Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software
BSI-DSZ-CC-0719-2011
Infineon Smart Card IC (Security Controller), SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / 1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA 2048 V1.5 and all with specific IC dedicated software
BSI-DSZ-CC-0437-2008
name Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software Infineon Smart Card IC (Security Controller), SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / 1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA 2048 V1.5 and all with specific IC dedicated software
not_valid_before 2011-05-19 2008-05-27
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0437b.pdf
manufacturer Samsung Electronics Co., Ltd. Infineon Technologies AG
manufacturer_web https://www.samsung.com https://www.infineon.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0437a.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2013, 9, 10), 'maintenance_title': 'Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 1 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719_ma1b_pdf.pdf'}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 1, 29), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / m1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA2048 V1.5 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0437_ma2.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2008, 9, 25), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / m1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA 2048 V1.5 and all with specific Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0437_ma1.pdf', 'maintenance_st_link': None})
state/report/pdf_hash 36850d51a46d0640a93d071e4e783bd7eee1ba0fb5c7271b01b57723b3aeda1b 57562d84ecbc087328699a93cf1ee26206db0c450b96c803b7d7161c5a99e87f
state/report/txt_hash 48b117ee84c9d160531e0a576e3d052edb07f09e3f0eed1dbc53c90816264072 7613d7cc3616bbd09abad672d82847d342da8218c3b1d08a57a9d9cd93b2ae13
state/st/pdf_hash 2126fa77d32a45fc4b30a967c2d23f920370938a2fede157f95c35ec35cf2dad 279a1d4f8f886eb5ca729c18b1f9fb2612f1e1721fc78f039d9dfad58451d0d6
state/st/txt_hash 8aaa493430efdff36740d04af76ec6bfc6438b20d2e17c2a0ec2a4312eb60a1b 30bc18a3fc387e217a176a7f290eb004b99756222559d2ba6d330439b6cf46c0
heuristics/cert_id BSI-DSZ-CC-0719-2011 BSI-DSZ-CC-0437-2008
heuristics/extracted_versions 1.0 1.5
heuristics/report_references/directly_referenced_by KECS-ISIS-0468-2013, BSI-DSZ-CC-0719-V2-2016, BSI-DSZ-CC-0720-2011 BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0425-2009
heuristics/report_references/directly_referencing BSI-DSZ-CC-0639-2010 BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0322-2005
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0801-2012, BSI-DSZ-CC-0882-2013, BSI-DSZ-CC-0720-V2-2016, KECS-ISIS-0468-2013, BSI-DSZ-CC-0720-2011, BSI-DSZ-CC-0719-V2-2016, BSI-DSZ-CC-0802-2012, BSI-DSZ-CC-0882-V2-2019 BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0425-2009, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0665-2010, BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0663-2009
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009 BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003
heuristics/st_references/directly_referenced_by KECS-ISIS-0468-2013 BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0425-2009
heuristics/st_references/indirectly_referenced_by KECS-ISIS-0468-2013 BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0425-2009
pdf_data/report_filename 0719a_pdf.pdf 0437a.pdf
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0719-2011 BSI-DSZ-CC-0437-2008
pdf_data/report_frontpage/DE/cert_item Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / m1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA2048 V1.5 and all with specific IC dedicated software
pdf_data/report_frontpage/DE/developer Samsung Electronics Infineon Technologies AG
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
  • RSA:
    • RSA2048: 33
    • RSA 2048: 4
  • ECC:
    • ECDSA:
      • ECDSA: 1
