This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0813-2012 |
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V4-2024 |
|
---|---|---|
name | Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software | NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) |
not_valid_before | 2012-06-06 | 2024-03-05 |
not_valid_after | 2019-09-01 | 2029-03-05 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0813b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4b_pdf.pdf |
status | archived | active |
manufacturer | Infineon Technologies AG | NXP Semiconductors Germany GmbH |
manufacturer_web | https://www.infineon.com/ | https://www.nxp.com |
security_level | EAL5+, AVA_VAN.5, ALC_DVS.2 | ALC_FLR.1, ASE_TSS.2, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0813a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4a_pdf.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4c_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | 266e3dee69a8d024ad80851a0e2cc977f1589718dee016ebc2e6b14a1a13f7f4 |
state/cert/txt_hash | None | 0c22211ca9b5526949efbf0b2f0f46eb3c81d2d1b8ba2a4964c8a752a9014252 |
state/report/pdf_hash | d2f0d771435eb5daf0d94da7e4d15a035295e7fc75dce75d8b8e4190f1438eea | 18e53403fd0bf68e2f2280b39beea2ef68004621590e50ce10af1e095fcc8869 |
state/report/txt_hash | 18d056d0b014de3fae27c137b5a485f72e46868219e7a9d9a1bed03476a7ae12 | 985a08775c97ec1789d0de44a669f6d85fac2fb45d132537090db26c4cefbfc1 |
state/st/pdf_hash | 03e405dd9b5f1957d81d9c84fc9f486576df46cf824293071e171c90e4028f94 | e8618a61e968de23b339cd627b2dc8054a1682e373bef85ce5905c41150832e6 |
state/st/txt_hash | e3c8980e6258e869dbabc9fd66d00c6f72209b9fb10a82efc4d2838307d6be8e | cf777065dbef7ce344f2e867ebb1e58cec4cada57a1632bcadddddbd97b6a5ae |
heuristics/cert_id | BSI-DSZ-CC-0813-2012 | BSI-DSZ-CC-1136-V4-2024 |
heuristics/extracted_versions | 1.01, 1.02.008 | - |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2013/39, ANSSI-CC-2012/40, BSI-DSZ-CC-0922-2014, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, ANSSI-CC-2012/41, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0819-2012, ANSSI-CC-2012/44, BSI-DSZ-CC-0764-2012, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2012/85, ANSSI-CC-2012/31, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2012/51, BSI-DSZ-CC-0850-2013 | NSCIB-CC-2300155-01-CR, NSCIB-CC-2300157-01-CR, NSCIB-CC-2300156-01-CR, NSCIB-CC-2300172-01-CR, NSCIB-CC-2300154-01-CR |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0728-2011 | BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1136-V2-2022 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, BSI-DSZ-CC-0889-2013, ANSSI-CC-2013/39, BSI-DSZ-CC-0836-V2-2017, ANSSI-CC-2012/40, BSI-DSZ-CC-0922-2014, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, ANSSI-CC-2013/10, ANSSI-CC-2012/41, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0952-V2-2016, ANSSI-CC-2012/44, BSI-DSZ-CC-0764-2012, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2012/85, ANSSI-CC-2012/31, ANSSI-CC-2013/11, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0835-V2-2017, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2012/51, BSI-DSZ-CC-0850-2013 | NSCIB-CC-2300155-01-CR, NSCIB-CC-2300157-01-CR, NSCIB-CC-2300156-01-CR, NSCIB-CC-2300172-01-CR, NSCIB-CC-2300154-01-CR |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 | BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1136-2021 |
heuristics/scheme_data | None |
|
heuristics/st_references/directly_referenced_by | BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2013/39, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2013/10, ANSSI-CC-2012/41, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0819-2012, ANSSI-CC-2012/44, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2012/31, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2012/51 | NSCIB-CC-2300155-01-CR, NSCIB-CC-2300157-01-CR, NSCIB-CC-2300156-01-CR, NSCIB-CC-2300172-01-CR, NSCIB-CC-2300154-01-CR |
heuristics/st_references/directly_referencing | BSI-DSZ-CC-0728-2011 | None |
heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0904-2015, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2016/75, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2013/10, ANSSI-CC-2012/41, ANSSI-CC-2014/62, BSI-DSZ-CC-0880-2013, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, ANSSI-CC-2014/48, ANSSI-CC-2012/44, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2013/32, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0751-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2014/13, ANSSI-CC-2012/51 | NSCIB-CC-2300155-01-CR, NSCIB-CC-2300157-01-CR, NSCIB-CC-2300156-01-CR, NSCIB-CC-2300172-01-CR, NSCIB-CC-2300154-01-CR |
heuristics/st_references/indirectly_referencing | BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 | None |
pdf_data/cert_filename | None | 1136V4c_pdf.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | 0813a_pdf.pdf | 1136V4a_pdf.pdf |
pdf_data/report_frontpage/DE |
|
|
pdf_data/report_frontpage/DE/cert_id | BSI-DSZ-CC-0813-2012 | BSI-DSZ-CC-1136-V4-2024 |
pdf_data/report_frontpage/DE/cert_item | Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software | NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4 |
pdf_data/report_frontpage/DE/developer | Infineon Technologies AG | NXP Semiconductors Germany GmbH |
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 4 | 18 |
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 | 3 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 7 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 1 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 | 1 | 5 |
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 | 1 | 4 |
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN | 2 | 1 |
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 3 | 1 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 6 | 4 |
pdf_data/report_keywords/cc_sfr | |
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/crypto_library | |
|
pdf_data/report_keywords/crypto_scheme | |
|
pdf_data/report_keywords/hash_function/SHA |
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 1 | 11 |
pdf_data/report_keywords/side_channel_analysis/FI |
|
|
pdf_data/report_keywords/side_channel_analysis/SCA |
|
|
pdf_data/report_keywords/side_channel_analysis/SCA/DPA | 4 | 2 |
pdf_data/report_keywords/side_channel_analysis/SCA/SPA | 3 | 1 |
pdf_data/report_keywords/side_channel_analysis/other/JIL | 3 | 4 |
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 20 | 1 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS 26 | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 36 | 3 | 2 |
pdf_data/report_keywords/standard_id/ISO |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 4 | 31 |
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES | 2 | 6 |
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 3 | 1 |
pdf_data/report_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/report_keywords/technical_report_id/BSI |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | Federal Office for Information Security |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologies AG" | "Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller" |
pdf_data/report_metadata//Subject | Common Criteria Zertifizierung | Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0813-2012 | Certification Report BSI-DSZ-CC-1136-V4-2024 |
pdf_data/report_metadata/pdf_file_size_bytes | 1310180 | 573114 |
pdf_data/report_metadata/pdf_number_of_pages | 46 | 39 |
pdf_data/st_filename | 0813b_pdf.pdf | 1136V4b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 10 | 50 |
pdf_data/st_keywords/asymmetric_crypto/FF |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 5 | 2 |
pdf_data/st_keywords/cc_cert_id/DE |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 1 | 5 |
pdf_data/st_keywords/cc_claims/T/T.RND | 1 | 2 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 | 1 | 4 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 | 3 | 8 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 | 3 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 9 | 2 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 11 | 3 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 10 | 5 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 24 | 65 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 34 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 5 | 4 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 24 | 20 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 58 | 45 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 28 | 14 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 12 | 16 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 30 | 8 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 7 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 22 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 15 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 18 | 19 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 18 | 19 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 7 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 15 | 5 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 3 | 13 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 7 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 7 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 20 | 2 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 21 | 5 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 16 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 6 | 1 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 19 | 10 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 7 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 25 | 8 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 | 11 | 6 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 7 | 8 |
pdf_data/st_keywords/cipher_mode | |
|
pdf_data/st_keywords/crypto_library | |
|
pdf_data/st_keywords/crypto_protocol | |
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 | 2 | 4 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 | 2 | 4 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 2 | 7 |
pdf_data/st_keywords/randomness/RNG/RNG | 9 | 33 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 12 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 1 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 10 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 10 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing | 1 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 7 | 6 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 4 | 3 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-4 | 2 | 1 |
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/standard_id/RFC/RFC 5639 | 1 | 9 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 24 | 44 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 3 | 8 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 6 | 3 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC | 4 | 1 |
pdf_data/st_keywords/technical_report_id/BSI |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Hans-Ulrich Buchmüller; modified by Steffen Heinkel | NXP B.V. |
pdf_data/st_metadata//Title | Security Target | Security Target Lite |
pdf_data/st_metadata/pdf_file_size_bytes | 1135564 | 777912 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.bsi.bund.de/ | mailto:[email protected] |
pdf_data/st_metadata/pdf_number_of_pages | 81 | 84 |
dgst | 2d236a32ede04769 | ba8d9fb5fd39868c |