name |
Samsung S3CC9P9 microcontroller |
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
DE |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
11.05.2004 |
05.05.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2004_06.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2004_06.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0728b_pdf.pdf |
manufacturer |
Samsung Electronics Co., Ltd. |
Infineon Technologies AG |
manufacturer_web |
https://www.samsung.com |
https://www.infineon.com/ |
security_level |
EAL4+, ALC_DVS.2, ADV_IMP.2, AVA_VLA.4 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
473ea605d6a40ef5 |
327502c9e9054739 |
heuristics/cert_id |
ANSSI-CC-2004/06 |
BSI-DSZ-CC-0728-2011 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
CVE-2017-15361 |
heuristics/indirect_transitive_cves |
{} |
CVE-2017-15361 |
heuristics/extracted_sars |
ADV_DVS.2, ATE_DPT.1, AVA_MSU.2, ADV_SPM.1, ASE_SRE.1, ATE_COV.2, AVA_SOF.1, ADV_LLD.1, ASE_INT.1, AVA_VLA.4, ALC_LCD.1, ALC_DVS.2, AGD_ADM.1, ASE_ENV.1, ADV_HLD.2, ATE_IND.2, ATE_FUN.1, ASE_DES.1, ASE_REQ.1, ADV_IMP.2, ASE_OBJ.1, ADV_RCR.1, ALC_TAT.1, ADV_FSP.1, ASE_TSS.1, ASE_PPC.1, AGD_USR.1 |
ADV_TDS.4, APE_REQ.2, ADV_SPM.1, ATE_COV.2, AGD_OPE.1, APE_OBJ.2, APE_INT.1, ALC_DEL.1, ASE_INT.1, APE_ECD.1, ADV_ARC.1, ADV_FSP.5, AVA_VAN.5, ASE_ECD.1, ATE_DPT.3, ALC_LCD.1, ASE_REQ.2, ADV_IMP.1, ALC_DVS.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.5, ADV_INT.2, APE_SPD.1, ALC_FLR.3, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, APE_CCL.1 |
heuristics/extracted_versions |
- |
1.01, 1.02.008 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0729-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0763-2012 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2002/25 |
BSI-DSZ-CC-0640-2010 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2014/12, BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0952-V2-2016, ANSSI-CC-2016/73, ANSSI-CC-2015/08, BSI-DSZ-CC-0818-2013, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2015/30, ANSSI-CC-2013/55, ANSSI-CC-2012/44, ANSSI-CC-2013/33, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0898-2014, ANSSI-CC-2014/06, ANSSI-CC-2015/03, ANSSI-CC-2015/39, ANSSI-CC-2012/40, ANSSI-CC-2015/04, ANSSI-CC-2014/49, ANSSI-CC-2014/14, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0829-V2-2015, BSI-DSZ-CC-0922-2014, ANSSI-CC-2013/11, ANSSI-CC-2014/50, ANSSI-CC-2013/42, ANSSI-CC-2012/50, BSI-DSZ-CC-0819-2012, ANSSI-CC-2012/85, ANSSI-CC-2015/38, BSI-DSZ-CC-0889-2013, BSI-DSZ-CC-0764-2012, ANSSI-CC-2012/38, ANSSI-CC-2012/31, ANSSI-CC-2012/51, ANSSI-CC-2014/07, ANSSI-CC-2014/09, ANSSI-CC-2016/03, BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0729-2011, ANSSI-CC-2015/25, ANSSI-CC-2016/74, ANSSI-CC-2015/37, ANSSI-CC-2013/34, BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0836-2013, BSI-DSZ-CC-0763-2012, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2013/35, ANSSI-CC-2012/41, BSI-DSZ-CC-0813-2012, ANSSI-CC-2016/75, ANSSI-CC-2015/09, BSI-DSZ-CC-0941-2016, BSI-DSZ-CC-0769-2012, ANSSI-CC-2013/10, BSI-DSZ-CC-0829-2012, ANSSI-CC-2015/41, BSI-DSZ-CC-0751-2013, ANSSI-CC-2015/01, ANSSI-CC-2014/86, CRP290, ANSSI-CC-2014/13, ANSSI-CC-2013/40, ANSSI-CC-2014/08, BSI-DSZ-CC-0850-2013, ANSSI-CC-2014/61, ANSSI-CC-2015/15, BSI-DSZ-CC-0835-2013, ANSSI-CC-2012/32, ANSSI-CC-2013/64, ANSSI-CC-2013/32, ANSSI-CC-2015/40, ANSSI-CC-2014/62, BSI-DSZ-CC-0904-2015, ANSSI-CC-2013/39, BSI-DSZ-CC-0760-2013, ANSSI-CC-2015/02, ANSSI-CC-2014/48, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0952-2014, ANSSI-CC-2014/11, ANSSI-CC-2016/04 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2002/25 |
BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0733-2011, BSI-DSZ-CC-0729-2011, BSI-DSZ-CC-0813-2012 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0640-2010 |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2014/08, ANSSI-CC-2014/12, BSI-DSZ-CC-0733-2011, ANSSI-CC-2014/61, BSI-DSZ-CC-0836-2013, ANSSI-CC-2016/73, ANSSI-CC-2012/50, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/41, ANSSI-CC-2013/35, ANSSI-CC-2012/32, ANSSI-CC-2012/38, ANSSI-CC-2012/31, BSI-DSZ-CC-0835-2013, ANSSI-CC-2012/51, ANSSI-CC-2014/07, ANSSI-CC-2014/09, ANSSI-CC-2013/32, ANSSI-CC-2013/34, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0729-2011, ANSSI-CC-2016/75, ANSSI-CC-2014/62, BSI-DSZ-CC-0904-2015, ANSSI-CC-2015/09, ANSSI-CC-2012/44, ANSSI-CC-2013/33, ANSSI-CC-2013/39, BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0898-2014, ANSSI-CC-2013/10, ANSSI-CC-2014/06, ANSSI-CC-2014/48, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0751-2013, ANSSI-CC-2012/40, ANSSI-CC-2016/74, BSI-DSZ-CC-0952-2014, ANSSI-CC-2014/11, ANSSI-CC-2014/14, BSI-DSZ-CC-0880-2013, ANSSI-CC-2014/13, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2013/40, BSI-DSZ-CC-0922-2014 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010 |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
2004_06.pdf |
0728a_pdf.pdf |
pdf_data/report_frontpage |
|
- FR:
- DE:
- cert_id: BSI-DSZ-CC-0728-2011
- cert_item: Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- Rapport de certification 2002/25: 1
- Rapport de certification 2004/06: 13
|
- DE:
- BSI-DSZ-CC-0640-2010: 3
- BSI-DSZ-CC-0728-2011: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL1: 1
- EAL3: 1
- EAL4: 1
- EAL4+: 1
- EAL41: 1
- EAL5: 1
- EAL7: 2
- ITSEC:
|
- EAL:
- EAL 4: 3
- EAL 5: 6
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 2
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 2
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.2: 3
- ADV_INT: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.2: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.4: 3
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 2
- FCS_COP.1: 2
- FDP:
- FDP_ACC.2: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 2
- FDP_IFF.1: 2
- FDP_SDI.1: 2
- FIA:
- FIA_ATD.1: 2
- FIA_UAU.2: 2
- FIA_UID.2: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.1: 2
- FMT_MSA.3: 2
- FMT_SMR.1: 2
- FPR:
- FPT:
- FPT_PHP.2: 2
- FPT_PHP.3: 2
- FPT_TST.1: 2
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 12
- Infineon Technologies: 7
- Infineon Technologies AG: 20
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
- ECC:
- RSA:
- RSA 1024: 1
- RSA-2048: 1
- RSA2048: 1
- RSA4096: 1
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- physical tampering: 1
- SCA:
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- ISO:
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 36: 3
- AIS 38: 1
- AIS31: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- M7820 A11, Version 1, 2011-04-15, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11, Version 1: 1
- TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 including optional Software Libraries RSA – EC –: 1
- – Toolbox, Version 1.2, 2011-01-26, Infineon Technologies AG (confidential document) [11] SLE/SLM 70 Family Production and Personalization, Version 2010-12-13, 2010-12-13, Infineon: 1
|
pdf_data/report_metadata |
- /Author: DCSSI
- /CreationDate: D:20040517150819+02'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /ModDate: D:20040517150839+03'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: Micro-circuit SAMSUNG S3CC9P9
- /Title: Rapport de certification 2004/06
- pdf_file_size_bytes: 656869
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 26
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20110518111733+02'00'
- /Creator: Writer
- /Keywords: "Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologies AG, Common Criteria, Certification, Zertifizierung"
- /ModDate: D:20110518112550+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0728-2011
- pdf_file_size_bytes: 1212432
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
pdf_data/st_filename |
cible2004_06.pdf |
0728b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL4: 12
- EAL4 augmented: 1
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL5: 5
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_CAP: 3
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_DVS.2: 1
- ADV_FSP: 3
- ADV_FSP.1: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.1: 2
- ADV_IMP.2: 5
- ADV_LLD: 2
- ADV_LLD.1: 2
- ADV_RCR: 3
- ADV_RCR.1: 1
- ADV_SPM: 2
- AGD:
- AGD_ADM: 3
- AGD_ADM.1: 1
- AGD_USR: 3
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_LCD: 2
- ALC_TAT: 2
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_MSU: 2
- AVA_SOF: 2
- AVA_VLA: 2
- AVA_VLA.4: 6
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 2
- FAU_SAA.1: 7
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.4: 7
- FCS_COP.1: 8
- FDP:
- FDP_ACC.1: 1
- FDP_ACC.2: 5
- FDP_ACF.1: 6
- FDP_IFC.1: 6
- FDP_IFF.1: 6
- FDP_ITC.1: 3
- FDP_SDI.1: 5
- FIA:
- FIA_ATD.1: 7
- FIA_UAU.2: 8
- FIA_UID.1: 1
- FIA_UID.2: 8
- FMT:
- FMT_MOF.1: 7
- FMT_MSA.1: 6
- FMT_MSA.2: 3
- FMT_MSA.3: 7
- FMT_SMR.1: 7
- FPR:
- FPT:
- FPT_AMT.1: 2
- FPT_PHP.2: 5
- FPT_PHP.3: 5
- FPT_TST.1: 8
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 24
- FCS_CKM.1: 33
- FCS_CKM.2: 5
- FCS_CKM.4: 24
- FCS_COP: 58
- FCS_COP.1: 28
- FCS_RNG: 4
- FCS_RNG.1: 11
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 25
- FDP_ACC.1.1: 1
- FDP_ACF.1: 22
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 15
- FDP_ITC.1: 18
- FDP_ITC.2: 18
- FDP_ITT.1: 18
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FMT:
- FMT_CKM.4: 1
- FMT_LIM: 3
- FMT_LIM.1: 7
- FMT_LIM.2: 7
- FMT_MSA.1: 20
- FMT_MSA.1.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 21
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 19
- FPT_ITT.1: 16
- FPT_LIM.2: 1
- FPT_PHP.3: 25
- FPT_TST: 7
- FPT_TST.1: 11
- FPT_TST.2: 36
- FPT_TST.2.1: 1
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.DEV_ORG: 2
- A.DLV: 1
- A.DLV_AUDIT: 2
- A.DLV_PROTECT: 2
- A.DLV_RESP: 2
- A.KEY_DEST: 3
- A.SOFT_ARCHI: 2
- A.USE_DIAG: 2
- A.USE_PROD: 2
- A.USE_SYS: 2
- A.USE_TEST: 2
- O:
- O.CLON: 3
- O.CRYPTO: 3
- O.DESIGN: 1
- O.DESIGN_ACS: 2
- O.DEV_DIS: 4
- O.DEV_TOOLS: 3
- O.DIS_: 3
- O.DIS_ME: 1
- O.DIS_MECHANISM: 4
- O.DIS_MEMORY: 3
- O.DLV_AUDIT: 1
- O.DLV_PROTECT: 2
- O.DLV_RESP: 2
- O.DSOFT: 1
- O.DSOFT_ACS: 2
- O.FLAW: 3
- O.IC_DLV: 2
- O.KEY_: 1
- O.KEY_DEST: 3
- O.MASK: 1
- O.MASK_FAB: 2
- O.MECH: 1
- O.MECH_ACS: 2
- O.MOD_: 2
- O.MOD_MEMORY: 5
- O.OPER: 1
- O.OPERATE: 7
- O.SOFT: 1
- O.SOFT_ACS: 2
- O.SOFT_DLV: 2
- O.SOFT_MECH: 1
- O.TA: 1
- O.TAMPER: 3
- O.TEST_OPERATE: 2
- O.TI: 1
- O.TI_ACS: 1
- O.TOE_PRT: 3
- O.USE_DIAG: 1
- O.USE_SYS: 2
- T:
- T.CLON: 12
- T.DIS_DEL: 5
- T.DIS_DESIGN: 10
- T.DIS_DSOFT: 8
- T.DIS_INFO: 4
- T.DIS_PHOTOMASK: 6
- T.DIS_SOFT: 7
- T.DIS_TEST: 5
- T.DIS_TOOLS: 5
- T.MOD_DEL: 5
- T.MOD_DESIGN: 10
- T.MOD_DSOFT: 9
- T.MOD_PHOTOMASK: 5
- T.MOD_SOFT: 10
- T.T_DEL: 6
- T.T_PHOTOMASK: 6
- T.T_PRODUCT: 7
- T.T_SAMPLE: 8
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 5
- Infineon Technologies: 7
- Infineon Technologies AG: 15
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 1
- RSA4096: 1
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 61
- SHA-256: 2
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Physical Tampering: 1
- physical tampering: 5
- other:
|
- FI:
- DFA: 7
- Malfunction: 12
- fault induction: 1
- malfunction: 1
- SCA:
- DPA: 10
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 5
- physical probing: 1
- side channel: 6
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 32: 1
- AIS31: 5
- AIS32: 4
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 197: 2
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 18092: 6
- ISO/IEC 7816-3: 1
- ISO/IEC18092: 6
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Test ROM code). The former is out of scope of the evaluation, while the latter is within the scope of the evaluation: 1
- a smart card embedded software and an IC dedicated software (Test ROM code). The former is out of scope of the evaluation, while the latter is within the scope of the evaluation. 10 To allow the: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20040221110009
- /Creator: AdobePS5.dll Version 5.0.1
- /ModDate: D:20040221110011+09'00'
- /Producer: Acrobat Distiller 4.0 for Windows
- /Title: Microsoft Word - ST C9P9 v1.2_FEB 21_.doc
- pdf_file_size_bytes: 651062
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
- /Author: Hans-Ulrich Buchmüller
- /CreationDate: D:20110415135116
- /Creator: SecurityTarget_SLE78_M7820_A11.doc - Microsoft Word
- /Keywords: Security Target, contactless, dual interface, DCLB, RSA, EC, SHA-2, Toolbox, Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, Elliptic Curve, cryptographic, libraries, PP0035
- /Producer: Acrobat PDFWriter 5.0 für Windows NT
- /Subject: Security Target M7820 Integrity Guard
- /Title: CC EAL5+ Certification Security Target
- pdf_file_size_bytes: 551119
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 79
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |