Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
BSI-DSZ-CC-0728-2011
Infineon smartcard IC (Security Controller) M7791 B12 with optional SCL library version 1.01.009 and with specific IC-dedicated firmware
BSI-DSZ-CC-0854-2013
name Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software Infineon smartcard IC (Security Controller) M7791 B12 with optional SCL library version 1.01.009 and with specific IC-dedicated firmware
not_valid_before 2011-05-05 2013-08-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0854b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0854a_pdf.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 8, 8), 'maintenance_title': 'Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, ECv1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728_ma1a_pdf.pdf', 'maintenance_st_link': None})
state/report/pdf_hash 3a7a84ff09c6a54b24abc9bb97776f5ccac5ccf7fae5c632b22797386c345f1a 29710d273ccf20bc77f47302a7a6bf16bf3fbcf2ce2d38984c4ed9baa8c855eb
state/report/txt_hash 153114c4916b3a171d2348304bfb93e59cec53e4470e4488fb4faed50a156ad1 8d05fdaa917941856810603cd955ff980dc7222481b388d74c0875af6523a697
state/st/pdf_hash 8c19392296315dc4ebf5ac0de8045b41ad6a25ee0581c22b85fd080a42527762 92db21758fb5df924721f2ed108b97f0f65ea512886c82bd673426d676a4fe21
state/st/txt_hash b2c17d95a093b2c4e8de85da670118f8f02acb7d1e23560383ffd090a609396f bb44dcba929740c389c576e1d0692424849004b4e588ca173b1c4478171bed08
heuristics/cert_id BSI-DSZ-CC-0728-2011 BSI-DSZ-CC-0854-2013
heuristics/direct_transitive_cves CVE-2017-15361 None
heuristics/extracted_versions 1.01, 1.02.008 1.01.009
heuristics/indirect_transitive_cves CVE-2017-15361 None
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0729-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0763-2012, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0733-2011 BSI-DSZ-CC-0963-2015, BSI-DSZ-CC-0944-2014
heuristics/report_references/directly_referencing BSI-DSZ-CC-0640-2010 BSI-DSZ-CC-0814-2012
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/02, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2013/10, BSI-DSZ-CC-0880-2013, ANSSI-CC-2014/48, ANSSI-CC-2014/09, BSI-DSZ-CC-0729-2011, ANSSI-CC-2016/73, BSI-DSZ-CC-0761-2013, ANSSI-CC-2013/32, ANSSI-CC-2015/37, ANSSI-CC-2013/40, CRP290, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, ANSSI-CC-2016/03, ANSSI-CC-2014/06, ANSSI-CC-2014/86, BSI-DSZ-CC-0850-2013, ANSSI-CC-2015/30, ANSSI-CC-2015/04, ANSSI-CC-2015/15, BSI-DSZ-CC-0889-2013, ANSSI-CC-2015/39, ANSSI-CC-2015/03, ANSSI-CC-2014/07, ANSSI-CC-2015/25, BSI-DSZ-CC-0952-V2-2016, BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0898-2014, ANSSI-CC-2016/04, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, BSI-DSZ-CC-0813-2012, ANSSI-CC-2015/38, ANSSI-CC-2013/55, ANSSI-CC-2012/40, ANSSI-CC-2014/62, ANSSI-CC-2012/41, ANSSI-CC-2012/44, ANSSI-CC-2014/14, ANSSI-CC-2013/33, ANSSI-CC-2014/49, ANSSI-CC-2012/38, ANSSI-CC-2013/42, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2014/13, ANSSI-CC-2012/51, BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2015/40, BSI-DSZ-CC-0904-2015, ANSSI-CC-2016/75, BSI-DSZ-CC-0763-2012, ANSSI-CC-2013/64, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0733-2011, ANSSI-CC-2015/01, ANSSI-CC-2016/74, ANSSI-CC-2014/61, ANSSI-CC-2014/08, BSI-DSZ-CC-0764-2012, ANSSI-CC-2015/09, ANSSI-CC-2014/50, ANSSI-CC-2012/50, ANSSI-CC-2015/41, ANSSI-CC-2015/08, ANSSI-CC-2012/85, ANSSI-CC-2013/11 BSI-DSZ-CC-0963-V3-2021, BSI-DSZ-CC-1017-2017, BSI-DSZ-CC-0990-2016, BSI-DSZ-CC-0944-2014, BSI-DSZ-CC-0963-2015, BSI-DSZ-CC-0990-V2-2017, BSI-DSZ-CC-0963-V2-2017, BSI-DSZ-CC-1014-2017
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0640-2010 BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0814-2012
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0729-2011 BSI-DSZ-CC-0944-2014
heuristics/st_references/directly_referencing BSI-DSZ-CC-0640-2010 None
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0904-2015, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2016/75, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2013/10, ANSSI-CC-2012/41, ANSSI-CC-2014/62, BSI-DSZ-CC-0880-2013, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, ANSSI-CC-2014/48, ANSSI-CC-2012/44, BSI-DSZ-CC-0733-2011, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, BSI-DSZ-CC-0729-2011, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2013/32, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0751-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, BSI-DSZ-CC-0813-2012, ANSSI-CC-2014/13, ANSSI-CC-2012/51 BSI-DSZ-CC-0944-2014
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0640-2010 None
pdf_data/report_filename 0728a_pdf.pdf 0854a_pdf.pdf
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0728-2011 BSI-DSZ-CC-0854-2013
pdf_data/report_frontpage/DE/cert_item Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software Infineon smartcard IC (Security Controller) M7791 B12 with optional SCL library version 1.01.009 and with specific IC-dedicated firmware
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
    • RSA-2048: 1
    • RSA 1024: 1
  • ECC:
    • ECC:
      • ECC: 3
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
    • ECC:
      • ECC: 4
pdf_data/report_keywords/asymmetric_crypto/ECC
  • ECC:
    • ECC: 3
  • ECDH:
    • ECDH: 1
  • ECDSA:
    • ECDSA: 1
  • ECC:
    • ECC: 4
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 3 4
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0728-2011: 23
  • BSI-DSZ-CC-0640-2010: 3
  • BSI-DSZ-CC-0854-2013: 24
  • BSI-DSZ-CC-0814-2012: 3
  • BSI-DSZ-CC-0854: 1
  • BSI-DSZ-CC-S-0007-2011: 1
  • BSI-DSZ-CC-S-0015-2012: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0035-2007 3 4
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.5 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.2 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.4 2 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 3 2
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 6 7
pdf_data/report_keywords/cc_security_level/EAL/EAL4 8 7
pdf_data/report_keywords/cc_security_level/EAL/EAL5 6 7
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • M7820 A11, Version 1, 2011-04-15, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 1: 1
  • TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 including optional Software Libraries RSA – EC –: 1
  • – Toolbox, Version 1.2, 2011-01-26, Infineon Technologies AG (confidential document) [11] SLE/SLM 70 Family Production and Personalization, Version 2010-12-13, 2010-12-13, Infineon: 1
  • Software Library SCL BSI-DSZ-CC-0854-2013, Version 3.3, 2013-08-06, Infineon Technologies AG (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
  • Summary) for the M7791 B12, BSI-DSZ-CC-0854, Version 2, 2013-08-23, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7791 B12, Version 2: 1
  • TÜV Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M7791 B12 including optional Software Library SCL, Version 2.0: 1
  • 2013-04-03, Infineon Technologies AG (confidential document) [12] SLx 70 Family Production and Personalization User’s Manual, 2012-06-27, Infineon Technologies: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 17
pdf_data/report_keywords/randomness/PRNG/PRNG 1 3
pdf_data/report_keywords/randomness/TRNG/TRNG 1 4
pdf_data/report_keywords/side_channel_analysis/FI/DFA 3 4
pdf_data/report_keywords/side_channel_analysis/SCA
  • SPA: 3
  • DPA: 3
  • physical probing: 1
  • SPA: 4
  • DPA: 4
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 3 4
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 3 4
pdf_data/report_keywords/side_channel_analysis/other/JIL 3 4
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS31: 1
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS 35: 2
  • AIS31: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 2
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 18092 6 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 4 14
pdf_data/report_keywords/symmetric_crypto/DES/3DES/3DES 3 10
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 3 5
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 12
    • Infineon Technologies AG: 20
    • Infineon Technologies: 7
  • Infineon:
    • Infineon: 11
    • Infineon Technologies AG: 19
    • Infineon Technologies: 11
  • GD:
    • G&D: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 12 11
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 7 11
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 20 19
pdf_data/report_metadata//CreationDate D:20110518111733+02'00' D:20130912082800+02'00'
pdf_data/report_metadata//Keywords "Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologies AG, Common Criteria, Certification, Zertifizierung" "Common Criteria, Certification, Zertifizierung, Infineon smartcard IC (Security Controller) M7791 B12 with optional SCL library version 1.01.009 and with specific IC-dedicated firmware, Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20110518112550+02'00' D:20130916114955+02'00'
pdf_data/report_metadata//Producer OpenOffice.org 3.2 LibreOffice 3.6
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0728-2011 Certification Report BSI-DSZ-CC-0854-2013
pdf_data/report_metadata/pdf_file_size_bytes 1212432 1160278
pdf_data/report_metadata/pdf_number_of_pages 44 42
pdf_data/st_filename 0728b_pdf.pdf 0854b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
    • RSA-2048: 1
  • ECC:
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 12
    • ECC:
      • ECC: 10
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • ECC:
    • ECC:
      • ECC: 9
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 4
  • ECDSA:
    • ECDSA: 12
  • ECC:
    • ECC: 10
  • ECC:
    • ECC: 9
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 10 9
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0640-2010: 1
pdf_data/st_keywords/cc_claims/O/O.RND 1 3
pdf_data/st_keywords/cc_claims/T/T.RND 1 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
  • ADV_ARC.1: 2
  • ADV_FSP.5: 1
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 3 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_CMS: 1
  • ALC_CMS.4: 1
  • ALC_DVS.1: 1
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 3 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 5
  • EAL 5: 3
  • EAL5 augmented: 1
  • EAL 5 augmented: 3
  • EAL5+: 1
  • EAL5: 6
  • EAL5 augmented: 2
pdf_data/st_keywords/cc_security_level/EAL/EAL5 5 6
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 10
    • FAU_SAS: 4
    • FAU_GEN: 1
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 11
    • FCS_COP.1: 28
    • FCS_CKM.1: 33
    • FCS_RNG: 4
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_COP: 58
    • FCS_CKM.4: 24
    • FCS_CKM: 24
    • FCS_CKM.2: 5
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACF.1: 22
    • FDP_SDI.1: 17
    • FDP_SDI.2: 15
    • FDP_ITT.1: 18
    • FDP_IFC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 18
    • FDP_ITC.2: 18
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.3: 21
    • FMT_SMF.1: 16
    • FMT_LIM: 3
    • FMT_LIM.1: 7
    • FMT_LIM.2: 7
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 1
    • FMT_CKM.4: 1
  • FPT:
    • FPT_TST: 7
    • FPT_TST.2: 36
    • FPT_TST.1: 11
    • FPT_FLS.1: 19
    • FPT_PHP.3: 25
    • FPT_ITT.1: 16
    • FPT_TST.2.1: 1
    • FPT_AMT.1: 1
    • FPT_LIM.2: 1
  • FRU:
    • FRU_FLT.2: 7
  • FAU:
    • FAU_SAS.1: 8
    • FAU_SAS: 5
    • FAU_GEN: 1
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG: 12
    • FCS_RNG.1: 28
    • FCS_COP.1: 17
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_COP: 10
    • FCS_CKM.1: 11
    • FCS_CKM.4: 8
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACF.1: 15
    • FDP_SDI.1: 12
    • FDP_SDI.2: 12
    • FDP_ITT.1: 4
    • FDP_IFC.1: 6
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 9
    • FDP_ITC.2: 9
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_MSA.1: 14
    • FMT_MSA.3: 15
    • FMT_SMF.1: 11
    • FMT_LIM: 3
    • FMT_LIM.1: 5
    • FMT_LIM.2: 5
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 2
  • FPT:
    • FPT_TST: 7
    • FPT_TST.2: 31
    • FPT_TST.1: 11
    • FPT_FLS.1: 5
    • FPT_PHP.3: 4
    • FPT_ITT.1: 4
    • FPT_TST.2.1: 1
    • FPT_AMT.1: 1
  • FRU:
    • FRU_FLT.2: 5
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS 4 5
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 10 8
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 11
  • FCS_COP.1: 28
  • FCS_CKM.1: 33
  • FCS_RNG: 4
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_COP: 58
  • FCS_CKM.4: 24
  • FCS_CKM: 24
  • FCS_CKM.2: 5
  • FCS_RNG: 12
  • FCS_RNG.1: 28
  • FCS_COP.1: 17
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_COP: 10
  • FCS_CKM.1: 11
  • FCS_CKM.4: 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 33 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 24 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 58 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 28 17
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 4 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 11 28
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 25 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 22 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 15 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 18 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 18 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 18 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 17 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 15 12
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 20
  • FMT_MSA.3: 21
  • FMT_SMF.1: 16
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 1
  • FMT_CKM.4: 1
  • FMT_MSA.1: 14
  • FMT_MSA.3: 15
  • FMT_SMF.1: 11
  • FMT_LIM: 3
  • FMT_LIM.1: 5
  • FMT_LIM.2: 5
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 7 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 7 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 21 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 16 11
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST: 7
  • FPT_TST.2: 36
  • FPT_TST.1: 11
  • FPT_FLS.1: 19
  • FPT_PHP.3: 25
  • FPT_ITT.1: 16
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_TST: 7
  • FPT_TST.2: 31
  • FPT_TST.1: 11
  • FPT_FLS.1: 5
  • FPT_PHP.3: 4
  • FPT_ITT.1: 4
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 19 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 16 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 25 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 36 31
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 7 5
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 2
  • CFB:
    • CFB: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-512: 2
      • SHA-2: 61
pdf_data/st_keywords/randomness/PRNG/PRNG 6 5
pdf_data/st_keywords/randomness/RNG/RND 2 6
pdf_data/st_keywords/randomness/RNG/RNG 3 8
pdf_data/st_keywords/randomness/TRNG/TRNG 13 6
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
  • fault induction: 1
  • Malfunction: 12
  • malfunction: 1
  • DFA: 4
pdf_data/st_keywords/side_channel_analysis/FI/DFA 7 4
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 6
  • SPA: 5
  • DPA: 10
  • Leak-Inherent: 10
  • Physical Probing: 2
  • side channel: 1
  • SPA: 2
  • DPA: 4
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 10 4
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 5 2
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 6 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 180-3: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS 32: 1
    • AIS32: 4
    • AIS31: 5
  • RFC:
    • RFC3447: 11
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC18092: 6
    • ISO/IEC 18092: 6
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-001: 1
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS31: 3
  • ISO:
    • ISO/IEC 18092: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS 32: 1
  • AIS32: 4
  • AIS31: 5
  • AIS31: 3
pdf_data/st_keywords/standard_id/BSI/AIS31 5 3
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-001: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 2
  • FIPS PUB 180-3: 2
  • FIPS PUB 197: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 2 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 14443: 2
  • ISO/IEC18092: 6
  • ISO/IEC 18092: 6
  • ISO/IEC 7816-3: 1
  • ISO/IEC 18092: 2
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 18092 6 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • DES:
      • DES: 6
    • 3DES:
      • 3DES: 17
      • Triple-DES: 2
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 23
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • 3DES: 20
      • Triple-DES: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 24 23
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 17 20
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 6 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/vendor/Infineon/Infineon 5 2
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 7 18
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 15 11
pdf_data/st_metadata
  • pdf_file_size_bytes: 551119
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
  • /Creator: SecurityTarget_SLE78_M7820_A11.doc - Microsoft Word
  • /CreationDate: D:20110415135116
  • /Subject: Security Target M7820 Integrity Guard
  • /Title: CC EAL5+ Certification Security Target
  • /Author: Hans-Ulrich Buchmüller
  • /Producer: Acrobat PDFWriter 5.0 für Windows NT
  • /Keywords: Security Target, contactless, dual interface, DCLB, RSA, EC, SHA-2, Toolbox, Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, Elliptic Curve, cryptographic, libraries, PP0035
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 789206
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
  • /Title: CC EAL5+ high Certification Security Target Lite
  • /Author: Steffen Heinkel
  • /Subject: Security Target Lite M7791 B12
  • /Keywords: contactless, Security Controller, Infineon, CCv3.1, PP0035
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20130807083757+02'00'
  • /ModDate: D:20130807083757+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: http://www.bsi.bund.de/, http://www.infineon.com/
pdf_data/st_metadata//Author Hans-Ulrich Buchmüller Steffen Heinkel
pdf_data/st_metadata//CreationDate D:20110415135116 D:20130807083757+02'00'
pdf_data/st_metadata//Creator SecurityTarget_SLE78_M7820_A11.doc - Microsoft Word Microsoft® Word 2010
pdf_data/st_metadata//Keywords Security Target, contactless, dual interface, DCLB, RSA, EC, SHA-2, Toolbox, Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, Elliptic Curve, cryptographic, libraries, PP0035 contactless, Security Controller, Infineon, CCv3.1, PP0035
pdf_data/st_metadata//Producer Acrobat PDFWriter 5.0 für Windows NT Microsoft® Word 2010
pdf_data/st_metadata//Subject Security Target M7820 Integrity Guard Security Target Lite M7791 B12
pdf_data/st_metadata//Title CC EAL5+ Certification Security Target CC EAL5+ high Certification Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 551119 789206
pdf_data/st_metadata/pdf_hyperlinks http://www.bsi.bund.de/, http://www.infineon.com/
pdf_data/st_metadata/pdf_number_of_pages 79 58
dgst 327502c9e9054739 7427879a8013e4de