| name |
Log Radar v3.2.15 with modules Console, Collector and Archiver |
Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software |
| category |
Detection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
DE |
| status |
archived |
archived |
| not_valid_after |
01.09.2019 |
04.09.2022 |
| not_valid_before |
13.02.2013 |
05.09.2017 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C010-CR-v1a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926V2a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LogRadar_ST-Document_v1-0R.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926V2b_pdf.pdf |
| manufacturer |
TecForte Sdn Bhd |
Infineon Technologies AG |
| manufacturer_web |
https://www.tecforte.com |
https://www.infineon.com/ |
| security_level |
EAL2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
5e01e4eeaa77cb17 |
a6b4ebcac512f88e |
| heuristics/cert_id |
ISCB-5-RPT-C010-CR-v1a |
BSI-DSZ-CC-0926-V2-2017 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2017-15361 |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2 |
| heuristics/extracted_versions |
3.2.15 |
2.00.002, 1.02.013 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0926-2014 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0907-2013, BSI-DSZ-CC-0757-2011 |
| heuristics/scheme_data |
- cert_no: 2013-002-C010
- certification_date: 13.02.2013
- developer: TecForte Sdn Bhd
- enhanced:
- assurance_level: EAL2
- category: Detection Devices and Systems
- cert_id: C010
- certification_date: 13.02.2013
- developer: Leong Wei Khuan Level 27, Quill 7,Jalan Stesen Sentral 5,Kuala Lumpur Sentral,50470 Kuala Lumpur,MALAYSIA. URL: http://www.tecforte.comEmail: [email protected]: +603 2776 6936Fax: +603 2776 6999
- expiration_date: 13.02.2018
- mutual_recognition: CCRA
- product: Log Radar v3.2.15 with modules Console, Collector and Archiver
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/ISCB-5-RPT-C010-CR-v1a.pdf
- scope: The Target of Evaluation (TOE) is Log Radar v3.2.15 with modules Console, Collector and Archiver; commonly referred as LogRadar. LogRadar is an automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications. Its key aims are to collect, normalise process and manage such information (logs) from a real time context. The modules included in the scope of the security evaluation and certification are: Console - acts as the interfacing point between user and TOE, Collector - its core function is to collect streams of data as and when they occur and process these device specific logs into a common and normalised form, and Archiver - functions as a backup daemon. In the context of the evaluation, the TOE is expected to provide the following major security features: Identification and authentication – the TOE provides user identification and authentication independent from the operating system on which it operates on. Security audit – the TOE records each individual user session and tracks each action within the session. Granular access control – the TOE allows users access permission within the application to be dynamically and granularly assigned via users and group memberships. Password management – the TOE provides a full password management function including the management of password policy rules as well as password expiry settings. Sessions management – the TOE maintain session management and restricts a single login for only a single valid session. Socket layer – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Import and export of configuration data – the TOE runs on Secure Socket Layer (SSL) to protect its data when travelling thru the network. Automated archive – the TOE provides a mechanism where the auto archival of aggregated reports, rawlogs and syslogs will be automatically hashed with MD-5 checksum, archived with AES encryption and stored at predetermined times. Real time syslog collection – the TOE provides the ability for authorised users to dynamically configure the TOE to listen to syslog streams from network devices, servers and/or any other supported applications.
- status: Archive
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C010/LogRadar_ST-Document_v1-0R.pdf
- type: Automated software system used on enterprise data networks to centralise the storage and interpretation of logs, or events, generated by other devices or applications.
- expiration_date: 13.02.2018
- level: EAL2
- product: Log Radar v3.2.15 with modules Console, Collector and Archiver
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/80
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
f6d23054061d72ba |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C010-CR-v1a.pdf |
0926V2a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0926-V2-2017
- cert_item: Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C010-CR-v1a: 31
|
- DE:
- BSI-DSZ-CC-0926-2014: 3
- BSI-DSZ-CC-0926-V2-2017: 25
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 9
- EAL 5: 14
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 1
- Giesecke & Devrient: 1
- Infineon:
- Infineon: 4
- Infineon Technologies: 18
- Infineon Technologies AG: 21
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 1
- RSA4096: 1
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 6
- physical tampering: 1
- SCA:
- DPA: 6
- SPA: 5
- physical probing: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- AIS 14: 1
- AIS 19: 1
- AIS 23: 1
- AIS 25: 1
- AIS 26: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- / ECC / Toolbox User Interface (1.02.013), Version 1.02.013, 2017-05-10, Infineon Technologies AG (confidential document) [17] SLE77 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (2.00.002: 1
- 13] M7790 & M7793 Hardware Reference Manual, Version 1.2, 2014-09-05, Infineon Technologies AG (confidential document) [14] 16-bit Security Controller Family SLE 70 Programmer’s Reference Manual, Version 9.5: 1
- 3, 2017-08-28, “Evaluation Technical Report for Composite Evaluation”, TÜV Informationstechnik (confidential document) [11] “Configuration Management Scope M7793 A12 and G12 including optional Software Libraries RSA –: 1
- A12 and G12 Including optional Software Libraries RSA - EC - Toolbox”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0926-V2-2017, Version 3, 2017-08-28, “Evaluation: 1
- Infineon Technologies AG (confidential document) [15] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG (confidential document) [16: 1
- Report (ETR Sumamry)”, TÜV Informationstechnik GmbH, (confidential document) 8 specifically • AIS 19, Version 9, Anwendungshinweise und Interpretationen zum Schema (AIS) • AIS: 1
- Version 2.00.002, 2017-05-10, Infineon Technologies AG (confidential document) [18] SLx 70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [19] SLE 77 Controller Family Errata Sheet, Version 6.1, 2017-06-21, Infineon Technologies AG: 1
- – Toolbox”, Version 1.3, 2013-11-11, Infineon Technologies AG (confidential document) [12] M7793 Security Guidelines User’s Manual, 2017-06-28, Infineon Technologies AG (confidential: 1
|
| pdf_data/report_metadata |
- /Author: Norhazimah Abdul Malek
- /Category: PUBLIC
- /Caveat: FINAL
- /Classification: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20130218150743+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Developer: TecForte Sdn Bhd
- /Document Type: REPORT
- /Identifier: ISCB-5-RPT-C010-CR-v1a
- /Index: ISCB_TMP_011
- /Keywords: Log Radar v3.2.15
- /ModDate: D:20130218150748+08'00'
- /Phase: External
- /Producer: Adobe PDF Library 10.0
- /Released: 13 February 2013
- /ST: LogRadar Security Target
- /ST Version: v1.0R
- /SourceModified: D:20130218070717
- /Sponsor: TecForte Sdn Bhd
- /Subject: Log Radar v3.2.15 with modules Console, Collector and Archiver
- /TOE: Log Radar
- /TOE Name: LogRadar
- /TOE Version: v3.2.15
- /Title: C010 Certification Report
- /Version: v1a
- pdf_file_size_bytes: 476755
- pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc
- pdf_is_encrypted: True
- pdf_number_of_pages: 31
|
- /Author: Bundesamt für Sicherheit in der Informationtechnik
- /CreationDate: D:20170920071317+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SmartCard, Infineon, Security Controller"
- /ModDate: D:20170925104644+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0926-V2-2017
- pdf_file_size_bytes: 1186681
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, http://www.sogisportal.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
| pdf_data/st_filename |
LogRadar_ST-Document_v1-0R.pdf |
0926V2b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 4
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_GEN.3: 15
- FAU_GEN.3.1: 1
- FAU_GEN.3.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FCS:
- FCS_COP.1: 23
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 14
- FDP_ACC.2: 8
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 2
- FDP_ACF.1: 10
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 2
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFC.2: 1
- FDP_IFF: 2
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS: 1
- FIA_SOS.1: 8
- FIA_UAU: 1
- FIA_UAU.1: 5
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 11
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 11
- FMT_MOF.1.1: 2
- FMT_MSA: 3
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_REV: 2
- FMT_REV.1: 6
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SAE: 1
- FMT_SAE.1: 6
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FMT_SMT: 1
- FPT:
- FPT_ETC: 4
- FPT_ETC.2: 8
- FPT_ETC.2.1: 1
- FPT_ETC.2.2: 1
- FPT_ETC.2.3: 1
- FPT_ETC.2.4: 2
- FPT_FMT: 1
- FPT_ITC: 2
- FPT_ITC.2: 8
- FPT_ITC.2.1: 1
- FPT_ITC.2.2: 1
- FPT_ITC.2.3: 1
- FPT_ITC.2.4: 1
- FPT_ITC.2.5: 2
- FPT_STM.1: 7
- FPT_TDC: 1
- FRU:
- FRU_RSA: 1
- FRU_RSA.1: 8
- FRU_RSA.1.1: 1
- FRU_SRA.1: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 9
- FTA_SSL.3.1: 1
- FTP:
- FTP_TRP: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 8
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 22
- FCS_CKM.2: 3
- FCS_CKM.4: 20
- FCS_COP: 31
- FCS_COP.1: 30
- FCS_RNG: 14
- FCS_RNG.1: 26
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 6
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITT.1: 4
- FDP_SDI.1: 12
- FDP_SDI.1.1: 1
- FDP_SDI.2: 12
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 2
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 3
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 5
- FPT_ITT.1: 4
- FPT_PHP.3: 4
- FPT_TST: 7
- FPT_TST.1: 11
- FPT_TST.2: 31
- FPT_TST.2.1: 1
- FRU:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.DIRECT: 2
- A.INTEGR: 3
- A.LOCATE: 3
- A.MANAGE: 2
- A.NOEVIL: 3
- A.NOTRST: 2
- A.PROTCT: 2
- A.REM_OPER: 1
- A.TIME: 6
- O:
- O.ACCESS: 19
- O.AUDITS: 7
- O.EADMIN: 12
- O.EXPORT: 10
- O.IDAUTH: 29
- O.INTEGR: 6
- O.PROTCT: 9
- O.SECRMT: 2
- O.TMSTMP: 2
- OE:
- OE.INSTAL: 4
- OE.INSTALL: 1
- OE.INTEGR: 5
- OE.OFLOWS: 5
- OE.PERSON: 7
- OE.PHYCAL: 7
- OE.TMSTMP: 6
- T:
- T.COMINT: 3
- T.DLOSS: 5
- T.IMPCON: 3
- T.INFLUX: 3
- T.INSECUSE: 3
- T.INTEGR: 3
- T.LOSSOF: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.UNATHDVCE: 2
|
|
| pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 3
- Infineon Technologies: 12
- Infineon Technologies AG: 16
- Microsoft:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 9
- TDEA: 1
- TDES: 5
- Triple-DES: 1
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 1
- RSA4096: 1
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 6
- Malfunction: 12
- malfunction: 1
- SCA:
- DPA: 6
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 4
- side channel: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ISO:
- ISO/IEC 7816-3: 1
- ISO/IEC 97971: 2011: 1
- NIST:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: WKhuan
- /Company:
- /CreationDate: D:20130115175724+08'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /ModDate: D:20130115175735+08'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20130115013704
- pdf_file_size_bytes: 614209
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
- /Author: Steffen Heinkel
- /CreationDate: D:20170804113341+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: M7793, EAL5+, attack potential high, AVA_VAN.5
- /ModDate: D:20170804113341+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target Lite M7793
- /Title: Public Security Target Lite
- pdf_file_size_bytes: 1016215
- pdf_hyperlinks: http://www.infineon.com/, http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |