This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3D350A/S3D300A/S3D264A/ S3D232A/ S3D200A/ S3K350A/ S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2 ANSSI-CC-2017/53 |
Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V3-2015 |
|
---|---|---|
name | S3D350A/S3D300A/S3D264A/ S3D232A/ S3D200A/ S3K350A/ S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2 | Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software |
not_valid_before | 2017-08-24 | 2015-11-03 |
not_valid_after | 2022-08-24 | 2020-11-03 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_53en.pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V3b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_53fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V3a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) | |
state/report/pdf_hash | 8734501e1c7636c54df911cb919114e652127aa4764a41490abb88660a43548a | 152859bde53573b0dcd40d97470caeeb8c1bc4bc01f5ced60ba24571bf766b3d |
state/report/txt_hash | 54a08816ad086cc6c3ee2a67a4fb262927d86ce4f87c925334e8e15c48e67f1f | 8048dbf6fd04ed99921cfd83fe85f5fbfca11a46f5b78ec2a85f46c1aeb8e4f6 |
state/st/pdf_hash | 8f314e39aa3e10ea1a3abadb85cd2a72da352657847e16b47842ee572b906ebe | 9797219f438a56fd4c679c17ca6a01dff54b960ce15f215a786eb744d62263e3 |
state/st/txt_hash | 3655712cf2a610a90e70dc45a2d2c4edea02a54e67451d0689bbc04a60e77478 | 91961c6ffe33466532822f8dc8282cb967d030154d1ee4dbefe5cbb99ee5e71a |
heuristics/cert_id | ANSSI-CC-2017/53 | BSI-DSZ-CC-0827-V3-2015 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 2, 32 | 1.01.0008, 1.03.006 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2018/12 | BSI-DSZ-CC-0827-V4-2016 |
heuristics/report_references/directly_referencing | ANSSI-CC-2017/11 | BSI-DSZ-CC-0827-V2-2014 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2019/03, 2017-62-INF-3233, ANSSI-CC-2021/04, ANSSI-CC-2018/12, KECS-ISIS-0936-2019, ANSSI-CC-2021/03, ANSSI-CC-2021/05, ANSSI-CC-2018/13, KECS-ISIS-0937-2019, ANSSI-CC-2019/01, ANSSI-CC-2019/61, ANSSI-CC-2019/59, 2017-63-INF-3232, ANSSI-CC-2019/02, ANSSI-CC-2019/51, ANSSI-CC-2019/60, ANSSI-CC-2018/14, ANSSI-CC-2021/06 | CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V5-2017 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2017/11 | BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0791-2012 |
heuristics/scheme_data |
|
None |
pdf_data/report_filename | anssi-cc-2017_53fr.pdf | 0827V3a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 10 | 5 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 7 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 2 | 3 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 3 | 6 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 | 1 | 7 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 | 1 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 3 | 14 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 | 1 | 4 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/crypto_scheme | |
|
pdf_data/report_keywords/ecc_curve | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/TRNG |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 8 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 3 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/tee_name | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//CreationDate | D:20170904142818+02'00' | D:20151120082832+01'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.025 | "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software" |
pdf_data/report_metadata//ModDate | D:20170911162916+02'00' | D:20151120121430+01'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | LibreOffice 4.2 |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-xxxx-200x | |
pdf_data/report_metadata/pdf_file_size_bytes | 713542 | 1387317 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_number_of_pages | 19 | 46 |
pdf_data/st_filename | anssi-cible-cc-2017_53en.pdf.pdf | 0827V3b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 30 | 20 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 15 | 6 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 21 | 14 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 4 | 5 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 6 | 1 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 6 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 7 | 9 |
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 | 1 | 4 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 13 | 11 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 2 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 2 | 3 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 6 | 7 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 3 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 8 | 4 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 10 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 13 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 26 | 31 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 17 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 51 | 47 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 27 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 17 | 12 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 14 | 30 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 20 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 13 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 13 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 13 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 2 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 22 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 16 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 15 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 13 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 20 | 14 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 8 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 7 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 3 | 2 |
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/ecc_curve/NIST |
|
|
pdf_data/st_keywords/ecc_curve/NIST/P-192 | 8 | 4 |
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 | 3 | 47 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 | 6 | 47 |
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 8 | 11 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 1 | 14 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 12 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 23 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing | 9 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 2 | 6 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 5 | 1 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 30 | 27 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA | 1 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 13 | 4 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 6 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 10 | 5 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//CreationDate | D:20170522222620+09'00' | D:20150930134010 |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//ModDate | D:20170911162903+02'00' | D:20150930134010 |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//Title | Security Target Lite | |
pdf_data/st_metadata/pdf_file_size_bytes | 1236724 | 921413 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | http://www.bsi.bund.de/, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_number_of_pages | 110 | 85 |
dgst | 2fa836f2d10827ff | ce8e09d43878d381 |