59db6ca9deec9eba06860fca2f95101340c5eecdd9b70b7 | 836c4ed42f5227f6ba526bc232f151077b64a66f6956313d8e4fb8713f01b894 |
state/report/txt_hash | e0344b087d4a6342c5eebc61ed89b726b844ba2633716a7d44aa288e963f0925 | a71f16256c05ed9983050e1b7b1d49213e6de7c78defd6df929f30e3348a7cb0 |
state/st/pdf_hash | dffde8fc34408eaa9f30074c4cf1001a1f44e7f8842a931494d8d17b06d71b3c | ca4d30daecee6150e7980d6237727848302823a11650164bb0923c7a532ec92c |
state/st/txt_hash | 1af5725cfe0979f52106ff4c872f9af749473be0a8288c23256034a6f8d6bfbc | 900db4392c40ea5514bb1e1cabb1d1d44826de2eb07eafd1bb54f8205c603981 |
heuristics/cert_id | ANSSI-CC-2021/09 | BSI-DSZ-CC-0523-2008 |
heuristics/extracted_versions | 32 | 1.1, 1.5 |
heuristics/indirect_transitive_cves | None | CVE-2021-3011 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2021/34 | ANSSI-CC-2011/79, ANSSI-CC-2011/10, BSI-DSZ-CC-0593-2009, ANSSI-CC-2011/13, ANSSI-CC-2011/16, ANSSI-CC-2011/12, BSI-DSZ-CC-0630-2010, ANSSI-CC-2011/80 |
heuristics/report_references/directly_referencing | ANSSI-CC-2020/71 | BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2021/34 | ANSSI-CC-2011/79, ANSSI-CC-2011/10, BSI-DSZ-CC-0593-2009, ANSSI-CC-2011/13, ANSSI-CC-2011/16, ANSSI-CC-2011/12, BSI-DSZ-CC-0630-2010, ANSSI-CC-2011/80, BSI-DSZ-CC-0784-2013 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2018/40, ANSSI-CC-2020/71 | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
|
None |
heuristics/st_references/directly_referenced_by | None | BSI-DSZ-CC-0630-2010 |
heuristics/st_references/directly_referencing | None | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0430-2008, BSI-DSZ-CC-0482-2008 |
heuristics/st_references/indirectly_referenced_by | None | BSI-DSZ-CC-0630-2010 |
heuristics/st_references/indirectly_referencing | None | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0430-2008, BSI-DSZ-CC-0482-2008 |
pdf_data/cert_filename | certificat_2021_09fr.pdf | None |
pdf_data/cert_keywords |
|
None |
pdf_data/cert_metadata |
|
None |
pdf_data/report_filename | anssi-cc-2021-09fr.pdf | 0523a.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 2 | 52 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM | 1 | 2 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 1 | 2 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 1 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 2 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 1 | 4 |
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 2 | 4 |
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 9 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/vendor | |
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | |
pdf_data/report_metadata//CreationDate | D:20210324153858+01'00' | D:20081117105441+01'00' |
pdf_data/report_metadata//Creator | PScript5.dll Version 5.2.2 | Writer |
pdf_data/report_metadata//ModDate | D:20210324153858+01'00' | D:20081120082435+01'00' |
pdf_data/report_metadata//Producer | Acrobat Distiller 11.0 (Windows) | StarOffice 8 |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0523-2008 | |
pdf_data/report_metadata/pdf_file_size_bytes | 280473 | 551749 |
pdf_data/report_metadata/pdf_hyperlinks | http://www.bsi.bund.de/ | |
pdf_data/report_metadata/pdf_number_of_pages | 17 | 42 |
pdf_data/st_filename | anssi-cible-2021_09en.pdf | 0523b.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 28 | 47 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 16 | 9 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 19 | 14 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 6 | 1 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_cert_id | |
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 | 2 | 3 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 4 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 4 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 36 | 49 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 26 | 30 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 28 | 45 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 20 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 18 | 15 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 18 | 24 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 18 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 3 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 2 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 15 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 6 | 9 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 6 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 3 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 20 | 7 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 6 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 13 | 3 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 4 | 3 |
pdf_data/st_keywords/certification_process | |
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 2 | 1 |
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 8 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 15 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 11 | 3 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 23 | 11 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 4 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 5 | 2 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 1 | 9 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 6 | 1 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 9 | 11 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Windows 사용자 | Buchmueller Hans-Ulrich |
pdf_data/st_metadata//CreationDate | D:20201204075416+09'00' | D:20081030093245Z |
pdf_data/st_metadata//Creator | Microsoft® Word 2016 | Security Target_SLE66CLX1600PEx_a12_Derivates_1.2_03.doc - Microsoft Word |
pdf_data/st_metadata//ModDate | D:20201204075416+09'00' | D:20081120082822+01'00' |
pdf_data/st_metadata//Producer | Microsoft® Word 2016 | Acrobat PDFWriter 5.0 for Windows NT |
pdf_data/st_metadata//Title | ST_Klallam7_Ver1.1 | CC EAL5+ Certification Security Target |
pdf_data/st_metadata/pdf_file_size_bytes | 1546128 | 442657 |
pdf_data/st_metadata/pdf_hyperlinks | https://tools.ietf.org/html/rfc7748, https://tools.ietf.org/html/rfc8032, mailto:[email protected] | |
pdf_data/st_metadata/pdf_number_of_pages | 115 | 60 |
dgst | 1a32a59ae72b4fae | 4befd70d36bd82c3 |