    • ECC:
      • ECC: 1
pdf_data/report_keywords/asymmetric_crypto/ECC
  • ECC:
    • ECC: 4
  • ECDSA:
    • ECDSA: 1
  • ECC:
    • ECC: 1
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 4 1
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0719-2011: 21
    • BSI-DSZ-CC-0639-2010: 3
    • BSI-DSZ-CC-0719: 2
  • DE:
    • BSI-DSZ-CC-0437-2008: 20
    • BSI-DSZ-CC-0322-2007: 2
    • BSI-DSZ-CC-0322-2005: 1
    • BSI-DSZ-CC-0399-2007: 1
    • BSI-DSZ-CC-0437: 1
  • NL:
    • CC-0322-2007: 1
    • CC-0437: 2
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0719-2011: 21
  • BSI-DSZ-CC-0639-2010: 3
  • BSI-DSZ-CC-0719: 2
  • BSI-DSZ-CC-0437-2008: 20
  • BSI-DSZ-CC-0322-2007: 2
  • BSI-DSZ-CC-0322-2005: 1
  • BSI-DSZ-CC-0399-2007: 1
  • BSI-DSZ-CC-0437: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0035-2007: 2
  • BSI-CC-PP- 0035-2007: 1
  • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 7
    • ALC_CMS.5: 3
    • ALC_TAT.2: 3
    • ALC_CMC: 2
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.3: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_DPT.3: 2
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 6
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ACM:
    • ACM_SCP: 3
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 4
    • AGD_USR: 2
  • ALC:
    • ALC_DVS.2: 6
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
    • ALC_LCD.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_MSU.3: 5
    • AVA_VLA.4: 6
    • AVA_VLA: 4
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_FSP.5: 2
  • ADV_INT.2: 2
  • ADV_TDS.4: 2
  • ADV_ARC.1: 1
  • ADV_FSP.1: 1
  • ADV_FSP.2: 1
  • ADV_FSP.3: 1
  • ADV_FSP.4: 1
  • ADV_FSP.6: 1
  • ADV_IMP.1: 1
  • ADV_IMP.2: 1
  • ADV_INT.1: 1
  • ADV_INT.3: 1
  • ADV_SPM.1: 1
  • ADV_TDS.1: 1
  • ADV_TDS.2: 1
  • ADV_TDS.3: 1
  • ADV_TDS.5: 1
  • ADV_TDS.6: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_FSP: 2
  • ADV_HLD: 2
  • ADV_IMP: 2
  • ADV_INT: 2
  • ADV_LLD: 2
  • ADV_RCR: 2
  • ADV_SPM: 2
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_INT 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM 1 2
pdf_data/report_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_OPE: 1
  • AGD_PRE: 1
  • AGD_ADM: 4
  • AGD_USR: 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 7
  • ALC_CMS.5: 3
  • ALC_TAT.2: 3
  • ALC_CMC: 2
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 2
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 2
  • ALC_DVS.1: 1
  • ALC_FLR.1: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 2
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_FLR: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 6
  • ALC_DVS: 2
  • ALC_FLR: 2
  • ALC_LCD: 1
  • ALC_TAT: 2
  • ALC_LCD.2: 1
  • ALC_TAT.2: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 7 6
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 3 1
pdf_data/report_keywords/cc_sar/APE
  • APE_INT.1: 1
  • APE_CCL.1: 1
  • APE_SPD.1: 1
  • APE_OBJ.1: 1
  • APE_OBJ.2: 1
  • APE_ECD.1: 1
  • APE_REQ.1: 1
  • APE_REQ.2: 1
  • APE_DES: 1
  • APE_ENV: 1
  • APE_INT: 1
  • APE_OBJ: 1
  • APE_REQ: 1
  • APE_SRE: 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_DES: 1
  • ASE_ENV: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_PPC: 1
  • ASE_REQ: 1
  • ASE_SRE: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ATE
  • ATE_DPT.3: 2
  • ATE_COV.1: 1
  • ATE_COV.2: 1
  • ATE_COV.3: 1
  • ATE_DPT.1: 1
  • ATE_DPT.2: 1
  • ATE_DPT.4: 1
  • ATE_FUN.1: 1
  • ATE_FUN.2: 1
  • ATE_IND.1: 1
  • ATE_IND.2: 1
  • ATE_IND.3: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
  • ATE_COV: 2
  • ATE_DPT: 2
  • ATE_FUN: 2
  • ATE_IND: 2
pdf_data/report_keywords/cc_sar/ATE/ATE_COV 1 2
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT 1 2
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN 1 2
pdf_data/report_keywords/cc_sar/ATE/ATE_IND 1 2
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.5: 6
  • AVA_VAN.1: 1
  • AVA_VAN.2: 1
  • AVA_VAN.3: 1
  • AVA_VAN.4: 1
  • AVA_VAN: 2
