name |
Huawei NE40E Series Software Consisting of VRP and the Underlying OS V800R010C00SPC200, V800R010SPH220T |
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17.24.19084.00, SLB9673_2.0 v27.24.19041.00 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
archived |
active |
not_valid_after |
26.10.2023 |
14.10.2029 |
not_valid_before |
26.10.2018 |
14.10.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1053c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1246c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1053a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1246a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1053b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1246b_pdf.pdf |
manufacturer |
Huawei Technologies Co. Ltd. |
Infineon Technologies AG |
manufacturer_web |
https://www.huawei.com |
https://www.infineon.com/ |
security_level |
{} |
AVA_VAN.4, EAL4+, ALC_FLR.1 |
dgst |
1b6c5bba158cdc1b |
3ec8b3cee59ee5c7 |
heuristics/cert_id |
BSI-DSZ-CC-1053-2018 |
BSI-DSZ-CC-1246-2024 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ALC_FLR.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
heuristics/extracted_versions |
- |
27.24.19041.00, 2.0, 17.24.19084.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1179-V4-2023 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1179-V4-2023 |
heuristics/scheme_data |
|
- category: Smart Cards and similar devices
- cert_id: BSI-DSZ-CC-1246-2024
- certification_date: 14.10.2024
- enhanced:
- applicant: Infineon Technologies AG Am Campeon 1-12 85579 Neubiberg
- assurance_level: EAL4+,ALC_FLR.1,AVA_VAN.4
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1246c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 14.10.2024
- description: The current evaluation is the fourth re-certification, based on the TPM Protection Profile for the TPM specification revision 1.59. Two HW-variants exist (with either "Serial Peripheral Interface" or "Inter Integrated Circuit Interface"), the certificate exclusively comprises the new FW-versions v17.24.19084.00 or v27.24.19041.00, including optimizations and bugfixes.
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 13.10.2029
- product: Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17.24.19084.00, SLB9673_2.0 v27.24.19041.00
- protection_profile: Protection Profile PC Client Specific TPM, TPM Library specification Family “2.0”, Level 0 Revision 1.59, Version: 1.3, Date: 2021-09-29, ANSSI-CC-PP-2021/02
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1246a_pdf.pdf?__blob=publicationFile&v=3
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1246b_pdf.pdf?__blob=publicationFile&v=3
- product: Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17.24.19084.00, SLB9673_2.0 v27.24.19041.00
- subcategory: ICs, Cryptolib
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1246.html
- vendor: Infineon Technologies AG
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
48ac4778e4272298 |
edccaca44d27fedc |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf |
pdf_data/cert_filename |
1053c_pdf.pdf |
1246c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 1
- Huawei Technologies Co: 1
|
- Infineon:
- Infineon Technologies AG: 2
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20181107103021+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, "
- /ModDate: D:20181107132049+01'00'
- /Producer: LibreOffice 5.2
- /Subject: Network Device, Huawei NE40E Series Software Consisting of VRP and the Underlying OS
- /Title: Certification Report BSI-DSZ-CC-1053-2018
- pdf_file_size_bytes: 899506
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Federal Office for Information Security
- /Keywords: Common Criteria Certification, Zertifizierung, TPM, IFX, Infineon Technologies AG, Trusted Platform Module
- /Subject: Common Criteria Certification, Zertifizierung, TPM, IFX, Infineon Technologies AG, Trusted Platform Module
- /Title: Certificate BSI-DSZ-CC-1246-2024
- pdf_file_size_bytes: 233629
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
1053a_pdf.pdf |
1246a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1053-2018
- cert_item: Huawei NE40E Series Software Consisting of VRP and the Underlying OS, V800R010C00SPC200, V800R010SPH220T
- cert_lab: BSI
- developer: Huawei Technologies Co., Ltd
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314, 2018-03-14, NDFW- iTC (Exact conformance
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA.VAN.4 and ALC.FLR.1 valid until: 13 October 2029
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1246-2024
- cert_item: Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v17.24.19084.00, SLB9673_2.0 v27.24.19041.00
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile PC Client Specific TPM, TPM Library specification Family “2.0”, Level 0 Revision 1.59, Version: 1.3, Date: 2021-09-29, ANSSI-CC- PP-2021/02
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1179-V4-2023: 3
- BSI-DSZ-CC-1246: 1
- BSI-DSZ-CC-1246-2024: 19
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2021/02: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_FLR: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 5
- ASE_REQ.2: 5
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 23
- Huawei Technologies Co: 12
|
- Infineon:
- Infineon: 3
- Infineon Technologies: 1
- Infineon Technologies AG: 14
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 3
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 15
- SHA-384: 13
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- side-channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 20: 3
- AIS 25: 1
- AIS 26: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 38: 1
- AIS20: 1
- AIS26: 1
- FIPS:
- FIPS PUB 186-4: 1
- FIPS PUB 186-5: 1
- FIPS180-4: 9
- FIPS186-4: 11
- FIPS186-5: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 3447: 1
- RFC 8391: 1
- RFC3447: 16
- RFC8391: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- BSI-DSZ-CC- 1053-2018, Version 2.0, Date 2018-10-24, TÜV Informationstechnik GmbH, (confidential document) [8] collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
- ConfidentialDocument:
- Standards Compliance Verification; Version 1, Sep. 13, 2024, TÜV Informationstechnik GmbH, (confidential document) 24 / 33 BSI-DSZ-CC-1246-2024 Certification Report C. Excerpts from the Criteria For the meaning: 1
- Version 1, Sep. 13, 2024, ”Evaluation Technical Report Summary”, TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile PC Client Specific TPM, TPM Library specification Family “2.0”, Level 0: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20181107103002+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, "
- /ModDate: D:20181107131053+01'00'
- /Producer: LibreOffice 5.2
- /Subject: Zertifizierunsreport Huawei NE40E Series Software Consisting of VRP and the Underlying OS, V800R010C00SPC200, V8000R010SPH220T
- /Title: Certification Report BSI-DSZ-CC-1053-2018
- pdf_file_size_bytes: 1360376
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, TPM, IFX, Infineon Technologies AG"
- /Subject: Common Criteria, Certification, Zertifizierung, TPM, IFX, Infineon Technologies AG
- /Title: Certification Report BSI-DSZ-CC-1246-2024
- pdf_file_size_bytes: 795896
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
pdf_data/st_filename |
1053b_pdf.pdf |
1246b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_REQ.1: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 5
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_STG: 7
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG_EXT: 1
- FAU_STG_EXT.1: 8
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 2
- FCO:
- FCO_CPC_EXT.1: 2
- FCO_CPC_EXT.1.2: 1
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 3
- FCS_CKM.2: 15
- FCS_CKM.2.1: 2
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 67
- FCS_COP.1: 5
- FCS_COP.1.1: 3
- FCS_RBG.1: 1
- FCS_RBG_EXT: 7
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 3
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_SSHC_EXT.1: 8
- FCS_SSHC_EXT.1.1: 3
- FCS_SSHC_EXT.1.2: 3
- FCS_SSHC_EXT.1.3: 3
- FCS_SSHC_EXT.1.4: 3
- FCS_SSHC_EXT.1.5: 8
- FCS_SSHC_EXT.1.6: 3
- FCS_SSHC_EXT.1.7: 3
- FCS_SSHC_EXT.1.8: 4
- FCS_SSHC_EXT.1.9: 4
- FCS_SSHS_EXT.1: 8
- FCS_SSHS_EXT.1.1: 3
- FCS_SSHS_EXT.1.2: 3
- FCS_SSHS_EXT.1.3: 3
- FCS_SSHS_EXT.1.4: 3
- FCS_SSHS_EXT.1.5: 5
- FCS_SSHS_EXT.1.6: 3
- FCS_SSHS_EXT.1.7: 3
- FCS_SSHS_EXT.1.8: 4
- FCS_TLSC_EXT.1: 9
- FCS_TLSC_EXT.1.1: 6
- FCS_TLSC_EXT.1.2: 3
- FCS_TLSC_EXT.1.3: 3
- FCS_TLSC_EXT.1.4: 3
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 8
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 13
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 18
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 2
- FMT:
- FMT_MOF: 31
- FMT_MOF.1: 6
- FMT_MTD: 14
- FMT_MTD.1: 7
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.2: 9
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 3
- FPT:
- FPT_APW_EXT.1: 8
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT: 1
