name |
Infineon Technologies Smart Card IC (Security Controller) M5072 with optional RSA v1.03.006/v2.06.003, EC v1.03.006/ v2.06.003, Toolbox v1.03.006/ v2.06.003, SCL v2.02.010 libraries with specific IC dedicated software |
Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
archived |
archived |
not_valid_after |
17.08.2022 |
09.09.2014 |
not_valid_before |
18.08.2017 |
22.02.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946V3a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946V3b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827b_pdf.pdf |
manufacturer |
Infineon Technologies AG |
Infineon Technologies AG |
manufacturer_web |
https://www.infineon.com/ |
https://www.infineon.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
6fbfdf147c9b6ad8 |
cac36ad3c18fbc02 |
heuristics/cert_id |
BSI-DSZ-CC-0946-V3-2017 |
BSI-DSZ-CC-0827-2013 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.5, APE_REQ.2, ASE_INT.1, APE_INT.1, ATE_FUN.1, ADV_IMP.1, ADV_SPM.1, ATE_DPT.3, ASE_TSS.1, APE_SPD.1, APE_ECD.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_FLR.3, ALC_DEL.1, APE_OBJ.2, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, APE_CCL.1, ASE_ECD.1 |
ALC_CMS.5, APE_REQ.2, ASE_INT.1, APE_INT.1, ATE_FUN.1, ADV_IMP.1, ADV_SPM.1, ATE_DPT.3, ASE_TSS.1, APE_SPD.1, APE_ECD.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_FLR.3, ALC_DEL.1, APE_OBJ.2, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, APE_CCL.1, ASE_ECD.1 |
heuristics/extracted_versions |
2.06.003, 2.02.010, 1.03.006 |
1.01.0008, 1.03.006 |
heuristics/prev_certificates |
BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0946-V2-2015 |
{} |
heuristics/next_certificates |
{} |
BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V8-2020 |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0827-V2-2014 |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0946-V2-2015 |
BSI-DSZ-CC-0791-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-V3-2017, BSI-DSZ-CC-0827-V4-2016, ANSSI-CC-2016/60, BSI-DSZ-CC-0827-V7-2018, ANSSI-CC-2019/38, CSEC2014007, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0827-V2-2014 |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0827-V2-2014 |
BSI-DSZ-CC-0791-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0946V3a_pdf.pdf |
0827a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0946-V3-2017
- cert_item: Infineon Technologies Smart Card IC (Security Controller) M5072 with optional RSA v1.03.006/v2.06.003, EC v1.03.006/ v2.06.003, Toolbox v1.03.006/ v2.06.003, SCL v2.02.010 libraries with specific IC dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
|
- DE:
- cert_id: BSI-DSZ-CC-0827-2013
- cert_item: Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0946-V2-: 1
- BSI-DSZ-CC-0946-V2-2015: 4
- BSI-DSZ-CC-0946-V3-2017: 27
|
- DE:
- BSI-DSZ-CC-0791-2012: 3
- BSI-DSZ-CC-0827-2013: 23
- BSI-DSZ-CC-S-0007-2011: 1
- BSI-DSZ-CC-S-0015-2012: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 9
- EAL 5: 14
- EAL 5 augmented: 3
- EAL 6: 3
- EAL 7: 4
- EAL5+: 1
- ITSEC:
|
- EAL:
- EAL 4: 3
- EAL 5: 8
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- GD:
- Infineon:
- Infineon: 4
- Infineon Technologies: 17
- Infineon Technologies AG: 21
|
- GD:
- Infineon:
- Infineon: 5
- Infineon Technologies: 17
- Infineon Technologies AG: 22
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 4
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA 1024: 1
- RSA-2048: 1
- RSA2048: 2
- RSA4096: 2
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
- Generic:
- Crypto Library 2.02.010: 1
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- DFA: 4
- physical tampering: 1
- SCA:
- DPA: 4
- SPA: 3
- physical probing: 1
|
- FI:
- DFA: 6
- physical tampering: 1
- SCA:
- DPA: 6
- SPA: 5
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 1
- AIS 26: 1
- AIS 31: 2
- AIS 34: 1
- AIS 35: 1
- AIS 36: 2
- AIS1: 1
- AIS14: 1
- AIS19: 1
- AIS20: 1
- AIS25: 1
- AIS26: 1
- AIS31: 1
- AIS32: 1
- AIS34: 1
- AIS35: 1
- AIS36: 1
- AIS38: 1
- AIS46: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS31: 2
- AIS32: 1
- AIS47: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Report Summary”, TÜV Informationstechnik, (confidential document) 8 specifically • AIS1, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung des: 1
- SCOPE M5072 G11 including optional Software Libraries RSA-EC-SCL” (confidential document) [12] M5072 Security Guidelines User’s Manual, 2017-06-30, Infineon Technologies AG [13] SLE97: 1
- Security Target M5072 including optional Software Libraries RSA-EC- SCL”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0946-V3-2017, Version 3, 2017-07-27, “Evaluation: 1
