This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software BSI-DSZ-CC-0554-2009 |
Secure Element S3B512C/SC3512C (32-bit RISC Microcontroller) with optional AT1 Secure Library and Fingerprint Library including specific IC Dedicated software (Référence S3B512C_20210830) ANSSI-CC-2021/62 |
|
---|---|---|
name | Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software | Secure Element S3B512C/SC3512C (32-bit RISC Microcontroller) with optional AT1 Secure Library and Fingerprint Library including specific IC Dedicated software (Référence S3B512C_20210830) |
not_valid_before | 2009-04-21 | 2021-12-27 |
not_valid_after | 2019-09-01 | 2026-12-27 |
scheme | DE | FR |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0554b.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_62en.pdf |
status | archived | active |
manufacturer | Infineon Technologies AG | Samsung Electronics Co., Ltd. |
manufacturer_web | https://www.infineon.com/ | https://www.samsung.com |
security_level | EAL5+, ALC_DVS.2, AVA_VLA.4, AVA_MSU.3 | ASE_TSS.2, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0554a.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_62.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021-62.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
state/cert/convert_garbage | False | True |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | 4ecc748049ae8a48189faf5d1c323a576fa656b722de82e1e776c8fd437857bc |
state/cert/txt_hash | None | 1915bff64b1d19e91196e0486ce9d4d18427e061b65db7c69541044773c8a08f |
state/report/convert_garbage | False | True |
state/report/pdf_hash | 735f266d06e964bb2a56595c0a26b0115fd5db43786167ce7f1b88e1ebbaca87 | 093f717327d8a707aa1aa8aa87737954b511ed95297b24444defaa6a045fb144 |
state/report/txt_hash | c0215dbadca4900d02297b3a6d05bfba0f6aa0bc7163cfe136a1c9e08189971e | fbb45abffbaf99999ed1eed60ff33fb25a660076d78c41b9a7e3fdfcb813ab6f |
state/st/pdf_hash | d17436de0929219e58e8f69a3e370463ee7396f5cae37edc3a7aeb36ae69dd35 | c1e5e4083308119bab27cc3fb21f812e3c804c3aee569f42d6d4f50b82ffb6e3 |
state/st/txt_hash | e21031759be2f62a044eecc5a4d2173044a113ba343a3237c1f43114d79ce1d3 | 6fcebf9b38a40c7b3f231f795f5321b92519d6ab0095d409083b58ec28382cc3 |
heuristics/cert_id | BSI-DSZ-CC-0554-2009 | ANSSI-CC-2021/62 |
heuristics/cert_lab | BSI | None |
heuristics/extracted_versions | 1.1, 1.6 | 32 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0627-2009 | ANSSI-CC-2021/62-R01 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0470-2008 | None |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-0627-2009 | ANSSI-CC-2022/63, ANSSI-CC-2021/62-R01 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0470-2008, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0344-2005 | None |
heuristics/scheme_data | None |
|
heuristics/st_references/directly_referenced_by | BSI-DSZ-CC-0627-2009 | None |
heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-0627-2009 | None |
pdf_data/cert_filename | None | certificat-anssi-cc-2021-62.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | 0554a.pdf | anssi-cc-2021_62.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 32 | 2 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN | 2 | 1 |
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 3 | 2 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 4 | 1 |
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 8 | 1 |
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | [email protected] |
pdf_data/report_metadata//CreationDate | D:20090526135132+02'00' | D:20220107144838+01'00' |
pdf_data/report_metadata//Creator | Writer | Microsoft® Word 2019 |
pdf_data/report_metadata//Keywords | "Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software, Infineon Technologies AG" | [ANSSI Crypto] |
pdf_data/report_metadata//ModDate | D:20090526152903+02'00' | D:20220107144838+01'00' |
pdf_data/report_metadata//Producer | StarOffice 9 | Microsoft® Word 2019 |
pdf_data/report_metadata//Subject | Common Criteria Certification | [Nom du produit] |
pdf_data/report_metadata/pdf_file_size_bytes | 793764 | 2387567 |
pdf_data/report_metadata/pdf_hyperlinks | http://www.bsi.bund.de/ | mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/ |
pdf_data/report_metadata/pdf_number_of_pages | 40 | 13 |
pdf_data/st_filename | 0554b.pdf | anssi-cible-cc-2021_62en.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 40 | 21 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 8 | 17 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 13 | 23 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 3 | 4 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 1 | 6 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 1 | 6 |
pdf_data/st_keywords/cc_claims/T/T.RND | 1 | 5 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 | 3 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 | 3 | 2 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 4 | 2 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 4 | 1 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 4 | 1 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 4 | 12 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 49 | 32 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 7 | 6 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 30 | 22 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 | 3 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 45 | 23 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 24 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 15 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 13 | 27 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 24 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 23 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 3 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 17 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 15 | 8 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 4 | 28 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 4 | 32 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 15 | 12 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 9 | 6 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 5 | 22 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 3 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 7 | 20 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 5 | 17 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 3 | 17 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 3 | 8 |
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 1 | 4 |
pdf_data/st_keywords/cplc_data | |
|
pdf_data/st_keywords/crypto_library | |
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 1 | 3 |
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function | |
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 2 | 11 |
pdf_data/st_keywords/randomness/RNG/RNG | 7 | 8 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 15 | 26 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 3 | 11 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 6 | 8 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 11 | 23 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 2 | 4 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 2 | 4 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 1 | 6 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 11 | 8 |
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Hans-Ulrich Buchmüller | Windows 사용자 |
pdf_data/st_metadata//CreationDate | D:20090325102645 | D:20210902112715+09'00' |
pdf_data/st_metadata//Creator | SecurityTarget_CX366_206_186PE_k11_1.4_11.doc - Microsoft Word | Microsoft® Word 2016 |
pdf_data/st_metadata//Producer | Acrobat PDFWriter 5.0 for Windows NT | Microsoft® Word 2016 |
pdf_data/st_metadata//Title | CC EAL5+ Certification Security Target | ST_Klallam7_Ver1.1 |
pdf_data/st_metadata/pdf_file_size_bytes | 353459 | 3516568 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, http://www.samsungsemi.com/, mailto:[email protected] | |
pdf_data/st_metadata/pdf_number_of_pages | 61 | 112 |
dgst | 358b99b9975d8305 | 8d798205eaf3159d |