Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
SLE88CFX4001P/m8835b18, SLE88CFX4003/m8837b18, SLE88CFX3521P/m8857b18 and SLE88CFX2921P/m8859b18 all including optional RSA2048 and SHA-2 Library
BSI-DSZ-CC-0632-2011
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series SLE88CFX4001P/m8835b18, SLE88CFX4003/m8837b18, SLE88CFX3521P/m8857b18 and SLE88CFX2921P/m8859b18 all including optional RSA2048 and SHA-2 Library
category Boundary Protection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme TR DE
not_valid_after 27.03.2017 01.09.2019
not_valid_before 15.03.2013 16.12.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0632a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0632b_pdf.pdf
manufacturer RIOREY Incorporated Infineon Technologies AG
manufacturer_web https://www.riorey.com/ https://www.infineon.com/
security_level EAL4+, ALC_FLR.1 EAL5+, AVA_MSU.3, ALC_DVS.2, AVA_VLA.4
dgst 53265b9d283d6074 a2c2f49bac569544
heuristics/cert_id BSI-DSZ-CC-0632-2011
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ALC_LCD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ATE_COV.2, ATE_DPT.2, AGD_ADM.1, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, ADV_HLD.3, AVA_VLA.4, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1, AVA_MSU.3
heuristics/extracted_versions - 2
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0878-2013, BSI-DSZ-CC-0936-2015
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0395-2007
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-1015-V2-2020, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0878-2013, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-1158-V3-2025, BSI-DSZ-CC-0936-2015, BSI-DSZ-CC-1015-2017, BSI-DSZ-CC-1158-V2-2023
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0376-2006, BSI-DSZ-CC-0395-2007, BSI-DSZ-CC-0269-2006
heuristics/protection_profiles {} 62c62b4b4210800e
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ssvgpp01.pdf
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf 0632a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0632-2011
    • cert_item: SLE88CFX4001P/m8835b18, SLE88CFX4003/m8837b18, SLE88CFX3521P/m8857b18 and SLE88CFX2921P/m8859b18 all including optional RSA2048 and SHA-2 Library
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0395-2007: 3
    • BSI-DSZ-CC-0632-2011: 21
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.3: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 3
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.3: 1
    • ADV_HLD: 2
    • ADV_HLD.3: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 1
    • ADV_INT: 2
    • ADV_INT.1: 1
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_RCR.2: 1
    • ADV_SPM: 2
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 2
    • ALC_TAT: 2
    • ALC_TAT.2: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_DPT.2: 1
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_CCA.1: 1
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 8
    • Infineon Technologies: 6
    • Infineon Technologies AG: 18
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 1
      • Triple-DES: 1
    • DES:
      • DES: 5
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
    • RSA2048: 12
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 3
    • SHA2:
      • SHA-2: 12
      • SHA2: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 3
    • AIS 36: 4
    • AIS 38: 1
  • FIPS:
    • FIPS PUB 180-1: 1
    • FIPS PUB 180-3: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Infineon Smart Card IC SLE88CFX4001P/m8835, Version 2.02, 6 October 2011, T-Systems GEI GmbH (confidential document) [11] Guidance documentation for the TOE, Edition 2006-07, SLE88 Family - Hardware Reference Manual: 1
    • Scope (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI-PP-0002-2001 [10] ETR: 1
    • Technical Report – Summary for Infineon Smart Card IC SLE88CFX4001P/m8835, T-Systems GEI GmbH (confidential document) [8] Configuration list for the TOE, Version 1.6, 6 July 2011, SLE88CFX4001P / m8835 Configuration: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120124142322+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon, Smart Card, Security Controller"
  • /ModDate: D:20120124145910+01'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: security certification
  • /Title: Certification Report BSI-DSZ-CC-0632-2011
  • pdf_file_size_bytes: 1060661
  • pdf_hyperlinks: https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename RioRey ST- v0.9.pdf 0632b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 2
    • BSI-PP-002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 4
    • EAL5: 4
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 3
    • ACM_SCP.2: 1
    • ACM_SCP.3: 4
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 5
    • ADV_HLD.3: 4
    • ADV_IMP.2: 3
    • ADV_INT.1: 2
    • ADV_LLD.1: 3
    • ADV_RCR.2: 3
    • ADV_SPM.3: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_LCD.2: 2
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_CCA.1: 2
    • AVA_MSU.3: 4
    • AVA_SOF: 5
    • AVA_SOF.1: 1
    • AVA_VLA.4: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 33
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 3
    • FCS_CKM.4: 17
    • FCS_COP: 1
    • FCS_COP.1: 35
    • FCS_COP.1.1: 7
    • FCS_RND: 2
    • FCS_RND.1: 4
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 5
    • FDP_ITC.1: 13
    • FDP_ITC.2: 13
    • FDP_ITT.1: 3
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 17
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_AMT.1: 4
    • FPT_FLS.1: 8
    • FPT_ITT.1: 3
    • FPT_LIM.2: 1
    • FPT_PHP.3: 7
    • FPT_SEP.1: 4
    • FPT_TST: 2
    • FPT_TST.1: 8
    • FPT_TST.2: 21
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • O:
    • O.RND: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 3
    • Infineon Technologies AG: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 12
      • Triple-DES: 1
    • DES:
      • DES: 26
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 28
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • MD:
    • MD5:
      • MD5: 8
  • SHA:
    • SHA1:
      • SHA-1: 18
      • SHA1: 4
    • SHA2:
      • SHA-2: 36
      • SHA-256: 1
      • SHA256: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 2
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 8
    • malfunction: 1
  • SCA:
    • DPA: 4
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 2
    • side channel: 1
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • BSI:
    • AIS31: 5
  • CC:
    • CCMB-2005-08-01: 2
    • CCMB-2005-08-02: 2
    • CCMB-2005-08-03: 2
  • FIPS:
    • FIPS PUB 180-1: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 2
  • ISO:
    • ISO/IEC 7816-3: 1
  • RFC:
    • RFC3447: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
  • /Author: Noller
  • /CreationDate: D:20111026104010+01'00'
  • /Creator: Microsoft Word - SLE88CFX4000P_SecTar.doc
  • /ModDate: D:20111026104036+02'00'
  • /Producer: ScanSoft PDF Create! 6
  • /Title: Microsoft Word - SLE88CFX4000P_SecTar.doc
  • pdf_file_size_bytes: 322467
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different