name |
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
|
M7892 Design Step G12, with specific IC dedicated firmware
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2021-10-11
|
2024-07-08
|
not_valid_after |
2026-10-11
|
2029-07-08
|
scheme |
DE
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V5b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V7b_pdf.pdf
|
status |
active
|
active
|
manufacturer |
Infineon Technologies AG
|
Infineon Technologies AG
|
manufacturer_web |
https://www.infineon.com/
|
https://www.infineon.com/
|
security_level |
ALC_FLR.1, EAL6+ |
ALC_FLR.1, EAL6+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V5a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V7a_pdf.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V5c_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V7c_pdf.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
750263fe1f57f5fe48dabfd93f2888723598a932b5c77960f7abc46c05e9a4f7
|
36be98a85fc60d2f12d59acb21b5fb84b62c631a10e3bc36c6072aba14142b09
|
state/cert/txt_hash |
793aa2c61a5bbf9512d8dfdf06644881844476792bdff5b1bccb91326b408c88
|
eb99b8d0f358df37cb4327b65a1cf43b199c87ed4a6c77696eae74c1b0debe33
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
62abed43514bce88f12a5be8aaa32d579209d0280775362b43a7f4eeb14eb9df
|
7fe5b23b14e7f4bc0f21de473582ca428c78dfb88d7c08387120b6ac4074bdf2
|
state/report/txt_hash |
0e42ca190ff1e00f2f14c9e95cf61fc10b73b17b90b04a8f0bedc9b246a84c86
|
233920be552c2ec25b2c140916fc85f6f0f933be6ab1a94179cb6b9698c4ff85
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
78059809e6cc058cb3296da89dc3f603a5221c2a767417fc911a94d95c018754
|
562685132bbb28f394f4f2e28013f1137bc8408a33806cce5203b6442dc8b61b
|
state/st/txt_hash |
7ac9a5964148429b62d567f50adf468d6f9f62ea3409acc125c8b15dc7e2878e
|
f34bb0ec08952e2a3fad084fff5ede39dde0676321ec52a5a85a93f5dd21eb07
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-0891-V5-2021
|
BSI-DSZ-CC-0891-V7-2024
|
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ALC_CMC.5, ALC_DVS.2, ATE_FUN.2, ALC_FLR.1, ATE_DPT.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ALC_CMS.5, ATE_COV.3, AGD_OPE.1, ALC_TAT.3, ADV_INT.3, ASE_OBJ.2, ADV_FSP.5, ALC_DEL.1, ATE_IND.2, ADV_IMP.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ADV_SPM.1, AVA_VAN.5, ASE_ECD.1, ADV_TDS.5, ASE_SPD.1 |
ALC_CMC.5, ALC_DVS.2, ATE_FUN.2, ALC_FLR.1, ATE_DPT.3, ASE_CCL.1, ASE_TSS.1, ALC_LCD.1, ALC_CMS.5, ATE_COV.3, AGD_OPE.1, ALC_TAT.3, ADV_INT.3, ASE_OBJ.2, ADV_FSP.5, ALC_DEL.1, ATE_IND.2, ADV_IMP.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, ADV_SPM.1, AVA_VAN.5, ASE_ECD.1, ADV_TDS.5, ASE_SPD.1 |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0891-V4-2019 |
BSI-DSZ-CC-0891-V6-2021 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/scheme_data |
None
|
- cert_id:
BSI-DSZ-CC-0891-V7-2024
- product:
Infineon Security Controller M7892 Design Step G12, with specific IC dedicated firmware
- vendor:
Infineon Technologies AG
- certification_date:
08.07.2024
- category:
Smart Cards and similar devices
- url:
https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/0891.html
- enhanced:
- product:
Infineon Security Controller M7892 Design Step G12, with specific IC dedicated firmware
- applicant:
Infineon Technologies AG
Am Campeon 1-15
85579 Neubiberg
