Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Infineon Security Controller M7892 G12 with optional RSA2048/4096 v1.02.013 or v2.03.008, EC v1.02.013 or v2.03.008, SHA-2 v1.01 and Toolbox v1.02.013 or v2.03.008 libraries and with specific IC dedicated software (firmware)
BSI-DSZ-CC-0891-2015
Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware)
BSI-DSZ-CC-0879-V2-2015
name Infineon Security Controller M7892 G12 with optional RSA2048/4096 v1.02.013 or v2.03.008, EC v1.02.013 or v2.03.008, SHA-2 v1.01 and Toolbox v1.02.013 or v2.03.008 libraries and with specific IC dedicated software (firmware) Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware)
not_valid_after 30.06.2020 13.11.2020
not_valid_before 30.06.2015 13.11.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V2b_pdf.pdf
dgst 39142aa26968bd3a aceaef20acc1bffe
heuristics/cert_id BSI-DSZ-CC-0891-2015 BSI-DSZ-CC-0879-V2-2015
heuristics/cpe_matches cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2017-15361 {}
heuristics/extracted_versions 1.02.013, 1.01, 2.03.008 1.01, 1.03.006
heuristics/prev_certificates {} BSI-DSZ-CC-0879-2014
heuristics/next_certificates BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-V5-2021, BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-0891-V7-2024 BSI-DSZ-CC-0879-V3-2018, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-0879-V5-2022
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0961-2017, BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-0945-2017 ANSSI-CC-2017/09, ANSSI-CC-2016/70, BSI-DSZ-CC-0879-V3-2018, ANSSI-CC-2016/67, ANSSI-CC-2017/08
heuristics/report_references/directly_referencing BSI-DSZ-CC-0782-2012 BSI-DSZ-CC-0879-2014
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1148-V2-2023, BSI-DSZ-CC-0980-2017, ANSSI-CC-2020/64, ANSSI-CC-2019/57-R01, ANSSI-CC-2018/21, BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-1147-2020, NSCIB-CC-0075541-CR2, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0951-V3-2018, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1110-V5-2022, NSCIB-CC-175887-CR3, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1211-2023, ANSSI-CC-2022/68, BSI-DSZ-CC-1148-V3-2023, ANSSI-CC-2018/50, BSI-DSZ-CC-1172-2022, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2019/58, BSI-DSZ-CC-1091-2018, BSI-DSZ-CC-1055-2018, NSCIB-CC-0299278-CR, BSI-DSZ-CC-1077-V2-2024, BSI-DSZ-CC-0951-V2-2017, ANSSI-CC-2018/56, BSI-DSZ-CC-1090-2018, NSCIB-CC-22-0286910-CR, BSI-DSZ-CC-1243-2024, ANSSI-CC-2020/49, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2020/55, ANSSI-CC-2022/33, BSI-DSZ-CC-0951-V4-2019, NSCIB-CC-16-95781-CR, BSI-DSZ-CC-1176-2023, ANSSI-CC-2020/43, ANSSI-CC-2018/58v2, BSI-DSZ-CC-1117-2019, BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-1076-2020, ANSSI-CC-2018/38v2, BSI-DSZ-CC-0891-V4-2019, 2017-18-INF-3170, ANSSI-CC-2019/57, BSI-DSZ-CC-0961-V5-2020, BSI-DSZ-CC-0891-V5-2021, ANSSI-CC-2020/57, ANSSI-CC-2017/19, ANSSI-CC-2020/58, ANSSI-CC-2020/87, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V3-2020, ANSSI-CC-2020/88, BSI-DSZ-CC-1112-V2-2021, ANSSI-CC-2020/44, BSI-DSZ-CC-1003-2018, ANSSI-CC-2018/32v2, BSI-DSZ-CC-0961-V3-2018, ANSSI-CC-2019/09, BSI-DSZ-CC-0869-V2-2019, BSI-DSZ-CC-1162-2021, ANSSI-CC-2019/07, BSI-DSZ-CC-0945-2017, ANSSI-CC-2018/32, ANSSI-CC-2020/08, ANSSI-CC-2022/67, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-1110-V7-2024, ANSSI-CC-2017/22, ANSSI-CC-2022/07, ANSSI-CC-2020/88-R01, ANSSI-CC-2018/53, 2017-19-INF-3171, ANSSI-CC-2020/42, BSI-DSZ-CC-0951-2015, BSI-DSZ-CC-0961-2017, NSCIB-CC-0286907-CR, ANSSI-CC-2020/59, ANSSI-CC-2017/07, ANSSI-CC-2020/45, ANSSI-CC-2018/11, ANSSI-CC-2019/56-R01, ANSSI-CC-2017/54, BSI-DSZ-CC-1084-2019, ANSSI-CC-2017/76, 2021-43-INF-4154, BSI-DSZ-CC-1077-2020, BSI-DSZ-CC-0951-V5-2021, ANSSI-CC-2018/57, ANSSI-CC-2017/83, ANSSI-CC-2020/63, BSI-DSZ-CC-0891-V6-2021, ANSSI-CC-2019/56, ANSSI-CC-2020/07, ANSSI-CC-2020/61, ANSSI-CC-2018/37v2, ANSSI-CC-2020/33, BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-0891-V2-2016, 2017-17-INF-3169, BSI-DSZ-CC-1148-2020, ANSSI-CC-2017/20, BSI-DSZ-CC-1092-2020, BSI-DSZ-CC-1147-V3-2023, ANSSI-CC-2018/24, ANSSI-CC-2017/21, ANSSI-CC-2019/55-R01, BSI-DSZ-CC-1112-2020, NSCIB-CC-146301-CR2, 2018-20-INF-4155, ANSSI-CC-2020/62, BSI-DSZ-CC-1162-V2-2023, ANSSI-CC-2018/36v2, ANSSI-CC-2022/65, ANSSI-CC-2022/64, ANSSI-CC-2018/35, BSI-DSZ-CC-1034-2019, BSI-DSZ-CC-1032-2018, BSI-DSZ-CC-0945-V2-2018, ANSSI-CC-2018/56v2, ANSSI-CC-2020/87-R01, BSI-DSZ-CC-1034-V2-2021, 2021-44-INF-4142, ANSSI-CC-2017/82, BSI-DSZ-CC-1098-2020, BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2022/19, BSI-DSZ-CC-1033-2019, JISEC-CC-CRP-C0648-01-2019, JISEC-CC-CRP-C0649-01-2019, NSCIB-CC-0112113-CR, KECS-ISIS-1031-2020, NSCIB-CC-0299277-CR, ANSSI-CC-2018/57v2, BSI-DSZ-CC-0976-V4-2021, ANSSI-CC-2019/58-R01, ANSSI-CC-2017/81, ANSSI-CC-2019/31, ANSSI-CC-2020/56, ANSSI-CC-2020/60, BSI-DSZ-CC-0891-V7-2024, BSI-DSZ-CC-0961-V2-2018, ANSSI-CC-2022/08, ANSSI-CC-2019/55, BSI-DSZ-CC-0961-V4-2019, ANSSI-CC-2022/20, BSI-DSZ-CC-0961-V6-2022, ANSSI-CC-2018/58 ANSSI-CC-2017/09, ANSSI-CC-2016/70, BSI-DSZ-CC-0879-V3-2018, ANSSI-CC-2016/67, BSI-DSZ-CC-1071-V7-2023, BSI-DSZ-CC-1084-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-1071-V4-2020, BSI-DSZ-CC-1071-V3-2020, ANSSI-CC-2017/08, ANSSI-CC-2018/22, BSI-DSZ-CC-1071-V6-2023, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-0879-V5-2022, BSI-DSZ-CC-1071-V2-2019, BSI-DSZ-CC-1071-V5-2021, BSI-DSZ-CC-1071-2019
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0782-2012 BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0782-2012
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2017/09, ANSSI-CC-2016/66, ANSSI-CC-2016/67, ANSSI-CC-2017/08
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0782-2012
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2017/08, ANSSI-CC-2017/09, ANSSI-CC-2016/66, ANSSI-CC-2016/67
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0758-2012, BSI-DSZ-CC-0782-2012
protection_profiles
pdf_data/report_filename 0891a_pdf.pdf 0879V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 SOGIS Recognition Agreement
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0891-2015
    • cert_item: Infineon Security Controller M7892 G12 with optional RSA2048/4096 v1.02.013 or v2.03.008, EC v1.02.013 or v2.03.008, SHA-2 v1.01 and Toolbox v1.02.013 or v2.03.008 libraries and with specific IC dedicated software (firmware
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 SOGIS Recognition Agreement
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0879-V2-2015
    • cert_item: Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-2012: 3
    • BSI-DSZ-CC-0891: 1
    • BSI-DSZ-CC-0891-2015: 26
  • DE:
    • BSI-DSZ-CC-0879-2014: 3
    • BSI-DSZ-CC-0879-V2-2015: 23
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 4
  • BSI:
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 8
    • EAL 5: 10
    • EAL 5+: 1
    • EAL 6: 8
    • EAL 6 augmented: 3
    • EAL 7: 4
    • EAL4: 1
    • EAL6: 2
    • EAL6 augmented: 2
    • EAL6+: 1
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 9
    • EAL 5: 10
    • EAL 5+: 1
    • EAL 6: 8
    • EAL 6 augmented: 3
    • EAL 7: 4
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 13
    • Infineon Technologies: 8
    • Infineon Technologies AG: 21
  • Infineon:
    • Infineon: 14
    • Infineon Technologies: 11
    • Infineon Technologies AG: 20
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 5
      • Triple-DES: 3
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 2
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 3
    • DES:
      • DES: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 8
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 3
    • RSA4096: 3
  • ECC:
    • ECC:
      • ECC: 7
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
  • RSA:
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 25
  • SHA:
    • SHA2:
      • SHA-2: 25
      • SHA-256: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 2
  • TRNG:
    • TRNG: 4
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 3
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 2
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 37
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • SPA: 3
    • physical probing: 1
  • other:
    • JIL: 4
  • FI:
    • DFA: 5
    • physical tampering: 1
  • SCA:
    • DPA: 5
    • SPA: 5
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS31: 3
    • AIS47: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS180-4: 2
    • FIPS186-4: 4
    • FIPS197: 3
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 1
    • RFC5639: 5
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 4
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS31: 2
    • AIS47: 2
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS180-4: 3
    • FIPS186-4: 5
    • FIPS197: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 5639: 1
    • RFC5639: 5
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • M7892 G12, Version 2, 2015-06-24, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
    • M7892 G12, Version 2, 2015-06-24, TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] Configuration Management Scope for Common Criteria with Evaluation Assurance Level EAL6: 1
    • Software Libraries RSA - EC - SHA-2 – Toolbox, Version 0.4, 2015-05-06, Infineon Technologies AG (confidential document) [12] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (v1.02: 1
    • and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification: 1
    • – Toolbox Common Criteria CCv3.1 EAL6 augmented, Version 1.9, 2015-04-27, Infineon Technologies AG (confidential document) [7] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • ConfidentialDocument:
    • B11 - Including optional Software Libraries RSA - EC - SHA-2 - Toolbox, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, 2, 2015-10-30, ETR Summary, TÜV Informationstechnik: 1
    • B11, 2, 2015-10-30, Evaluation Technical Report for Composite Evaluation, TÜV Informationstechnik (confidential document) [11] Configuration Management Scope ALC Maintenance for Common Criteria with Evaluation Assurance: 1
    • Software Libraries RSA - EC - SHA-2 – Toolbox, Version 0.4, 2014-10-20, Infineon Technologies AG (confidential document) [12] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (v1.03: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20150709081130+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 G12 with optional RSA2048/4096 v1.02.013 or v2.03.008, EC v1.02.013 or v2.03.008, SHA-2 v1.01 and Toolbox v1.02.013 or v2.03.008 libraries and with specific IC dedicated software (firmware), Infineon Technologies AG"
  • /ModDate: D:20150710065217+02'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0891-2015
  • pdf_file_size_bytes: 1391885
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
pdf_data/st_filename 0891b_pdf.pdf 0879V2b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-2012: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 3
  • BSI:
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL6: 7
    • EAL6 augmented: 4
    • EAL6+: 120
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL6: 8
    • EAL6 augmented: 5
    • EAL6+: 109
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_CMC.5: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 2
    • ADV_INT: 1
    • ADV_INT.2: 3
    • ADV_INT.3: 2
    • ADV_SPM: 1
    • ADV_SPM.1: 6
    • ADV_TDS: 1
    • ADV_TDS.3: 2
    • ADV_TDS.5: 3
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 2
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 4
    • ALC_FLR.1: 11
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 2
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 3
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 3
    • ATE_FUN.2: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_CMC.5: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 2
    • ADV_INT: 1
    • ADV_INT.2: 3
    • ADV_INT.3: 2
    • ADV_SPM: 1
    • ADV_SPM.1: 6
    • ADV_TDS: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 3
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 2
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.1: 2
    • ALC_DVS.2: 4
    • ALC_FLR.1: 12
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 2
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 3
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 3
    • ATE_FUN.2: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 49
    • FCS_CKM.1: 23
    • FCS_CKM.2: 6
    • FCS_CKM.4: 26
    • FCS_COP: 71
    • FCS_COP.1: 24
    • FCS_RNG: 9
    • FCS_RNG.1: 13
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 21
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 14
    • FDP_ITC.1: 22
    • FDP_ITC.2: 22
    • FDP_ITT.1: 18
    • FDP_SDC: 3
    • FDP_SDC.1: 7
    • FDP_SDI.1: 16
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 15
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 2
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 26
    • FMT_LIM.1: 9
    • FMT_LIM.2: 8
    • FMT_MSA.1: 19
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS.1: 19
    • FPT_ITT: 3
    • FPT_ITT.1: 13
    • FPT_LIM: 2
    • FPT_LIM.1: 2
    • FPT_PHP.3: 24
    • FPT_TST: 8
    • FPT_TST.1: 11
    • FPT_TST.2: 30
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 6
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 24
    • FCS_CKM.1: 35
    • FCS_CKM.2: 5
    • FCS_CKM.4: 25
    • FCS_COP: 64
    • FCS_COP.1: 29
    • FCS_RNG: 14
    • FCS_RNG.1: 29
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 26
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 16
    • FDP_ITC.1: 19
    • FDP_ITC.2: 19
    • FDP_ITT.1: 19
    • FDP_SDI.1: 18
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 16
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 3
    • FMT_LIM.1: 8
    • FMT_LIM.2: 8
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 20
    • FPT_ITT.1: 17
    • FPT_LIM.2: 1
    • FPT_PHP.3: 26
    • FPT_TST: 7
    • FPT_TST.1: 11
    • FPT_TST.2: 34
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 7
    • O.RND: 3
    • O.SHA: 5
    • O.TDES: 6
  • T:
    • T.RND: 1
  • O:
    • O.RND: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 14
    • Infineon Technologies: 10
    • Infineon Technologies AG: 19
  • Infineon:
    • Infineon: 6
    • Infineon Technologies: 10
    • Infineon Technologies AG: 24
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 39
  • DES:
    • 3DES:
      • 3DES: 4
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 3
    • DES:
      • DES: 16
  • constructions:
    • MAC:
      • CBC-MAC: 6
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • 3DES:
      • 3DES: 6
      • TDEA: 2
      • TDES: 1
      • Triple-DES: 1
    • DES:
      • DES: 22
  • constructions:
    • MAC:
      • CBC-MAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 19
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 35
  • FF:
    • DH:
      • Diffie-Hellman: 12
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 1
    • RSA4096: 1
  • ECC:
    • ECC:
      • ECC: 13
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 18
  • FF:
    • DH:
      • Diffie-Hellman: 6
    • DSA:
      • DSA: 1
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 64
      • SHA-256: 5
      • SHA-512: 5
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-2: 71
      • SHA-256: 7
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
    • Key agreement: 2
  • KA:
    • Key Agreement: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 7
  • RNG:
    • RND: 4
    • RNG: 9
  • TRNG:
    • DTRNG: 1
    • TRNG: 12
  • PRNG:
    • PRNG: 6
  • RNG:
    • RND: 2
    • RNG: 10
  • TRNG:
    • TRNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 9
  • CFB:
    • CFB: 1
  • ECB:
    • ECB: 9
  • CBC:
    • CBC: 9
  • CFB:
    • CFB: 5
  • ECB:
    • ECB: 9
pdf_data/st_keywords/ecc_curve
  • NIST:
    • K-163: 8
    • P-192: 16
  • NIST:
    • K-163: 2
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 22
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 9
    • Malfunction: 12
    • fault induction: 1
    • malfunction: 1
  • SCA:
    • DPA: 8
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 7
    • physical probing: 1
    • side channel: 8
  • FI:
    • DFA: 7
    • Malfunction: 12
    • fault induction: 1
    • malfunction: 1
  • SCA:
    • DPA: 7
    • Leak-Inherent: 11
    • Physical Probing: 2
    • SPA: 6
    • physical probing: 1
    • side channel: 7
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 8
    • AIS32: 6
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 197: 3
    • FIPS PUB 180-4: 3
    • FIPS PUB 186-4: 2
  • ISO:
    • ISO/IEC 10118: 2
    • ISO/IEC 10118-3: 2
    • ISO/IEC 11770-3: 3
    • ISO/IEC 14888-3: 7
    • ISO/IEC 18033: 2
    • ISO/IEC 18033-3: 2
    • ISO/IEC 18092: 4
    • ISO/IEC 9797-1: 4
  • NIST:
    • SP 800-38A: 6
    • SP 800-67: 3
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 2
    • RFC3447: 1
  • BSI:
    • AIS31: 9
    • AIS32: 4
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS PUB 180-4: 4
    • FIPS PUB 197: 3
  • ISO:
    • ISO/IEC 18092: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9797-1: 3
  • NIST:
    • SP 800-38A: 2
    • SP 800-67: 2
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 2
    • RFC3447: 11
pdf_data/st_metadata
  • /Author: Hans-Ulrich Buchmüller
  • /CreationDate: D:20150709122640+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Taiwan, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, ACLB, 90nm
  • /ModDate: D:20150709122640+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Security Target M7892 G12 Integrity Guard
  • /Title: Public Security Target
  • pdf_file_size_bytes: 1556606
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.infineon.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 118
  • /Author: Hans-Ulrich Buchmüller
  • /CreationDate: D:20151102193054+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Dresden, contactless, multi interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, ACLB, USB, GPIO, 90nm
  • /ModDate: D:20151102193054+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Security Target Lite M7893 Integrity Guard
  • /Title: Public Security Target Lite
  • pdf_file_size_bytes: 1355244
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.infineon.com/, http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 108
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different