- FPT_ITT.1: 7
- FPT_SKP_EXT.1: 8
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM_EXT.1: 9
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 2
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 4
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 8
- FPT_TUD_EXT.1.1: 3
- FPT_TUD_EXT.1.2: 3
- FPT_TUD_EXT.1.3: 6
- FPT_TUD_EXT.2: 4
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_SSL.3: 9
- FTA_SSL.4: 7
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 13
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 27
- FTP_ITC.1.1: 7
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_ITC.2: 6
- FTP_TRP: 11
- FTP_TRP.1: 5
|
- FCO:
- FCS:
- FCS_CKM: 37
- FCS_CKM.1: 20
- FCS_CKM.2: 8
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 47
- FCS_COP.1: 19
- FCS_RNG: 1
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 4
- FDP_ACF: 30
- FDP_ACF.1: 8
- FDP_ETC: 7
- FDP_IFC.1: 2
- FDP_ITC: 7
- FDP_ITC.1: 11
- FDP_ITC.2: 11
- FDP_ITT.1: 1
- FDP_RIP.1: 3
- FDP_SDI.1: 3
- FDP_UCT: 7
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 12
- FIA_MSA: 1
- FIA_SOS.2: 3
- FIA_UAU.1: 3
- FIA_UAU.5: 3
- FIA_UAU.6: 3
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FMT:
- FMT_MOF: 3
- FMT_MSA: 65
- FMT_MSA.1: 1
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 2
- FMT_MTD: 6
- FMT_SMF.1: 3
- FMT_SMR.1: 4
- FPT:
- FPT_FLS: 7
- FPT_FLS.1: 1
- FPT_ITT.1: 3
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_STM.1: 3
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 2
- A.PHYSICAL_PROTECTION: 2
- A.REGULAR_UPDATES: 2
- A.RESIDUAL_INFORMATION: 2
- A.TRUSTED_ADMINISTRATOR: 2
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 3
- OE.NO_GENERAL_PURPOSE: 3
- OE.NO_THRU_TRAFFIC_PROTECTION: 3
- OE.PHYSICAL: 3
- OE.RESIDUAL_INFORMATION: 3
- OE.TRUSTED_ADMIN: 3
- OE.UPDATES: 3
- T:
- T.PASSWORD_CRACKING: 4
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
- T.SECURITY_FUNCTIONALITY_FAILURE: 2
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 2
- T.UNDETECTED_ACTIVITY: 3
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 4
- T.UPDATE_COMPROMISE: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 2
- T.WEAK_CRYPTOGRAPHY: 2
|
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 14
- Huawei Technologies Co: 1
|
- Cisco:
- Infineon:
- Infineon: 6
- Infineon Technologies: 6
- Infineon Technologies AG: 17
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 18
- AES128: 2
- AES256: 4
- DES:
- constructions:
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 14
- SHA-384: 5
- SHA-512: 1
- SHA256: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 56
- TLS 1.1: 1
- TLS 1.2: 1
- TLS v1.2: 1
- TLS1.1: 1
- TLS1.2: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 186-4: 1
- FIPS 198-1: 1
- FIPS PUB 186-4: 6
- FIPS186-4: 1
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 10118-3: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 5
- ISO/IEC 9796-2: 3
- ISO/IEC 9797-2: 1
- NIST:
- NIST SP 800-56A: 1
- NIST SP 800-56B: 2
- SP 800-131A: 1
- SP 800-56B: 1
- PKCS:
- PKCS #1: 1
- PKCS#1: 1
- PKCS#3: 1
- RFC:
- RFC 1195: 1
- RFC 3268: 3
- RFC 3526: 2
- RFC 4251: 4
- RFC 4252: 1
- RFC 4253: 11
- RFC 4254: 1
- RFC 4346: 2
- RFC 5246: 4
- RFC 5280: 9
- RFC 5288: 4
- RFC 5647: 8
- RFC 5656: 1
- RFC 5759: 2
- RFC 6125: 4
- RFC 6668: 3
- RFC3447: 1
- RFC3526: 2
- RFC4253: 1
- RFC5246: 2
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 3
- FIPS PUB 140-2: 3
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 1
- ISO:
- ISO/IEC 10116:2006: 2
- ISO/IEC 10118-3: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 15946-1: 1
- ISO/IEC 9797-2: 3
- NIST:
- NIST SP 800-90A: 2
- SP 800-133: 1
- SP 800-90A: 3
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 3447: 1
- RFC3447: 35
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the assurance activity for this requirement. AES128-CBC and AES256-CBC are implemented according: 1
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. All required algorithms required by RFC 4253 are: 1
- out of scope: 2
|
|
pdf_data/st_metadata |
|
- /Author: Jürgen Noller
- /Keywords: Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module
- /Subject: Security Target SLB9670_2.0
- /Title: CC EAL4+ moderate Certification Security Target
- pdf_file_size_bytes: 1127787
- pdf_hyperlinks: mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.infineon.com/, http://www.rsa.com/, http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 63
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |