Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
BSI-DSZ-CC-0728-2011
Infineon Technologies SmartCard IC (Security Controller) M7793 A12 with optional RSAv1.02.010, EC v1.02.010 and Toolbox v1.02.010 libraries and with specific IC-dedicated software
BSI-DSZ-CC-0757-2011
name Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software Infineon Technologies SmartCard IC (Security Controller) M7793 A12 with optional RSAv1.02.010, EC v1.02.010 and Toolbox v1.02.010 libraries and with specific IC-dedicated software
not_valid_before 2011-05-05 2011-09-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0757b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0757a_pdf.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 8, 8), 'maintenance_title': 'Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, ECv1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728_ma1a_pdf.pdf', 'maintenance_st_link': None}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2012, 2, 21), 'maintenance_title': 'Infineon Technologies SmartCard IC (Security Controller) M7793 A12 with optional RSA v1.02.010, EC v1.02.010 and Toolbox v1.02.010 libraries and with specific IC-dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0757_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0757_ma1b_pdf.pdf'})
state/report/pdf_hash 3a7a84ff09c6a54b24abc9bb97776f5ccac5ccf7fae5c632b22797386c345f1a b7acbc354f232e99596487fe0562a0b9431471aba38c5c323049723ca109588d
state/report/txt_hash 153114c4916b3a171d2348304bfb93e59cec53e4470e4488fb4faed50a156ad1 6a403df225df7712bfe02b09809c9994e058021d39ea6a540dc6617a647fdae6
state/st/pdf_hash 8c19392296315dc4ebf5ac0de8045b41ad6a25ee0581c22b85fd080a42527762 f783c3f8153b4030de25d14f651efe4e0909e6bc43568e511d12a5e99d69d04c
state/st/txt_hash b2c17d95a093b2c4e8de85da670118f8f02acb7d1e23560383ffd090a609396f ad38709c4a4dbe2aae8b242afe00bbd60e2ea310c08be77ee1f261858f63890e
heuristics/cert_id BSI-DSZ-CC-0728-2011 BSI-DSZ-CC-0757-2011
heuristics/extracted_versions 1.01, 1.02.008 1.02.010
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0729-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0763-2012, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0733-2011 BSI-DSZ-CC-0907-2013
heuristics/report_references/directly_referencing BSI-DSZ-CC-0640-2010 None
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/02, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2013/10, BSI-DSZ-CC-0880-2013, ANSSI-CC-2014/48, ANSSI-CC-2014/09, BSI-DSZ-CC-0729-2011, ANSSI-CC-2016/73, BSI-DSZ-CC-0761-2013, ANSSI-CC-2013/32, ANSSI-CC-2015/37, ANSSI-CC-2013/40, CRP290, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, ANSSI-CC-2016/03, ANSSI-CC-2014/06, ANSSI-CC-2014/86, BSI-DSZ-CC-0850-2013, ANSSI-CC-2015/30, ANSSI-CC-2015/04, ANSSI-CC-2015/15, BSI-DSZ-CC-0889-2013, ANSSI-CC-2015/39, ANSSI-CC-2015/03, ANSSI-CC-2014/07, ANSSI-CC-2015/25, BSI-DSZ-CC-0952-V2-2016, BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0898-2014, ANSSI-CC-2016/04, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, BSI-DSZ-CC-0813-2012, ANSSI-CC-2015/38, ANSSI-CC-2013/55, ANSSI-CC-2012/40, ANSSI-CC-2014/62, ANSSI-CC-2012/41, ANSSI-CC-2012/44, ANSSI-CC-2014/14, ANSSI-CC-2013/33, ANSSI-CC-2014/49, ANSSI-CC-2012/38, ANSSI-CC-2013/42, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2014/13, ANSSI-CC-2012/51, BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2015/40, BSI-DSZ-CC-0904-2015, ANSSI-CC-2016/75, BSI-DSZ-CC-0763-2012, ANSSI-CC-2013/64, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0733-2011, ANSSI-CC-2015/01, ANSSI-CC-2016/74, ANSSI-CC-2014/61, ANSSI-CC-2014/08, BSI-DSZ-CC-0764-2012, ANSSI-CC-2015/09, ANSSI-CC-2014/50, ANSSI-CC-2012/50, ANSSI-CC-2015/41, ANSSI-CC-2015/08, ANSSI-CC-2012/85, ANSSI-CC-2013/11 ANSSI-CC-2016/06, ANSSI-CC-2016/24, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0926-V2-2017, ANSSI-CC-2016/23, BSI-DSZ-CC-0907-2013
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0640-2010 None
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0729-2011 None
heuristics/st_references/directly_referencing BSI-DSZ-CC-0640-2010 None
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0904-2015, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2016/75, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2013/10, ANSSI-CC-2012/41, ANSSI-CC-2014/62, BSI-DSZ-CC-0880-2013, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, ANSSI-CC-2014/48, ANSSI-CC-2012/44, BSI-DSZ-CC-0733-2011, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, BSI-DSZ-CC-0729-2011, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2013/32, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0751-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, BSI-DSZ-CC-0813-2012, ANSSI-CC-2014/13, ANSSI-CC-2012/51 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0640-2010 None
pdf_data/report_filename 0728a_pdf.pdf 0757a_pdf.pdf
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0728-2011 BSI-DSZ-CC-0757-2011
pdf_data/report_frontpage/DE/cert_item Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software Infineon Technologies SmartCard IC (Security Controller) M7793 A12 with optional RSA v1.02.010, EC v1.02.010 and Toolbox v1.02.010 libraries and with specific IC-dedicated software
pdf_data/report_keywords/asymmetric_crypto/ECC
  • ECC:
    • ECC: 3
  • ECDH:
    • ECDH: 1
  • ECDSA:
    • ECDSA: 4
  • ECC:
    • ECC: 3
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA-2048 1 2
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 1 2
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA4096 1 2
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0728-2011: 23
  • BSI-DSZ-CC-0640-2010: 3
  • BSI-DSZ-CC-0757-2011: 23
  • BSI-DSZ-CC-0757: 2
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.5 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.2 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.4 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 3 1
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.2 1 6
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.3 2 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 6
  • EAL 4: 3
  • EAL1: 7
  • EAL4: 8
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL 5 augmented: 3
  • EAL 4: 13
  • EAL 5: 9
  • EAL1: 7
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL5: 1
  • EAL7: 4
  • EAL2: 3
  • EAL 4 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 3 13
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 6 9
pdf_data/report_keywords/cc_security_level/EAL/EAL5 6 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • M7820 A11, Version 1, 2011-04-15, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 1: 1
  • TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 including optional Software Libraries RSA – EC –: 1
  • – Toolbox, Version 1.2, 2011-01-26, Infineon Technologies AG (confidential document) [11] SLE/SLM 70 Family Production and Personalization, Version 2010-12-13, 2010-12-13, Infineon: 1
  • optional Software Libraries RSA – EC – Toolbox, Version 2.0, 2011-07-07, Infineon Technologies AG (confidential document) [7] Security Target Lite, BSI-DSZ-CC-0757, M7793 A12 including optional Software Libraries RSA –: 1
  • M7793 A12, Version 2, 2011-09-19, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7793 A12, Version 2: 1
  • TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
  • optional Software Libraries RSA – EC – Toolbox, Version 1.5, 2011-06-29, Infineon Technologies AG (confidential document) [12] SLx 70 Family Production and Personalization User’s Manual, Version 2011-06-21, 2011-06-21: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 17
pdf_data/report_keywords/randomness/TRNG/TRNG 1 2
pdf_data/report_keywords/side_channel_analysis/FI/DFA 3 5
pdf_data/report_keywords/side_channel_analysis/SCA
  • SPA: 3
  • DPA: 3
  • physical probing: 1
  • SPA: 5
  • DPA: 5
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 3 5
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 3 5
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 36: 3
    • AIS31: 1
    • AIS 20: 1
    • AIS 32: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 18092: 6
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 36: 3
    • AIS 35: 1
    • AIS31: 1
    • AIS 20: 1
    • AIS 32: 1
    • AIS 38: 1
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS31: 1
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS 35: 1
  • AIS31: 1
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 4 6
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 3 5
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 12
    • Infineon Technologies AG: 20
    • Infineon Technologies: 7
  • Infineon:
    • Infineon Technologies: 15
    • Infineon Technologies AG: 21
    • Infineon: 4
  • GD:
    • Giesecke & Devrient: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 12 4
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 7 15
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 20 21
pdf_data/report_metadata//CreationDate D:20110518111733+02'00' D:20111102110158+01'00'
pdf_data/report_metadata//Keywords "Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologies AG, Common Criteria, Certification, Zertifizierung" "Common Criteria, Certification, Zertifizierung, Infineon Technologies SmartCard IC (Security Controller) M7793 A12 with optional RSA v1.02.010, EC v1.02.010 and Toolbox v1.02.010 libraries and with specific IC-dedicated software, Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20110518112550+02'00' D:20111102110407+01'00'
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0728-2011 Certification Report BSI-DSZ-CC-0757-2011
pdf_data/report_metadata/pdf_file_size_bytes 1212432 1027641
pdf_data/st_filename 0728b_pdf.pdf 0757b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 4 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 12 9
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 5 4
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0640-2010: 1
pdf_data/st_keywords/cc_claims/O/O.RND 1 3
pdf_data/st_keywords/cc_claims/T/T.RND 1 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
  • ADV_ARC.1: 2
  • ADV_FSP.4: 1
  • ADV_IMP.1: 2
  • ADV_TDS.3: 2
  • ADV_FSP.2: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 1 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_CMS: 1
  • ALC_CMS.4: 1
  • ALC_DVS.1: 1
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.1: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 9
  • ATE_COV.2: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 5
  • EAL 5: 3
  • EAL5 augmented: 1
  • EAL 5 augmented: 3
  • EAL4+: 1
  • EAL4: 5
  • EAL 4: 1
  • EAL4 augmented: 1
  • EAL 4 augmented: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS 4 5
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 10 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 24 18
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 33 32
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 24 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 58 34
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 28 32
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 11 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 25 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 22 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 15 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 18 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 18 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 18 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 17 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 15 12
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 20
  • FMT_MSA.3: 21
  • FMT_SMF.1: 16
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 1
  • FMT_CKM.4: 1
  • FMT_MSA.1: 14
  • FMT_MSA.3: 15
  • FMT_SMF.1: 11
  • FMT_LIM: 3
  • FMT_LIM.1: 5
  • FMT_LIM.2: 5
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 7 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 7 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 1 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 21 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 16 11
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST: 7
  • FPT_TST.2: 36
  • FPT_TST.1: 11
  • FPT_FLS.1: 19
  • FPT_PHP.3: 25
  • FPT_ITT.1: 16
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_TST: 7
  • FPT_TST.2: 31
  • FPT_TST.1: 11
  • FPT_FLS.1: 5
  • FPT_PHP.3: 4
  • FPT_ITT.1: 4
  • FPT_AMT.1: 2
  • FPT_TST.2.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_AMT.1 1 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 19 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 16 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 25 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 36 31
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 7 5
pdf_data/st_keywords/cipher_mode/CBC/CBC 2 1
pdf_data/st_keywords/cipher_mode/CFB/CFB 4 2
pdf_data/st_keywords/cipher_mode/ECB/ECB 2 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-512: 2
      • SHA-2: 61
  • SHA:
    • SHA1:
      • SHA1: 5
    • SHA2:
      • SHA256: 5
  • MD:
    • MD5:
      • MD5: 5
pdf_data/st_keywords/hash_function/SHA
  • SHA2:
    • SHA-256: 2
    • SHA-512: 2
    • SHA-2: 61
  • SHA1:
    • SHA1: 5
  • SHA2:
    • SHA256: 5
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 2
  • SHA-512: 2
  • SHA-2: 61
  • SHA256: 5
pdf_data/st_keywords/randomness/PRNG/PRNG 6 5
pdf_data/st_keywords/randomness/RNG/RND 2 6
pdf_data/st_keywords/randomness/RNG/RNG 3 2
pdf_data/st_keywords/randomness/TRNG/TRNG 13 5
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
  • fault induction: 1
  • Malfunction: 12
  • malfunction: 1
  • DFA: 6
pdf_data/st_keywords/side_channel_analysis/FI/DFA 7 6
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 6
  • SPA: 5
  • DPA: 10
  • Leak-Inherent: 9
  • Physical Probing: 2
  • SPA: 4
  • DPA: 6
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 10 6
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 10 9
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 5 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 180-3: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS 32: 1
    • AIS32: 4
    • AIS31: 5
  • RFC:
    • RFC3447: 11
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC18092: 6
    • ISO/IEC 18092: 6
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-001: 1
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS31: 4
  • RFC:
    • RFC3447: 6
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS 32: 1
  • AIS32: 4
  • AIS31: 5
  • AIS31: 4
pdf_data/st_keywords/standard_id/BSI/AIS31 5 4
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-002 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-003 2 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 2
  • FIPS PUB 180-3: 2
  • FIPS PUB 197: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 2 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 14443: 2
  • ISO/IEC18092: 6
  • ISO/IEC 18092: 6
  • ISO/IEC 7816-3: 1
  • ISO/IEC 7816-3: 1
pdf_data/st_keywords/standard_id/RFC/RFC3447 11 6
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • DES:
      • DES: 6
    • 3DES:
      • 3DES: 17
      • Triple-DES: 2
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • 3DES: 9
      • Triple-DES: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 24 13
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 17 9
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 2 1
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 6 5
pdf_data/st_keywords/vendor/Infineon/Infineon 5 4
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 7 4
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 15 11
pdf_data/st_metadata
  • pdf_file_size_bytes: 551119
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
  • /Creator: SecurityTarget_SLE78_M7820_A11.doc - Microsoft Word
  • /CreationDate: D:20110415135116
  • /Subject: Security Target M7820 Integrity Guard
  • /Title: CC EAL5+ Certification Security Target
  • /Author: Hans-Ulrich Buchmüller
  • /Producer: Acrobat PDFWriter 5.0 für Windows NT
  • /Keywords: Security Target, contactless, dual interface, DCLB, RSA, EC, SHA-2, Toolbox, Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, Elliptic Curve, cryptographic, libraries, PP0035
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 408744
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
  • /Creator: Microsoft Word - M7793SecurityTargetLite
  • /Producer: ScanSoft PDF Create! 6
  • /CreationDate: D:20110927105537+01'00'
  • /ModDate: D:20110927105537+01'00'
  • /Author: Steffen Heinkel
  • /Title: M7793 Security Target
  • /Keywords: M7793, CC, EAL4+
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Hans-Ulrich Buchmüller Steffen Heinkel
pdf_data/st_metadata//CreationDate D:20110415135116 D:20110927105537+01'00'
pdf_data/st_metadata//Creator SecurityTarget_SLE78_M7820_A11.doc - Microsoft Word Microsoft Word - M7793SecurityTargetLite
pdf_data/st_metadata//Keywords Security Target, contactless, dual interface, DCLB, RSA, EC, SHA-2, Toolbox, Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, Elliptic Curve, cryptographic, libraries, PP0035 M7793, CC, EAL4+
pdf_data/st_metadata//Producer Acrobat PDFWriter 5.0 für Windows NT ScanSoft PDF Create! 6
pdf_data/st_metadata//Title CC EAL5+ Certification Security Target M7793 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 551119 408744
pdf_data/st_metadata/pdf_number_of_pages 79 58
dgst 327502c9e9054739 b12707051b8e1919