  • AVA_MSU.3: 5
  • AVA_VLA.4: 6
  • AVA_VLA: 4
  • AVA_CCA: 2
  • AVA_MSU: 2
  • AVA_SOF: 3
  • AVA_VLA.2: 1
  • AVA_VLA.3: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 6
    • EAL 4: 2
    • EAL1: 7
    • EAL4: 7
    • EAL5: 8
    • EAL5+: 1
    • EAL6: 4
    • EAL3: 4
    • EAL7: 4
    • EAL2: 3
    • EAL 5 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 5: 4
    • EAL 4: 5
    • EAL4: 7
    • EAL 1: 1
    • EAL 7: 1
    • EAL5+: 1
    • EAL1: 5
    • EAL3: 4
    • EAL5: 6
    • EAL7: 4
    • EAL2: 3
    • EAL6: 3
    • EAL 5 augmented: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 6
  • EAL 4: 2
  • EAL1: 7
  • EAL4: 7
  • EAL5: 8
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL7: 4
  • EAL2: 3
  • EAL 5 augmented: 3
  • EAL 5: 4
  • EAL 4: 5
  • EAL4: 7
  • EAL 1: 1
  • EAL 7: 1
  • EAL5+: 1
  • EAL1: 5
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL6: 3
  • EAL 5 augmented: 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 2 5
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 6 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 augmented 3 4
pdf_data/report_keywords/cc_security_level/EAL/EAL1 7 5
pdf_data/report_keywords/cc_security_level/EAL/EAL5 8 6
pdf_data/report_keywords/cc_security_level/EAL/EAL6 4 3
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 1
  • FDP:
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FMT:
    • FMT_MSA.2: 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • Secure RSA and ECC Library – Project Crow II, Version 1.3, 2011-04-20, Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR SUMMARY), BSI-DSZ-CC-0719, S3CT9KA / S3CT9K7 : 1
  • Version 1, 2011-04-29, TÜViT (confidential document) [8] Life Cycle Definition (Class ALC_CMC.4/CMS.5) – Project Crow II, Version 1.0, 2011-03-21: 1
  • Electronics (confidential document) [9] Security Target Lite of S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart: 1
  • Evaluation (ETR-COMP), BSI-DSZ-CC-0719, S3CT9KA / S3CT9K7 / S3CT9K3, Version 1, 2011-04-29, TÜViT (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
  • SLE66CX480PE / m1565-a14, SLE66CX182PE / m1564-a14, All Products with RSA2048 V1.5 library, TÜViT (confidential document) [8] Configuration list for the TOE, Configuration Management Scope (ACM_SCP), SLE66CX680PE : 1
  • SLE66CX182PE / m1564-a14, all Products with RSA2048 V1.5, Version 1.4, 10.08.2007 Infineon (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
  • all products with RSA2048 V1.5 library, Version 1, 2008-04-01, Infineon Technologies AG, TÜViT, (confidential document) [11] Data Book – SLE 66CxxxPE / MicroSlim Security Controller Family, incl. the errata sheet: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICVersion:
    • IC Version: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 9
  • RNG:
    • RNG: 1
  • RNG:
    • RNG: 5
pdf_data/report_keywords/randomness/RNG/RNG 1 5
pdf_data/report_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • DFA: 1
  • physical tampering: 1
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • side-channel: 1
  • DPA: 3
  • SPA: 1
  • physical probing: 1
  • side channel: 2
  • DPA: 2
  • SPA: 1
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 3 2
pdf_data/report_keywords/side_channel_analysis/other
  • JIL: 4
  • Bellcore attack: 1
  • JIL: 4
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS20: 2
    • AIS31: 2
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 36: 2
    • AIS 35: 2
    • AIS 20: 1
    • AIS 32: 1
    • AIS 38: 1
  • FIPS:
    • FIPS140: 1
  • BSI:
    • AIS 34: 3
    • AIS 31: 4
    • AIS 25: 3
    • AIS 26: 2
    • AIS 32: 1
    • AIS 35: 1
    • AIS 36: 2
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/standard_id/BSI
  • AIS20: 2
  • AIS31: 2
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 2
  • AIS 35: 2
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS 34: 3
  • AIS 31: 4
  • AIS 25: 3
  • AIS 26: 2
  • AIS 32: 1
  • AIS 35: 1
  • AIS 36: 2
  • AIS 38: 1
pdf_data/report_keywords/standard_id/BSI/AIS 25 2 3
