This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3D350A/S3D300A/S3D264A/ S3D232A/ S3D200A/ S3K350A/ S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2 ANSSI-CC-2017/53 |
Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software BSI-DSZ-CC-0827-V4-2016 |
|
---|---|---|
name | S3D350A/S3D300A/S3D264A/ S3D232A/ S3D200A/ S3K350A/ S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2 | Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software |
not_valid_before | 2017-08-24 | 2016-11-23 |
not_valid_after | 2022-08-24 | 2021-11-23 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_53en.pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V4b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_53fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V4a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) | |
state/report/pdf_hash | 8734501e1c7636c54df911cb919114e652127aa4764a41490abb88660a43548a | 0d97f0b5532f5a687413a7ccae85ca3d278477b5795bd16537ee5722e74a748e |
state/report/txt_hash | 54a08816ad086cc6c3ee2a67a4fb262927d86ce4f87c925334e8e15c48e67f1f | 7155542acac11697fa673dda7044a75258ffe26fcc0dbb83d85fc83aba20a93d |
state/st/pdf_hash | 8f314e39aa3e10ea1a3abadb85cd2a72da352657847e16b47842ee572b906ebe | eba39ff320b0452694d746c3fc546a8cae3557c996ca334ef102c350048ac799 |
state/st/txt_hash | 3655712cf2a610a90e70dc45a2d2c4edea02a54e67451d0689bbc04a60e77478 | 176a98682e63c6ae49a8f1e0bf180b6fdab47df4bad371d48f92241e508e4318 |
heuristics/cert_id | ANSSI-CC-2017/53 | BSI-DSZ-CC-0827-V4-2016 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 2, 32 | 1.01.0008, 4.00.009, 2.01.011, 1.03.006, 2.05.005 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2018/12 | CSEC2014007, BSI-DSZ-CC-0827-V5-2017 |
heuristics/report_references/directly_referencing | ANSSI-CC-2017/11 | BSI-DSZ-CC-0827-V3-2015 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2019/03, 2017-62-INF-3233, ANSSI-CC-2021/04, ANSSI-CC-2018/12, KECS-ISIS-0936-2019, ANSSI-CC-2021/03, ANSSI-CC-2021/05, ANSSI-CC-2018/13, KECS-ISIS-0937-2019, ANSSI-CC-2019/01, ANSSI-CC-2019/61, ANSSI-CC-2019/59, 2017-63-INF-3232, ANSSI-CC-2019/02, ANSSI-CC-2019/51, ANSSI-CC-2019/60, ANSSI-CC-2018/14, ANSSI-CC-2021/06 | CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V5-2017 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2017/11 | BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0791-2012 |
heuristics/scheme_data |
|
None |
heuristics/st_references/directly_referenced_by | None | CSEC2014007 |
heuristics/st_references/indirectly_referenced_by | None | CSEC2014007 |
pdf_data/report_filename | anssi-cc-2017_53fr.pdf | 0827V4a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 10 | 4 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 7 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 2 | 3 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 3 | 6 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 | 1 | 7 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 | 1 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 3 | 14 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 | 1 | 4 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/crypto_library | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/TRNG |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 9 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 8 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/tee_name | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//CreationDate | D:20170904142818+02'00' | D:20161129141134+01'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.025 | "Common Criteria, Certification, Zertifizierung, SmartCard, Pepe, PP-0084, Infineon BSI-DSZ-CC-0827-V4" |
pdf_data/report_metadata//ModDate | D:20170911162916+02'00' | D:20161130144903+01'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | LibreOffice 4.2 |
pdf_data/report_metadata//Subject | Common Criteria Certification | |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0827-V4-2016 | |
pdf_data/report_metadata/pdf_file_size_bytes | 713542 | 1233762 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte |
pdf_data/report_metadata/pdf_number_of_pages | 19 | 44 |
pdf_data/st_filename | anssi-cible-cc-2017_53en.pdf.pdf | 0827V4b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 30 | 84 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 15 | 8 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 21 | 17 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 4 | 7 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 6 | 2 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 6 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 7 | 9 |
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 | 1 | 4 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 13 | 11 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 2 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 2 | 3 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 6 | 7 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 3 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 8 | 5 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 10 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 13 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 26 | 42 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 4 | 6 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 17 | 33 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 51 | 126 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 37 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 17 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 14 | 25 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 20 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 13 | 26 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 13 | 26 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 2 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 22 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 16 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 15 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 18 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 13 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 20 | 14 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 8 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 11 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 3 | 4 |
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/ecc_curve/NIST |
|
|
pdf_data/st_keywords/ecc_curve/NIST/P-192 | 8 | 4 |
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 | 3 | 56 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 | 6 | 56 |
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 8 | 17 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 1 | 14 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 12 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 23 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing | 9 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 2 | 7 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 5 | 1 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 30 | 56 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA | 1 | 6 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 13 | 6 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 6 | 3 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 10 | 16 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//CreationDate | D:20170522222620+09'00' | D:20161129124810+01'00' |
pdf_data/st_metadata//ModDate | D:20170911162903+02'00' | D:20161129124810+01'00' |
pdf_data/st_metadata//Title | Security Target Lite, BSI-DSZ-CC-0827-V4-2016 | |
pdf_data/st_metadata/pdf_file_size_bytes | 1236724 | 1339240 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | http://www.ietf.org/rfc/rfc5639.txt, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.bsi.bund.de/, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_number_of_pages | 110 | 95 |
dgst | 2fa836f2d10827ff | 37a743f92a3da4a3 |