Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
BSI-DSZ-CC-0891-V5-2021
Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
BSI-DSZ-CC-1110-V5-2022
name Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
not_valid_before 2021-10-11 2022-04-29
not_valid_after 2026-10-11 2027-04-29
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V5b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V5a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5a_pdf.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V5c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5c_pdf.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 9, 9), 'maintenance_title': 'Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5ma1a_pdf.pdf', 'maintenance_st_link': None})
state/cert/pdf_hash 750263fe1f57f5fe48dabfd93f2888723598a932b5c77960f7abc46c05e9a4f7 c4992b696670cb6164cb9142759a2ca47b81fd10566c6db8698bfd7f8430266d
state/cert/txt_hash 793aa2c61a5bbf9512d8dfdf06644881844476792bdff5b1bccb91326b408c88 b52830c9efc77bd2c6bf96ed7ea4ee24825b5658849dd075d59bc00401e39212
state/report/pdf_hash 62abed43514bce88f12a5be8aaa32d579209d0280775362b43a7f4eeb14eb9df efff6d940ecd114d57e089fcaa500637cda8fb4a5cef491bd40e15596faa6c51
state/report/txt_hash 0e42ca190ff1e00f2f14c9e95cf61fc10b73b17b90b04a8f0bedc9b246a84c86 db55eda31873f6ed305fa9ff1edf60104631241d058287f3481fcff9a39b8daf
state/st/pdf_hash 78059809e6cc058cb3296da89dc3f603a5221c2a767417fc911a94d95c018754 0e99159be7aeec3da78267541aec787e8afa018c7d8d7fe5be97c5b67c8e8702
state/st/txt_hash 7ac9a5964148429b62d567f50adf468d6f9f62ea3409acc125c8b15dc7e2878e 897de2507e612fac27b77a6aa835c5aa6f1abcaea8668faae774b2dbf75455ec
heuristics/cert_id BSI-DSZ-CC-0891-V5-2021 BSI-DSZ-CC-1110-V5-2022
heuristics/report_references/directly_referenced_by None ANSSI-CC-2022/67, NSCIB-CC-175887-CR3, ANSSI-CC-2019/55-R01, ANSSI-CC-2019/57-R01, NSCIB-CC-0299277-CR, NSCIB-CC-0299278-CR, ANSSI-CC-2022/68, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01, ANSSI-CC-2019/56-R01, BSI-DSZ-CC-1162-V2-2023, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65, BSI-DSZ-CC-1110-V6-2023
heuristics/report_references/directly_referencing BSI-DSZ-CC-0891-V4-2019 BSI-DSZ-CC-1110-V4-2021
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2022/67, BSI-DSZ-CC-1243-2024, NSCIB-CC-175887-CR3, ANSSI-CC-2019/55-R01, ANSSI-CC-2019/57-R01, NSCIB-CC-0299277-CR, ANSSI-CC-2020/88-R01, NSCIB-CC-0299278-CR, ANSSI-CC-2022/68, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01, ANSSI-CC-2019/56-R01, BSI-DSZ-CC-1077-V2-2024, BSI-DSZ-CC-1162-V2-2023, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65, ANSSI-CC-2020/87-R01, BSI-DSZ-CC-1110-V6-2023
heuristics/st_references/directly_referenced_by None ANSSI-CC-2022/67, NSCIB-CC-175887-CR3, ANSSI-CC-2019/55-R01, ANSSI-CC-2019/57-R01, ANSSI-CC-2022/68, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01, ANSSI-CC-2019/56-R01, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65
heuristics/st_references/indirectly_referenced_by None ANSSI-CC-2022/67, NSCIB-CC-175887-CR3, ANSSI-CC-2019/55-R01, ANSSI-CC-2019/57-R01, ANSSI-CC-2022/68, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01, ANSSI-CC-2019/56-R01, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65
pdf_data/cert_filename 0891V5c_pdf.pdf 1110V5c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0891-V5-2021: 1
  • BSI-DSZ-CC-1110-V5-2022: 1
pdf_data/cert_keywords/cc_security_level/EAL
  • EAL 6: 1
  • EAL5: 1
  • EAL 2: 1
  • EAL 6 augmented: 1
  • EAL 6: 1
  • EAL 5: 1
  • EAL 2: 1
  • EAL 6 augmented: 1
pdf_data/cert_metadata//CreationDate D:20211021080400+02'00' D:20220512164627+02'00'
pdf_data/cert_metadata//Keywords Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware including the Flash Loader enhanced by the Mutual Authentication Extension, Infineon Technologies AG "Common Criteria, Certification, Zertifizierung, Smartcard, PP-0084, Security IC, Infineon Technologies AG"
pdf_data/cert_metadata//ModDate D:20211021080739+02'00' D:20220512164813+02'00'
pdf_data/cert_metadata//Title Certificate BSI-DSZ-CC-0891-V5-2021 Certificate BSI-DSZ-CC-1110-V5-2022
pdf_data/cert_metadata/pdf_file_size_bytes 254179 257848
pdf_data/report_filename 0891V5a_pdf.pdf 1110V5a_pdf.pdf
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0891-V5-2021 BSI-DSZ-CC-1110-V5-2022
pdf_data/report_frontpage/DE/cert_item Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 3
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
pdf_data/report_keywords/asymmetric_crypto/ECC
  • ECC:
    • ECC: 1
  • ECDH:
    • ECDH: 1
  • ECDSA:
    • ECDSA: 3
  • ECC:
    • ECC: 2
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 1 2
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0891-V5-2021: 20
  • BSI-DSZ-CC-0891-V4-2019: 3
  • BSI-DSZ-CC-1110-V5-2022: 23
  • BSI-DSZ-CC-1110-: 1
  • BSI-DSZ-CC-1110-V4-2021: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 3
  • BSI-CC-PP-0084-: 1
  • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084-2014 3 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
    • ALC_FLR: 3
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ADV:
    • ADV_ARC: 3
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 4 5
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 6: 4
  • EAL5: 1
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL 5: 3
  • EAL 5+: 1
  • EAL6: 2
  • EAL6+: 2
  • EAL 6 augmented: 2
  • EAL6 augmented: 2
  • EAL 6: 4
  • EAL 5: 4
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL5+: 1
  • EAL6: 1
  • EAL 6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 3 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 augmented 2 3
pdf_data/report_keywords/cc_security_level/EAL/EAL6 2 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • Common Criteria EAL6 augmented / EAL6+ M7892 Design Steps D11 and G12”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for certification BSI-DSZ-CC-0891-V5-2021, Version 4, 2021-10-08: 1
    • Technical Report Summary (ETR Summary)”, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] 16-bit Security Controller Family SLE 70 Programmer’s Reference Manual, v9.14, 2019-12-03: 1
  • OutOfScope:
    • out of scope: 2
    • note: Toolbox library is out of scope of the certification: 1
    • Table 2: Deliverables of the TOE Please note that NRG functionality, RFAPI and toolbox are out of scope of this evaluation, hence no evaluated TOE guidance documentation applies. However, respective: 1
    • and symmetric cryptography libraries and the supporting Toolbox libraries (note: Toolbox library is out of scope of the certification). The Flash Loader is a firmware located in the ROM and enables the download: 1
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • IFX_CCI_00001Dh, IFX_CCI_000021h, IFX_CCI_000022h design step H13”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for the Product BSI-DSZ-CC-1110-V5-2022, Version 1, 2022-03-29: 1
    • Technical Report - Summary”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • Version 1, 2022-03-29, ETR for composite evaluation (EFC), TÜV Informationstechnik GmbH (confidential document) [11] See table 2 in section B.2 [12] See table 2 in section B.2 [13] See table 2 in section B.2: 1
    • Standards Compliance Verification”, Version 1, 2022-01-21, TÜV Informationstechnik GmbH (confidential document) [22] See table 2 in section B.2 35 / 38 Certification Report BSI-DSZ-CC-1110-V5-2022 C. Excerpts: 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Common Criteria EAL6 augmented / EAL6+ M7892 Design Steps D11 and G12”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for certification BSI-DSZ-CC-0891-V5-2021, Version 4, 2021-10-08: 1
  • Technical Report Summary (ETR Summary)”, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] 16-bit Security Controller Family SLE 70 Programmer’s Reference Manual, v9.14, 2019-12-03: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • IFX_CCI_00001Dh, IFX_CCI_000021h, IFX_CCI_000022h design step H13”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for the Product BSI-DSZ-CC-1110-V5-2022, Version 1, 2022-03-29: 1
  • Technical Report - Summary”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Version 1, 2022-03-29, ETR for composite evaluation (EFC), TÜV Informationstechnik GmbH (confidential document) [11] See table 2 in section B.2 [12] See table 2 in section B.2 [13] See table 2 in section B.2: 1
  • Standards Compliance Verification”, Version 1, 2022-01-21, TÜV Informationstechnik GmbH (confidential document) [22] See table 2 in section B.2 35 / 38 Certification Report BSI-DSZ-CC-1110-V5-2022 C. Excerpts: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 4
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 4
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 2
  • CFB:
    • CFB: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KEX:
    • Key Exchange: 1
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 4 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 2
      • SHA-224: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/randomness/RNG/RNG 2 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 4
  • SCA:
    • physical probing: 1
    • SPA: 2
    • DPA: 2
  • FI:
    • DFA: 2
pdf_data/report_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • DFA: 2
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • physical probing: 1
  • SPA: 2
  • DPA: 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS197: 2
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 36: 3
    • AIS 35: 2
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 32: 1
    • AIS 37: 1
    • AIS 38: 1
    • AIS31: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
  • FIPS:
    • FIPS197: 3
    • FIPS186-4: 6
    • FIPS 180-4: 7
  • PKCS:
    • PKCS #1: 16
  • BSI:
    • AIS 34: 2
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 27: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 1
    • AIS 38: 1
    • AIS 41: 1
    • AIS 46: 1
    • AIS 47: 1
    • AIS20: 1
    • AIS31: 2
  • RFC:
    • RFC5639: 5
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS 35: 2
  • AIS 1: 1
  • AIS 14: 1
  • AIS 19: 1
  • AIS 20: 1
  • AIS 32: 1
  • AIS 37: 1
  • AIS 38: 1
  • AIS31: 1
  • AIS 34: 2
  • AIS 1: 1
  • AIS 14: 1
  • AIS 19: 1
  • AIS 20: 1
  • AIS 23: 1
  • AIS 25: 1
  • AIS 26: 1
  • AIS 27: 1
  • AIS 31: 2
  • AIS 32: 1
  • AIS 35: 2
  • AIS 36: 2
  • AIS 37: 1
  • AIS 38: 1
  • AIS 41: 1
  • AIS 46: 1
  • AIS 47: 1
  • AIS20: 1
  • AIS31: 2
pdf_data/report_keywords/standard_id/BSI/AIS 25 2 1
pdf_data/report_keywords/standard_id/BSI/AIS 26 2 1
pdf_data/report_keywords/standard_id/BSI/AIS 36 3 2
pdf_data/report_keywords/standard_id/BSI/AIS31 1 2
pdf_data/report_keywords/standard_id/FIPS
  • FIPS197: 2
  • FIPS197: 3
  • FIPS186-4: 6
  • FIPS 180-4: 7
pdf_data/report_keywords/standard_id/FIPS/FIPS197 2 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • TDES: 6
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • Triple-DES: 3
      • TDES: 2
      • TDEA: 1
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 5 14
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • TDES: 6
  • Triple-DES: 3
  • TDES: 2
  • TDEA: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES 6 2
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 9
    • Infineon Technologies AG: 17
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 1
  • Infineon:
    • Infineon: 25
    • Infineon Technologies AG: 7
pdf_data/report_keywords/vendor/Infineon/Infineon 9 25
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 17 7
pdf_data/report_metadata//CreationDate D:20211021074728+02'00' D:20220512163250+02'00'
pdf_data/report_metadata//Keywords Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware including the Flash Loader enhanced by the Mutual Authentication Extension, Infineon Technologies AG "Common Criteria, Certification, Zertifizierung, Smartcard, PP-0084, Security IC, Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20211021080237+02'00' D:20220512164606+02'00'
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0891-V5-2021 Certification Report BSI-DSZ-CC-1110-V5-2022
pdf_data/report_metadata/pdf_file_size_bytes 654246 909217
pdf_data/report_metadata/pdf_number_of_pages 28 38
pdf_data/st_filename 0891V5b_pdf.pdf 1110V5b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-2048: 1
  • ECC:
    • ECC:
      • ECC: 6
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
  • ECC:
    • ECDH:
      • ECDH: 14
    • ECDSA:
      • ECDSA: 33
    • ECC:
      • ECC: 21
  • FF:
    • DH:
      • Diffie-Hellman: 14
    • DSA:
      • DSA: 2
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECC:
    • ECC: 6
  • ECDH:
    • ECDH: 14
  • ECDSA:
    • ECDSA: 33
  • ECC:
    • ECC: 21
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 6 21
pdf_data/st_keywords/asymmetric_crypto/RSA
  • RSA-2048: 1
  • RSA2048: 1
  • RSA4096: 1
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0891-V4-: 1
pdf_data/st_keywords/cc_claims/O/O.AES 6 8
pdf_data/st_keywords/cc_claims/O/O.RND 3 4
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 4
  • BSI-CC-PP-0084-2014: 3
  • BSI-CC-PP-0084-: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084-2014 4 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_SPM: 2
  • ADV_ARC.1: 1
  • ADV_FSP.5: 3
  • ADV_IMP.2: 2
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 6
  • ADV_IMP: 1
  • ADV_IMP.1: 2
  • ADV_FSP: 1
  • ADV_FSP.4: 4
  • ADV_SPM.1: 10
  • ADV_ARC.1: 1
  • ADV_FSP.5: 3
  • ADV_IMP.2: 2
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_IMP: 1
  • ADV_IMP.1: 2
  • ADV_FSP: 1
  • ADV_FSP.4: 4
  • ADV_SPM: 1
  • ADV_CMC.5: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 6 10
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 11
  • ALC_DVS.2: 3
  • ALC_CMC.5: 3
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS: 2
  • ALC_CMS.4: 2
  • ALC_CMC: 1
  • ALC_CMC.4: 3
  • ALC_DVS: 2
  • ALC_DVS.2: 3
  • ALC_FLR.1: 10
  • ALC_CMC.5: 2
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS: 2
  • ALC_CMS.4: 3
  • ALC_CMC: 1
  • ALC_CMC.4: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 3 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.5 3 2
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 2 3
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.1 11 10
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL 2 7
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD 2 4
pdf_data/st_keywords/cc_sar/ASE/ASE_INT 2 22
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ 2 13
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ 2 64
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD 2 8
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS 2 26
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 4
  • AVA_VAN.5: 4
  • AVA_VAN: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 7
  • EAL6+: 5
  • EAL4+: 1
  • EAL 6: 1
  • EAL6 augmented: 4
  • EAL 6 augmented: 1
  • EAL6: 169
  • EAL6+: 165
  • EAL 6: 1
  • EAL6 augmented: 165
  • EAL 6 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL6 7 169
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented 4 165
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ 5 165
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 10
    • FAU_SAS: 4
    • FAU_GEN: 1
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 13
    • FCS_RNG: 7
    • FCS_COP: 16
    • FCS_CKM: 18
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_COP.1: 8
    • FCS_CKM.4: 10
    • FCS_CKM.1: 10
  • FDP:
    • FDP_SDC: 2
    • FDP_SDC.1: 9
    • FDP_SDI.2: 11
    • FDP_ITT.1: 18
    • FDP_IFC.1: 16
    • FDP_ACC.1: 27
    • FDP_ACF.1: 25
    • FDP_SDI.1: 15
    • FDP_ACF: 17
    • FDP_ACC: 17
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SDC.1.1: 1
  • FIA:
    • FIA_API: 2
    • FIA_API.1: 11
    • FIA_API.1.1: 1
  • FMT:
    • FMT_LIM: 27
    • FMT_LIM.1: 9
    • FMT_LIM.2: 8
    • FMT_MSA.1: 18
    • FMT_MSA.3: 24
    • FMT_SMF.1: 15
    • FMT_SMR.1: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
  • FPT:
    • FPT_TST.2: 33
    • FPT_TST: 5
    • FPT_TST.1: 11
    • FPT_TST.2.1: 2
    • FPT_FLS.1: 18
    • FPT_PHP.3: 24
    • FPT_ITT.1: 14
    • FPT_LIM.1: 2
    • FPT_LIM: 2
    • FPT_ITT: 3
  • FRU:
    • FRU_FLT.2: 6
  • FAU:
    • FAU_SAS.1: 11
    • FAU_SAS: 3
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_RNG: 38
    • FCS_CKM: 228
    • FCS_COP: 295
    • FCS_COP.1: 54
    • FCS_CKM.4: 50
    • FCS_CKM.1: 54
    • FCS_CKM.2: 8
  • FDP:
    • FDP_SDI.2: 26
    • FDP_SDC.1: 12
    • FDP_SDC: 1
    • FDP_ACC.1: 29
    • FDP_ACC: 15
    • FDP_ACF.1: 26
    • FDP_ACF: 15
    • FDP_IFC.1: 19
    • FDP_ITT.1: 21
    • FDP_UCT.1: 12
    • FDP_UIT.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 39
    • FDP_ITC.2: 39
    • FDP_SDI.1: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SDC.1.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
  • FIA:
    • FIA_API.1: 14
    • FIA_API: 3
    • FIA_API.1.1: 1
  • FMT:
    • FMT_LIM: 35
    • FMT_LIM.1: 9
    • FMT_LIM.2: 8
    • FMT_MSA.1: 18
    • FMT_MSA.3: 22
    • FMT_SMF.1: 16
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 4
  • FPT:
    • FPT_TST.2: 31
    • FPT_TST: 5
    • FPT_FLS.1: 35
    • FPT_TST.1: 11
    • FPT_ITT.1: 22
    • FPT_PHP.3: 34
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 3
    • FTP_ACF: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 10
  • FAU_SAS: 4
  • FAU_GEN: 1
  • FAU_SAS.1.1: 1
  • FAU_SAS.1: 11
  • FAU_SAS: 3
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS 4 3
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 10 11
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 13
  • FCS_RNG: 7
  • FCS_COP: 16
  • FCS_CKM: 18
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_COP.1: 8
  • FCS_CKM.4: 10
  • FCS_CKM.1: 10
  • FCS_RNG.1: 15
  • FCS_RNG: 38
  • FCS_CKM: 228
  • FCS_COP: 295
  • FCS_COP.1: 54
  • FCS_CKM.4: 50
  • FCS_CKM.1: 54
  • FCS_CKM.2: 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 18 228
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 10 54
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 10 50
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 16 295
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 8 54
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 7 38
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 13 15
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC: 2
  • FDP_SDC.1: 9
  • FDP_SDI.2: 11
  • FDP_ITT.1: 18
  • FDP_IFC.1: 16
  • FDP_ACC.1: 27
  • FDP_ACF.1: 25
  • FDP_SDI.1: 15
  • FDP_ACF: 17
  • FDP_ACC: 17
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 10
  • FDP_ITC.2: 10
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_SDC.1.1: 1
  • FDP_SDI.2: 26
  • FDP_SDC.1: 12
  • FDP_SDC: 1
  • FDP_ACC.1: 29
  • FDP_ACC: 15
  • FDP_ACF.1: 26
  • FDP_ACF: 15
  • FDP_IFC.1: 19
  • FDP_ITT.1: 21
  • FDP_UCT.1: 12
  • FDP_UIT.1: 12
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 39
  • FDP_ITC.2: 39
  • FDP_SDI.1: 1
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_SDC.1.1: 1
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 17 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 27 29
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 17 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 25 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 16 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 39
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 10 39
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 18 21
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC.1 9 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 15 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 11 26
pdf_data/st_keywords/cc_sfr/FIA/FIA_API 2 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 11 14
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 27
  • FMT_LIM.1: 9
  • FMT_LIM.2: 8
  • FMT_MSA.1: 18
  • FMT_MSA.3: 24
  • FMT_SMF.1: 15
  • FMT_SMR.1: 5
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_LIM: 35
  • FMT_LIM.1: 9
  • FMT_LIM.2: 8
  • FMT_MSA.1: 18
  • FMT_MSA.3: 22
  • FMT_SMF.1: 16
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 27 35
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 24 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 15 16
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 5 6
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST.2: 33
  • FPT_TST: 5
  • FPT_TST.1: 11
  • FPT_TST.2.1: 2
  • FPT_FLS.1: 18
  • FPT_PHP.3: 24
  • FPT_ITT.1: 14
  • FPT_LIM.1: 2
  • FPT_LIM: 2
  • FPT_ITT: 3
  • FPT_TST.2: 31
  • FPT_TST: 5
  • FPT_FLS.1: 35
  • FPT_TST.1: 11
  • FPT_ITT.1: 22
  • FPT_PHP.3: 34
  • FPT_TST.2.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 18 35
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 14 22
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 24 34
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 33 31
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 2 1
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 6 8
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 3
  • SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use- case and the authentication functionality is no longer available. Depending on: 1
  • related to the TOE authentication is regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The following: 1
  • SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The PP [12: 1
  • out of scope: 2
  • certification. The user operating system and further applications implemented on the TOE are also out of scope of this certification. To summarize, if used with the PCD software the certification view equals to: 1
  • is enabled to communicate via the selected interfaces. The surrounding environment is in both cases out of scope. The CIPURSE™ CL is delivered as object code and in this way integrated in the user software. The: 1
pdf_data/st_keywords/certification_process/OutOfScope/out of scope 3 2
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 5
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 17
  • CBC:
    • CBC: 14
  • CTR:
    • CTR: 8
  • CFB:
    • CFB: 9
pdf_data/st_keywords/cipher_mode/CBC/CBC 4 14
pdf_data/st_keywords/cipher_mode/ECB/ECB 5 17
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • KA:
    • Key agreement: 3
    • Key Agreement: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 31
      • SHA1: 11
    • SHA2:
      • SHA-256: 29
      • SHA256: 10
      • SHA-2: 1
  • MD:
    • MD5:
      • MD5: 40
pdf_data/st_keywords/randomness/PRNG/PRNG 6 1
pdf_data/st_keywords/randomness/RNG/RND 4 5
pdf_data/st_keywords/randomness/RNG/RNG 8 25
pdf_data/st_keywords/randomness/TRNG/TRNG 11 3
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 3
    • DPA: 2
    • SPA: 1
  • FI:
    • Malfunction: 7
    • DFA: 3
    • fault induction: 1
  • SCA:
    • Leak-Inherent: 12
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 19
    • DPA: 2
    • SPA: 1
  • FI:
    • Malfunction: 13
    • malfunction: 1
    • DFA: 3
    • fault induction: 1
    • fault injection: 5
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 7
  • DFA: 3
  • fault induction: 1
  • Malfunction: 13
  • malfunction: 1
  • DFA: 3
  • fault induction: 1
  • fault injection: 5
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 7 13
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 10 12
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 3 19
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 197: 2
    • FIPS PUB 197: 2
  • NIST:
    • SP 800-67: 3
    • SP 800-38A: 5
  • BSI:
    • AIS31: 8
  • ISO:
    • ISO/IEC 18092: 4
    • ISO/IEC 18033: 2
    • ISO/IEC 9798-2: 1
    • ISO/IEC14443-3: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 180-4: 2
    • FIPS 197: 2
  • NIST:
    • SP 800-38A: 16
    • SP 800-67: 4
    • SP 800-38B: 4
    • SP 800-22: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS #1: 2
  • BSI:
    • AIS32: 10
    • AIS31: 24
    • AIS 31: 1
  • RFC:
    • RFC 5639: 2
  • ISO:
    • ISO/IEC 14443-4: 4
    • ISO/IEC 18092: 2
    • ISO/IEC 18033-3: 8
    • ISO/IEC 9797-1: 7
    • ISO/IEC 9798-2: 2
    • ISO/IEC 14888-3: 1
    • ISO/IEC 11770-3: 1
    • ISO/IEC 18033: 2
    • ISO/IEC14443-3: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 8
  • AIS32: 10
  • AIS31: 24
  • AIS 31: 1
pdf_data/st_keywords/standard_id/BSI/AIS31 8 24
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 1 2
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 1 2
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-003 1 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 197: 2
  • FIPS PUB 197: 2
  • FIPS PUB 197: 2
  • FIPS PUB 180-4: 2
  • FIPS 197: 2
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 18092: 4
  • ISO/IEC 18033: 2
  • ISO/IEC 9798-2: 1
  • ISO/IEC14443-3: 1
  • ISO/IEC 14443-4: 4
  • ISO/IEC 18092: 2
  • ISO/IEC 18033-3: 8
  • ISO/IEC 9797-1: 7
  • ISO/IEC 9798-2: 2
  • ISO/IEC 14888-3: 1
  • ISO/IEC 11770-3: 1
  • ISO/IEC 18033: 2
  • ISO/IEC14443-3: 1
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 18092 4 2
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 9798-2 1 2
pdf_data/st_keywords/standard_id/NIST
  • SP 800-67: 3
  • SP 800-38A: 5
  • SP 800-38A: 16
  • SP 800-67: 4
  • SP 800-38B: 4
  • SP 800-22: 1
pdf_data/st_keywords/standard_id/NIST/SP 800-38A 5 16
pdf_data/st_keywords/standard_id/NIST/SP 800-67 3 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 34
  • DES:
    • DES:
      • DES: 14
    • 3DES:
      • Triple-DES: 3
      • TDES: 20
  • AES_competition:
    • AES:
      • AES: 97
      • AES-128: 4
  • DES:
    • DES:
      • DES: 32
    • 3DES:
      • TDES: 67
      • 3DES: 7
      • TDEA: 3
      • TripleDES: 2
      • Triple-DES: 3
  • constructions:
    • MAC:
      • CMAC: 42
      • CBC-MAC: 6
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES: 34
  • AES: 97
  • AES-128: 4
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 34 97
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 3
  • TDES: 20
  • TDES: 67
  • 3DES: 7
  • TDEA: 3
  • TripleDES: 2
  • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 20 67
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 14 32
pdf_data/st_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI TR-02102: 1
  • BSI TR-03111: 1
pdf_data/st_keywords/vendor/Infineon/Infineon 13 20
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 5 23
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 25 19
pdf_data/st_metadata
  • pdf_file_size_bytes: 716166
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 81
  • /Creator: Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx
  • /Producer: Nuance PDF Create 8
  • /CreationDate: D:20211008132017+02'00'
  • /ModDate: D:20211008132017+02'00'
  • /Author: Infineon Technologies AG
  • /Title: Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx
  • /Keywords: 32-bit security controller
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 2525769
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 164
  • /Title: Security Target IFX_CCI_3h with Options
  • /Author: Jürgen Noller
  • /Subject: Common Criteria
  • /Keywords: contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high resistance, Infineon, RSA, Elliptic Curve, asymmetric libraries, CCv3.1, PP0084, ACLB, 65nm
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20220328142816+02'00'
  • /ModDate: D:20220328142816+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks: mailto:Crypto@2304T%20User%20Manual%20(CUM), http://www.infineon.com/, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bund.bsi.de/, http://www.ietf.org/rfc/rfc5639.txt, http://www.bsi.bund.de/, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.osptalliance.org/resources/documentation
pdf_data/st_metadata//Author Infineon Technologies AG Jürgen Noller
pdf_data/st_metadata//CreationDate D:20211008132017+02'00' D:20220328142816+02'00'
pdf_data/st_metadata//Creator Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx Microsoft® Word 2016
pdf_data/st_metadata//Keywords 32-bit security controller contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high resistance, Infineon, RSA, Elliptic Curve, asymmetric libraries, CCv3.1, PP0084, ACLB, 65nm
pdf_data/st_metadata//ModDate D:20211008132017+02'00' D:20220328142816+02'00'
pdf_data/st_metadata//Producer Nuance PDF Create 8 Microsoft® Word 2016
pdf_data/st_metadata//Title Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx Security Target IFX_CCI_3h with Options
pdf_data/st_metadata/pdf_file_size_bytes 716166 2525769
pdf_data/st_metadata/pdf_hyperlinks mailto:Crypto@2304T%20User%20Manual%20(CUM), http://www.infineon.com/, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bund.bsi.de/, http://www.ietf.org/rfc/rfc5639.txt, http://www.bsi.bund.de/, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.osptalliance.org/resources/documentation
pdf_data/st_metadata/pdf_number_of_pages 81 164
dgst 2a7e09a6e7e58f1f 158dba651191a5b8