name |
Cybertrust UniCERT v5.2.1 |
Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v16.10.16488.00 |
category |
Products for Digital Signatures |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
AU |
DE |
status |
archived |
archived |
not_valid_after |
13.07.2017 |
15.12.2024 |
not_valid_before |
25.10.2006 |
01.10.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1178c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFAT028_Certification_Report_V1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1178a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cybertrust_UniCERT_5.2.1_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1178b_pdf.pdf |
manufacturer |
Cybertrust |
Infineon Technologies AG |
manufacturer_web |
https://www.cybertrust.com/ |
https://www.infineon.com/ |
security_level |
EAL4+, ALC_FLR.2 |
ALC_FLR.1, AVA_VAN.4, EAL4+ |
dgst |
6780328fff5788c0 |
210bc0d0a2d360fa |
heuristics/cert_id |
Certificate Number: 2006/39 |
BSI-DSZ-CC-1178-2021 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_FLR.2, ASE_PPC.1, ASE_DES.1, ASE_OBJ.1, ADV_LLD.1, ASE_SRE.1, AVA_VLA.2, ATE_COV.2, ADV_SPM.1, AVA_SOF.1, ASE_REQ.1, AVA_MSU.2, ALC_LCD.1, ATE_FUN.1, ASE_TSS.1, ASE_ENV.1, AGD_AGD.1, ALC_DVS.1, ADV_HLD.2, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, ADV_IMP.1, ASE_INT.1, ALC_TAT.1, AGD_USR.1, AGD_ADM.1, ADV_FSP.2 |
ADV_ARC.1, AGD_OPE.1, ATE_COV.2, AGD_PRE.1, ALC_DEL.1, ADV_TDS.3, ASE_SPD.1, ALC_LCD.1, ASE_OBJ.2, ASE_REQ.2, ATE_FUN.1, AVA_VAN.4, ASE_TSS.1, ALC_CMS.4, ALC_DVS.1, ATE_IND.2, ALC_CMC.4, ASE_CCL.1, ALC_FLR.1, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ASE_INT.1, ALC_TAT.1, ADV_FSP.4 |
heuristics/extracted_versions |
5.2.1 |
16.10.16488.00, 2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1178-V2-2022 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1113-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1178-V2-2022, BSI-DSZ-CC-1178-V3-2022, BSI-DSZ-CC-1178-V4-2023, BSI-DSZ-CC-1245-2024 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1113-2021 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
dcc6f443e1f31677 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2020_01_pp.pdf |
pdf_data/cert_filename |
|
1178c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 2
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211011090305+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Infineon Technologies AG OPTIGA™ TrustedPlatform Module SLB9672_2.0 v16.10.16488.00, Infineon Technologies AG
- /ModDate: D:20211011090444+02'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-1178-2021
- pdf_file_size_bytes: 252900
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
EFAT028_Certification_Report_V1.0.pdf |
1178a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by AVA_VAN.4 and ALC_FLR.1
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1178-2021
- cert_item: Infineon Technologies AG OPTIGA™ Trusted Platform Module SLB9672_2.0 v16.10.16488.00
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: PC Client Specific TPM, TPM Library specification Family “2.0”, Level 0 Revision 1.38, Version: 1.2, Date: 2019-06-13, ANSSI-CC-PP-2020/01
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certificate Number: 2006/39: 1
|
- DE:
- BSI-DSZ-CC-1113-2021: 3
- BSI-DSZ-CC-1178-2021: 19
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 2
- Giesecke & Devrient: 1
- Infineon:
- Infineon: 4
- Infineon Technologies: 1
- Infineon Technologies AG: 15
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 15
- SHA-384: 13
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- PKCS:
- PKCS#11: 3
- PKCS#12: 2
- PKCS#7: 1
- X509:
|
- BSI:
- AIS 20: 2
- AIS 25: 1
- AIS 26: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 1
- AIS 38: 1
- AIS20: 1
- AIS26: 1
- FIPS:
- FIPS PUB 186-4: 1
- FIPS PUB 186-5: 1
- FIPS180-4: 9
- FIPS186-4: 11
- FIPS186-5: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 3447: 1
- RFC 8391: 1
- RFC3447: 16
- RFC8391: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Standards Compliance Verification (CSCV); Version 1, July 19, 2021, TÜV Informationstechnik GmbH, (confidential document) 23 / 32 Certification Report BSI-DSZ-CC-1178-2021 C. Excerpts from the Criteria For the meaning: 1
- Version 2, Sep 09, 2021, ”Evaluation Technical Report Summary”, TÜV Informationstechnik GmbH, (confidential document) [8] PC Client Specific TPM, TPM Library specification Family “2.0”, Level 0 Revision 1.38: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20061222014212+11'00'
- /Creator: AdobePS5.dll Version 5.2
- /ModDate: D:20061222014212+11'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - EFAT028 Certification Report V1.0.doc
- pdf_file_size_bytes: 184977
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211011082012+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Infineon Technologies AG OPTIGA™ TrustedPlatform Module SLB9672_2.0 v16.10.16488.00, Infineon Technologies AG
- /ModDate: D:20211011090209+02'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-1178-2021
- pdf_file_size_bytes: 959628
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierungsreporte, http://www.commoncriteriaportal.org/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
pdf_data/st_filename |
Cybertrust_UniCERT_5.2.1_ST.pdf |
1178b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 6
- EAL 4 augmented: 1
- EAL 4+: 1
- EAL4: 8
|
- EAL:
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 10
- ACM_CAP: 1
- ACM_CAP.4: 18
- ACM_SCP: 1
- ACM_SCP.2: 6
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 9
- ADO_IGS.1: 8
- ADV:
- ADV_FSP.2: 9
- ADV_HLD: 1
- ADV_HLD.2: 12
- ADV_IMP.1: 6
- ADV_LLD: 1
- ADV_LLD.1: 13
- ADV_RCR: 1
- ADV_RCR.1: 4
- ADV_SPM: 1
- ADV_SPM.1: 10
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 15
- AGD_AGD.1: 1
- AGD_USR: 1
- AGD_USR.1: 13
- ALC:
- ALC_DVS.1: 7
- ALC_FLR: 2
- ALC_FLR.2: 19
- ALC_LCD.1: 8
- ALC_TAT.1: 9
- ASE:
- ASE_DES.1: 2
- ASE_ENV.1: 2
- ASE_INT.1: 2
- ASE_OBJ.1: 2
- ASE_PPC.1: 2
- ASE_REQ.1: 2
- ASE_SRE.1: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 7
- ATE_DPT.1: 6
- ATE_FUN.1: 11
- ATE_IND.2: 7
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 9
- AVA_SOF.1: 6
- AVA_VLA: 1
- AVA_VLA.2: 10
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCO:
- FCO_NRO.2: 9
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 22
- FCS_CKM.1.1: 1
- FCS_CKM.2: 9
- FCS_CKM.2.1: 2
- FCS_CKM.3: 12
- FCS_CKM.3.1: 1
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_COP: 90
- FCS_COP.1: 10
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 1
- FDP_ACF.1: 23
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 24
- FDP_DAU.2: 16
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC.1: 23
- FDP_IFC.1.1: 1
- FDP_IFF.1: 21
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 16
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 12
- FDP_ITT.1.1: 1
- FDP_ITT.3: 12
- FDP_ITT.3.1: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 13
- FIA_SOS.1.1: 1
- FIA_UAU: 45
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 2
- FIA_UID: 47
- FIA_UID.1: 32
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 2
- FIA_USB.1: 11
- FIA_USB.1.1: 1
- FMT:
- FMT_MOF.1: 19
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 17
- FMT_MSA.1.1: 1
- FMT_MSA.2: 32
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 18
- FMT_MTD.1.1: 1
- FMT_MTD.2: 6
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_REV.1: 11
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SAE: 1
- FMT_SAE.1: 12
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC: 10
- FPT_ITC.1: 1
- FPT_ITI.1: 12
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_ITT: 10
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_SAE: 1
- FPT_SSP: 2
- FPT_SSP.1: 5
- FPT_SSP.1.1: 1
- FPT_STM.1: 5
- FTP:
|
- FCO:
- FCS:
- FCS_CKM: 37
- FCS_CKM.1: 20
- FCS_CKM.2: 8
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 47
- FCS_COP.1: 19
- FCS_RNG: 1
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 4
- FDP_ACF: 30
- FDP_ACF.1: 8
- FDP_ETC: 7
- FDP_IFC.1: 2
- FDP_ITC: 7
- FDP_ITC.1: 11
- FDP_ITC.2: 11
- FDP_ITT.1: 1
- FDP_RIP.1: 3
- FDP_SDI.1: 3
- FDP_UCT: 7
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 12
- FIA_MSA: 1
- FIA_SOS.2: 3
- FIA_UAU.1: 3
- FIA_UAU.5: 3
- FIA_UAU.6: 3
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FMT:
- FMT_MOF: 3
- FMT_MSA: 65
- FMT_MSA.1: 1
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 2
- FMT_MTD: 6
- FMT_SMF.1: 3
- FMT_SMR.1: 4
- FPT:
- FPT_FLS: 7
- FPT_FLS.1: 1
- FPT_ITT.1: 3
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_STM.1: 3
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
- Cisco:
- Microsoft:
- Oberthur:
|
- Infineon:
- Infineon: 7
- Infineon Technologies: 6
- Infineon Technologies AG: 15
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 1
- NIST P-384: 1
- P-256: 1
- P-384: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180: 1
- FIPS 186: 1
- FIPS 46-3: 1
- ISO:
- PKCS:
- PKCS #11: 1
- PKCS #7: 1
- PKCS 1: 1
- PKCS#11: 4
- PKCS#12: 5
- PKCS#7: 3
- PKCS11: 4
- PKCS12: 3
- PKCS7: 3
- RFC:
- RFC 13: 1
- RFC1321: 6
- RFC3280: 1
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 3
- FIPS PUB 140-2: 3
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 1
- ISO:
- ISO/IEC 10116:2006: 2
- ISO/IEC 10118-3: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 15946-1: 1
- ISO/IEC 9797-2: 3
- NIST:
- NIST SP 800-90A: 2
- SP 800-133: 1
- SP 800-90A: 3
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 3447: 1
- RFC3447: 35
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- java:
- java.dll: 1
- java.exe: 1
- java.js: 4
- java.policy: 1
- java.security: 1
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The assessment of the algorithmic strength used by these functions is out of scope of the evaluation, being assessed by the National Authority: 1
- are cryptographic in nature and therefore the assessment of their algorithmic strength is out of scope of the evaluation, being assessed by the National Authority. However one mechanism does require a: 1
- out of scope: 4
- protocol handlers: Web Handler, email Handler, SCEP Handler, and CMP Handler (the CMP Handler is out of scope of the evaluation.) · Web RA Operator (WebRAO) The relationship between these components is shown: 1
- the CMP Handler is out of scope of the evaluation: 1
- to cryptographic SFRs). The assessment of the algorithmic strength used by these functions is out of scope of the evaluation, being assessed by the National Authority. However one mechanism does require a: 1
- users who have no role in the PKI, but have certificates issued by the PKI. Their activities are out of scope of the evaluation. 9.3 Information Flow Control Policy This ST contains one information flow: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20061222014648+11'00'
- /Creator: AdobePS5.dll Version 5.2
- /ModDate: D:20061222014648+11'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - Baltimore UniCERT 5 Security Target v5.0ab2.doc
- pdf_file_size_bytes: 1406278
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 266
|
- /Author: Jürgen Noller
- /CreationDate: D:20210727144252+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Infineon, CCS, Security Target, EAL4+, moderate, SLB967x, SLB9670, SPI, Trusted Computing, TPM 2.0, Trusted Platform Module
- /ModDate: D:20210727144252+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: Security Target SLB9670_2.0
- /Title: CC EAL4+ moderate Certification Security Target
- pdf_file_size_bytes: 1254631
- pdf_hyperlinks: http://www.infineon.com/, http://www.bsi.bund.de/, http://www.rsa.com/, mailto:[email protected];[email protected]?subject=Document%20question%20
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |