This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software BSI-DSZ-CC-0554-2009 |
S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software(S3FT9MH_20200702) ANSSI-CC-2020/93 |
|
---|---|---|
name | Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software(S3FT9MH_20200702) |
not_valid_before | 2009-04-21 | 2020-12-18 |
not_valid_after | 2019-09-01 | 2026-12-27 |
scheme | DE | FR |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0554b.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_93en.pdf |
status | archived | active |
manufacturer | Infineon Technologies AG | Samsung |
manufacturer_web | https://www.infineon.com/ | https://www.samsung.com/ |
security_level | EAL5+, ALC_DVS.2, AVA_VLA.4, AVA_MSU.3 | ASE_TSS.2, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0554a.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_93fr.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_anssi-cc-2020_93-s01fr.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2021, 12, 27), 'maintenance_title': 'Reassessment report : ANSSI-2020/93-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_93-s01.pdf', 'maintenance_st_link': None}) | |
state/cert/convert_garbage | False | True |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | e5d3349cb8217c715818bc151131ca62caf4845261b2fa69a7de9b45b5469a61 |
state/cert/txt_hash | None | 3da0357cb47c0575c1ae007222c082f580648e7ebc477dd40d9d54ed95b19e88 |
state/report/pdf_hash | 735f266d06e964bb2a56595c0a26b0115fd5db43786167ce7f1b88e1ebbaca87 | 0268e2533bb0c13e64b85a1861cae70a512e6c327282f019e4a7a95bf3a04f93 |
state/report/txt_hash | c0215dbadca4900d02297b3a6d05bfba0f6aa0bc7163cfe136a1c9e08189971e | 08fde3b9604fbefa405e2e916d74b5eec19f7491cb05060b9ea1da64ee97ebbe |
state/st/pdf_hash | d17436de0929219e58e8f69a3e370463ee7396f5cae37edc3a7aeb36ae69dd35 | b7ee1c282c82982134f6130245c5cd850aa9a6c026a425721b80e34e785479fa |
state/st/txt_hash | e21031759be2f62a044eecc5a4d2173044a113ba343a3237c1f43114d79ce1d3 | 2b0c4c93a11c8b63bf8dd963f5eee5a846162703f16649b2e662b063204520b0 |
heuristics/cert_id | BSI-DSZ-CC-0554-2009 | ANSSI-CC-2020/93 |
heuristics/cert_lab | BSI | None |
heuristics/extracted_versions | 1.1, 1.6 | 16 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0627-2009 | None |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0470-2008 | ANSSI-CC-2020/12 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-0627-2009 | None |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0470-2008, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0344-2005 | ANSSI-CC-2020/12, ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2018/33, ANSSI-CC-2017/24 |
heuristics/scheme_data | None |
|
heuristics/st_references/directly_referenced_by | BSI-DSZ-CC-0627-2009 | None |
heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-0627-2009 | None |
pdf_data/cert_filename | None | certificat_anssi-cc-2020_93-s01fr.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | 0554a.pdf | anssi-cc-2020_93fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 1 | 2 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 5 | 1 |
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 3 | 2 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 4 | 1 |
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/crypto_engine | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 4 | 1 |
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 8 | 2 |
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | |
pdf_data/report_metadata//CreationDate | D:20090526135132+02'00' | D:20201223170407+01'00' |
pdf_data/report_metadata//Creator | Writer | PScript5.dll Version 5.2.2 |
pdf_data/report_metadata//ModDate | D:20090526152903+02'00' | D:20201223170407+01'00' |
pdf_data/report_metadata//Producer | StarOffice 9 | Acrobat Distiller 11.0 (Windows) |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0554-2009 | |
pdf_data/report_metadata/pdf_file_size_bytes | 793764 | 152242 |
pdf_data/report_metadata/pdf_hyperlinks | http://www.bsi.bund.de/ | |
pdf_data/report_metadata/pdf_number_of_pages | 40 | 15 |
pdf_data/st_filename | 0554b.pdf | anssi-cible-cc-2020_93en.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 40 | 32 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 8 | 9 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 13 | 14 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 3 | 2 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 1 | 4 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 1 | 6 |
pdf_data/st_keywords/cc_claims/T/T.RND | 1 | 5 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 | 3 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 | 3 | 2 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 4 | 2 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 4 | 2 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 4 | 2 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 4 | 12 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 49 | 25 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 7 | 4 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 30 | 12 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 45 | 21 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 19 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 15 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 13 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 24 | 12 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 23 | 12 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 3 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 17 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 15 | 8 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 4 | 28 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 4 | 32 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 15 | 12 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 16 | 15 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 9 | 6 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 5 | 22 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 3 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 7 | 21 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 5 | 17 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 3 | 13 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 3 | 12 |
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 1 | 3 |
pdf_data/st_keywords/cplc_data | |
|
pdf_data/st_keywords/crypto_engine | |
|
pdf_data/st_keywords/crypto_protocol | |
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 1 | 3 |
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function | |
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 2 | 11 |
pdf_data/st_keywords/randomness/RNG/RNG | 7 | 17 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 15 | 26 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 3 | 13 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 6 | 8 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 11 | 23 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 2 | 4 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 2 | 5 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 9 | 11 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 1 | 6 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 11 | 10 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Hans-Ulrich Buchmüller | Windows 사용자 |
pdf_data/st_metadata//CreationDate | D:20090325102645 | D:20200923081622+09'00' |
pdf_data/st_metadata//Creator | SecurityTarget_CX366_206_186PE_k11_1.4_11.doc - Microsoft Word | Microsoft® Word 2016 |
pdf_data/st_metadata//Producer | Acrobat PDFWriter 5.0 for Windows NT | Microsoft® Word 2016 |
pdf_data/st_metadata//Title | CC EAL5+ Certification Security Target | ST_Klallam7_Ver1.1 |
pdf_data/st_metadata/pdf_file_size_bytes | 353459 | 1248519 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, http://www.ssi.gouv.fr/uploads/2015/01/RGS_v-2-0_B1.pdf, mailto:[email protected] | |
pdf_data/st_metadata/pdf_number_of_pages | 61 | 109 |
dgst | 358b99b9975d8305 | 4f757ef86008edbb |