This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0813-2012 |
Infineon Technologies Smart Card IC (Security Controller) M5072 with optional RSA v1.03.006/v2.06.003, EC v1.03.006/ v2.06.003, Toolbox v1.03.006/ v2.06.003, SCL v2.02.010 libraries with specific IC dedicated software BSI-DSZ-CC-0946-V3-2017 |
|
---|---|---|
name | Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software | Infineon Technologies Smart Card IC (Security Controller) M5072 with optional RSA v1.03.006/v2.06.003, EC v1.03.006/ v2.06.003, Toolbox v1.03.006/ v2.06.003, SCL v2.02.010 libraries with specific IC dedicated software |
not_valid_before | 2012-06-06 | 2017-08-18 |
not_valid_after | 2019-09-01 | 2022-08-17 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0813b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946V3b_pdf.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0813a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946V3a_pdf.pdf |
state/report/pdf_hash | d2f0d771435eb5daf0d94da7e4d15a035295e7fc75dce75d8b8e4190f1438eea | 307fea2724f1de569bbef8f79cbf2bc58c601a7625408ca964f90259e2c3d2d5 |
state/report/txt_hash | 18d056d0b014de3fae27c137b5a485f72e46868219e7a9d9a1bed03476a7ae12 | c3694d765f381adad3e01e2e1a75d5987c7ba04dfe5507bf334eeeef388f8320 |
state/st/pdf_hash | 03e405dd9b5f1957d81d9c84fc9f486576df46cf824293071e171c90e4028f94 | 64c8952853d8047a6d7c6578ea29faf5793bcf7ea3bddbbcbc9ab49af6d374a6 |
state/st/txt_hash | e3c8980e6258e869dbabc9fd66d00c6f72209b9fb10a82efc4d2838307d6be8e | 2fa61c12d81735ec270664252c652510d549007a4f7ab814e9e1727269e79e8a |
heuristics/cert_id | BSI-DSZ-CC-0813-2012 | BSI-DSZ-CC-0946-V3-2017 |
heuristics/extracted_versions | 1.01, 1.02.008 | 2.02.010, 1.03.006, 2.06.003 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2013/39, ANSSI-CC-2012/40, BSI-DSZ-CC-0922-2014, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, ANSSI-CC-2012/41, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0819-2012, ANSSI-CC-2012/44, BSI-DSZ-CC-0764-2012, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2012/85, ANSSI-CC-2012/31, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2012/51, BSI-DSZ-CC-0850-2013 | None |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0728-2011 | BSI-DSZ-CC-0946-V2-2015 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, BSI-DSZ-CC-0889-2013, ANSSI-CC-2013/39, BSI-DSZ-CC-0836-V2-2017, ANSSI-CC-2012/40, BSI-DSZ-CC-0922-2014, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, ANSSI-CC-2013/10, ANSSI-CC-2012/41, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0952-V2-2016, ANSSI-CC-2012/44, BSI-DSZ-CC-0764-2012, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2012/85, ANSSI-CC-2012/31, ANSSI-CC-2013/11, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0835-V2-2017, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2012/51, BSI-DSZ-CC-0850-2013 | None |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 | BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0946-V2-2015 |
heuristics/st_references/directly_referenced_by | BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2013/39, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2013/10, ANSSI-CC-2012/41, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0819-2012, ANSSI-CC-2012/44, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2012/31, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2012/51 | None |
heuristics/st_references/directly_referencing | BSI-DSZ-CC-0728-2011 | None |
heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0904-2015, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2016/75, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2013/10, ANSSI-CC-2012/41, ANSSI-CC-2014/62, BSI-DSZ-CC-0880-2013, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, ANSSI-CC-2014/48, ANSSI-CC-2012/44, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2013/32, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0751-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2014/13, ANSSI-CC-2012/51 | None |
heuristics/st_references/indirectly_referencing | BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 | None |
pdf_data/report_filename | 0813a_pdf.pdf | 0946V3a_pdf.pdf |
pdf_data/report_frontpage/DE |
|
|
pdf_data/report_frontpage/DE/cert_id | BSI-DSZ-CC-0813-2012 | BSI-DSZ-CC-0946-V3-2017 |
pdf_data/report_frontpage/DE/cert_item | Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software | Infineon Technologies Smart Card IC (Security Controller) M5072 with optional RSA v1.03.006/v2.06.003, EC v1.03.006/ v2.06.003, Toolbox v1.03.006/ v2.06.003, SCL v2.02.010 libraries with specific IC dedicated software |
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 4 | 5 |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 2 | 1 |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 5 | 1 |
pdf_data/report_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 | 4 | 1 |
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA4096 | 4 | 1 |
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_claims/O/O.C | 2 | 1 |
pdf_data/report_keywords/cc_claims/R/R.O | 2 | 1 |
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0035-2007 | 3 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 1 | 3 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 3 | 9 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 6 | 14 |
pdf_data/report_keywords/cc_sfr | |
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/crypto_library | |
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 1 | 2 |
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/side_channel_analysis/FI/DFA | 3 | 4 |
pdf_data/report_keywords/side_channel_analysis/SCA |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 25 | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 26 | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 34 | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 36 | 3 | 2 |
pdf_data/report_keywords/standard_id/ISO |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 4 | 9 |
pdf_data/report_keywords/symmetric_crypto/DES/3DES/3DES | 3 | 1 |
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 3 | 7 |
pdf_data/report_keywords/technical_report_id/BSI |
|
|
pdf_data/report_keywords/tee_name | |
|
pdf_data/report_keywords/vendor/GD |
|
|
pdf_data/report_keywords/vendor/Infineon/Infineon | 12 | 4 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies | 7 | 17 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG | 19 | 21 |
pdf_data/report_metadata//CreationDate | D:20120620074213+02'00' | D:20170829141626+02'00' |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologies AG" | "Common Criteria, Certification, Zertifizierung, SmartCard, Infineon, IFX, 0946-V3, PP-0084, Security IC" |
pdf_data/report_metadata//ModDate | D:20120622114739+02'00' | D:20170830070656+02'00' |
pdf_data/report_metadata//Producer | OpenOffice.org 3.2 | LibreOffice 5.2 |
pdf_data/report_metadata//Subject | Common Criteria Zertifizierung | Common Criteria Certification |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0813-2012 | Certification Report BSI-DSZ-CC-0946-V3-2017 |
pdf_data/report_metadata/pdf_file_size_bytes | 1310180 | 1150834 |
pdf_data/report_metadata/pdf_number_of_pages | 46 | 42 |
pdf_data/st_filename | 0813b_pdf.pdf | 0946V3b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 10 | 67 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 4 | 7 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 12 | 16 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 5 | 6 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 1 | 2 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 | 1 | 3 |
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 | 1 | 3 |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 | 2 | 3 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 | 1 | 4 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 3 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 5 | 7 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 3 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 24 | 22 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 34 | 30 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 24 | 28 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 58 | 46 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 28 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 12 | 20 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 30 | 23 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 22 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 15 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 18 | 21 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 18 | 21 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 11 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 7 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 20 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 21 | 19 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 19 | 18 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 13 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 25 | 14 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST | 7 | 5 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 | 11 | 12 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 | 36 | 34 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 7 | 8 |
pdf_data/st_keywords/cipher_mode | |
|
pdf_data/st_keywords/crypto_library | |
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 1 | 4 |
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RNG | 9 | 11 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 10 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 5 | 6 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 4 | 5 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 24 | 43 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES | 17 | 21 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 6 | 13 |
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor/Infineon/Infineon | 5 | 8 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies | 7 | 6 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG | 15 | 17 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Hans-Ulrich Buchmüller; modified by Steffen Heinkel | Jürgen Noller, Rainer Urian |
pdf_data/st_metadata//CreationDate | D:20120516160724+02'00' | D:20170829171858+02'00' |
pdf_data/st_metadata//ModDate | D:20120622123754+02'00' | D:20170829171858+02'00' |
pdf_data/st_metadata//Title | Security Target | ST-Lite |
pdf_data/st_metadata/pdf_file_size_bytes | 1135564 | 1217401 |
pdf_data/st_metadata/pdf_number_of_pages | 81 | 77 |
dgst | 2d236a32ede04769 | 6fbfdf147c9b6ad8 |