This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0728-2011 |
Infineon IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional ACL v3.04.001, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC-dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001 NSCIB-CC-2200060-01-CR |
|
---|---|---|
name | Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software | Infineon IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional ACL v3.04.001, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC-dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001 |
not_valid_before | 2011-05-05 | 2023-06-24 |
not_valid_after | 2019-09-01 | 2028-06-24 |
scheme | DE | NL |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200060-01-STlite%20v1_88.pdf |
status | archived | active |
security_level | EAL5+, AVA_VAN.5, ALC_DVS.2 | ALC_FLR.1, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200060-01-CR.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200060-01-Cert.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': None}) |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 8, 8), 'maintenance_title': 'Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, ECv1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728_ma1a_pdf.pdf', 'maintenance_st_link': None}) | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2023, 10, 4), 'maintenance_title': 'IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional ACL v3.04.001, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC-dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200060-01-MA1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200060-01-MA1-STLitev19.pdf'}) |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | 615b23ec57f2703a88a96670a5e6e42edb6c02443a7480f124aa96cfe8a6a86f |
state/cert/txt_hash | None | 059c1c30bcaa77fad7ec2395b4fd27037422e3abbb58d797ba402a5a67008c2b |
state/report/pdf_hash | 3a7a84ff09c6a54b24abc9bb97776f5ccac5ccf7fae5c632b22797386c345f1a | bdc4164ecce5865032d66212edee0d4dcd045862af117668f6e9319db6ddc3ac |
state/report/txt_hash | 153114c4916b3a171d2348304bfb93e59cec53e4470e4488fb4faed50a156ad1 | af34e4becb1c084358c51b3a6dedab40bc18f235ae8a7862facda84d35e344de |
state/st/pdf_hash | 8c19392296315dc4ebf5ac0de8045b41ad6a25ee0581c22b85fd080a42527762 | 8a76512ddfbb54575b40561d0930e31fa06091b9ba26163b56b5ba35c6c5d2fa |
state/st/txt_hash | b2c17d95a093b2c4e8de85da670118f8f02acb7d1e23560383ffd090a609396f | 3121adc763264f6989c466afbb834c12f1d8f98da02859c83cb8691d84c4ebb2 |
heuristics/cert_id | BSI-DSZ-CC-0728-2011 | NSCIB-CC-2200060-01-CR |
heuristics/cert_lab | BSI | |
heuristics/direct_transitive_cves | CVE-2017-15361 | None |
heuristics/extracted_versions | 1.01, 1.02.008 | 2.01.6198, 80.203.00.3, 8.06.001, 3.03.003, 2.13.001, 1.10.006, 3.04.001, 1.13.001 |
heuristics/indirect_transitive_cves | CVE-2017-15361 | None |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0729-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0763-2012, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0733-2011 | BSI-DSZ-CC-1071-V7-2023, BSI-DSZ-CC-1071-V6-2023 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0640-2010 | None |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2015/02, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2013/10, BSI-DSZ-CC-0880-2013, ANSSI-CC-2014/48, ANSSI-CC-2014/09, BSI-DSZ-CC-0729-2011, ANSSI-CC-2016/73, BSI-DSZ-CC-0761-2013, ANSSI-CC-2013/32, ANSSI-CC-2015/37, ANSSI-CC-2013/40, CRP290, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, ANSSI-CC-2016/03, ANSSI-CC-2014/06, ANSSI-CC-2014/86, BSI-DSZ-CC-0850-2013, ANSSI-CC-2015/30, ANSSI-CC-2015/04, ANSSI-CC-2015/15, BSI-DSZ-CC-0889-2013, ANSSI-CC-2015/39, ANSSI-CC-2015/03, ANSSI-CC-2014/07, ANSSI-CC-2015/25, BSI-DSZ-CC-0952-V2-2016, BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0898-2014, ANSSI-CC-2016/04, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, BSI-DSZ-CC-0813-2012, ANSSI-CC-2015/38, ANSSI-CC-2013/55, ANSSI-CC-2012/40, ANSSI-CC-2014/62, ANSSI-CC-2012/41, ANSSI-CC-2012/44, ANSSI-CC-2014/14, ANSSI-CC-2013/33, ANSSI-CC-2014/49, ANSSI-CC-2012/38, ANSSI-CC-2013/42, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2014/13, ANSSI-CC-2012/51, BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2015/40, BSI-DSZ-CC-0904-2015, ANSSI-CC-2016/75, BSI-DSZ-CC-0763-2012, ANSSI-CC-2013/64, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0733-2011, ANSSI-CC-2015/01, ANSSI-CC-2016/74, ANSSI-CC-2014/61, ANSSI-CC-2014/08, BSI-DSZ-CC-0764-2012, ANSSI-CC-2015/09, ANSSI-CC-2014/50, ANSSI-CC-2012/50, ANSSI-CC-2015/41, ANSSI-CC-2015/08, ANSSI-CC-2012/85, ANSSI-CC-2013/11 | BSI-DSZ-CC-1071-V7-2023, BSI-DSZ-CC-1071-V6-2023 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0640-2010 | None |
heuristics/scheme_data | None |
|
heuristics/st_references/directly_referenced_by | BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0729-2011 | None |
heuristics/st_references/directly_referencing | BSI-DSZ-CC-0640-2010 | None |
heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0904-2015, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2016/75, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2013/10, ANSSI-CC-2012/41, ANSSI-CC-2014/62, BSI-DSZ-CC-0880-2013, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, ANSSI-CC-2014/48, ANSSI-CC-2012/44, BSI-DSZ-CC-0733-2011, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, BSI-DSZ-CC-0729-2011, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2013/32, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0751-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, BSI-DSZ-CC-0813-2012, ANSSI-CC-2014/13, ANSSI-CC-2012/51 | None |
heuristics/st_references/indirectly_referencing | BSI-DSZ-CC-0640-2010 | None |
pdf_data/cert_filename | None | NSCIB-2200060-01-Cert.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | 0728a_pdf.pdf | NSCIB-2200060-01-CR.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 3 | 4 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 | 1 | 2 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN | 2 | 1 |
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 6 | 3 |
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL4 | 8 | 1 |
pdf_data/report_keywords/cc_security_level/EAL/EAL6 | 4 | 1 |
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/crypto_scheme | |
|
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik | 4 | 3 |
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 1 | 9 |
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/side_channel_analysis/SCA |
|
|
pdf_data/report_keywords/side_channel_analysis/other |
|
|
pdf_data/report_keywords/side_channel_analysis/other/JIL | 3 | 2 |
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 4 | 9 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/vendor/Infineon |
|
|
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG | 20 | 3 |
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | Denise Cater |
pdf_data/report_metadata//CreationDate | D:20110518111733+02'00' | D:20230712144749+01'00' |
pdf_data/report_metadata//Creator | Writer | Microsoft® Word 2021 |
pdf_data/report_metadata//ModDate | D:20110518112550+02'00' | D:20230712144749+01'00' |
pdf_data/report_metadata//Producer | OpenOffice.org 3.2 | Microsoft® Word 2021 |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0728-2011 | Certification Report |
pdf_data/report_metadata/pdf_file_size_bytes | 1212432 | 220929 |
pdf_data/report_metadata/pdf_number_of_pages | 44 | 13 |
pdf_data/st_filename | 0728b_pdf.pdf | NSCIB-2200060-01-STlite v1_88.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 10 | 9 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 12 | 11 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 5 | 7 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 1 | 4 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 | 1 | 4 |
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 9 | 4 |
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL | 2 | 10 |
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD | 2 | 4 |
pdf_data/st_keywords/cc_sar/ASE/ASE_INT | 2 | 26 |
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ | 2 | 9 |
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ | 2 | 47 |
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD | 2 | 8 |
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS | 2 | 16 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 11 | 3 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 4 | 3 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 10 | 11 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 24 | 77 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 33 | 32 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 5 | 4 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 24 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 58 | 151 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 28 | 27 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 4 | 61 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 11 | 18 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 27 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 22 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 15 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 18 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 18 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 17 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 15 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 3 | 29 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 7 | 12 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 7 | 11 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 20 | 17 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 21 | 20 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 16 | 15 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 19 | 22 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 15 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 25 | 19 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST | 7 | 5 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 | 36 | 31 |
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 7 | 9 |
pdf_data/st_keywords/certification_process | |
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC | 2 | 15 |
pdf_data/st_keywords/cipher_mode/CFB/CFB | 4 | 7 |
pdf_data/st_keywords/cipher_mode/ECB/ECB | 2 | 17 |
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/KA |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 1 | 2 |
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-2 | 61 | 1 |
pdf_data/st_keywords/randomness/PRNG |
|
|
pdf_data/st_keywords/randomness/PRNG/PRNG | 6 | 1 |
pdf_data/st_keywords/randomness/RNG/RND | 2 | 5 |
pdf_data/st_keywords/randomness/RNG/RNG | 3 | 34 |
pdf_data/st_keywords/randomness/TRNG/TRNG | 13 | 3 |
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 7 | 3 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 12 | 11 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 10 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 10 | 12 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 5 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 6 | 7 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 5 | 9 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 | 1 | 9 |
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 24 | 43 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 6 | 18 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/vendor/Infineon/Infineon | 5 | 12 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies | 7 | 21 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG | 15 | 30 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Hans-Ulrich Buchmüller | Jürgen Noller |
pdf_data/st_metadata//CreationDate | D:20110415135116 | D:20230630104033+02'00' |
pdf_data/st_metadata//Creator | SecurityTarget_SLE78_M7820_A11.doc - Microsoft Word | Microsoft® Word 2016 |
pdf_data/st_metadata//Keywords | Security Target, contactless, dual interface, DCLB, RSA, EC, SHA-2, Toolbox, Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, Elliptic Curve, cryptographic, libraries, PP0035 | Infineon, EAL6 +, EAL6 plus, PP0084, SmartCard |
pdf_data/st_metadata//Producer | Acrobat PDFWriter 5.0 für Windows NT | Microsoft® Word 2016 |
pdf_data/st_metadata//Title | CC EAL5+ Certification Security Target | Security Target Lite |
pdf_data/st_metadata/pdf_file_size_bytes | 551119 | 2685059 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ietf.org/rfc/rfc5639.txt, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.infineon.com/, http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html | |
pdf_data/st_metadata/pdf_number_of_pages | 79 | 120 |
dgst | 327502c9e9054739 | 6466cb14efee3cf0 |