Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software
BSI-DSZ-CC-0640-2010
Infineon Technologies SmartCard IC (Security Controller) M7793 A12 with optional RSAv1.02.010, EC v1.02.010 and Toolbox v1.02.010 libraries and with specific IC-dedicated software
BSI-DSZ-CC-0757-2011
name Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software Infineon Technologies SmartCard IC (Security Controller) M7793 A12 with optional RSAv1.02.010, EC v1.02.010 and Toolbox v1.02.010 libraries and with specific IC-dedicated software
not_valid_before 2010-07-28 2011-09-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0757b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0757a_pdf.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2010, 8, 30), 'maintenance_title': 'Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2v1.1 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640_ma1b_pdf.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 8, 8), 'maintenance_title': 'Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2v1.1 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640_ma2a_pdf.pdf', 'maintenance_st_link': None}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2012, 2, 21), 'maintenance_title': 'Infineon Technologies SmartCard IC (Security Controller) M7793 A12 with optional RSA v1.02.010, EC v1.02.010 and Toolbox v1.02.010 libraries and with specific IC-dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0757_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0757_ma1b_pdf.pdf'})
state/report/pdf_hash c6990cd24c41f94a466033230cfae435863b12c222404a8fee0edccf8e6b9f63 b7acbc354f232e99596487fe0562a0b9431471aba38c5c323049723ca109588d
state/report/txt_hash 6de1516dd50bb7ce7ffbe25b61b63373d7104793e9e176912a25f0435c1a0a2f 6a403df225df7712bfe02b09809c9994e058021d39ea6a540dc6617a647fdae6
state/st/pdf_hash 3f58c3db61acda65df3f96474fbed76a6ccf740f2dd16d8e43ac6c6f3678bca4 f783c3f8153b4030de25d14f651efe4e0909e6bc43568e511d12a5e99d69d04c
state/st/txt_hash 934774f1409d9d748b9d59bb9030954650657149e459fe14ce0dfa110bdd5ac8 ad38709c4a4dbe2aae8b242afe00bbd60e2ea310c08be77ee1f261858f63890e
heuristics/cert_id BSI-DSZ-CC-0640-2010 BSI-DSZ-CC-0757-2011
heuristics/direct_transitive_cves None CVE-2017-15361
heuristics/extracted_versions 1.1, 1.1.18 1.02.010
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0677-2010, BSI-DSZ-CC-0732-2011 BSI-DSZ-CC-0907-2013
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/02, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2013/10, BSI-DSZ-CC-0880-2013, ANSSI-CC-2014/48, ANSSI-CC-2014/09, BSI-DSZ-CC-0729-2011, ANSSI-CC-2016/73, BSI-DSZ-CC-0761-2013, ANSSI-CC-2013/32, ANSSI-CC-2015/37, ANSSI-CC-2013/40, CRP290, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, ANSSI-CC-2016/03, ANSSI-CC-2014/06, ANSSI-CC-2014/86, BSI-DSZ-CC-0850-2013, ANSSI-CC-2015/30, ANSSI-CC-2015/04, ANSSI-CC-2015/15, BSI-DSZ-CC-0889-2013, ANSSI-CC-2015/39, ANSSI-CC-2015/03, ANSSI-CC-2014/07, ANSSI-CC-2015/25, BSI-DSZ-CC-0952-V2-2016, BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0898-2014, ANSSI-CC-2016/04, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, BSI-DSZ-CC-0813-2012, ANSSI-CC-2015/38, ANSSI-CC-2013/55, ANSSI-CC-2012/40, ANSSI-CC-2014/62, ANSSI-CC-2012/41, ANSSI-CC-2012/44, BSI-DSZ-CC-0677-2010, ANSSI-CC-2014/14, ANSSI-CC-2013/33, ANSSI-CC-2014/49, ANSSI-CC-2012/38, ANSSI-CC-2013/42, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2014/13, ANSSI-CC-2012/51, BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2015/40, BSI-DSZ-CC-0904-2015, BSI-DSZ-CC-0728-2011, ANSSI-CC-2016/75, BSI-DSZ-CC-0763-2012, ANSSI-CC-2013/64, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0733-2011, ANSSI-CC-2015/01, ANSSI-CC-2016/74, ANSSI-CC-2014/61, ANSSI-CC-2014/08, BSI-DSZ-CC-0764-2012, ANSSI-CC-2015/09, ANSSI-CC-2014/50, ANSSI-CC-2012/50, ANSSI-CC-2015/41, ANSSI-CC-2015/08, BSI-DSZ-CC-0695-2011, ANSSI-CC-2012/85, ANSSI-CC-2013/11, BSI-DSZ-CC-0732-2011 ANSSI-CC-2016/06, ANSSI-CC-2016/24, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0926-V2-2017, ANSSI-CC-2016/23, BSI-DSZ-CC-0907-2013
heuristics/st_references/directly_referenced_by ANSSI-CC-2012/31, ANSSI-CC-2013/10, ANSSI-CC-2013/11, ANSSI-CC-2012/41, ANSSI-CC-2013/40, ANSSI-CC-2012/50, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0728-2011, ANSSI-CC-2012/40, ANSSI-CC-2012/32, BSI-DSZ-CC-0677-2010, ANSSI-CC-2012/51, BSI-DSZ-CC-0732-2011 None
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0904-2015, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2016/75, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2013/10, ANSSI-CC-2012/41, ANSSI-CC-2014/62, BSI-DSZ-CC-0880-2013, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, ANSSI-CC-2014/48, ANSSI-CC-2012/44, BSI-DSZ-CC-0733-2011, ANSSI-CC-2014/14, ANSSI-CC-2016/74, BSI-DSZ-CC-0677-2010, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, BSI-DSZ-CC-0729-2011, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2013/32, ANSSI-CC-2012/31, ANSSI-CC-2013/11, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0751-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, BSI-DSZ-CC-0813-2012, ANSSI-CC-2014/13, ANSSI-CC-2012/51, BSI-DSZ-CC-0732-2011 None
pdf_data/report_filename 0640a_pdf.pdf 0757a_pdf.pdf
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0640-2010 BSI-DSZ-CC-0757-2011
pdf_data/report_frontpage/DE/cert_item Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software Infineon Technologies SmartCard IC (Security Controller) M7793 A12 with optional RSA v1.02.010, EC v1.02.010 and Toolbox v1.02.010 libraries and with specific IC-dedicated software
pdf_data/report_keywords/asymmetric_crypto/ECC
  • ECC:
    • ECC: 4
  • ECDH:
    • ECDH: 1
  • ECDSA:
    • ECDSA: 4
  • ECC:
    • ECC: 3
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 4 3
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA-2048 1 2
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 1 2
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA4096 1 2
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0640-2010: 22
  • BSI-DSZ-CC-0757-2011: 23
  • BSI-DSZ-CC-0757: 2
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0035-2007 4 3
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.5 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.2 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.4 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 3 1
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.2 1 6
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.3 2 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 4
  • EAL 4: 5
  • EAL1: 7
  • EAL4: 8
  • EAL5+: 1
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL6: 3
  • EAL 5 augmented: 3
  • EAL 4: 13
  • EAL 5: 9
  • EAL1: 7
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL5: 1
  • EAL7: 4
  • EAL2: 3
  • EAL 4 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 5 13
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 4 9
pdf_data/report_keywords/cc_security_level/EAL/EAL5 6 1
pdf_data/report_keywords/cc_security_level/EAL/EAL6 3 4
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • A11, Version 4 from 2010-07-26, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product SLE78CLXxxxP/M/PS / M7820 A11: 1
  • Version 4 from 2010-07-26, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [10] a) Document Reference M7820 A11 including optional Software Libraries RSA– EC – SHA-2: 1
  • Libraries RSA v1.0 – EC v1.0 –- SHA-2 v1.0, version 1.3 from 2010-06-10, Infineon Technologies AG (confidential document) [11] SLE/SLM 70 Family Production and Personalization version 2009-04 from 2009-04- 27, Infineon: 1
  • optional Software Libraries RSA – EC – Toolbox, Version 2.0, 2011-07-07, Infineon Technologies AG (confidential document) [7] Security Target Lite, BSI-DSZ-CC-0757, M7793 A12 including optional Software Libraries RSA –: 1
  • M7793 A12, Version 2, 2011-09-19, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7793 A12, Version 2: 1
  • TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
  • optional Software Libraries RSA – EC – Toolbox, Version 1.5, 2011-06-29, Infineon Technologies AG (confidential document) [12] SLx 70 Family Production and Personalization User’s Manual, Version 2011-06-21, 2011-06-21: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 17
pdf_data/report_keywords/randomness/TRNG/TRNG 1 2
pdf_data/report_keywords/side_channel_analysis/FI
  • DFA: 3
  • physical tampering: 1
  • DFA: 5
pdf_data/report_keywords/side_channel_analysis/FI/DFA 3 5
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 3 5
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 3 5
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 3
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS31: 1
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS 35: 1
  • AIS31: 1
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
pdf_data/report_keywords/standard_id/BSI/AIS 34 3 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 4 6
pdf_data/report_keywords/symmetric_crypto/DES/3DES/3DES 2 3
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 3 5
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies: 15
    • Infineon Technologies AG: 20
    • Infineon: 4
  • Infineon:
    • Infineon Technologies: 15
    • Infineon Technologies AG: 21
    • Infineon: 4
  • GD:
    • Giesecke & Devrient: 1
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 20 21
pdf_data/report_metadata//CreationDate D:20100806130533+02'00' D:20111102110158+01'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software, Infineon Technologies AG" "Common Criteria, Certification, Zertifizierung, Infineon Technologies SmartCard IC (Security Controller) M7793 A12 with optional RSA v1.02.010, EC v1.02.010 and Toolbox v1.02.010 libraries and with specific IC-dedicated software, Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20100809170019+02'00' D:20111102110407+01'00'
pdf_data/report_metadata//Producer OpenOffice.org 3.1 OpenOffice.org 3.2
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0640-2010 Certification Report BSI-DSZ-CC-0757-2011
pdf_data/report_metadata/pdf_file_size_bytes 996847 1027641
pdf_data/report_metadata/pdf_number_of_pages 42 44
pdf_data/st_filename 0640b_pdf.pdf 0757b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 8 10
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 4 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 12 9
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 5 4
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 2 1
pdf_data/st_keywords/cc_claims/O/O.RND 1 3
pdf_data/st_keywords/cc_claims/T/T.RND 1 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
  • ADV_ARC.1: 2
  • ADV_FSP.4: 1
  • ADV_IMP.1: 2
  • ADV_TDS.3: 2
  • ADV_FSP.2: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 1 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_CMS: 1
  • ALC_CMS.4: 1
  • ALC_DVS.1: 1
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.1: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 9
  • ATE_COV.2: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 5
  • EAL 5: 3
  • EAL5 augmented: 1
  • EAL 5 augmented: 3
  • EAL4+: 1
  • EAL4: 5
  • EAL 4: 1
  • EAL4 augmented: 1
  • EAL 4 augmented: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS 4 5
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 10 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 24 18
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 33 32
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 24 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 56 34
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 28 32
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 11 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 25 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 22 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 15 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 18 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 18 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 18 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 17 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 15 12
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 20
  • FMT_MSA.3: 21
  • FMT_SMF.1: 16
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 1
  • FMT_CKM.4: 1
  • FMT_MSA.1: 14
  • FMT_MSA.3: 15
  • FMT_SMF.1: 11
  • FMT_LIM: 3
  • FMT_LIM.1: 5
  • FMT_LIM.2: 5
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 7 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 7 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 1 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 21 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 16 11
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST: 7
  • FPT_TST.2: 37
  • FPT_TST.1: 12
  • FPT_AMT.1: 4
  • FPT_FLS.1: 19
  • FPT_PHP.3: 25
  • FPT_ITT.1: 16
  • FPT_TST.2.1: 1
  • FPT_LIM.2: 1
  • FPT_TST: 7
  • FPT_TST.2: 31
  • FPT_TST.1: 11
  • FPT_FLS.1: 5
  • FPT_PHP.3: 4
  • FPT_ITT.1: 4
  • FPT_AMT.1: 2
  • FPT_TST.2.1: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_AMT.1 4 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 19 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 16 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 25 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 12 11
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 37 31
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 8 5
pdf_data/st_keywords/cipher_mode/CBC/CBC 2 1
pdf_data/st_keywords/cipher_mode/CFB/CFB 4 2
pdf_data/st_keywords/cipher_mode/ECB/ECB 2 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/st_keywords/hash_function/MD/MD5/MD5 6 5
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 6 5
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 3
  • SHA-512: 2
  • SHA256: 5
  • SHA-2: 55
  • SHA256: 5
pdf_data/st_keywords/randomness/PRNG/PRNG 6 5
pdf_data/st_keywords/randomness/RNG/RND 2 6
pdf_data/st_keywords/randomness/RNG/RNG 3 2
pdf_data/st_keywords/randomness/TRNG/TRNG 13 5
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
  • fault induction: 1
  • Malfunction: 12
  • malfunction: 1
  • DFA: 6
pdf_data/st_keywords/side_channel_analysis/FI/DFA 7 6
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 2
  • SPA: 5
  • DPA: 10
  • Leak-Inherent: 9
  • Physical Probing: 2
  • SPA: 4
  • DPA: 6
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 10 6
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 10 9
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 5 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 180-3: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 5
  • RFC:
    • RFC3447: 11
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC18092: 4
    • ISO/IEC 18092: 4
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS31: 4
  • RFC:
    • RFC3447: 6
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
pdf_data/st_keywords/standard_id/BSI/AIS31 5 4
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-001 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-002 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2009-07-003 2 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 2
  • FIPS PUB 180-3: 2
  • FIPS PUB 197: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 2 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 14443: 4
  • ISO/IEC18092: 4
  • ISO/IEC 18092: 4
  • ISO/IEC 7816-3: 1
  • ISO/IEC 7816-3: 1
pdf_data/st_keywords/standard_id/RFC
  • RFC3447: 11
  • RFC3447: 6
  • RFC 5639: 1
pdf_data/st_keywords/standard_id/RFC/RFC3447 11 6
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • DES:
      • DES: 6
    • 3DES:
      • 3DES: 17
      • Triple-DES: 2
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • 3DES: 9
      • Triple-DES: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 24 13
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 17 9
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 2 1
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 6 5
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 1
  • Infineon:
    • Infineon Technologies AG: 12
    • Infineon: 5
    • Infineon Technologies: 5
  • Infineon:
    • Infineon Technologies AG: 11
    • Infineon: 4
    • Infineon Technologies: 4
pdf_data/st_keywords/vendor/Infineon/Infineon 5 4
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 5 4
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 12 11
pdf_data/st_metadata
  • pdf_file_size_bytes: 520296
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
  • /Creator: SecurityTarget_SLE78_M7820.doc - Microsoft Word
  • /CreationDate: D:20100623103859
  • /Subject: Security Target M7820 Integrity Guard
  • /Title: CC EAL5+ Certification Security Target
  • /Author: Hans-Ulrich Buchmüller, Jürgen Noller
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Keywords: Security Target, contactless, dual interface, DCLB, CL, bridge, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, EAL5 high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, cryptographic, libraries
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 408744
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
  • /Creator: Microsoft Word - M7793SecurityTargetLite
  • /Producer: ScanSoft PDF Create! 6
  • /CreationDate: D:20110927105537+01'00'
  • /ModDate: D:20110927105537+01'00'
  • /Author: Steffen Heinkel
  • /Title: M7793 Security Target
  • /Keywords: M7793, CC, EAL4+
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Hans-Ulrich Buchmüller, Jürgen Noller Steffen Heinkel
pdf_data/st_metadata//CreationDate D:20100623103859 D:20110927105537+01'00'
pdf_data/st_metadata//Creator SecurityTarget_SLE78_M7820.doc - Microsoft Word Microsoft Word - M7793SecurityTargetLite
pdf_data/st_metadata//Keywords Security Target, contactless, dual interface, DCLB, CL, bridge, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, EAL5 high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, cryptographic, libraries M7793, CC, EAL4+
pdf_data/st_metadata//Producer Acrobat PDFWriter 5.0 for Windows NT ScanSoft PDF Create! 6
pdf_data/st_metadata//Title CC EAL5+ Certification Security Target M7793 Security Target
pdf_data/st_metadata/pdf_file_size_bytes 520296 408744
pdf_data/st_metadata/pdf_number_of_pages 73 58
dgst 454b704420e1b9ab b12707051b8e1919