name |
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
|
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2021-10-11
|
2018-01-09
|
not_valid_after |
2026-10-11
|
2023-01-09
|
scheme |
DE
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V5b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V3b_pdf.pdf
|
status |
active
|
archived
|
manufacturer |
Infineon Technologies AG
|
Infineon Technologies AG
|
manufacturer_web |
https://www.infineon.com/
|
https://www.infineon.com/
|
security_level |
ALC_FLR.1, EAL6+ |
ALC_FLR.1, EAL6+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V5a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V3a_pdf.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V5c_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V3c_pdf.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
750263fe1f57f5fe48dabfd93f2888723598a932b5c77960f7abc46c05e9a4f7
|
cd66781c4d44ea2a4d3f6fca52aef16ece35cb54767c70345a50f9c68013d867
|
state/cert/txt_hash |
793aa2c61a5bbf9512d8dfdf06644881844476792bdff5b1bccb91326b408c88
|
dd54426ff556b258b465f975bb85c17e3f370a920c4e2b32aa12a35272a3a739
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
62abed43514bce88f12a5be8aaa32d579209d0280775362b43a7f4eeb14eb9df
|
42983c139a1af287ae12ec22c97b38d622debd2852ebc1f5b4a1f118fe841897
|
state/report/txt_hash |
0e42ca190ff1e00f2f14c9e95cf61fc10b73b17b90b04a8f0bedc9b246a84c86
|
56fdbc1fc408a542bedb7b2712c321f2019bce45be1b4a956a0c65b4c5ac335c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
78059809e6cc058cb3296da89dc3f603a5221c2a767417fc911a94d95c018754
|
43b17d568d60978864986b51b229d92415e316e33925a5bd558f93f18c04e62a
|
state/st/txt_hash |
7ac9a5964148429b62d567f50adf468d6f9f62ea3409acc125c8b15dc7e2878e
|
d827bb01d4c18f7ad012c6a76663f85f516aa1b5a1ac63088389cc6527797512
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-0891-V5-2021
|
BSI-DSZ-CC-0891-V3-2018
|
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_CMC.5, ALC_DVS.2, ATE_FUN.2, ALC_FLR.1, ATE_DPT.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ALC_CMS.5, ATE_COV.3, AGD_OPE.1, ALC_TAT.3, ADV_INT.3, ASE_OBJ.2, ADV_FSP.5, ALC_DEL.1, ATE_IND.2, ADV_IMP.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ADV_SPM.1, AVA_VAN.5, ASE_ECD.1, ADV_TDS.5, ASE_SPD.1 |
ALC_CMC.5, ALC_DVS.2, ATE_FUN.2, ALC_FLR.1, ATE_DPT.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ALC_CMS.5, ATE_COV.3, AGD_OPE.1, ALC_TAT.3, ADV_INT.3, ASE_OBJ.2, ADV_FSP.5, ALC_DEL.1, ATE_IND.2, ADV_IMP.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ADV_SPM.1, AVA_VAN.5, ASE_ECD.1, ADV_TDS.5, ASE_SPD.1 |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
2017-17-INF-3169, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-0869-V2-2019, JISEC-CC-CRP-C0649-01-2019, BSI-DSZ-CC-1055-2018, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1034-2019, 2017-19-INF-3171, 2017-18-INF-3170, JISEC-CC-CRP-C0648-01-2019, ANSSI-CC-2019/09 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0891-V4-2019 |
BSI-DSZ-CC-0891-V2-2016 |
heuristics/report_references/indirectly_referenced_by |
None
|
2017-17-INF-3169, BSI-DSZ-CC-0869-V2-2019, ANSSI-CC-2020/42, BSI-DSZ-CC-1148-V2-2023, 2021-43-INF-4154, NSCIB-CC-146301-CR2, JISEC-CC-CRP-C0648-01-2019, BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-1147-V2-2023, ANSSI-CC-2020/43, ANSSI-CC-2019/09, 2021-44-INF-4142, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-1147-V3-2023, ANSSI-CC-2020/44, ANSSI-CC-2020/33, BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-1112-V2-2021, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, BSI-DSZ-CC-0891-V7-2024, 2017-18-INF-3170, BSI-DSZ-CC-1117-2019, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1055-2018, BSI-DSZ-CC-1034-2019, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-1147-2020, ANSSI-CC-2020/45, BSI-DSZ-CC-1112-2020, NSCIB-CC-0112113-CR, JISEC-CC-CRP-C0649-01-2019, ANSSI-CC-2020/49, 2018-20-INF-4155, BSI-DSZ-CC-1211-2023, 2017-19-INF-3171, BSI-DSZ-CC-0891-V5-2021 |
heuristics/scheme_data |
None
|
None
|
heuristics/st_references/directly_referenced_by |
None
|
2017-17-INF-3169, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-0869-V2-2019, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1034-2019, 2017-19-INF-3171, 2017-18-INF-3170, ANSSI-CC-2019/09 |
heuristics/st_references/directly_referencing |
None
|
BSI-DSZ-CC-0891-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
None
|
2017-17-INF-3169, BSI-DSZ-CC-0869-V2-2019, ANSSI-CC-2020/42, NSCIB-CC-146301-CR2, ANSSI-CC-2020/43, ANSSI-CC-2019/09, BSI-DSZ-CC-0891-V4-2019, ANSSI-CC-2020/44, BSI-DSZ-CC-1112-V2-2021, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, 2017-18-INF-3170, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1034-2019, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2020/45, BSI-DSZ-CC-1112-2020, NSCIB-CC-0112113-CR, ANSSI-CC-2020/49, BSI-DSZ-CC-1105-2020, 2017-19-INF-3171 |
heuristics/st_references/indirectly_referencing |
None
|
BSI-DSZ-CC-0891-V2-2016 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
0891V5c_pdf.pdf
|
0891V3c_pdf.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0891-V5-2021:
1
|
- BSI-DSZ-CC-0891-V3-2018:
1
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
- EAL 6:
1
- EAL5: 1
- EAL 2:
1
- EAL 6 augmented:
1
|
- EAL 6:
1
- EAL 5: 1
- EAL 2:
1
- EAL 6 augmented:
1
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL 2 |
1
|
1
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL 6 |
1
|
1
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL 6 augmented |
1
|
1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
- Infineon:
- Infineon:
1
- Infineon Technologies AG:
1
|
- Infineon:
- Infineon:
1
- Infineon Technologies AG:
1
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/cert_metadata//CreationDate |
D:20211021080400+02'00'
|
D:20180129152008+01'00'
|
pdf_data/cert_metadata//Creator |
Writer
|
Writer
|
pdf_data/cert_metadata//Keywords |
Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware including the Flash Loader enhanced by the Mutual Authentication Extension, Infineon Technologies AG
|
"Common Criteria, Certification, Zertifizierung, SmartCard, Protection Profile, Infineon, Security IC"
|
pdf_data/cert_metadata//ModDate |
D:20211021080739+02'00'
|
D:20180129154227+01'00'
|
pdf_data/cert_metadata//Producer |
LibreOffice 6.3
|
LibreOffice 5.2
|
pdf_data/cert_metadata//Subject |
Common Criteria Certification
|
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software from Infineon Technologies AG
|
pdf_data/cert_metadata//Title |
Certificate BSI-DSZ-CC-0891-V5-2021
|
Certificate BSI-DSZ-CC-0891-V3-2018
|
pdf_data/cert_metadata/pdf_file_size_bytes |
254179
|
443569
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
1
|
1
|
pdf_data/report_filename |
0891V5a_pdf.pdf
|
0891V3a_pdf.pdf
|
pdf_data/report_frontpage/DE/cc_security_level |
Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
|
Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
|
pdf_data/report_frontpage/DE/cc_version |
PP conformant plus product specific extensions Common Criteria Part 2 extended
|
PP conformant plus product specific extensions Common Criteria Part 2 extended
|
pdf_data/report_frontpage/DE/cert_id |
BSI-DSZ-CC-0891-V5-2021
|
BSI-DSZ-CC-0891-V3-2018
|
pdf_data/report_frontpage/DE/cert_item |
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE
|
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software
|
pdf_data/report_frontpage/DE/cert_lab |
BSI
|
BSI
|
pdf_data/report_frontpage/DE/developer |
Infineon Technologies AG
|
Infineon Technologies AG
|
pdf_data/report_frontpage/DE/match_rules |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
pdf_data/report_frontpage/DE/ref_protection_profiles |
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC |
1
|
5
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0891-V5-2021:
20
- BSI-DSZ-CC-0891-V4-2019:
3
|
- BSI-DSZ-CC-0891-V3-2018:
21
- BSI-DSZ-CC-0891-V2-2016:
3
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-2014:
3
- BSI-CC-PP-0084-:
1
|
- BSI:
- BSI-CC-PP-0084-2014:
3
- BSI-CC-PP-0084-:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
3
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 |
4
|
5
|
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 6:
4
- EAL5: 1
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
- EAL 5:
3
- EAL 5+:
1
- EAL6:
2
- EAL6+:
2
- EAL 6 augmented:
2
- EAL6 augmented:
2
|
- EAL 6:
5
- EAL 5:
4
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
- EAL6:
3
- EAL6+:
3
- EAL 5+:
1
- EAL 6 augmented:
3
- EAL6 augmented:
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 2+ |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5+ |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 |
4
|
5
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 augmented |
2
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6 |
2
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6 augmented |
2
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6+ |
2
|
3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Common Criteria EAL6 augmented / EAL6+ M7892 Design Steps D11 and G12”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for certification BSI-DSZ-CC-0891-V5-2021, Version 4, 2021-10-08: 1
- Technical Report Summary (ETR Summary)”, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] 16-bit Security Controller Family SLE 70 Programmer’s Reference Manual, v9.14, 2019-12-03: 1
|
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Common Criteria EAL6 augmented / EAL6+ M7892 Design Steps D11 and G12”, Infineon Technologies AG (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
- Version 1, 2017-11-29, “Evaluation Technical Report (ETR Summary)”, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- “Evaluation Technical Report for Conmposite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, “Configuration Management Scope for Common Criteria with: 1
- Library RSA - EC - SHA-2 – Toolbox – SCL”, Version 2.0, 2017-10-30, Infineon Technologies AG (confidential document) [12] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG [13] M7892 SOLID FLASH: 1
|
pdf_data/report_keywords/certification_process/ConfidentialDocument/being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification |
1
|
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
4
|
- TUV:
- TÜV Informationstechnik:
4
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG |
2
|
1
|
pdf_data/report_keywords/randomness/TRNG/TRNG |
1
|
2
|
pdf_data/report_keywords/side_channel_analysis/FI |
|
- physical tampering:
1
- DFA: 3
|
pdf_data/report_keywords/side_channel_analysis/FI/physical tampering |
1
|
1
|
pdf_data/report_keywords/side_channel_analysis/SCA |
|
|
pdf_data/report_keywords/side_channel_analysis/other |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- BSI:
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 31:
2
- AIS 36:
3
- AIS 35:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
1
- AIS 32:
1
- AIS 37:
1
- AIS 38:
1
- AIS31:
1
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
- BSI:
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 31:
2
- AIS 36:
3
- AIS 35:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
1
- AIS 23:
1
- AIS 32:
1
- AIS 37:
1
- AIS 38:
1
- AIS 46:
1
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
pdf_data/report_keywords/standard_id/BSI |
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 31:
2
- AIS 36:
3
- AIS 35:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
1
- AIS 32:
1
- AIS 37:
1
- AIS 38:
1
- AIS31: 1
|
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 31:
2
- AIS 36:
3
- AIS 35:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
1
- AIS 23: 1
- AIS 32:
1
- AIS 37:
1
- AIS 38:
1
- AIS 46: 1
|
pdf_data/report_keywords/standard_id/BSI/AIS 1 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 14 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 19 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 20 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 25 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 26 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 32 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 34 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 35 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 36 |
3
|
3
|
pdf_data/report_keywords/standard_id/BSI/AIS 37 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 38 |
1
|
1
|
pdf_data/report_keywords/standard_id/ISO |
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
pdf_data/report_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES |
2
|
4
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/GD |
- G&D:
1
- Giesecke & Devrient:
1
|
- G&D:
1
- Giesecke & Devrient:
1
|
pdf_data/report_keywords/vendor/Infineon |
- Infineon:
9
- Infineon Technologies AG:
17
|
- Infineon:
11
- Infineon Technologies AG:
20
- Infineon Technologies: 1
|
pdf_data/report_keywords/vendor/Infineon/Infineon |
9
|
11
|
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG |
17
|
20
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20211021074728+02'00'
|
D:20180124115618+01'00'
|
pdf_data/report_metadata//Creator |
Writer
|
Writer
|
pdf_data/report_metadata//Keywords |
Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware including the Flash Loader enhanced by the Mutual Authentication Extension, Infineon Technologies AG
|
"Common Criteria, Certification, Zertifizierung, SmartCard, Protection Profile, Infineon, Security IC"
|
pdf_data/report_metadata//ModDate |
D:20211021080237+02'00'
|
D:20180130074514+01'00'
|
pdf_data/report_metadata//Producer |
LibreOffice 6.3
|
LibreOffice 5.2
|
pdf_data/report_metadata//Subject |
Common Criteria Certification
|
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware and optional software from Infineon Technologies AG
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-0891-V5-2021
|
Certification Report BSI-DSZ-CC-0891-V3-2018
|
pdf_data/report_metadata/pdf_file_size_bytes |
654246
|
887185
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
28
|
33
|
pdf_data/st_filename |
0891V5b_pdf.pdf
|
0891V3b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
- RSA:
- RSA2048:
2
- RSA4096:
2
- RSA-2048:
1
- ECC:
- FF:
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
6
|
25
|
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
- RSA2048: 2
- RSA4096: 2
- RSA-2048:
1
|
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA-2048 |
1
|
1
|
pdf_data/st_keywords/cc_cert_id/DE |
|
- BSI-DSZ-CC-0891-V2-2016:
1
|
pdf_data/st_keywords/cc_claims/O |
- O.RND:
3
- O.TDES:
7
- O.AES:
6
|
- O.RND:
3
- O.TDES:
10
- O.AES:
11
- O.SHA: 5
|
pdf_data/st_keywords/cc_claims/O/O.AES |
6
|
11
|
pdf_data/st_keywords/cc_claims/O/O.RND |
3
|
3
|
pdf_data/st_keywords/cc_claims/O/O.TDES |
7
|
10
|
pdf_data/st_keywords/cc_claims/T |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_SPM:
2
- ADV_ARC.1:
1
- ADV_FSP.5:
3
- ADV_IMP.2:
2
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_SPM.1:
6
- ADV_IMP:
1
- ADV_IMP.1:
2
- ADV_FSP:
1
- ADV_FSP.4:
4
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
11
- ALC_DVS.2:
3
- ALC_CMC.5:
3
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_CMS:
2
- ALC_CMS.4:
2
- ALC_CMC:
1
- ALC_CMC.4:
3
- ATE:
- ATE_COV.3:
4
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- ATE_COV:
1
- ATE_COV.2:
3
- AVA:
- ASE:
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_OBJ:
2
- ASE_ECD:
2
- ASE_REQ:
2
- ASE_TSS:
2
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_SPM:
2
- ADV_ARC.1:
1
- ADV_FSP.5:
3
- ADV_IMP.2:
2
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_SPM.1:
6
- ADV_IMP:
1
- ADV_IMP.1:
2
- ADV_FSP:
1
- ADV_FSP.4:
4
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
11
- ALC_DVS.2:
3
- ALC_CMC.5:
3
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_CMS:
2
- ALC_CMS.4:
2
- ALC_CMC:
1
- ALC_CMC.4:
3
- ATE:
- ATE_COV.3:
4
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- ATE_COV:
1
- ATE_COV.2:
3
- AVA:
- ASE:
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_OBJ:
2
- ASE_ECD:
2
- ASE_REQ:
2
- ASE_TSS:
2
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 6 |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 6 augmented |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4+ |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL6 |
7
|
8
|
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented |
4
|
5
|
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ |
5
|
6
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1:
13
- FCS_RNG:
7
- FCS_COP:
16
- FCS_CKM:
18
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
8
- FCS_CKM.4:
10
- FCS_CKM.1:
10
|
- FCS_RNG.1:
13
- FCS_RNG:
7
- FCS_COP:
78
- FCS_CKM:
66
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
23
- FCS_CKM.4:
31
- FCS_CKM.1:
31
- FCS_CKM.2: 4
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
18
|
66
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
10
|
31
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
10
|
31
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
16
|
78
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
8
|
23
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
17
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
27
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
17
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
25
|
25
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
16
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
10
|
26
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
10
|
26
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 |
15
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API:
2
- FIA_API.1:
11
- FIA_API.1.1:
1
|
- FIA_API:
2
- FIA_API.1:
11
- FIA_API.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM:
27
- FMT_LIM.1:
9
- FMT_LIM.2:
8
- FMT_MSA.1:
18
- FMT_MSA.3:
24
- FMT_SMF.1:
15
- FMT_SMR.1:
5
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
|
- FMT_LIM:
27
- FMT_LIM.1:
9
- FMT_LIM.2:
8
- FMT_MSA.1:
18
- FMT_MSA.3:
24
- FMT_SMF.1:
15
- FMT_SMR.1:
5
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_CKM.4: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
27
|
27
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
24
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
15
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_TST.2:
33
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_TST.2.1:
2
- FPT_FLS.1:
18
- FPT_PHP.3:
24
- FPT_ITT.1:
14
- FPT_LIM.1:
2
- FPT_LIM:
2
- FPT_ITT:
3
|
- FPT_TST.2:
33
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_TST.2.1:
2
- FPT_FLS.1:
18
- FPT_PHP.3:
24
- FPT_ITT.1:
14
- FPT_LIM.1:
2
- FPT_LIM:
2
- FPT_ITT:
3
|
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/certification_process/OutOfScope |
- out of scope:
3
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use- case and the authentication functionality is no longer available. Depending on: 1
- related to the TOE authentication is regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The following:
1
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The PP [12:
1
|
- out of scope:
3
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use- case and the authentication functionality is no longer available. 1 Bundesamt: 1
- related to the TOE authentication is regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The following:
1
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The PP [12:
1
|
pdf_data/st_keywords/certification_process/OutOfScope/SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The PP [12 |
1
|
1
|
pdf_data/st_keywords/certification_process/OutOfScope/out of scope |
3
|
3
|
pdf_data/st_keywords/certification_process/OutOfScope/related to the TOE authentication is regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The following |
1
|
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
4
|
16
|
pdf_data/st_keywords/cipher_mode/ECB/ECB |
5
|
17
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library v2.02.010:
1
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key agreement:
2
- Key Agreement:
2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256:
4
- SHA-512:
3
- SHA-2:
63
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness/PRNG |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
4
|
4
|
pdf_data/st_keywords/randomness/RNG/RNG |
8
|
9
|
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA |
3
|
9
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
7
|
8
|
pdf_data/st_keywords/side_channel_analysis/FI/fault induction |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
2
|
13
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
10
|
10
|
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
7
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/side channel |
3
|
9
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 197:
2
- FIPS PUB 197:
2
- NIST:
- SP 800-67:
3
- SP 800-38A:
5
- BSI:
- ISO:
- ISO/IEC 18092:
4
- ISO/IEC 18033:
2
- ISO/IEC 9798-2:
1
- ISO/IEC14443-3:
1
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- FIPS:
- FIPS PUB 180-4:
2
- FIPS 197:
4
- FIPS PUB 800-38:
1
- FIPS PUB 186-4:
2
- FIPS PUB 197:
2
- NIST:
- SP 800-67:
4
- SP 800-38A:
7
- PKCS:
- BSI:
- RFC:
- ISO:
- ISO/IEC 18092:
4
- ISO/IEC 14888-3:
3
- ISO/IEC 11770-3:
3
- ISO/IEC 10118:
2
- ISO/IEC 18033:
2
- ISO/IEC 9797-1:
2
- ISO/IEC 9798-2:
1
- CC:
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 |
8
|
8
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 |
1
|
2
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 |
1
|
2
|
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-003 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS 197:
2
- FIPS PUB 197:
2
|
- FIPS PUB 180-4: 2
- FIPS 197:
4
- FIPS PUB 800-38: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197:
2
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 |
2
|
4
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
2
|
2
|
pdf_data/st_keywords/standard_id/ISO |
- ISO/IEC 18092:
4
- ISO/IEC 18033:
2
- ISO/IEC 9798-2:
1
- ISO/IEC14443-3: 1
|
- ISO/IEC 18092:
4
- ISO/IEC 14888-3: 3
- ISO/IEC 11770-3: 3
- ISO/IEC 10118: 2
- ISO/IEC 18033:
2
- ISO/IEC 9797-1: 2
- ISO/IEC 9798-2:
1
|
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 18033 |
2
|
2
|
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 18092 |
4
|
4
|
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 9798-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/NIST/SP 800-38A |
5
|
7
|
pdf_data/st_keywords/standard_id/NIST/SP 800-67 |
3
|
4
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
34
|
69
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
20
|
41
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
3
|
4
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
14
|
26
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Infineon/Infineon |
13
|
13
|
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies |
5
|
4
|
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG |
25
|
22
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
716166
- pdf_is_encrypted:
False
- pdf_number_of_pages:
81
- /Creator:
Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx
- /Producer:
Nuance PDF Create 8
- /CreationDate:
D:20211008132017+02'00'
- /ModDate:
D:20211008132017+02'00'
- /Author:
Infineon Technologies AG
- /Title:
Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx
- /Keywords:
32-bit security controller
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1807037
- pdf_is_encrypted:
False
- pdf_number_of_pages:
115
- /Title:
M7892 D11 and G12 Security Target Lite
- /Author:
Dr. Oleg Rudakov
- /Subject: BSI-DSZ-CC-0891-V3 Product Security Certification
- /Keywords:
Infineon, security certification, Smartcard, common criteria, high-security microcontroller
- /Creator:
Microsoft® Word 2010
- /CreationDate:
D:20171215122240+01'00'
- /ModDate:
D:20171215122240+01'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
https://www.bsi.bund.de/, http://www.bsi.bund.de/, http://www.infineon.com/
|
pdf_data/st_metadata//Author |
Infineon Technologies AG
|
Dr. Oleg Rudakov
|
pdf_data/st_metadata//CreationDate |
D:20211008132017+02'00'
|
D:20171215122240+01'00'
|
pdf_data/st_metadata//Creator |
Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx
|
Microsoft® Word 2010
|
pdf_data/st_metadata//Keywords |
32-bit security controller
|
Infineon, security certification, Smartcard, common criteria, high-security microcontroller
|
pdf_data/st_metadata//ModDate |
D:20211008132017+02'00'
|
D:20171215122240+01'00'
|
pdf_data/st_metadata//Producer |
Nuance PDF Create 8
|
Microsoft® Word 2010
|
pdf_data/st_metadata//Title |
Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx
|
M7892 D11 and G12 Security Target Lite
|
pdf_data/st_metadata/pdf_file_size_bytes |
716166
|
1807037
|
pdf_data/st_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/, http://www.bsi.bund.de/, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
81
|
115
|
dgst |
2a7e09a6e7e58f1f
|
3baaf5793775bb55
|