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL6+,ALC_FLR.1
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- certification_date:
08.07.2024
- expiration_date:
07.07.2029
- entries:
frozendict({'id': 'BSI-DSZ-CC-0891-V7-2024\n(Ausstellungsdatum / Certification Date 08.07.2024, gültig bis / valid until 07.07.2029)', 'description': 'Certificate'}), frozendict({'id': 'BSI', 'description': 'forerunner, there are now crypto-librarys within the focus of the evaluation and a variety of improved Penetration Tests has been conducted, leading to restrictions in the guidance.'}), frozendict({'id': 'BSI-DSZ-CC-0891-V6-2021\n(Ausstellungsdatum / Certification Date 23.11.2021, gültig bis / valid until 22.11.2026)', 'description': 'Guidance'}), frozendict({'id': 'BSI-DSZ-CC-0891-V5-2021\n(Ausstellungsdatum / Certification Date 11.10.2021, gültig bis / valid until 10.10.2026)', 'description': 'forerunner, a variety of improved Penetration Tests has been conducted, leading to restrictions in the guidance.'}), frozendict({'id': 'BSI-DSZ-CC-0891-V4-2019\n(Ausstellungsdatum / Certification Date 19.12.2019, gültig bis / valid until 18.12.2024) \nZertifizierungsreport / Certification Report', 'description': 'forerunner, a variety of improved Penetration Tests has been conducted, leading to restrictions in the guidance.'}), frozendict({'id': 'BSI-DSZ-CC-0891-V3-2018\n(Ausstellungsdatum / Certification Date 09.01.2018, gültig bis / valid until 08.01.2023) \nZertifizierungsreport / Certification Report', 'description': ') in scope of the certificate.'}), frozendict({'id': 'BSI-DSZ-CC-0891-V2-2016\n(Ausstellungsdatum / Certification Date 20.12.2016, gültig bis / valid until 19.12.2021) \nZertifizierungsreport / Certification Report', 'description': 'dedicated software (firmware). The changes, compared to the prior certification, are the introduction of the new D11 configuration item.'}), frozendict({'id': 'BSI-DSZ-CC-0891-2015\n(Ausstellungsdatum / Certification Date 30.06.2015, gültig bis / valid until 29.06.2020) \nZertifizierungsreport / Certification Report', 'description': 'Security Target'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0891V7a_pdf.pdf?__blob=publicationFile&v=2
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0891V7b_pdf.pdf?__blob=publicationFile&v=2
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte08/0891V7c_pdf.pdf?__blob=publicationFile&v=2
- description:
The Target of Evaluation (TOE) is the Infineon Security Controller M7892 G12 with optional RSA2048/4096 v1.02.013 or v2.03.008, EC v1.02.013 or v2.03.008, SHA-2 v1.01 and Toolbox v1.02.013 or v2.03.008 libraries and with specific IC dedicated software (firmware). The TOE provides a real 16-bit CPU-architecture and is compatible to the Intel 80251 architecture. The major components of the core system are the two CPUs (Central Processing Units), the MMU (Memory Management Unit) and MED (Memory Encryption/Decryption Unit). The dual interface controller is able to communicate using either the contact based or the contactless interface. The TOE consists of the hardware part, the firmware part and the software part. The software part is differentiated into: the cryptographic libraries RSA, EC and SHA-2 and the supporting libraries Toolbox and Base. RSA, EC, SHA-2 and Toolbox provide certain functionality to the Smartcard Embedded Software.
- subcategory:
ICs, Cryptolib
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
0891V5c_pdf.pdf
|
0891V7c_pdf.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0891-V5-2021:
1
|
- BSI-DSZ-CC-0891-V7-2024:
1
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
- EAL 6:
1
- EAL5: 1
- EAL 2:
1
- EAL 6 augmented:
1
|
- EAL 6:
1
- EAL 5: 1
- EAL 2:
1
- EAL 6 augmented:
1
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL 2 |
1
|
1
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL 6 |
1
|
1
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL 6 augmented |
1
|
1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor/Infineon |
- Infineon: 1
- Infineon Technologies AG:
1
|
- Infineon Technologies AG:
1
|
pdf_data/cert_keywords/vendor/Infineon/Infineon Technologies AG |
1
|
1
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
254179
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211021080400+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware including the Flash Loader enhanced by the Mutual Authentication Extension, Infineon Technologies AG
- /ModDate: D:20211021080739+02'00'
- /Producer: LibreOffice 6.3
- /Subject:
Common Criteria Certification
- /Title:
Certificate BSI-DSZ-CC-0891-V5-2021
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
231422
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Subject:
Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-0891-V7-2024
- pdf_hyperlinks:
|
pdf_data/cert_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/cert_metadata//Subject |
Common Criteria Certification
|
Common Criteria Certification
|
pdf_data/cert_metadata//Title |
Certificate BSI-DSZ-CC-0891-V5-2021
|
Certification Report BSI-DSZ-CC-0891-V7-2024
|
pdf_data/cert_metadata/pdf_file_size_bytes |
254179
|
231422
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
1
|
1
|
pdf_data/report_filename |
0891V5a_pdf.pdf
|
0891V7a_pdf.pdf
|
pdf_data/report_frontpage/DE/cc_security_level |
Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
|
Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 7 July 2029 SOGIS Recognition Agreement
|
pdf_data/report_frontpage/DE/cc_version |
PP conformant plus product specific extensions Common Criteria Part 2 extended
|
PP conformant plus product specific extensions Common Criteria Part 2 extended
|
pdf_data/report_frontpage/DE/cert_id |
BSI-DSZ-CC-0891-V5-2021
|
BSI-DSZ-CC-0891-V7-2024
|
pdf_data/report_frontpage/DE/cert_item |
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE
|
M7892 Design Step G12, with specific IC dedicated firmware
|
pdf_data/report_frontpage/DE/cert_lab |
BSI
|
BSI
|
pdf_data/report_frontpage/DE/developer |
Infineon Technologies AG
|
Infineon Technologies AG
|
pdf_data/report_frontpage/DE/match_rules |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
pdf_data/report_frontpage/DE/ref_protection_profiles |
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0891-V5-2021:
20
- BSI-DSZ-CC-0891-V4-2019:
3
|
- BSI-DSZ-CC-0891-V7-2024:
17
- BSI-DSZ-CC-0891-:
1
- BSI-DSZ-CC-0891-V6-2021:
2
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0084-2014:
3
- BSI-CC-PP-0084-: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084-2014 |
3
|
4
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
3
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 |
4
|
5
|
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 6:
4
- EAL5: 1
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+: 1
- EAL 5:
3
- EAL 5+:
1
- EAL6:
2
- EAL6+:
2
- EAL 6 augmented:
2
- EAL6 augmented:
2
|
- EAL 6:
5
- EAL 5:
4
- EAL 2:
3
- EAL 1:
1
- EAL 4:
1
- EAL6:
2
- EAL6+:
2
- EAL 5+:
1
- EAL 6 augmented:
3
- EAL6 augmented:
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 |
2
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
3
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5+ |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 |
4
|
5
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 augmented |
2
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6 augmented |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6+ |
2
|
2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Common Criteria EAL6 augmented / EAL6+ M7892 Design Steps D11 and G12”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for certification BSI-DSZ-CC-0891-V5-2021, Version 4, 2021-10-08: 1
- Technical Report Summary (ETR Summary)”, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] 16-bit Security Controller Family SLE 70 Programmer’s Reference Manual, v9.14, 2019-12-03: 1
|
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Target Common Criteria EAL6 augmented / EAL6+ M7892 Design Step G12”, Infineon Technologies (confidential document) [7] Evaluation Technical Report for certification BSI-DSZ-CC-0891-V7-2024, Version 2, 2024-06-21: 1
- TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- Certification Report COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) [11] M7892 SOLID FLASH Controller for Security Applications Hardware Reference Manual, Version 3.0: 1
- Technologies AG, Regensburg, Germany”, Version 3, 2024-05-17, TÜV Informationstechnik GmbH (confidential document) [18] “SITE TECHNICAL AUDIT REPORT (STAR) DHL Supply Chain Singapore Pte Ltd., Advanced Regional: 1
- Version 3, 2024-05-17, TÜV Informationstechnik GmbH (confidential document) [19] “SITE TECHNICAL AUDIT REPORT (STAR) Amkor Technology Philippines”, Version 3, 2024-05-28, TÜV: 1
- GmbH (confidential document) [20] “SITE TECHNICAL AUDIT REPORT (STAR) PacTech - Packaging Technologies GmbH”, Version 2: 1
- TÜV Informationstechnik GmbH (confidential document) 23 / 26 Certification Report BSI-DSZ-CC-0891-V7-2024 C. Excerpts from the Criteria For the: 1
|
pdf_data/report_keywords/certification_process/ConfidentialDocument/being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification |
1
|
1
|
pdf_data/report_keywords/cipher_mode/CBC/CBC |
4
|
2
|
pdf_data/report_keywords/cipher_mode/ECB/ECB |
4
|
2
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik |
4
|
6
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness/RNG |
|
|
pdf_data/report_keywords/randomness/TRNG/TRNG |
1
|
3
|
pdf_data/report_keywords/side_channel_analysis/FI |
|
- physical tampering:
1
- DFA: 1
|
pdf_data/report_keywords/side_channel_analysis/FI/physical tampering |
1
|
1
|
pdf_data/report_keywords/side_channel_analysis/SCA |
|
- physical probing:
1
- DPA: 1
- SPA: 1
|
pdf_data/report_keywords/side_channel_analysis/SCA/physical probing |
1
|
1
|
pdf_data/report_keywords/side_channel_analysis/other |
|
|
pdf_data/report_keywords/standard_id/BSI |
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 31:
2
- AIS 36:
3
- AIS 35:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
1
- AIS 32: 1
- AIS 37: 1
- AIS 38:
1
- AIS31:
1
|
- AIS31:
3
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 31:
4
- AIS 36:
3
- AIS 35:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
1
- AIS 23: 1
- AIS 38:
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 1 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 14 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 19 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 20 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 25 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 26 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 |
2
|
4
|
pdf_data/report_keywords/standard_id/BSI/AIS 34 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 35 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 36 |
3
|
3
|
pdf_data/report_keywords/standard_id/BSI/AIS 38 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS31 |
1
|
3
|
pdf_data/report_keywords/standard_id/FIPS |
|
|
pdf_data/report_keywords/standard_id/ISO |
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
5
|
6
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES |
6
|
5
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES |
2
|
3
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon:
9
- Infineon Technologies AG:
17
- GD:
- G&D:
1
- Giesecke & Devrient:
1
|
- Infineon:
- Infineon Technologies AG:
8
- Infineon:
1
- Infineon Technologies:
7
|
pdf_data/report_keywords/vendor/Infineon |
- Infineon:
9
- Infineon Technologies AG:
17
|
- Infineon Technologies AG:
8
- Infineon:
1
- Infineon Technologies: 7
|
pdf_data/report_keywords/vendor/Infineon/Infineon |
9
|
1
|
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG |
17
|
8
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
654246
- pdf_is_encrypted:
False
- pdf_number_of_pages:
28
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211021074728+02'00'
- /Creator: Writer
- /Keywords:
Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware including the Flash Loader enhanced by the Mutual Authentication Extension, Infineon Technologies AG
- /ModDate: D:20211021080237+02'00'
- /Producer: LibreOffice 6.3
- /Subject:
Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-0891-V5-2021
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
- pdf_file_size_bytes:
533141
- pdf_is_encrypted:
False
- pdf_number_of_pages:
26
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /Keywords:
"Common Criteria, Certification, Zertifizierung"
- /Subject:
Common Criteria, Certification, Zertifizierung
- /Title:
Certification Report BSI-DSZ-CC-0891-V7-2024
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//Keywords |
Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware including the Flash Loader enhanced by the Mutual Authentication Extension, Infineon Technologies AG
|
"Common Criteria, Certification, Zertifizierung"
|
pdf_data/report_metadata//Subject |
Common Criteria Certification
|
Common Criteria, Certification, Zertifizierung
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-0891-V5-2021
|
Certification Report BSI-DSZ-CC-0891-V7-2024
|
pdf_data/report_metadata/pdf_file_size_bytes |
654246
|
533141
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
28
|
26
|
pdf_data/st_filename |
0891V5b_pdf.pdf
|
0891V7b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.RND:
3
- O.TDES:
7
- O.AES:
6
- T:
|
- O:
- O.RND:
3
- O.TDES:
7
- O.AES:
6
- T:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_SPM:
2
- ADV_ARC.1:
1
- ADV_FSP.5:
3
- ADV_IMP.2:
2
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_SPM.1:
6
- ADV_IMP:
1
- ADV_IMP.1:
2
- ADV_FSP:
1
- ADV_FSP.4:
4
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
11
- ALC_DVS.2:
3
- ALC_CMC.5:
3
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_CMS:
2
- ALC_CMS.4:
2
- ALC_CMC:
1
- ALC_CMC.4:
3
- ATE:
- ATE_COV.3:
4
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- ATE_COV:
1
- ATE_COV.2:
3
- AVA:
- ASE:
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_OBJ:
2
- ASE_ECD:
2
- ASE_REQ:
2
- ASE_TSS:
2
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_SPM:
2
- ADV_ARC.1:
1
- ADV_FSP.5:
3
- ADV_IMP.2:
2
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_SPM.1:
6
- ADV_IMP:
1
- ADV_IMP.1:
2
- ADV_FSP:
1
- ADV_FSP.4:
4
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
11
- ALC_DVS.2:
3
- ALC_CMC.5:
3
- ALC_CMS.5:
3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_CMS:
2
- ALC_CMS.4:
2
- ALC_CMC:
1
- ALC_CMC.4:
3
- ATE:
- ATE_COV.3:
4
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- ATE_COV:
1
- ATE_COV.2:
3
- AVA:
- ASE:
- ASE_INT:
2
- ASE_CCL:
2
- ASE_SPD:
2
- ASE_OBJ:
2
- ASE_ECD:
2
- ASE_REQ:
2
- ASE_TSS:
2
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL6:
7
- EAL6+:
5
- EAL4+:
1
- EAL 6:
1
- EAL6 augmented:
4
- EAL 6 augmented:
1
|
- EAL:
- EAL6:
7
- EAL6+:
5
- EAL4+:
1
- EAL 6:
1
- EAL6 augmented:
4
- EAL 6 augmented:
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG.1:
13
- FCS_RNG:
7
- FCS_COP:
16
- FCS_CKM:
18
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
8
- FCS_CKM.4:
10
- FCS_CKM.1:
10
- FDP:
- FDP_SDC:
2
- FDP_SDC.1:
9
- FDP_SDI.2:
11
- FDP_ITT.1:
18
- FDP_IFC.1:
16
- FDP_ACC.1:
27
- FDP_ACF.1:
25
- FDP_SDI.1:
15
- FDP_ACF:
17
- FDP_ACC:
17
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
10
- FDP_ITC.2:
10
- FDP_SDI.1.1:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDC.1.1:
1
- FIA:
- FIA_API:
2
- FIA_API.1:
11
- FIA_API.1.1:
1
- FMT:
- FMT_LIM:
27
- FMT_LIM.1:
9
- FMT_LIM.2:
8
- FMT_MSA.1:
18
- FMT_MSA.3:
24
- FMT_SMF.1:
15
- FMT_SMR.1:
5
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FPT:
- FPT_TST.2:
33
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_TST.2.1:
2
- FPT_FLS.1:
18
- FPT_PHP.3:
24
- FPT_ITT.1:
14
- FPT_LIM.1:
2
- FPT_LIM:
2
- FPT_ITT:
3
- FRU:
|
- FAU:
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG.1:
13
- FCS_RNG:
7
- FCS_COP:
16
- FCS_CKM:
18
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
8
- FCS_CKM.4:
10
- FCS_CKM.1:
10
- FDP:
- FDP_SDC:
2
- FDP_SDC.1:
9
- FDP_SDI.2:
11
- FDP_ITT.1:
18
- FDP_IFC.1:
16
- FDP_ACC.1:
25
- FDP_ACF.1:
20
- FDP_SDI.1:
15
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
10
- FDP_ITC.2:
10
- FDP_SDI.1.1:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDC.1.1:
1
- FMT:
- FMT_LIM:
2
- FMT_LIM.1:
6
- FMT_LIM.2:
5
- FMT_MSA.1:
18
- FMT_MSA.3:
21
- FMT_SMF.1:
15
- FMT_SMR.1:
5
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FPT:
- FPT_TST.2:
33
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_TST.2.1:
2
- FPT_FLS.1:
18
- FPT_PHP.3:
24
- FPT_ITT.1:
14
- FPT_ITT:
3
- FRU:
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1:
13
- FCS_RNG:
7
- FCS_COP:
16
- FCS_CKM:
18
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
8
- FCS_CKM.4:
10
- FCS_CKM.1:
10
|
- FCS_RNG.1:
13
- FCS_RNG:
7
- FCS_COP:
16
- FCS_CKM:
18
- FCS_RNG.1.1:
1
- FCS_RNG.1.2:
1
- FCS_COP.1:
8
- FCS_CKM.4:
10
- FCS_CKM.1:
10
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_SDC:
2
- FDP_SDC.1:
9
- FDP_SDI.2:
11
- FDP_ITT.1:
18
- FDP_IFC.1:
16
- FDP_ACC.1:
27
- FDP_ACF.1:
25
- FDP_SDI.1:
15
- FDP_ACF: 17
- FDP_ACC: 17
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
10
- FDP_ITC.2:
10
- FDP_SDI.1.1:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDC.1.1:
1
|
- FDP_SDC:
2
- FDP_SDC.1:
9
- FDP_SDI.2:
11
- FDP_ITT.1:
18
- FDP_IFC.1:
16
- FDP_ACC.1:
25
- FDP_ACF.1:
20
- FDP_SDI.1:
15
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
10
- FDP_ITC.2:
10
- FDP_SDI.1.1:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDC.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
27
|
25
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
25
|
20
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
16
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 |
15
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
27
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
9
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
8
|
5
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
24
|
21
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
15
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_TST.2:
33
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_TST.2.1:
2
- FPT_FLS.1:
18
- FPT_PHP.3:
24
- FPT_ITT.1:
14
- FPT_LIM.1: 2
- FPT_LIM: 2
- FPT_ITT:
3
|
- FPT_TST.2:
33
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_TST.2.1:
2
- FPT_FLS.1:
18
- FPT_PHP.3:
24
- FPT_ITT.1:
14
- FPT_ITT:
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
18
|
18
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT |
3
|
3
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
24
|
24
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 |
33
|
33
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope:
3
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use- case and the authentication functionality is no longer available. Depending on:
1
- related to the TOE authentication is regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The following:
1
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The PP [12:
1
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Malfunction:
7
- DFA:
3
- fault induction:
1
|
- Malfunction:
7
- DFA:
3
- fault induction:
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
10
|
8
|
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing |
2
|
2
|
pdf_data/st_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA/side channel |
3
|
2
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 197:
2
- FIPS PUB 197:
2
- NIST:
- SP 800-67:
3
- SP 800-38A:
5
- BSI:
- ISO:
- ISO/IEC 18092:
4
- ISO/IEC 18033:
2
- ISO/IEC 9798-2:
1
- ISO/IEC14443-3:
1
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- FIPS:
- FIPS 197:
2
- FIPS PUB 197:
2
- NIST:
- SP 800-67:
3
- SP 800-38A:
5
- BSI:
- ISO:
- ISO/IEC 18092:
4
- ISO/IEC 18033:
2
- ISO/IEC 9798-2:
1
- ISO/IEC14443-3:
1
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
14
|
13
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Infineon/Infineon |
13
|
6
|
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies |
5
|
4
|
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG |
25
|
19
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
716166
- pdf_is_encrypted:
False
- pdf_number_of_pages:
81
- /Creator: Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx
- /Producer: Nuance PDF Create 8
- /CreationDate: D:20211008132017+02'00'
- /ModDate: D:20211008132017+02'00'
- /Author:
Infineon Technologies AG
- /Title:
Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx
- /Keywords:
32-bit security controller
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
2134749
- pdf_is_encrypted:
False
- pdf_number_of_pages:
66
- /Author:
Dr. Oleg Rudakov
- /Keywords:
Infineon
- /Subject: Product Security Certification
- /Title:
M7892 D11 and G12 Confidential Security Target
- pdf_hyperlinks:
https://www.bsi.bund.de/, http://www.bsi.bund.de/, http://www.infineon.com/
|
pdf_data/st_metadata//Author |
Infineon Technologies AG
|
Dr. Oleg Rudakov
|
pdf_data/st_metadata//Keywords |
32-bit security controller
|
Infineon
|
pdf_data/st_metadata//Title |
Microsoft Word - M7892_D11_G12_Security_Lite_NoLibs.docx
|
M7892 D11 and G12 Confidential Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
716166
|
2134749
|
pdf_data/st_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/, http://www.bsi.bund.de/, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
81
|
66
|
dgst |
2a7e09a6e7e58f1f
|
ed8d5b7c2e3faee5
|