pdf_data/report_keywords/standard_id/BSI/AIS 31 2 4
pdf_data/report_keywords/standard_id/BSI/AIS 34 2 3
pdf_data/report_keywords/standard_id/BSI/AIS 35 2 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • Triple-DES: 2
      • 3DES: 2
  • constructions:
    • MAC:
      • HMAC: 2
  • DES:
    • DES:
      • DES: 12
    • 3DES:
      • Triple-DES: 6
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 2
  • 3DES: 2
  • Triple-DES: 6
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 2 6
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 5 12
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI 7149: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 31
  • Infineon:
    • Infineon Technologies AG: 11
    • Infineon: 24
    • Infineon AG: 1
    • Infineon Technologies: 5
  • Philips:
    • Philips: 1
pdf_data/report_metadata//CreationDate D:20110715095208+02'00' D:20080606110001+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software, Samsung Electronics" "Infineon, Common Criteria, BSI-DSZ-CC-0437-2008, SLE66CX680PE, SLE66CX360PE, SLE66CX482PE, SLE66CX480PE, SLE66CX182PE all optional with RSA2048 V1.5 and all with specific IC dedicated software"
pdf_data/report_metadata//ModDate D:20110715095543+02'00' D:20080606113010+02'00'
pdf_data/report_metadata//Producer OpenOffice.org 3.2 StarOffice 8
pdf_data/report_metadata//Subject Common Criteria Certification BSI-DSZ-CC-0437-2008
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0719-2011 Certification Report BSI-DSZ-CC-0437-2008
pdf_data/report_metadata/pdf_file_size_bytes 972498 515020
pdf_data/report_metadata/pdf_hyperlinks https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ http://www.bsi.bund.de/
pdf_data/report_metadata/pdf_number_of_pages 40 38
pdf_data/st_filename 0719b_pdf.pdf 0437b.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-CRT: 1
  • ECC:
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 15
    • ECC:
      • ECC: 27
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 2
  • RSA:
    • RSA2048: 19
  • ECC:
    • ECC:
      • ECC: 9
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 9
  • ECDSA:
    • ECDSA: 15
  • ECC:
    • ECC: 27
  • ECC:
    • ECC: 9
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 27 9
pdf_data/st_keywords/asymmetric_crypto/RSA
  • RSA-CRT: 1
  • RSA2048: 19
pdf_data/st_keywords/cc_claims/O/O.RND 5 1
pdf_data/st_keywords/cc_claims/T/T.RND 5 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 5
  • BSI-PP-0002: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARV: 1
    • ADV_FSP: 2
    • ADV_IMP: 1
    • ADV_VAN: 1
    • ADV_ARC.1: 7
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
    • ADV_FSP.2: 1
    • ADV_TDS.3: 1
    • ADV_FSP.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_DVS.2: 7
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_CMS: 2
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
    • ALC_DVS.1: 1
    • ALC_CMS.4: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 13
    • AVA_VAN: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 1
    • ACM_SCP.3: 5
    • ACM_SCP: 3
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.3: 5
    • ADV_HLD.3: 3
    • ADV_IMP.2: 3
    • ADV_INT.1: 3
    • ADV_LLD.1: 3
    • ADV_RCR.2: 3
    • ADV_SPM.3: 2
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.2: 4
    • ALC_LCD.2: 1
    • ALC_TAT.2: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.3: 3
    • AVA_VLA.4: 4
    • AVA_CCA.1: 2
    • AVA_SOF.1: 2
    • AVA_SOF: 4
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARV: 1
  • ADV_FSP: 2
  • ADV_IMP: 1
  • ADV_VAN: 1
  • ADV_ARC.1: 7
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
  • ADV_FSP.4: 1
  • ADV_FSP.3: 5
  • ADV_HLD.3: 3
  • ADV_IMP.2: 3
  • ADV_INT.1: 3
  • ADV_LLD.1: 3
  • ADV_RCR.2: 3
  • ADV_SPM.3: 2
  • ADV_FSP: 1
  • ADV_FSP.2: 1
  • ADV_SPM.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 2 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE: 1
  • AGD_PRE: 1
  • AGD_OPE.1: 2
  • AGD_PRE.1: 2
  • AGD_ADM.1: 2
  • AGD_USR.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 7
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_CMS: 2
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_DVS.1: 1
  • ALC_CMS.4: 1
  • ALC_DVS.2: 4
  • ALC_LCD.2: 1
  • ALC_TAT.2: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 7 4
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 1 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 2
  • ATE_DPT.2: 1
  • ATE_FUN.1: 2
  • ATE_IND.2: 2
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 13
  • AVA_VAN: 1
  • AVA_MSU.3: 3
  • AVA_VLA.4: 4
  • AVA_CCA.1: 2
  • AVA_SOF.1: 2
  • AVA_SOF: 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 6
  • EAL 4: 1
  • EAL 5: 2
  • EAL5 augmented: 1
  • EAL 4 augmented: 1
  • EAL 5 augmented: 2
  • EAL5+: 3
  • EAL5: 4
  • EAL 5: 4
  • EAL5 augmented: 1
  • EAL 5 augmented: 4
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 2 4
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented 2 4
pdf_data/st_keywords/cc_security_level/EAL/EAL5 6 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 8
    • FAU_GEN: 2
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
    • FAU_GEN.1: 1
  • FCS:
    • FCS_RNG: 11
    • FCS_RNG.1: 19
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
    • FCS_COP.1: 23
    • FCS_COP: 19
    • FCS_CKM.1: 21
    • FCS_CKM.4: 11
    • FCS_CKM: 4
    • FCS_CKM.2: 2
  • FDP:
    • FDP_ACC: 2
    • FDP_ACF: 2
    • FDP_ITT.1: 17
    • FDP_ITT.1.1: 1
    • FDP_ACC.1: 13
    • FDP_IFC.1: 18
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ACF.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_SDI.1: 1
    • FDP_IFC: 1
    • FDP_ITT: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 24
    • FMT_LIM.2: 28
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 2
    • FMT_MSA.3: 10
    • FMT_MSA.1: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 6
    • FMT_MSA.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 3
    • FMT_MSA: 2
    • FMT_SMF: 1
  • FPT:
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_PHP: 3
    • FPT_ITT.1: 15
    • FPT_ITT.1.1: 1
    • FPT_FLS: 1
    • FPT_ITT: 1
  • FRU:
    • FRU_FLT.2: 17
    • FRU_FLT.1: 1
    • FRU_FLT: 1
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_RND: 2
    • FCS_RND.1: 4
    • FCS_COP.1: 29
    • FCS_CKM.1: 34
    • FCS_COP.1.1: 2
    • FCS_CKM.4: 21
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 4
    • FCS_CKM.4.1: 2
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ITT.1: 3
    • FDP_IFC.1: 10
    • FDP_ACC.1: 22
    • FDP_ACF.1: 15
    • FDP_SDI.1: 17
    • FDP_SDI.2: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ACF.1.1: 1
    • FDP_ITC.1: 17
    • FDP_ITC.2: 16
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC.1.1: 2
    • FDP_ITC.1.2: 2
    • FDP_ITC.1.3: 2
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_CKM.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MSA.3: 15
    • FMT_MSA.1: 14
    • FMT_SMF.1: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 8
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 22
    • FMT_MSA.2.1: 2
  • FPT:
    • FPT_TST.2: 26
    • FPT_FLS.1: 5
    • FPT_SEP.1: 6
    • FPT_PHP.3: 7
    • FPT_ITT.1: 3
    • FPT_TST.1: 11
    • FPT_TST.2.1: 2
    • FPT_AMT.1: 4
    • FPT_TDC.1: 2
    • FPT_TST: 2
  • FRU:
    • FRU_FLT.2: 5
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 8
  • FAU_GEN: 2
  • FAU_SAS.1: 12
  • FAU_SAS.1.1: 2
  • FAU_GEN.1: 1
  • FAU_SAS.1: 4
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 12 4
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 11
  • FCS_RNG.1: 19
  • FCS_RNG.1.1: 2
  • FCS_RNG.1.2: 2
  • FCS_COP.1: 23
  • FCS_COP: 19
  • FCS_CKM.1: 21
  • FCS_CKM.4: 11
  • FCS_CKM: 4
  • FCS_CKM.2: 2
  • FCS_RND: 2
  • FCS_RND.1: 4
  • FCS_COP.1: 29
  • FCS_CKM.1: 34
  • FCS_COP.1.1: 2
  • FCS_CKM.4: 21
  • FCS_CKM.1.1: 3
  • FCS_CKM.2: 4
  • FCS_CKM.4.1: 2
  • FCS_RND.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 21 34
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 11 21
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 23 29
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 2
  • FDP_ACF: 2
  • FDP_ITT.1: 17
  • FDP_ITT.1.1: 1
  • FDP_ACC.1: 13
  • FDP_IFC.1: 18
  • FDP_IFC.1.1: 1
  • FDP_IFF.1: 3
  • FDP_ACF.1: 9
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 10
  • FDP_ITC.2: 10
  • FDP_SDI.1: 1
  • FDP_IFC: 1
  • FDP_ITT: 1
  • FDP_ITT.1: 3
  • FDP_IFC.1: 10
  • FDP_ACC.1: 22
  • FDP_ACF.1: 15
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ACF.1.1: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 16
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC.1.1: 2
  • FDP_ITC.1.2: 2
  • FDP_ITC.1.3: 2
  • FDP_ITC.2.1: 2
  • FDP_ITC.2.2: 2
  • FDP_ITC.2.3: 2
  • FDP_ITC.2.4: 2
  • FDP_ITC.2.5: 2
  • FDP_CKM.2: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 13 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 9 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 18 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 10 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 17 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 1 17
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 8
  • FMT_LIM.1: 24
  • FMT_LIM.2: 28
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MSA.3: 10
  • FMT_MSA.1: 9
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 6
  • FMT_MSA.1.1: 1
  • FMT_SMF.1: 6
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 3
  • FMT_MSA: 2
  • FMT_SMF: 1
  • FMT_LIM.1: 4
  • FMT_LIM.2: 4
  • FMT_MSA.3: 15
  • FMT_MSA.1: 14
  • FMT_SMF.1: 9
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 8
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 22
  • FMT_MSA.2.1: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 24 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 28 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 9 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 3 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 10 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 6 8
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 21
  • FPT_FLS.1.1: 1
  • FPT_PHP.3: 20
  • FPT_PHP.3.1: 1
  • FPT_PHP: 3
  • FPT_ITT.1: 15
  • FPT_ITT.1.1: 1
  • FPT_FLS: 1
  • FPT_ITT: 1
  • FPT_TST.2: 26
  • FPT_FLS.1: 5
  • FPT_SEP.1: 6
  • FPT_PHP.3: 7
  • FPT_ITT.1: 3
  • FPT_TST.1: 11
  • FPT_TST.2.1: 2
  • FPT_AMT.1: 4
  • FPT_TDC.1: 2
  • FPT_TST: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 21 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 15 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 20 7
pdf_data/st_keywords/cc_sfr/FRU
  • FRU_FLT.2: 17
  • FRU_FLT.1: 1
  • FRU_FLT: 1
  • FRU_FLT.2: 5
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 17 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • single DES is out of scope of the evaluation: 1
    • key lengths below 1024 bit are out of scope of the evaluation: 1
    • smart card applications, • data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation), • data encryption according to RSA standard with 512 to 2048 bits key length: 1
    • lengths below 1024 bit are out of scope of the evaluation), Public SLE66CX680_360_482_480_182PE Security Target V1.3 Date: 2007-03-22: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 8
    • P-224: 8
    • P-256: 8
    • P-384: 8
    • secp192k1: 4
    • secp192r1: 4
    • secp224k1: 4
    • secp224r1: 4
    • secp256k1: 4
    • secp256r1: 4
    • secp384r1: 4
  • Brainpool:
    • brainpoolP192r1: 4
    • brainpoolP192t1: 4
    • brainpoolP224r1: 4
    • brainpoolP224t1: 4
    • brainpoolP256r1: 4
    • brainpoolP256t1: 4
    • brainpoolP320r1: 4
    • brainpoolP320t1: 4
    • brainpoolP384r1: 4
    • brainpoolP384t1: 4
    • brainpoolP512r1: 4
    • brainpoolP512t1: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
      • SHA-1: 1
    • SHA2:
      • SHA224: 6
      • SHA256: 6
      • SHA384: 6
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
      • SHA512: 2
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 16
    • DTRNG: 2
  • RNG:
    • RNG: 1
    • RND: 10
  • RNG:
    • RNG: 7
    • RND: 2
pdf_data/st_keywords/randomness/RNG/RND 10 2
pdf_data/st_keywords/randomness/RNG/RNG 1 7
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 2
  • Malfunction: 24
  • malfunction: 11
  • DFA: 4
  • fault injection: 2
  • Malfunction: 15
  • malfunction: 3
  • DFA: 3
pdf_data/st_keywords/side_channel_analysis/FI/DFA 4 3
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 24 15
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 11 3
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 21
  • Physical Probing: 4
  • physical probing: 9
  • Physical probing: 2
  • side-channel: 4
  • side channel: 2
  • DPA: 12
  • SPA: 10
  • timing attacks: 1
  • timing attack: 5
  • Leak-Inherent: 11
  • Physical Probing: 2
  • SPA: 3
  • DPA: 5
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 12 5
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 21 11
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing 4 2
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 10 3
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering 5 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-3: 6
    • FIPS 197: 1
  • BSI:
    • AIS20: 3
    • AIS31: 2
    • AIS 20: 1
    • AIS 31: 2
  • CC:
    • CCMB-2009-07-001: 3
    • CCMB-2009-07-002: 3
    • CCMB-2009-07-003: 3
    • CCMB-2009-07-004: 3
  • FIPS:
    • FIPS PUB 46-3: 2
  • BSI:
    • AIS31: 9
  • ISO:
    • ISO/IEC7816-3: 1
    • ISO/IEC 9796-1: 3
    • ISO/IEC 7816: 4
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-002: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS20: 3
  • AIS31: 2
  • AIS 20: 1
  • AIS 31: 2
  • AIS31: 9
pdf_data/st_keywords/standard_id/BSI/AIS31 2 9
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 3
  • CCMB-2009-07-002: 3
  • CCMB-2009-07-003: 3
  • CCMB-2009-07-004: 3
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-002: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 180-3: 6
  • FIPS 197: 1
  • FIPS PUB 46-3: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • DES:
      • DES: 9
    • 3DES:
      • 3DES: 6
      • Triple-DES: 1
      • TDEA: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • DES:
    • DES:
      • DES: 11
    • 3DES:
      • 3DES: 20
      • Triple-DES: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 6
  • Triple-DES: 1
  • TDEA: 1
  • 3DES: 20
  • Triple-DES: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 6 20
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 9 11
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 3
  • Infineon:
    • Infineon Technologies AG: 8
    • Infineon: 2
pdf_data/st_metadata//Author SungGeun Park Hans-Ulrich Buchmüller
pdf_data/st_metadata//CreationDate D:20110516173531+09'00' D:20080603104359Z
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 SecurityTarget_CX680_360_482_480_182PE_a14_1.3_05.doc - Microsoft Word
pdf_data/st_metadata//Keywords Security Target of S3CT9KA/K7/K3 16-bit Secure RISC Microcontroller For Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software, CC EAL5+, Samsung Electroncis, SmartCard IC, Common Criteria version 3.1 Design Step a14, RSA, libraries, Security Target, Security Controller, public, document, resistance to attackers with high attack potential, Infineon, SLE66CX680PE, high security
pdf_data/st_metadata//ModDate D:20110516174952+09'00' D:20080606113047+02'00'
pdf_data/st_metadata//Producer Acrobat Distiller 9.0.0 (Windows) Acrobat PDFWriter 5.0 for Windows NT
pdf_data/st_metadata//Subject S3CT9KA/K7/K3 Common Criteria(version 3.1) EAL5+ Evaluation CC EAL5+ Certification Security Target
pdf_data/st_metadata//Title Security Target Lite of S3CT9KA/K7/K3 16-bit RISC Microcontroller For Smart Cards SecurityTarget_SLE66CX680_360_482_480_182PE a14
pdf_data/st_metadata/pdf_file_size_bytes 753587 302819
pdf_data/st_metadata/pdf_is_encrypted True False
pdf_data/st_metadata/pdf_number_of_pages 67 54
dgst 200fa846782ecbb5 158f2e487ac4b630