name |
HiCommand Suite Common Component Version: 05-51-01 |
IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
15.10.2024 |
not_valid_before |
30.05.2007 |
15.10.2019 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0096_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0096_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126b_pdf.pdf |
manufacturer |
Hitachi, Ltd. |
Infineon Technologies AG |
manufacturer_web |
https://www.hitachi.com/ |
https://www.infineon.com/ |
security_level |
EAL2+, ALC_FLR.1 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
1a3d494b8e6e9a5d |
3a233e3a6e2bb53a |
heuristics/cert_id |
JISEC-CC-CRP-C0096 |
BSI-DSZ-CC-1126-2019 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
01, 05, 51 |
80.301.05.1, 01.00.0234, 2.62.7626, 2.04.003 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1126-V2-2021 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1126-V3-2023, BSI-DSZ-CC-1126-V2-2021 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0096
- certification_date: 01.05.2007
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2+ALC_FLR.1
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0096_eimg.pdf
- description: PRODUCT DESCRIPTION TOE is a module that provides some kinds of storage management software that manage a plural of storage devices that are connected through SAN with common functions. Storage management software is such as HiCommand Device Manager, HiCommand Replication Monitor and HiCommand Tiered Storage Manager. HiCommand Suite is the general term for these software and TOE. TOE is provided customers as built-in module included in each software package. TOE has the following security functions. - Identification/authentication - Privilege information management (Privilege information is attached to each user's information and it decides each user's role for storage management software.) - Warning banner
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: HiCommand Suite Common Component
- product_type: IT Product (Foundational Module Software)
- report_link: https://www.ipa.go.jp/en/security/c0096_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0096_est.pdf
- toe_version: 05-51-01
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2007-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0096_it6106_01.html'})]
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0096_it6106.html
- toe_japan_name: HiCommand Suite Common Component 05-51-01
- toe_overseas_link: None
- toe_overseas_name: HiCommand Suite Common Component 05-70-01
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
|
1126c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informatiostechnik
- /CreationDate: D:20191018114634+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Smartcard Security IC, Infineon AG, PP-0084
- /ModDate: D:20191018115002+02'00'
- /Producer: LibreOffice 6.2
- /Subject: IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance from Infineon Technologies AG
- /Title: Certificate BSI-DSZ-CC-1126-2019
- pdf_file_size_bytes: 281959
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0096_erpt.pdf |
1126a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1126-2019
- cert_item: IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP- 0084-2014
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0096-01: 1
- Certification No. C0096: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0084-2014: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 8
- EAL 5 augmented: 3
- EAL5+: 1
- EAL6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMINISTRATORS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 1
- A.SECURE_CHANNEL: 1
- A.TOKEN: 1
- T:
- T.ILLEGAL_ACCESS: 1
- T.UNAUTHORISED_: 1
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 2
- Giesecke & Devrient: 1
- Infineon:
- Infineon: 4
- Infineon Technologies: 2
- Infineon Technologies AG: 18
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 3
- Triple-DES: 2
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 23: 1
- AIS 24: 1
- AIS 25: 1
- AIS 26: 1
- AIS 31: 2
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS 47: 1
- AIS31: 2
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38B: 3
- NIST SP 800-67: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- 2019-07-10, Infineon Technologies AG (confidential document) [12] “32-bit Security Controller – V02, Hardware Reference Manual”, v9.0, 2019-06-12, Infineon: 1
- IFX_CCI_0037h T31 and M31 Security Target”, Version 4.3, 2019-07-24, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 1, 2019-08-05, “EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
- Standards Compliance Verification”, Version 1, 2019-07-09, TÜV Informationstechnik GmbH (confidential document) 7 See section 9.1 for detailed list of used AIS 24 / 29 BSI-DSZ-CC-1126-2019 Certification Report: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- “EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, “Configuration Management Scope M5270 T31 and M31”, Version 1: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20081212094836+09'00'
- /ModDate: D:20081212094836+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 107748
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Bundesamt für Sicherheit in der Informatiostechnik
- /CreationDate: D:20191018104040+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard Security IC, Infineon AG, PP-0084"
- /ModDate: D:20191018113414+02'00'
- /Producer: LibreOffice 6.2
- /Subject: IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance from Infineon Technologies AG
- /Title: Certification Report BSI-DSZ-CC-1126-2019
- pdf_file_size_bytes: 735933
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
c0096_est.pdf |
1126b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 6
- EAL2 augmented: 4
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_FSP.5: 4
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 5
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 12
- ASE_INT.1: 1
- ASE_OBJ: 4
- ASE_OBJ.2: 1
- ASE_REQ: 20
- ASE_REQ.2: 1
- ASE_SPD: 4
- ASE_SPD.1: 1
- ASE_TSS: 5
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 12
- FIA_SOS.1.1: 1
- FIA_TAB: 5
- FIA_TAB.1: 7
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC.1: 5
- FPT_ITC.1.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 15
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 11
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 3
- FTA_TAB.1.1: 2
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 8
- FCS_CKM.4: 9
- FCS_COP: 8
- FCS_COP.1: 8
- FCS_RNG: 4
- FCS_RNG.1: 8
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 9
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF: 11
- FDP_ACF.1: 18
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 1
- FDP_IFC.1: 7
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_ITT.1: 3
- FDP_SDC: 2
- FDP_SDC.1: 5
- FDP_SDC.1.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_API: 2
- FIA_API.1: 7
- FIA_API.1.1: 1
- FMT:
- FMT_LIM: 15
- FMT_LIM.1: 7
- FMT_LIM.2: 5
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_FLS.1: 5
- FPT_ITT.1: 3
- FPT_PHP.3: 3
- FPT_TST: 5
- FPT_TST.1: 11
- FPT_TST.2: 29
- FPT_TST.2.1: 1
- FRU:
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMINISTRATORS: 3
- A.ADMINISTROTORS: 1
- A.NETWORKS: 3
- A.PASSWORD: 3
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.TOKEN: 4
- O:
- O.BANNER: 6
- O.MGMT: 7
- O.PASSWORD: 7
- OE:
- OE.BANNER: 7
- OE.SECURE_CHAN: 1
- OE.SECURE_CHANNEL: 6
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
- O:
- O.AES: 1
- O.RND: 1
- O.TDES: 1
- T:
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 6
- Microsoft Corporation: 1
|
- Infineon:
- Infineon: 3
- Infineon Technologies: 7
- Infineon Technologies AG: 10
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 10
- Triple-DES: 2
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 2
- Leak-Inherent: 5
- Physical Probing: 2
- SPA: 1
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ISO:
- ISO/IEC 7816-3: 1
- ISO/IEC 9798-2: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38B: 1
- NIST SP 800-67: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Hitachi, Ltd.
- /CreationDate: D:20081205141328
- /Creator: PrimoPDF http://www.primopdf.com/
- /ModDate: D:20081205141328
- /Producer: PrimoPDF
- /Subject: HSCC-ST
- /Title: HiCommand Suite Common Component ST
- pdf_file_size_bytes: 381919
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 54
|
- /Author: Infineon Technologies AG
- /CreationDate: D:20191007171359+02'00'
- /Creator: Microsoft Word - IFX_CCI_000Dh_T31_M31_SecurityTargetLite.docx
- /Keywords: security controller, EAL 5+, IFX_CCI_000Dh, IFX_CCI_002
- /ModDate: D:20191007171359+02'00'
- /Producer: Nuance PDF Create 8
- /Title: Microsoft Word - IFX_CCI_000Dh_T31_M31_SecurityTargetLite.docx
- pdf_file_size_bytes: 457846
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |