Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software
BSI-DSZ-CC-0523-2008
Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software
BSI-DSZ-CC-0946-V2-2015
name Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software
not_valid_after 01.09.2019 23.11.2020
not_valid_before 06.11.2008 23.11.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946V2b_pdf.pdf
security_level AVA_VLA.4, AVA_MSU.3, EAL5+, ALC_DVS.2 AVA_VAN.5, ALC_DVS.2, EAL5+
dgst 4befd70d36bd82c3 32ed1825f99fafee
heuristics/cert_id BSI-DSZ-CC-0523-2008 BSI-DSZ-CC-0946-V2-2015
heuristics/cert_lab [] BSI
heuristics/indirect_transitive_cves CVE-2021-3011 {}
heuristics/extracted_sars ADV_LLD.1, ATE_FUN.1, ADV_HLD.3, AVA_VLA.4, AVA_SOF.1, AGD_ADM.1, ADV_IMP.2, AGD_USR.1, ALC_DVS.2, ATE_DPT.2, AVA_CCA.1, ATE_COV.2, ADV_INT.1, ALC_TAT.2, ALC_LCD.2, AVA_MSU.3, ADV_RCR.2, ADV_SPM.3, ATE_IND.2, ADV_FSP.3 ALC_CMS.5, APE_REQ.2, ASE_INT.1, APE_INT.1, ATE_FUN.1, ADV_IMP.1, ADV_SPM.1, ATE_DPT.3, ASE_TSS.1, APE_SPD.1, APE_ECD.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_FLR.3, ALC_DEL.1, APE_OBJ.2, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, APE_CCL.1, ASE_ECD.1
heuristics/extracted_versions 1.1, 1.5 1.03.006
heuristics/prev_certificates {} BSI-DSZ-CC-0946-2014
heuristics/next_certificates {} BSI-DSZ-CC-0946-V3-2017
heuristics/report_references/directly_referenced_by ANSSI-CC-2011/10, BSI-DSZ-CC-0630-2010, BSI-DSZ-CC-0593-2009, ANSSI-CC-2011/79, ANSSI-CC-2011/16, ANSSI-CC-2011/80, ANSSI-CC-2011/12, ANSSI-CC-2011/13 BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60
heuristics/report_references/directly_referencing BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008 BSI-DSZ-CC-0946-2014
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2011/10, BSI-DSZ-CC-0630-2010, BSI-DSZ-CC-0593-2009, ANSSI-CC-2011/79, ANSSI-CC-2011/16, ANSSI-CC-2011/80, BSI-DSZ-CC-0784-2013, ANSSI-CC-2011/12, ANSSI-CC-2011/13 BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60, ANSSI-CC-2019/38
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008 BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-0630-2010 ANSSI-CC-2019/38
heuristics/st_references/directly_referencing BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0430-2008 {}
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-0630-2010 ANSSI-CC-2019/38
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0430-2008 {}
maintenance_updates
  • maintenance_date: 09.06.2009
  • maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523_ma1.pdf
  • maintenance_st_link: None
  • maintenance_title: Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a13, SLE66CLX1600PE / m1596-a13, SLE66CLX1600PES / m1597-a13, SLE66CX1600PE / m1598-a13, SLE66CLX1440PEM / m2090-a13, SLE66CLX1440PE / m2091-a13, SLE66CLX1440PES / m2092-a13, SLE66CX1440PE / m2093-a13, SLE66CLX1280PEM / m2094-a13, SLE66CLX1280PE / m2095-a13,SLE66CLX1280PES / m2096-a13, SLE66CX1280PE / m2097-a13 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software
protection_profiles
pdf_data/report_filename 0523a.pdf 0946V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by AVA_VAN.5 and ALC_DVS.2 SOGIS Recognition Agreement
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0946-V2-2015
    • cert_item: Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0322-2005: 1
    • BSI-DSZ-CC-0482-2008: 5
    • BSI-DSZ-CC-0523: 2
    • BSI-DSZ-CC-0523-2008: 22
  • NL:
    • CC-0437-2007: 1
  • DE:
    • BSI-DSZ-CC-0946-2014: 3
    • BSI-DSZ-CC-0946-V2-2015: 23
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
  • BSI:
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 2
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 9
    • EAL 5: 14
    • EAL 5 augmented: 3
    • EAL 6: 3
    • EAL 7: 4
    • EAL5+: 1
    • EAL6: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 3
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 2
    • ALC_TAT.2: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 12
    • Infineon AG: 24
    • Infineon Technologies: 6
    • Infineon Technologies AG: 11
  • Philips:
    • Philips: 1
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 16
    • Infineon Technologies AG: 21
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • Triple-DES: 5
    • DES:
      • DES: 9
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 3
      • Triple-DES: 3
    • DES:
      • DES: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 52
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 2048: 28
    • RSA2048: 23
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA2048: 2
    • RSA4096: 2
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 5
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 3
  • TRNG:
    • TRNG: 4
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • K-163: 2
    • P-192: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 1
  • other:
    • JIL: 4
  • FI:
    • DFA: 6
    • physical tampering: 1
  • SCA:
    • DPA: 6
    • SPA: 5
    • physical probing: 1
    • side channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 3
    • AIS 26: 2
    • AIS 31: 4
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 1
    • AIS 36: 1
    • AIS 38: 1
  • FIPS:
    • FIPS140: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15408:2005: 3
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 4
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS31: 4
    • AIS32: 1
    • AIS47: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 1
    • FIPS186-4: 4
    • FIPS197: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 1
    • RFC5639: 5
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen: 1
    • RSA2048 V1.5 and ECC V1.1, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] Data Book – SLE66C(L)(X)xxxPE(M/S), Security Controller Family, Version 09.08 from 2008-09: 1
    • all with optional libraries RSA2048 V1.5 and ECC V1.1, Version 1.1, from 2008-07-02, Infineon AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
  • ConfidentialDocument:
    • Informationstechnik GmbH (confidential document) 8 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
    • and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification: 1
    • for the M5072 G11 with Crypto Libraries, Version 6, 2015-11-02, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M5072 G11, Version 6, 2015-11-02: 1
    • optional Software Libraries RSA - EC – Toolbox, Version 0.3, 2015-09-28, Infineon Technologies AG (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
    • optional Software Libraries RSA - EC – ToolboxL, Version 0.3, 2015-09-28, Infineon Technologies AG (confidential document) [12] M5072 Security Guidelines User’s Manual, 2015-08-25, Infineon Technologies AG [13] SLE 97: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20081117105441+01'00'
  • /Creator: Writer
  • /Keywords: "Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12,SLE66CLX1600PE / m1596-a12,SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12,SLE66CLX1440PEM / m2090-a12,SLE66CLX1440PE / m2091-a12,SLE66CLX1440PES / m2092-a12,SLE66CX1440PE / m2093-a12,SLE66CLX1280PEM / m2094-a12,SLE66CLX1280PE / m2095-a12,SLE66CLX1280PES / m2096-a12,SLE66CX1280PE / m2097-a12all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software, Infineon Technologies AG, BSI-DSZ-CC-0523-2008, SmartCard Controller"
  • /ModDate: D:20081120082435+01'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0523-2008
  • pdf_file_size_bytes: 551749
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20151207102520+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software, Infineon Technologies AG"
  • /ModDate: D:20151207110731+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0946-V2-2015
  • pdf_file_size_bytes: 1407969
  • pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
pdf_data/st_filename 0523b.pdf 0946V2b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0266-2005: 1
    • BSI-DSZ-CC-0322-2005: 1
    • BSI-DSZ-CC-0430-2008: 1
    • BSI-DSZ-CC-0482-2008: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 2
  • BSI:
    • BSI-PP-0035: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 4
    • EAL5: 5
    • EAL5 augmented: 2
    • EAL5+: 2
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL5: 7
    • EAL5 augmented: 3
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 3
    • ACM_SCP.2: 1
    • ACM_SCP.3: 5
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 5
    • ADV_HLD.3: 3
    • ADV_IMP.2: 3
    • ADV_INT.1: 3
    • ADV_LLD.1: 3
    • ADV_RCR.2: 3
    • ADV_SPM.1: 3
    • ADV_SPM.3: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.2: 4
    • ALC_LCD.2: 1
    • ALC_TAT.2: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_CCA.1: 2
    • AVA_MSU.3: 3
    • AVA_SOF: 4
    • AVA_SOF.1: 2
    • AVA_VLA.4: 4
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 4
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 49
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 7
    • FCS_CKM.4: 30
    • FCS_CKM.4.1: 3
    • FCS_COP.1: 45
    • FCS_COP.1.1: 4
    • FCS_RND: 2
    • FCS_RND.1: 4
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_CKM.2: 1
    • FDP_IFC.1: 14
    • FDP_ITC.1: 24
    • FDP_ITC.1.1: 3
    • FDP_ITC.1.2: 3
    • FDP_ITC.1.3: 3
    • FDP_ITC.2: 23
    • FDP_ITC.2.1: 3
    • FDP_ITC.2.2: 3
    • FDP_ITC.2.3: 3
    • FDP_ITC.2.4: 3
    • FDP_ITC.2.5: 3
    • FDP_ITT.1: 3
    • FDP_SDI.1: 17
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 15
    • FDP_SDI.2.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 32
    • FMT_MSA.2.1: 3
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
  • FPT:
    • FPT_AMT.1: 4
    • FPT_FLS.1: 6
    • FPT_ITT.1: 3
    • FPT_PHP.3: 7
    • FPT_SEP.1: 6
    • FPT_TDC.1: 3
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.2: 26
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 6
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 3
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 23
    • FCS_CKM.1: 31
    • FCS_CKM.2: 5
    • FCS_CKM.4: 23
    • FCS_COP: 47
    • FCS_COP.1: 27
    • FCS_RNG: 12
    • FCS_RNG.1: 30
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 20
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 10
    • FDP_ITC.1: 17
    • FDP_ITC.2: 17
    • FDP_ITT.1: 13
    • FDP_PHP.3: 1
    • FDP_SDI.1: 17
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 15
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_LIM: 3
    • FMT_LIM.1: 7
    • FMT_LIM.2: 7
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 19
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 16
    • FPT_ITT.1: 13
    • FPT_LIM.2: 1
    • FPT_PHP.3: 14
    • FPT_TST: 7
    • FPT_TST.1: 11
    • FPT_TST.2: 36
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 7
  • Infineon:
    • Infineon: 7
    • Infineon Technologies: 8
    • Infineon Technologies AG: 19
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 21
      • Triple-DES: 1
    • DES:
      • DES: 11
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • 3DES:
      • 3DES: 17
      • TDEA: 2
      • TDES: 4
      • Triple-DES: 2
    • DES:
      • DES: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 47
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 14
  • FF:
    • DH:
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 2048: 2
    • RSA2048: 19
  • ECC:
    • ECC:
      • ECC: 20
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 14
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA2048: 2
    • RSA4096: 2
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 46
  • SHA:
    • SHA1:
      • SHA1: 46
    • SHA2:
      • SHA256: 46
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • KA:
    • Key Agreement: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 7
  • RNG:
    • RND: 2
    • RNG: 10
  • TRNG:
    • TRNG: 14
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • ECB:
    • ECB: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • K-163: 2
    • P-192: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 4
    • Malfunction: 15
    • malfunction: 3
  • SCA:
    • DPA: 6
    • Leak-Inherent: 11
    • Physical Probing: 2
    • SPA: 4
  • other:
    • reverse engineering: 2
  • FI:
    • DFA: 7
    • Malfunction: 12
    • malfunction: 1
  • SCA:
    • DPA: 7
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 6
    • Side-channel: 1
    • Timing Attack: 1
    • physical probing: 1
    • side channel: 6
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 9
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS PUB 46-3: 2
  • ISO:
    • ISO/IEC 7816: 6
    • ISO/IEC 7816-3: 1
  • PKCS:
    • PKCS#1: 3
  • RFC:
    • RFC2437: 3
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 7816-3: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 1
    • RFC3447: 11
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • according to ECDH standard with 160 - 521 bits key length (key length below 192 bit are out of scope of the evaluation) • Advanced security sensors and physical countermeasures (e.g. shielding: 1
    • key length (key length below 1280 bit are out of scope of the evaluation) • Signature creation and verification according to ECDSA standard and key: 1
    • key length below 1280 bit are out of scope of the evaluation: 1
    • key length below 192 bit are out of scope of the evaluation: 1
    • out of scope: 3
    • single DES is out of scope of the evaluation: 1
    • smart card applications • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) • Data encryption by the ACE module according to RSA standard with 512 to 2048: 1
pdf_data/st_metadata
  • /Author: Buchmueller Hans-Ulrich
  • /CreationDate: D:20081030093245Z
  • /Creator: Security Target_SLE66CLX1600PEx_a12_Derivates_1.2_03.doc - Microsoft Word
  • /Keywords: "Security Target, contactless, dual interface, Security Controller, public, document, resistance to attackers with high attack potential, EAL5+, EAL5 high, Infineon Technologies AG, RSA, Elliptic Curve, Libraries, Dresden, crypto"
  • /ModDate: D:20081120082822+01'00'
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Subject: Security Target SLE66CLX1600PEx - SLE66CLX1400PEx - SLE66CLX1280PEx a12
  • /Title: CC EAL5+ Certification Security Target
  • pdf_file_size_bytes: 442657
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 60
  • /Author: Jürgen Noller
  • /CreationDate: D:20151002084025
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: TSMC, Infineon, RSA, Eliptic Curve, Library, multi interface, high end security controler, ARM CPU, ARM Core, robust, CCv3.1, EAL5+, secure controller, EAL5+, augmented, high attack potential, AVA_VAN.5, PP0035
  • /ModDate: D:20151002084025
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target Lite M5072 G11
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 926798
  • pdf_hyperlinks: http://www.infineon.com/, http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 82
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different