Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
BSI-DSZ-CC-0813-2012
Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
BSI-DSZ-CC-0827-V3-2015
name Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
not_valid_before 2012-06-06 2015-11-03
not_valid_after 2019-09-01 2020-11-03
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0813b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V3b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0813a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V3a_pdf.pdf
state/report/pdf_hash d2f0d771435eb5daf0d94da7e4d15a035295e7fc75dce75d8b8e4190f1438eea 152859bde53573b0dcd40d97470caeeb8c1bc4bc01f5ced60ba24571bf766b3d
state/report/txt_hash 18d056d0b014de3fae27c137b5a485f72e46868219e7a9d9a1bed03476a7ae12 8048dbf6fd04ed99921cfd83fe85f5fbfca11a46f5b78ec2a85f46c1aeb8e4f6
state/st/pdf_hash 03e405dd9b5f1957d81d9c84fc9f486576df46cf824293071e171c90e4028f94 9797219f438a56fd4c679c17ca6a01dff54b960ce15f215a786eb744d62263e3
state/st/txt_hash e3c8980e6258e869dbabc9fd66d00c6f72209b9fb10a82efc4d2838307d6be8e 91961c6ffe33466532822f8dc8282cb967d030154d1ee4dbefe5cbb99ee5e71a
heuristics/cert_id BSI-DSZ-CC-0813-2012 BSI-DSZ-CC-0827-V3-2015
heuristics/extracted_versions 1.01, 1.02.008 1.01.0008, 1.03.006
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2013/39, ANSSI-CC-2012/40, BSI-DSZ-CC-0922-2014, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, ANSSI-CC-2012/41, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0819-2012, ANSSI-CC-2012/44, BSI-DSZ-CC-0764-2012, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2012/85, ANSSI-CC-2012/31, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2012/51, BSI-DSZ-CC-0850-2013 BSI-DSZ-CC-0827-V4-2016
heuristics/report_references/directly_referencing BSI-DSZ-CC-0728-2011 BSI-DSZ-CC-0827-V2-2014
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, BSI-DSZ-CC-0889-2013, ANSSI-CC-2013/39, BSI-DSZ-CC-0836-V2-2017, ANSSI-CC-2012/40, BSI-DSZ-CC-0922-2014, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, ANSSI-CC-2013/10, ANSSI-CC-2012/41, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0952-V2-2016, ANSSI-CC-2012/44, BSI-DSZ-CC-0764-2012, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2012/85, ANSSI-CC-2012/31, ANSSI-CC-2013/11, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0835-V2-2017, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2012/51, BSI-DSZ-CC-0850-2013 CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V5-2017
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0791-2012
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2013/39, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2013/10, ANSSI-CC-2012/41, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0819-2012, ANSSI-CC-2012/44, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2012/31, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2012/51 None
heuristics/st_references/directly_referencing BSI-DSZ-CC-0728-2011 None
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0904-2015, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2016/75, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2013/10, ANSSI-CC-2012/41, ANSSI-CC-2014/62, BSI-DSZ-CC-0880-2013, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, ANSSI-CC-2014/48, ANSSI-CC-2012/44, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2013/32, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0751-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, ANSSI-CC-2014/13, ANSSI-CC-2012/51 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 None
pdf_data/report_filename 0813a_pdf.pdf 0827V3a_pdf.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0813-2012
  • cert_item: Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0827-V3-2015
  • cert_item: Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
  • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0813-2012 BSI-DSZ-CC-0827-V3-2015
pdf_data/report_frontpage/DE/cert_item Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 4 5
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDH/ECDH 2 3
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 5 7
pdf_data/report_keywords/asymmetric_crypto/RSA
  • RSA2048: 4
  • RSA4096: 4
  • RSA-2048: 1
  • RSA 1024: 1
  • RSA-2048: 1
  • RSA2048: 2
  • RSA4096: 2
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 4 2
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA4096 4 2
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0813-2012: 24
  • BSI-DSZ-CC-0728-2011: 3
  • BSI-DSZ-CC-S-0007-: 1
  • BSI-DSZ-CC-0827-V3-2015: 25
  • BSI-DSZ-CC-0827-V2-2014: 3
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0035-2007 3 4
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 6
  • EAL 4: 3
  • EAL1: 7
  • EAL4: 8
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL 5 augmented: 3
  • EAL 5: 14
  • EAL 4: 9
  • EAL 1: 7
  • EAL 2: 4
  • EAL 5+: 1
  • EAL 6: 4
  • EAL 3: 4
  • EAL 7: 4
  • EAL 5 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 3 9
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 6 14
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • M7820 A11, Version 1, 2012-06-01, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 1: 1
  • TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 including optional Software Libraries RSA – EC –: 1
  • – Toolbox, Version 2.0, 2012-05-03, Infineon Technologies AG (confidential document) [11] SLE70 Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface, Version 1.02.008: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Software Libraries RSA - EC – Toolbox – FTL, Version 1.8, 2015-09-30, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900, M9905, M9906 including optional Software Libraries RSA – EC –: 1
  • the M9900 A22 and G11, M9905 A11, M9906 A11, version 6, 2015-10-09, TÜV Informationstechnik GmbH, (confidential document) 11 specifically • AIS 19, Version 9, Anwendungshinweise und Interpretationen zum Schema (AIS) •: 1
  • to AIS 36 for the Product M9900 A22 and G11, Version 6, 2015-10-09, TÜV Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M9900 A22 and G11 including optional Software Libraries RSA -: 1
  • – Toolbox – FTL, Version 0.7, 2015-06-09, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006), 2012-08-16: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 3
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-192: 4
    • K-163: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 28
pdf_data/report_keywords/randomness/RNG/RNG 1 3
pdf_data/report_keywords/side_channel_analysis/FI/DFA 3 6
pdf_data/report_keywords/side_channel_analysis/SCA
  • DPA: 4
  • SPA: 3
  • physical probing: 1
  • SPA: 5
  • DPA: 6
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 4 6
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 3 5
pdf_data/report_keywords/side_channel_analysis/other/JIL 3 4
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 36: 3
    • AIS31: 1
    • AIS 20: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 1
  • ISO:
    • ISO/IEC 18092: 6
  • FIPS:
    • FIPS186-4: 4
    • FIPS197: 3
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • BSI:
    • AIS32: 1
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 36: 3
    • AIS31: 2
    • AIS 35: 2
    • AIS 19: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 1
  • RFC:
    • RFC5639: 5
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS31: 1
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 1
  • AIS32: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 3
  • AIS 36: 3
  • AIS31: 2
  • AIS 35: 2
  • AIS 19: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 1
pdf_data/report_keywords/standard_id/BSI/AIS 31 2 3
pdf_data/report_keywords/standard_id/BSI/AIS31 1 2
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 18092: 6
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • DES:
      • DES: 3
    • 3DES:
      • Triple-DES: 2
      • 3DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • DES:
      • DES: 3
    • 3DES:
      • Triple-DES: 3
      • TDES: 3
      • TDEA: 1
      • 3DES: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 4 8
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 2
  • 3DES: 3
  • Triple-DES: 3
  • TDES: 3
  • TDEA: 1
  • 3DES: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/3DES 3 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 2 3
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI TR-02102: 1
  • BSI 7138: 2
  • BSI 7125: 2
  • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 12
    • Infineon Technologies AG: 19
    • Infineon Technologies: 7
  • GD:
    • G&D: 1
  • Infineon:
    • Infineon: 13
    • Infineon Technologies AG: 21
    • Infineon Technologies: 9
pdf_data/report_keywords/vendor/Infineon/Infineon 12 13
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 7 9
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 19 21
pdf_data/report_metadata
  • pdf_file_size_bytes: 1310180
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120620074213+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologies AG"
  • /ModDate: D:20120622114739+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Zertifizierung
  • /Title: Certification Report BSI-DSZ-CC-0813-2012
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
  • pdf_file_size_bytes: 1387317
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20151120082832+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software"
  • /ModDate: D:20151120121430+01'00'
  • /Producer: LibreOffice 4.2
  • /Title: Certification Report BSI-DSZ-CC-xxxx-200x
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata//CreationDate D:20120620074213+02'00' D:20151120082832+01'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologies AG" "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software"
pdf_data/report_metadata//ModDate D:20120622114739+02'00' D:20151120121430+01'00'
pdf_data/report_metadata//Producer OpenOffice.org 3.2 LibreOffice 4.2
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0813-2012 Certification Report BSI-DSZ-CC-xxxx-200x
pdf_data/report_metadata/pdf_file_size_bytes 1310180 1387317
pdf_data/st_filename 0813b_pdf.pdf 0827V3b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 10 20
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 4 6
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 12 14
pdf_data/st_keywords/asymmetric_crypto/RSA
  • RSA2048: 1
  • RSA4096: 1
  • RSA-2048: 1
  • RSA 1024: 1
  • RSA2048: 2
  • RSA4096: 2
  • RSA-2048: 1
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 1 2
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 1 2
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0728-2011: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_CMS: 1
  • ALC_CMS.4: 1
  • ALC_DVS.1: 1
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 3
  • ALC_CMS: 1
  • ALC_TAT: 1
  • ALC_CMS.4: 1
  • ALC_TAT.1: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 1 3
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 4
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 1 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 5
  • EAL 5: 3
  • EAL5 augmented: 1
  • EAL 5 augmented: 3
  • EAL5: 7
  • EAL5+: 1
  • EAL 5: 4
  • EAL5 augmented: 3
  • EAL 5 augmented: 3
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 3 4
pdf_data/st_keywords/cc_security_level/EAL/EAL5 5 7
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 24 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 34 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 24 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 58 47
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 28 27
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 25
  • FDP_ACF.1: 22
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ITT.1: 18
  • FDP_IFC.1: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 18
  • FDP_ITC.2: 18
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_ACC.1: 23
  • FDP_ACF.1: 20
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ITT.1: 13
  • FDP_IFC.1: 10
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 17
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_PHP.3: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 25 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 22 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 15 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 18 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 18 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 18 13
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 20
  • FMT_MSA.3: 21
  • FMT_SMF.1: 16
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 1
  • FMT_CKM.4: 1
  • FMT_MSA.1: 18
  • FMT_MSA.3: 19
  • FMT_SMF.1: 15
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 21 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 16 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST: 7
  • FPT_TST.2: 36
  • FPT_TST.1: 11
  • FPT_FLS.1: 19
  • FPT_PHP.3: 25
  • FPT_ITT.1: 16
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_TST: 7
  • FPT_TST.2: 36
  • FPT_TST.1: 11
  • FPT_FLS.1: 16
  • FPT_PHP.3: 14
  • FPT_ITT.1: 13
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_FLS: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 19 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 16 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 25 14
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 7 8
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 7
  • CBC:
    • CBC: 7
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 1 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 4
    • K-163: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-512: 2
      • SHA-2: 61
  • SHA:
    • SHA1:
      • SHA1: 47
    • SHA2:
      • SHA256: 47
  • MD:
    • MD5:
      • MD5: 47
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-256: 2
    • SHA-512: 2
    • SHA-2: 61
  • SHA1:
    • SHA1: 47
  • SHA2:
    • SHA256: 47
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 2
  • SHA-512: 2
  • SHA-2: 61
  • SHA256: 47
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 14
  • PRNG:
    • PRNG: 6
  • RNG:
    • RND: 2
    • RNG: 9
  • TRNG:
    • TRNG: 14
  • RNG:
    • RNG: 11
    • RND: 2
pdf_data/st_keywords/randomness/RNG/RNG 9 11
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 7
    • SPA: 5
    • DPA: 10
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
    • fault induction: 1
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 6
    • Side-channel: 1
    • SPA: 6
    • DPA: 7
    • Timing Attack: 1
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
  • fault induction: 1
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 7
  • SPA: 5
  • DPA: 10
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 6
  • Side-channel: 1
  • SPA: 6
  • DPA: 7
  • Timing Attack: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 10 7
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 5 6
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 7 6
pdf_data/st_keywords/standard_id/BSI/AIS31 4 5
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-001: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 2
  • FIPS PUB 180-4: 2
  • FIPS PUB 197: 2
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 14443: 2
  • ISO/IEC18092: 6
  • ISO/IEC 18092: 6
  • ISO/IEC 7816-3: 1
  • ISO/IEC 7816-3: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • DES:
      • DES: 6
    • 3DES:
      • 3DES: 17
      • Triple-DES: 3
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • 3DES: 17
      • Triple-DES: 2
      • TDES: 4
      • TDEA: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 24 27
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 17
  • Triple-DES: 3
  • 3DES: 17
  • Triple-DES: 2
  • TDES: 4
  • TDEA: 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 3 2
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 6 5
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/vendor/Infineon/Infineon 5 7
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 15 21
pdf_data/st_metadata
  • pdf_file_size_bytes: 1135564
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 81
  • /Author: Hans-Ulrich Buchmüller; modified by Steffen Heinkel
  • /CreationDate: D:20120516160724+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20120622123754+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title: Security Target
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_file_size_bytes: 921413
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
  • /Title: Security Target Lite
  • /Author: Jürgen Noller
  • /Subject: Security Target Lite M9900, M9905, M9906
  • /Keywords: Dresden, TSMC, Infineon, RSA, Eliptic Curve, Library, multi interface, high end security controler, ARM CPU, ARM Core, robust, CCv3.1, EAL5+, secure controller, EAL5+, augmented, high attack potential, AVA_VAN.5, PP0035
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20150930134010
  • /ModDate: D:20150930134010
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks: http://www.bsi.bund.de/, http://www.infineon.com/
pdf_data/st_metadata//Author Hans-Ulrich Buchmüller; modified by Steffen Heinkel Jürgen Noller
pdf_data/st_metadata//CreationDate D:20120516160724+02'00' D:20150930134010
pdf_data/st_metadata//Creator Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//ModDate D:20120622123754+02'00' D:20150930134010
pdf_data/st_metadata//Producer Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Title Security Target Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 1135564 921413
pdf_data/st_metadata/pdf_number_of_pages 81 85
dgst 2d236a32ede04769 ce8e09d43878d381