Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software
BSI-DSZ-CC-0554-2009
SAM 5000 build 4.9, BOS-V1 and RMS firmware with ID 80001141, SLE97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v1.03.006, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip)
CSEC2014007
name Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software SAM 5000 build 4.9, BOS-V1 and RMS firmware with ID 80001141, SLE97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v1.03.006, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip)
not_valid_before 2009-04-21 2017-06-16
not_valid_after 2019-09-01 2022-06-16
scheme DE SE
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0554b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/902390A.pdf
manufacturer Infineon Technologies AG Kapsch TrafficCom S.r.l.
manufacturer_web https://www.infineon.com/ https://www.kapsch.net/
security_level EAL5+, ALC_DVS.2, AVA_VLA.4, AVA_MSU.3 EAL5
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0554a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Fortuna.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/fortuna%20sogis%20cert.pdf
state/cert/convert_garbage False True
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None d867fa980ad9c784936a7f781c66a705003295e6bfa69267d4f1f1d31dcda71e
state/cert/txt_hash None aa66c3731a9c7696e8c81061bb83a4b85561dfec9a70babb797d4e29b9e86326
state/report/pdf_hash 735f266d06e964bb2a56595c0a26b0115fd5db43786167ce7f1b88e1ebbaca87 6b96da253629157bc163a3a1e3aa4521d3fdf3ba3f8d9617e67b12343649f130
state/report/txt_hash c0215dbadca4900d02297b3a6d05bfba0f6aa0bc7163cfe136a1c9e08189971e da1beb02c5db6bba73879e8748e83958a9fd12ecb84da8431a4183a19f26eb8b
state/st/pdf_hash d17436de0929219e58e8f69a3e370463ee7396f5cae37edc3a7aeb36ae69dd35 5ae68af0345d00f00f65a051331c0b81ed023847d0d2985c2e5c38031ab82318
state/st/txt_hash e21031759be2f62a044eecc5a4d2173044a113ba343a3237c1f43114d79ce1d3 f2792b7343c325e4c4ff368e6386e4790b51da945b9f4938b171aa50a693da97
heuristics/cert_id BSI-DSZ-CC-0554-2009 CSEC2014007
heuristics/cert_lab BSI None
heuristics/extracted_versions 1.1, 1.6 1.03.006, 4.9
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0627-2009 None
heuristics/report_references/directly_referencing BSI-DSZ-CC-0470-2008 BSI-DSZ-CC-0827-V4-2016
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0627-2009 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0470-2008, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0344-2005 BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-0827-V3-2015
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-0627-2009 None
heuristics/st_references/directly_referencing None BSI-DSZ-CC-0827-V4-2016
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-0627-2009 None
heuristics/st_references/indirectly_referencing None BSI-DSZ-CC-0827-V4-2016
pdf_data/cert_filename None fortuna sogis cert.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL 2: 1
      • EAL 5: 1
  • cc_sar:
    • ALC:
      • ALC_FLR: 2
  • cc_sfr:
  • cc_claims:
  • vendor:
    • Infineon:
      • Infineon Technologies: 1
  • eval_facility:
    • Combitech:
      • Combitech AB: 1
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 287293
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20170622123120+02'00'
  • /ModDate: D:20170622125255+02'00'
  • pdf_hyperlinks:
pdf_data/report_filename 0554a.pdf Certification Report - Fortuna.pdf
pdf_data/report_frontpage
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0554-2009
    • cert_item: Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software
    • developer: Infineon Technologies AG
    • cert_lab: BSI
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 22
    • RSA 2048: 10
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 32
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • ECC:
    • ECC:
      • ECC: 4
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 1
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 32
  • ECC:
    • ECC: 4
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 32 4
pdf_data/report_keywords/asymmetric_crypto/FF/DH
  • Diffie-Hellman: 1
  • DH: 1
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0554-2009: 19
    • BSI-DSZ-CC-0470-2008: 5
    • BSI-DSZ-CC-0554: 1
  • DE:
    • BSI-DSZ-CC-0827-V4-2016: 1
  • SE:
    • CSEC2014007: 1
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0554-2009: 19
  • BSI-DSZ-CC-0470-2008: 5
  • BSI-DSZ-CC-0554: 1
  • BSI-DSZ-CC-0827-V4-2016: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.RND: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002-2001: 4
  • BSI-PP-0035: 2
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_SCP: 1
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 8
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 2
    • ALC_TAT.1: 1
    • ALC_TAT.2: 2
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_MSU.3: 6
    • AVA_VLA.4: 6
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.5: 1
    • ADV_ARC: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.1: 1
  • ADV_FSP.2: 1
  • ADV_FSP.3: 1
  • ADV_FSP.4: 1
  • ADV_FSP.5: 1
  • ADV_FSP.6: 1
  • ADV_IMP.1: 1
  • ADV_IMP.2: 1
  • ADV_INT.1: 1
  • ADV_INT.2: 1
  • ADV_INT.3: 1
  • ADV_SPM.1: 1
  • ADV_TDS.1: 1
  • ADV_TDS.2: 1
  • ADV_TDS.3: 1
  • ADV_TDS.4: 1
  • ADV_TDS.5: 1
  • ADV_TDS.6: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_ARC.1: 1
  • ADV_FSP.5: 1
  • ADV_IMP.1: 1
  • ADV_INT.2: 1
  • ADV_TDS.5: 1
  • ADV_ARC: 1
pdf_data/report_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_OPE: 1
  • AGD_PRE: 1
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 8
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 1
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_FLR.1: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 1
  • ALC_LCD.2: 2
  • ALC_TAT.1: 1
  • ALC_TAT.2: 2
  • ALC_TAT.3: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_FLR: 1
  • ALC_TAT: 1
  • ALC_CMC.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 2 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
pdf_data/report_keywords/cc_sar/ATE
  • ATE_COV.1: 1
  • ATE_COV.2: 1
  • ATE_COV.3: 1
  • ATE_DPT.1: 1
  • ATE_DPT.2: 1
  • ATE_DPT.3: 1
  • ATE_DPT.4: 1
  • ATE_FUN.1: 1
  • ATE_FUN.2: 1
  • ATE_IND.1: 1
  • ATE_IND.2: 1
  • ATE_IND.3: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_MSU.3: 6
  • AVA_VLA.4: 6
  • AVA_VAN.1: 1
  • AVA_VAN.2: 1
  • AVA_VAN.3: 1
  • AVA_VAN.4: 1
  • AVA_VAN.5: 1
  • AVA_VAN: 2
  • AVA_VAN.4: 1
  • AVA_VAN: 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 2 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 5
  • EAL 4: 5
  • EAL 1: 1
  • EAL 7: 1
  • EAL4: 6
  • EAL5+: 2
  • EAL1: 6
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL6: 3
  • EAL 5 augmented: 4
  • EAL 5: 2
  • EAL 2: 1
  • EAL 4: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 5 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 5 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • all with optional libraries RSA2048 V1.6 and ECC V1.1, Version 1.4 from 2009-03-25, Infineon AG (confidential document) [7] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
    • V1.1, Version 2 from 2009-04-08, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [9] ETR for composition according to AIS 36 for the Products SLE66CX206PE / M1506-k11: 1
    • V1.1, Version 2 from 2009-04-08, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
    • all with optional libraries RSA2048 V1.6 and ECC V1.1, Version 1.1 from 2008-10-13, Infineon AG (confidential document) [11] Errata Sheet - SLE66CxxxPE Controllers - Product and Boundout, Version 2008-10- 17 , Infineon: 1
    • Application Note, SLE66CxxxPE, Using MicroSlim NVM (cLib), Version 05.05 from 2005-05, Infineon AG (confidential document) [19] Application Note, SLE66CxxxP/PE, Memory Encryption Decryption, Version 11.04 from 2004-11: 1
    • AG (confidential document) [20] Application Note, SLE66CxxxPE, MMU-Memory Management Unit (PDF+SW), Version 12.04 from: 1
    • Infineon AG (confidential document) [21] SLE66C(L)xxxPE - Optimized Usage of Data NVM Above 64k, Version 08.05 from 2005-08, Infineon: 1
    • confidential document) [22] Application Note, SLE66CxxxP/PE, Testing the RNG, Version 11.04 from 2004-11, Infineon AG [23: 1
    • Note, SLE66CxxxP/PE, Using RNG a.t. FIPS140 (PDF+SW), Version 02.04 from 2004-02, Infineon AG (confidential document) [24] Application Note, SLE66CxxxPE, Using the active shield, confidential, Version 12.04 From: 1
    • Infineon AG (confidential document) [25] Application Note, SLE66CxxxPE - UART basic (PDF), Version 02.07 from 2007-02, Infineon AG [26: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
  • Combitech:
    • Combitech AB: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/randomness/RNG
  • RNG: 5
  • RNG: 1
  • RND: 1
pdf_data/report_keywords/randomness/RNG/RNG 5 1
pdf_data/report_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • fault injection: 1
  • Malfunction: 2
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • DPA: 2
  • SPA: 1
  • Leak-Inherent: 1
  • Physical Probing: 1
pdf_data/report_keywords/side_channel_analysis/other
  • Bellcore attack: 1
  • JIL: 4
  • JIL: 3
pdf_data/report_keywords/side_channel_analysis/other/JIL 4 3
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS140: 1
  • BSI:
    • AIS 31: 4
    • AIS 34: 2
    • AIS 25: 3
    • AIS 26: 2
    • AIS 36: 2
    • AIS 20: 1
    • AIS 32: 1
    • AIS 35: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
  • ISO:
    • ISO/IEC 17025: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408:2005: 3
  • ISO/IEC 17025: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 8
    • 3DES:
      • Triple-DES: 5
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • DES:
      • DES: 6
    • 3DES:
      • 3DES: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 5
  • 3DES: 1
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 8 6
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 9
    • Infineon Technologies AG: 11
    • Infineon AG: 17
    • Infineon Technologies: 6
  • Philips:
    • Philips: 1
  • Infineon:
    • Infineon Technologies: 3
    • Infineon: 1
pdf_data/report_keywords/vendor/Infineon
  • Infineon: 9
  • Infineon Technologies AG: 11
  • Infineon AG: 17
  • Infineon Technologies: 6
  • Infineon Technologies: 3
  • Infineon: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 9 1
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 6 3
pdf_data/report_metadata
  • pdf_file_size_bytes: 793764
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
  • /CreationDate: D:20090526135132+02'00'
  • /Subject: Common Criteria Certification
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Creator: Writer
  • /Keywords: "Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software, Infineon Technologies AG"
  • /Producer: StarOffice 9
  • /ModDate: D:20090526152903+02'00'
  • /Title: Certification Report BSI-DSZ-CC-0554-2009
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_file_size_bytes: 123294
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Ansvarigt Område/enhet: CSEC
  • /Approved By:
  • /Author: Mats Engquist
  • /C-datum: 2008
  • /CSEC ID:
  • /CSECID: CB-015
  • /Company: ORGNAME
  • /ContentTypeId: 0x010100AC3668A6D66F264E876397486E9370DA
  • /Copy: 0
  • /CreationDate: D:20170616141231+02'00'
  • /Creator: Acrobat PDFMaker 11 för Word
  • /Current Version:
  • /DDocBinder: Scheme (CB)
  • /DDocCabinet: QMS
  • /DDocID: 2005-03-05-64D6-T9YR
  • /DDocLastModDate: 2006-03-16 10:56:39
  • /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
  • /DDocRevision: 3,7
  • /DDocTitle: 035 CB General Document - Template
  • /DLCPolicyLabelClientValue: Version: {_UIVersionString}
  • /DLCPolicyLabelLock:
  • /DLCPolicyLabelValue: Version: 7.2
  • /Datum, skapat: -
  • /Deluppdragsbenämning:
  • /Diarienummer:
  • /Dnr:
  • /Document responsible: Certification Manager
  • /Dokument Status: Aktiv
  • /Dokumentansvarig: Jerry Johansson
  • /Dokumentansvarigs enhet: KC Ledsyst
  • /Dokumentbeteckning:
  • /Dokumentdatum: 2017-06-16
  • /Dokumenttitel: Certification Report - Kapsch SAM 5000
  • /Dokumenttyp: CB
  • /FMV_beteckning: nnnn
  • /Fast_Roll:
  • /Fast_av:
  • /Fast_den: 2013-01-22T12:06:49Z
  • /Fastställarens roll: Lead certifier
  • /Fastställd den: 2014-11-04T12:06:49Z
  • /Fastställt av: Jerry Johansson
  • /Fastställt av1: Mats Engquist
  • /Format:
  • /Giltigt från: -
  • /Infoklass: HEMLIG/
  • /Information Management:
  • /Informationsklass:
  • /Keywords:
  • /Klassificeringsnr: 25 550
  • /MallVersion: 7.0
  • /ModDate: D:20170616141234+02'00'
  • /Paragraf:
  • /Platina: 1
  • /Producer: Adobe PDF Library 11.0
  • /Referens ID: CB-015
  • /Sekr. gäller tom.: -
  • /SourceModified: D:20170616121221
  • /Stämpel: 0
  • /Subject: nnnn
  • /Title: Certification Report - Kapsch SAM 5000
  • /Uncontrolled: 1.000000
  • /Uppdragsbenämning:
  • /Utgåva: 1.0
  • /_dlc_DocId: CSEC-11-44
  • /_dlc_DocIdItemGuid: 471541fc-7dc2-4d73-bb20-08572f207f32
  • /_dlc_DocIdUrl: http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-11-44, CSEC-11-44
  • /display_urn:schemas-microsoft-com:office:office#Author: Larsson, Erik ekla
  • /display_urn:schemas-microsoft-com:office:office#Editor: Systemkonto
  • /Ärendetyp:
  • pdf_hyperlinks: http://sharepoint.fmv.se/projekt/CSEC/Scheme%20notes%20%20policies/Scheme%20note%2011%20-%20Methodology%20for%20AVA_VAN%204%20and%205.doc, http://www.fmv.se/Global/Dokument/Verksamhet/CSEC/Scheme_Note_15.pdf, http://sharepoint.fmv.se/projekt/CSEC/Scheme%20notes%20%20policies/Scheme%20note%2016%20-%20Additional%20planning%20requirements.doc, http://www.fmv.se/Global/Dokument/Verksamhet/CSEC/Scheme%20note%2018%20-%20Highlighted%20Requirements%20on%20the%20Security%20Target.pdf
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationstechnik Mats Engquist
pdf_data/report_metadata//CreationDate D:20090526135132+02'00' D:20170616141231+02'00'
pdf_data/report_metadata//Creator Writer Acrobat PDFMaker 11 för Word
pdf_data/report_metadata//Keywords "Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software, Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20090526152903+02'00' D:20170616141234+02'00'
pdf_data/report_metadata//Producer StarOffice 9 Adobe PDF Library 11.0
pdf_data/report_metadata//Subject Common Criteria Certification nnnn
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0554-2009 Certification Report - Kapsch SAM 5000
pdf_data/report_metadata/pdf_file_size_bytes 793764 123294
pdf_data/report_metadata/pdf_hyperlinks http://www.bsi.bund.de/ http://sharepoint.fmv.se/projekt/CSEC/Scheme%20notes%20%20policies/Scheme%20note%2011%20-%20Methodology%20for%20AVA_VAN%204%20and%205.doc, http://www.fmv.se/Global/Dokument/Verksamhet/CSEC/Scheme_Note_15.pdf, http://sharepoint.fmv.se/projekt/CSEC/Scheme%20notes%20%20policies/Scheme%20note%2016%20-%20Additional%20planning%20requirements.doc, http://www.fmv.se/Global/Dokument/Verksamhet/CSEC/Scheme%20note%2018%20-%20Highlighted%20Requirements%20on%20the%20Security%20Target.pdf
pdf_data/report_metadata/pdf_number_of_pages 40 16
pdf_data/st_filename 0554b.pdf 902390A.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 8
  • ECDSA:
    • ECDSA: 13
  • ECC:
    • ECC: 40
  • ECDH:
    • ECDH: 1
  • ECC:
    • ECC: 22
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 40 22
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 8 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH
  • Diffie-Hellman: 3
  • DH: 7
  • Diffie-Hellman: 7
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 3 7
pdf_data/st_keywords/asymmetric_crypto/RSA
  • RSA2048: 21
  • RSA 2048: 6
  • RSA 1024: 1
  • RSA 4096: 1
  • RSA2048: 1
  • RSA4096: 1
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 21 1
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0827-V4-2016: 1
pdf_data/st_keywords/cc_claims/O/O.RND 1 2
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002: 2
  • BSI-PP-035: 11
  • BSI-PP-0035: 3
  • BSI-PP- 0035: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 1
    • ACM_SCP.3: 5
    • ACM_SCP: 3
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.3: 5
    • ADV_HLD.3: 3
    • ADV_IMP.2: 3
    • ADV_INT.1: 3
    • ADV_LLD.1: 3
    • ADV_RCR.2: 3
    • ADV_SPM.3: 2
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.2: 4
    • ALC_LCD.2: 1
    • ALC_TAT.2: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.3: 3
    • AVA_VLA.4: 4
    • AVA_CCA.1: 2
    • AVA_SOF.1: 2
    • AVA_SOF: 4
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.5: 2
    • ADV_IMP.1: 3
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
    • ADV_FSP.4: 1
    • ADV_TDS.3: 1
    • ADV_ARC: 1
    • ADV_INT: 1
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 3
  • ALC:
    • ALC_DVS.2: 2
    • ALC_CMC.4: 3
    • ALC_CMS.5: 2
    • ALC_DEL.1: 3
    • ALC_DVS.1: 2
    • ALC_LCD.1: 3
    • ALC_TAT.2: 2
    • ALC_CMS.4: 1
    • ALC_TAT.1: 1
    • ALC_CMC: 1
    • ALC_DEL: 1
    • ALC_LCD: 1
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.3: 2
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 2
    • AVA_VAN.4: 3
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 3
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.3: 5
  • ADV_HLD.3: 3
  • ADV_IMP.2: 3
  • ADV_INT.1: 3
  • ADV_LLD.1: 3
  • ADV_RCR.2: 3
  • ADV_SPM.3: 2
  • ADV_FSP: 1
  • ADV_FSP.2: 1
  • ADV_SPM.1: 3
  • ADV_ARC.1: 3
  • ADV_FSP.5: 2
  • ADV_IMP.1: 3
  • ADV_INT.2: 2
  • ADV_TDS.4: 2
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
  • ADV_ARC: 1
  • ADV_INT: 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 2
  • AGD_USR.1: 2
  • AGD_OPE.1: 3
  • AGD_PRE.1: 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 4
  • ALC_LCD.2: 1
  • ALC_TAT.2: 2
  • ALC_DVS.2: 2
  • ALC_CMC.4: 3
  • ALC_CMS.5: 2
  • ALC_DEL.1: 3
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_TAT.2: 2
  • ALC_CMS.4: 1
  • ALC_TAT.1: 1
  • ALC_CMC: 1
  • ALC_DEL: 1
  • ALC_LCD: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 4 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 2
  • ATE_DPT.2: 1
  • ATE_FUN.1: 2
  • ATE_IND.2: 2
  • ATE_COV.2: 3
  • ATE_DPT.3: 2
  • ATE_FUN.1: 3
  • ATE_IND.2: 3
  • ATE_DPT.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 2 3
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 2 3
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 2 3
pdf_data/st_keywords/cc_sar/AVA
  • AVA_MSU.3: 3
  • AVA_VLA.4: 4
  • AVA_CCA.1: 2
  • AVA_SOF.1: 2
  • AVA_SOF: 4
  • AVA_VAN.5: 2
  • AVA_VAN.4: 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 3
  • EAL5: 4
  • EAL 5: 4
  • EAL5 augmented: 1
  • EAL 5 augmented: 4
  • EAL5: 6
pdf_data/st_keywords/cc_security_level/EAL/EAL5 4 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_RND: 2
    • FCS_RND.1: 4
    • FCS_COP.1: 45
    • FCS_CKM.1: 49
    • FCS_COP.1.1: 4
    • FCS_CKM.4: 30
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 7
    • FCS_CKM.4.1: 3
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ITT.1: 3
    • FDP_IFC.1: 13
    • FDP_ACC.1: 25
    • FDP_ACF.1: 15
    • FDP_SDI.1: 17
    • FDP_SDI.2: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 24
    • FDP_ITC.2: 23
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC.1.1: 3
    • FDP_ITC.1.2: 3
    • FDP_ITC.1.3: 3
    • FDP_ITC.2.1: 3
    • FDP_ITC.2.2: 3
    • FDP_ITC.2.3: 3
    • FDP_ITC.2.4: 3
    • FDP_ITC.2.5: 3
    • FDP_CKM.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MSA.3: 16
    • FMT_MSA.1: 15
    • FMT_SMF.1: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 9
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 32
    • FMT_MSA.2.1: 3
  • FPT:
    • FPT_TST.2: 26
    • FPT_FLS.1: 5
    • FPT_SEP.1: 6
    • FPT_PHP.3: 7
    • FPT_ITT.1: 3
    • FPT_TST.1: 11
    • FPT_TST.2.1: 2
    • FPT_AMT.1: 4
    • FPT_TDC.1: 3
    • FPT_TST: 2
  • FRU:
    • FRU_FLT.2: 5
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 3
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM: 42
    • FCS_CKM.3: 7
    • FCS_CKM.4: 42
    • FCS_COP: 117
    • FCS_CKM.1: 19
    • FCS_COP.1: 17
    • FCS_CKM.2: 5
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACF.1: 9
    • FDP_IFC.1: 15
    • FDP_IFF.1: 8
    • FDP_ETC.2: 12
    • FDP_ITC.2: 31
    • FDP_ITC.2.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITC.1: 15
    • FDP_ITT.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
  • FIA:
    • FIA_AFL: 16
    • FIA_SOS.1: 8
    • FIA_UAU.1: 9
    • FIA_UAU.5: 8
    • FIA_UAU.6: 7
    • FIA_AFL.1: 4
    • FIA_UAU.1.2: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MSA.3: 14
    • FMT_SMF.1: 8
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 1
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
  • FPT:
    • FPT_RPL.1: 8
    • FPT_TEE.1: 8
    • FPT_RPL.1.2: 1
    • FPT_TEE.1.2: 1
    • FPT_TDC.1: 2
    • FPT_FLS.1: 1
    • FPT_PHP.3: 1
    • FPT_ITT.1: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 1
    • FTP_TRP.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 4 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 2
  • FCS_RND.1: 4
  • FCS_COP.1: 45
  • FCS_CKM.1: 49
  • FCS_COP.1.1: 4
  • FCS_CKM.4: 30
  • FCS_CKM.1.1: 5
  • FCS_CKM.2: 7
  • FCS_CKM.4.1: 3
  • FCS_RND.1.1: 1
  • FCS_CKM: 42
  • FCS_CKM.3: 7
  • FCS_CKM.4: 42
  • FCS_COP: 117
  • FCS_CKM.1: 19
  • FCS_COP.1: 17
  • FCS_CKM.2: 5
  • FCS_RNG.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 49 19
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 7 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 30 42
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 45 17
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITT.1: 3
  • FDP_IFC.1: 13
  • FDP_ACC.1: 25
  • FDP_ACF.1: 15
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 24
  • FDP_ITC.2: 23
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC.1.1: 3
  • FDP_ITC.1.2: 3
  • FDP_ITC.1.3: 3
  • FDP_ITC.2.1: 3
  • FDP_ITC.2.2: 3
  • FDP_ITC.2.3: 3
  • FDP_ITC.2.4: 3
  • FDP_ITC.2.5: 3
  • FDP_CKM.2: 1
  • FDP_ACC.1: 13
  • FDP_ACF.1: 9
  • FDP_IFC.1: 15
  • FDP_IFF.1: 8
  • FDP_ETC.2: 12
  • FDP_ITC.2: 31
  • FDP_ITC.2.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_ETC.2.2: 1
  • FDP_ETC.2.3: 1
  • FDP_ETC.2.4: 1
  • FDP_ITC.2.2: 1
  • FDP_ITC.2.3: 1
  • FDP_ITC.2.4: 1
  • FDP_ITC.2.5: 1
  • FDP_ITC.1: 15
  • FDP_ITT.1: 1
  • FDP_SDI.1: 1
  • FDP_SDI.2: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 25 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 15 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 13 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 24 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 23 31
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2.1 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2.2 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2.3 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2.4 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2.5 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 3 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 17 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 15 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM.1: 4
  • FMT_LIM.2: 4
  • FMT_MSA.3: 16
  • FMT_MSA.1: 15
  • FMT_SMF.1: 9
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 9
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 32
  • FMT_MSA.2.1: 3
  • FMT_MSA.3: 14
  • FMT_SMF.1: 8
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 1
  • FMT_LIM.1: 1
  • FMT_LIM.2: 1
  • FMT_MSA.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 15 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 16 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 9 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 9 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST.2: 26
  • FPT_FLS.1: 5
  • FPT_SEP.1: 6
  • FPT_PHP.3: 7
  • FPT_ITT.1: 3
  • FPT_TST.1: 11
  • FPT_TST.2.1: 2
  • FPT_AMT.1: 4
  • FPT_TDC.1: 3
  • FPT_TST: 2
  • FPT_RPL.1: 8
  • FPT_TEE.1: 8
  • FPT_RPL.1.2: 1
  • FPT_TEE.1.2: 1
  • FPT_TDC.1: 2
  • FPT_FLS.1: 1
  • FPT_PHP.3: 1
  • FPT_ITT.1: 1
  • FPT_TST.2: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 3 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 7 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 3 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 26 1
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 5 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 3 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 3 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • single DES is out of scope of the evaluation: 1
    • key length below 192 bit are out of scope of the evaluation: 1
    • smart card applications • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) • Data encryption by the ACE module according to RSA standard with 512 to 2048: 1
    • agreement according to ECDH standard with 160 - 521 bits key length (key length below 192 bit are out of scope of the evaluation) • Advanced security sensors and physical countermeasures (e.g. shielding: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • ECB:
    • ECB: 4
  • CBC:
    • CBC: 19
pdf_data/st_keywords/cipher_mode/ECB/ECB 1 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 36
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-521: 2
    • NIST P-256: 2
    • NIST P-521: 2
pdf_data/st_keywords/eval_facility
  • Combitech:
    • Combitech AB: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 7
      • SHA256: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 7
    • RND: 2
  • TRNG:
    • TRNG: 1
  • PRNG:
    • DRBG: 1
  • RNG:
    • RNG: 4
    • RND: 3
pdf_data/st_keywords/randomness/RNG/RND 2 3
pdf_data/st_keywords/randomness/RNG/RNG 7 4
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 11
    • Physical Probing: 2
    • SPA: 4
    • DPA: 6
  • FI:
    • Malfunction: 15
    • malfunction: 3
    • DFA: 4
  • other:
    • reverse engineering: 2
  • SCA:
    • Leak-Inherent: 5
    • Physical Probing: 2
    • physical probing: 1
  • FI:
    • Malfunction: 5
    • malfunction: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 15
  • malfunction: 3
  • DFA: 4
  • Malfunction: 5
  • malfunction: 2
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 15 5
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 3 2
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 11
  • Physical Probing: 2
  • SPA: 4
  • DPA: 6
  • Leak-Inherent: 5
  • Physical Probing: 2
  • physical probing: 1
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 11 5
pdf_data/st_keywords/standard_id
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 9
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 7816: 6
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-002: 1
  • FIPS:
    • FIPS 140-2: 2
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-2: 1
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15446: 2
    • ISO/IEC 10116:2006: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-002: 1
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816-3: 1
  • ISO/IEC 7816: 6
  • ISO/IEC 15446: 2
  • ISO/IEC 10116:2006: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 1
  • PKCS #1: 2
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 11
    • 3DES:
      • 3DES: 21
      • Triple-DES: 1
  • AES_competition:
    • AES:
      • AES: 51
  • DES:
    • DES:
      • DES: 44
    • 3DES:
      • 3DES: 2
      • Triple-DES: 1
      • TDES: 1
  • constructions:
    • MAC:
      • CMAC: 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 21
  • Triple-DES: 1
  • 3DES: 2
  • Triple-DES: 1
  • TDES: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 21 2
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 11 44
pdf_data/st_keywords/vendor/Infineon
  • Infineon Technologies AG: 7
  • Infineon: 2
  • Infineon Technologies: 2
  • Infineon: 9
  • Infineon Technologies AG: 3
pdf_data/st_keywords/vendor/Infineon/Infineon 2 9
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 7 3
pdf_data/st_metadata
  • pdf_file_size_bytes: 353459
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
  • /Creator: SecurityTarget_CX366_206_186PE_k11_1.4_11.doc - Microsoft Word
  • /CreationDate: D:20090325102645
  • /Subject: Security Target SLE66CX366PE, SLE66CX206PE, SLE66CX186PE k11
  • /Title: CC EAL5+ Certification Security Target
  • /Author: Hans-Ulrich Buchmüller
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Keywords: Security Target, Security Controller, public, document, attackers with high attack potential, EAL5+, EAL5 high, Infineon Technologies AG, m1528, m1506, m1503, RSA, Elliptic Curve, Cryptographic Libraries, Kulim
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 449945
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 72
  • /Producer: PDFCreator 2.5.1.5
  • /CreationDate: D:20171025135904+02'00'
  • /ModDate: D:20171025135904+02'00'
  • /Title: 902390A
  • /Author: stgran
  • /Subject:
  • /Keywords:
  • /Creator: PDFCreator 2.5.1.5
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Hans-Ulrich Buchmüller stgran
pdf_data/st_metadata//CreationDate D:20090325102645 D:20171025135904+02'00'
pdf_data/st_metadata//Creator SecurityTarget_CX366_206_186PE_k11_1.4_11.doc - Microsoft Word PDFCreator 2.5.1.5
pdf_data/st_metadata//Keywords Security Target, Security Controller, public, document, attackers with high attack potential, EAL5+, EAL5 high, Infineon Technologies AG, m1528, m1506, m1503, RSA, Elliptic Curve, Cryptographic Libraries, Kulim
pdf_data/st_metadata//Producer Acrobat PDFWriter 5.0 for Windows NT PDFCreator 2.5.1.5
pdf_data/st_metadata//Subject Security Target SLE66CX366PE, SLE66CX206PE, SLE66CX186PE k11
pdf_data/st_metadata//Title CC EAL5+ Certification Security Target 902390A
pdf_data/st_metadata/pdf_file_size_bytes 353459 449945
pdf_data/st_metadata/pdf_number_of_pages 61 72
dgst 358b99b9975d8305 0e6aea8cc0669cb8