This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software BSI-DSZ-CC-0554-2009 |
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V02.00.0004, RSA2048/4096 V2.08.007 / V2.07.003 / V2.06.003, EC V2.08.007 / V2.07.003 / V2.06.003, Toolbox V2.08.007 / V2.07.003 / V2.06.003, HSL V03.12.8812 / V03.11.8339 / V02.01.6634 / V01.22.4346, SCL V2.04.002 / V2.02.010 and with specific IC dedicated software BSI-DSZ-CC-0961-V4-2019 |
|
---|---|---|
name | Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software | Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V02.00.0004, RSA2048/4096 V2.08.007 / V2.07.003 / V2.06.003, EC V2.08.007 / V2.07.003 / V2.06.003, Toolbox V2.08.007 / V2.07.003 / V2.06.003, HSL V03.12.8812 / V03.11.8339 / V02.01.6634 / V01.22.4346, SCL V2.04.002 / V2.02.010 and with specific IC dedicated software |
not_valid_before | 2009-04-21 | 2019-12-18 |
not_valid_after | 2019-09-01 | 2024-12-18 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0554b.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0961V4b_pdf.pdf |
status | archived | active |
security_level | EAL5+, ALC_DVS.2, AVA_VLA.4, AVA_MSU.3 | ALC_FLR.1, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0554a.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0961V4a_pdf.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0961V4c_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | e649af6cc14bef4258e943d2bd217719e33f7aaa80328c2594db3156b3435698 |
state/cert/txt_hash | None | 25af6c3fbb0a0c833035e5f9572099d2d289238becdb94bcd540fb8e6ece584e |
state/report/pdf_hash | 735f266d06e964bb2a56595c0a26b0115fd5db43786167ce7f1b88e1ebbaca87 | f7fb4b12858e4187ce8608ab7c9d41aebf0ba93bb31ef3ca4552bc24a2fa538d |
state/report/txt_hash | c0215dbadca4900d02297b3a6d05bfba0f6aa0bc7163cfe136a1c9e08189971e | 59423dc9e0df3081a43c2451eadf7a11097c9d556f85b6efb5ad621fb41d01a0 |
state/st/pdf_hash | d17436de0929219e58e8f69a3e370463ee7396f5cae37edc3a7aeb36ae69dd35 | 3f37e9221265542563302757d9589b35ea8a72bac412741c606422d610f970f0 |
state/st/txt_hash | e21031759be2f62a044eecc5a4d2173044a113ba343a3237c1f43114d79ce1d3 | f22261dc6da45264b041d9aa2aee31d0bfa48728ac61bd3de0703bad38ec4e36 |
heuristics/cert_id | BSI-DSZ-CC-0554-2009 | BSI-DSZ-CC-0961-V4-2019 |
heuristics/extracted_versions | 1.1, 1.6 | 03.12.8812, 2.02.010, 02.01.6634, 02.00.0004, 2.06.003, 2.08.007, 2.04.002, 03.11.8339, 01.22.4346, 2.07.003 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0627-2009 | BSI-DSZ-CC-0961-V5-2020 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0470-2008 | BSI-DSZ-CC-0961-V3-2018 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-0627-2009 | BSI-DSZ-CC-0961-V5-2020, BSI-DSZ-CC-0961-V6-2022 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0470-2008, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0344-2005 | BSI-DSZ-CC-0961-V3-2018, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0961-2017, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0961-V2-2018 |
heuristics/st_references/directly_referenced_by | BSI-DSZ-CC-0627-2009 | None |
heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-0627-2009 | None |
pdf_data/cert_filename | None | 0961V4c_pdf.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | 0554a.pdf | 0961V4a_pdf.pdf |
pdf_data/report_frontpage/DE |
|
|
pdf_data/report_frontpage/DE/cert_id | BSI-DSZ-CC-0554-2009 | BSI-DSZ-CC-0961-V4-2019 |
pdf_data/report_frontpage/DE/cert_item | Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software | Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V02.00.0004, RSA2048/4096 V2.08.007 / V2.07.003 / V2.06.003, EC V2.08.007 / V2.07.003 / V2.06.003, Toolbox V2.08.007 / V2.07.003 / V2.06.003, HSL V03.12.8812 / V03.11.8339 / V02.01.6634 / V01.22.4346, SCL V2.04.002 / V2.02.010 and with specific IC dedicated software |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 32 | 3 |
pdf_data/report_keywords/asymmetric_crypto/FF |
|
|
pdf_data/report_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 | 22 | 3 |
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 8 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 1 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 | 1 | 5 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 5 | 1 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 5 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL5+ | 2 | 1 |
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cipher_mode/CBC/CBC | 1 | 4 |
pdf_data/report_keywords/cipher_mode/ECB/ECB | 1 | 4 |
pdf_data/report_keywords/crypto_scheme | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 5 | 1 |
pdf_data/report_keywords/side_channel_analysis/FI |
|
|
pdf_data/report_keywords/side_channel_analysis/SCA/SPA | 1 | 2 |
pdf_data/report_keywords/side_channel_analysis/other |
|
|
pdf_data/report_keywords/side_channel_analysis/other/JIL | 4 | 5 |
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 4 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 34 | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 36 | 2 | 1 |
pdf_data/report_keywords/standard_id/FIPS |
|
|
pdf_data/report_keywords/standard_id/ISO |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES | 5 | 3 |
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 8 | 5 |
pdf_data/report_keywords/technical_report_id/BSI |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vendor/Infineon |
|
|
pdf_data/report_keywords/vendor/Infineon/Infineon | 9 | 24 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies | 6 | 1 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG | 11 | 24 |
pdf_data/report_metadata//CreationDate | D:20090526135132+02'00' | D:20191219112535+01'00' |
pdf_data/report_metadata//Keywords | "Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software, Infineon Technologies AG" | "Common Criteria, Certification, Zertifizierung, SmartCard, Security IC, PP-0084, Infineon Technologies AG" |
pdf_data/report_metadata//ModDate | D:20090526152903+02'00' | D:20191219115827+01'00' |
pdf_data/report_metadata//Producer | StarOffice 9 | LibreOffice 6.2 |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0554-2009 | Certification Report BSI-DSZ-CC-0961-V4-2019 |
pdf_data/report_metadata/pdf_file_size_bytes | 793764 | 840672 |
pdf_data/report_metadata/pdf_hyperlinks | http://www.bsi.bund.de/ | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
pdf_data/report_metadata/pdf_number_of_pages | 40 | 35 |
pdf_data/st_filename | 0554b.pdf | 0961V4b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 40 | 18 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 8 | 12 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 13 | 31 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 3 | 14 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 1 | 2 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 | 21 | 1 |
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 1 | 4 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 | 3 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 | 3 | 10 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 4 | 3 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 2 | 3 |
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 4 | 11 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 49 | 42 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 30 | 43 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 45 | 39 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 29 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 15 | 26 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 13 | 19 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 24 | 35 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 23 | 35 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 3 | 21 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 17 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 15 | 26 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 4 | 9 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 4 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 15 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 | 32 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 16 | 22 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 16 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 9 | 6 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 5 | 31 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 3 | 22 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 7 | 34 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST | 2 | 5 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 | 26 | 31 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 5 | 8 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 3 | 18 |
pdf_data/st_keywords/certification_process/OutOfScope |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 1 | 17 |
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/KA |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 1 | 2 |
pdf_data/st_keywords/hash_function | |
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 2 | 5 |
pdf_data/st_keywords/randomness/RNG/RNG | 7 | 25 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 4 | 3 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 15 | 13 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 3 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 6 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 11 | 12 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 4 | 1 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 2 | 1 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 9 | 24 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES | 21 | 4 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 1 | 3 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 11 | 32 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/vendor/Infineon |
|
|
pdf_data/st_keywords/vendor/Infineon/Infineon | 2 | 18 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG | 7 | 16 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Hans-Ulrich Buchmüller | Buchmüller |
pdf_data/st_metadata//CreationDate | D:20090325102645 | D:20190730120718+02'00' |
pdf_data/st_metadata//Creator | SecurityTarget_CX366_206_186PE_k11_1.4_11.doc - Microsoft Word | Microsoft® Word 2010 |
pdf_data/st_metadata//Keywords | Security Target, Security Controller, public, document, attackers with high attack potential, EAL5+, EAL5 high, Infineon Technologies AG, m1528, m1506, m1503, RSA, Elliptic Curve, Cryptographic Libraries, Kulim | contact based interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high resistance, Infineon, RSA, Elliptic Curve, asymmetric libraries, CCv3.1, PP0084, 65nm |
pdf_data/st_metadata//Producer | Acrobat PDFWriter 5.0 for Windows NT | Microsoft® Word 2010 |
pdf_data/st_metadata//Subject | Security Target SLE66CX366PE, SLE66CX206PE, SLE66CX186PE k11 | Common Criteria |
pdf_data/st_metadata//Title | CC EAL5+ Certification Security Target | Security Target IFX_CCI_3h with Options |
pdf_data/st_metadata/pdf_file_size_bytes | 353459 | 2383474 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.infineon.com/, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, http://www.ietf.org/rfc/rfc5639.txt, http://www.bsi.bund.de/, mailto:[email protected];[email protected]?subject=Document%20question%20 | |
pdf_data/st_metadata/pdf_number_of_pages | 61 | 159 |
dgst | 358b99b9975d8305 | 51639df3c11fd372 |