This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3D350A/S3D300A/S3D264A/ S3D232A/ S3D200A/ S3K350A/ S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2 ANSSI-CC-2017/53 |
Infineon Smart Card IC (Security Controller) SLE66CX126PE / M2160-k11 and SLE66CX86PE / M2161-k11 both with optional libraries RSA V1.6, EC V1.1 and SHA-2 V1.0 both with specific IC dedicated software BSI-DSZ-CC-0627-2009 |
|
---|---|---|
name | S3D350A/S3D300A/S3D264A/ S3D232A/ S3D200A/ S3K350A/ S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2 | Infineon Smart Card IC (Security Controller) SLE66CX126PE / M2160-k11 and SLE66CX86PE / M2161-k11 both with optional libraries RSA V1.6, EC V1.1 and SHA-2 V1.0 both with specific IC dedicated software |
not_valid_before | 2017-08-24 | 2009-11-16 |
not_valid_after | 2022-08-24 | 2019-09-01 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_53en.pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0627b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_53fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0627a_pdf.pdf |
state/report/pdf_hash | 8734501e1c7636c54df911cb919114e652127aa4764a41490abb88660a43548a | a5a346b6781f46a500cf07bdc8b69a570b24e082de6078625f2e15e5520a1aff |
state/report/txt_hash | 54a08816ad086cc6c3ee2a67a4fb262927d86ce4f87c925334e8e15c48e67f1f | 42793918ce365aaf9ca3b94de591ede686f62acf92f2f8e8867c8210ac6fd542 |
state/st/pdf_hash | 8f314e39aa3e10ea1a3abadb85cd2a72da352657847e16b47842ee572b906ebe | 9c202711dafddde219c00a5a337190431ae65d2c7ff5b650edbf098319cb61e7 |
state/st/txt_hash | 3655712cf2a610a90e70dc45a2d2c4edea02a54e67451d0689bbc04a60e77478 | bf88c02eed34d459bdf847cb4a28dfc03b91a1b827d1ea864cb3a12782bf9b88 |
heuristics/cert_id | ANSSI-CC-2017/53 | BSI-DSZ-CC-0627-2009 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 2, 32 | 1.1, 1.6, 1.0 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2018/12 | None |
heuristics/report_references/directly_referencing | ANSSI-CC-2017/11 | BSI-DSZ-CC-0554-2009 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2019/03, 2017-62-INF-3233, ANSSI-CC-2021/04, ANSSI-CC-2018/12, KECS-ISIS-0936-2019, ANSSI-CC-2021/03, ANSSI-CC-2021/05, ANSSI-CC-2018/13, KECS-ISIS-0937-2019, ANSSI-CC-2019/01, ANSSI-CC-2019/61, ANSSI-CC-2019/59, 2017-63-INF-3232, ANSSI-CC-2019/02, ANSSI-CC-2019/51, ANSSI-CC-2019/60, ANSSI-CC-2018/14, ANSSI-CC-2021/06 | None |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2017/11 | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0470-2008, BSI-DSZ-CC-0554-2009, BSI-DSZ-CC-0344-2005, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
|
None |
heuristics/st_references/directly_referencing | None | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0554-2009 |
heuristics/st_references/indirectly_referencing | None | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0554-2009 |
pdf_data/report_filename | anssi-cc-2017_53fr.pdf | 0627a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM | 1 | 2 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 6 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 1 | 2 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 3 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 2 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 1 | 4 |
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 8 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//CreationDate | D:20170904142818+02'00' | D:20091127085911+01'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.025 | Infineon Smart Card IC (Security Controller) SLE66CX126PE / m2160-k11 and SLE66CX86PE / m2161-k11 both with optional libraries RSA V1.6, EC V1.1 and SHA-2 V1.0 both with specific IC dedicated software, Infineon Technologies AG, SmartCard Controller, Smartcard IC Platform Protection Profile, Version 1.0, July 2001, Eurosmart, BSI-PP-0002-2001 |
pdf_data/report_metadata//ModDate | D:20170911162916+02'00' | D:20091203120415+01'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | StarOffice 9 |
pdf_data/report_metadata//Subject | Common Criteria Certification | |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0627-2009 | |
pdf_data/report_metadata/pdf_file_size_bytes | 713542 | 872680 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | https://www.bsi.bund.de/ |
pdf_data/report_metadata/pdf_number_of_pages | 19 | 40 |
pdf_data/st_filename | anssi-cible-cc-2017_53en.pdf.pdf | 0627b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 30 | 11 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 15 | 9 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 21 | 14 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 6 | 1 |
pdf_data/st_keywords/cc_cert_id | |
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 7 | 4 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 2 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 2 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 6 | 5 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 2 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 4 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 26 | 51 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 4 | 7 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 17 | 31 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 53 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 20 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 15 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 13 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 13 | 24 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 3 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 2 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 15 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 6 | 9 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 6 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 3 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 20 | 7 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 6 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 13 | 3 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 4 | 3 |
pdf_data/st_keywords/certification_process | |
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 1 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 | 2 | 1 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 | 2 | 1 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 | 2 | 1 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 15 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 3 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 23 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 4 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 5 | 2 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 5 | 10 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-3 | 6 | 1 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 6 | 1 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 10 | 11 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC | 2 | 4 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//CreationDate | D:20170522222620+09'00' | D:20090925132518Z |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//ModDate | D:20170911162903+02'00' | D:20091203120506+01'00' |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//Title | Security Target | |
pdf_data/st_metadata/pdf_file_size_bytes | 1236724 | 992834 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | |
pdf_data/st_metadata/pdf_number_of_pages | 110 | 61 |
dgst | 2fa836f2d10827ff | 9de51328e52a558f |