- Technical Report for Composite Evaluation (ETR COMP) for the M5072 G11”, TÜV Informationstechnik (confidential document) [11] Configuration list for the TOE of BSI-DSZ-CC-0946-V3-2017, 0.5, 2017-01-16, “CONFIGURATION: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
- ConfidentialDocument:
- Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M9900 A21 including optional Software Libraries RSA - EC –: 1
- Software Libraries RSA - EC – Toolbox – FTL, Version 1.3, 2013-01-22, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900 A21 including optional Software Libraries RSA - EC – Toolbox – FTL: 1
- for the M9900 A21 with Crypto Libraries, Version 3, 2013-02-08, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M9900 A21, Version 3, 2013-02-08: 1
- – FTL, Version 0.4, 2013-01-18, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006),2012-08-16: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20170829141626+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SmartCard, Infineon, IFX, 0946-V3, PP-0084, Security IC"
- /ModDate: D:20170830070656+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0946-V3-2017
- pdf_file_size_bytes: 1150834
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.sogisportal.eu/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20130311160734+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG"
- /ModDate: D:20130311161303+01'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0827-2013
- pdf_file_size_bytes: 1235472
- pdf_hyperlinks: https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierung, http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
pdf_data/st_filename |
0946V3b_pdf.pdf |
0827b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0035-2007: 1
- BSI-PP-0035: 3
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 4
- EAL 5 augmented: 3
- EAL5: 7
- EAL5 augmented: 3
- EAL5+: 1
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 3
- EAL5: 6
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 22
- FCS_CKM.1: 30
- FCS_CKM.2: 5
- FCS_CKM.4: 28
- FCS_COP: 46
- FCS_COP.1: 29
- FCS_RNG: 20
- FCS_RNG.1: 23
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.1.1: 1
- FDP_ACF.1: 20
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 14
- FDP_ITC.1: 21
- FDP_ITC.2: 21
- FDP_ITT.1: 11
- FDP_PHP.3: 1
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 2
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 7
- FMT_LIM.2: 8
- FMT_MSA.1: 18
- FMT_MSA.1.1: 1
- FMT_MSA.3: 19
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 18
- FPT_ITT.1: 13
- FPT_PHP.3: 14
- FPT_TST: 5
- FPT_TST.1: 12
- FPT_TST.2: 34
- FPT_TST.2.1: 2
- FRU:
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 23
- FCS_CKM.1: 31
- FCS_CKM.2: 5
- FCS_CKM.4: 23
- FCS_COP: 47
- FCS_COP.1: 27
- FCS_RNG: 12
- FCS_RNG.1: 30
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.1.1: 1
- FDP_ACF.1: 20
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 10
- FDP_ITC.1: 17
- FDP_ITC.2: 17
- FDP_ITT.1: 13
- FDP_PHP.3: 1
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 2
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 7
- FMT_LIM.2: 7
- FMT_MSA.1: 18
- FMT_MSA.1.1: 1
- FMT_MSA.3: 19
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 1
- FPT_FLS.1: 16
- FPT_ITT.1: 13
- FPT_LIM.2: 1
- FPT_PHP.3: 14
- FPT_TST: 7
- FPT_TST.1: 11
- FPT_TST.2: 36
- FPT_TST.2.1: 1
- FRU:
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon: 8
- Infineon Technologies: 6
- Infineon Technologies AG: 17
|
- Infineon:
- Infineon: 4
- Infineon Technologies: 2
- Infineon Technologies AG: 19
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 21
- TDEA: 2
- TDES: 8
- Triple-DES: 3
- DES:
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 3
- RSA4096: 3
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 2
- RSA4096: 2
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- K-163: 2
- K-409: 1
- P-192: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
- Generic:
- Crypto Library 37: 1
- Crypto Library 38: 1
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 7
- Malfunction: 12
- malfunction: 1
- SCA:
- DPA: 7
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 6
- Side-channel: 1
- physical probing: 1
- side channel: 7
|
- FI:
- DFA: 7
- Malfunction: 12
- malfunction: 1
- SCA:
- DPA: 7
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 6
- Side-channel: 1
- Timing Attack: 1
- physical probing: 1
- side channel: 6
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ISO:
- ISO/IEC 15946-: 1
- ISO/IEC 25: 2
- ISO/IEC 7816-3: 1
- PKCS:
- RFC:
- SCP:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- ISO:
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Jürgen Noller
- /CreationDate: D:20130128081309
- /Creator: Microsoft® Office Word 2007
- /Keywords: Common Criteria, chip card, secure controller, EAL5+, augmented, AVA_VAM.5, protection profile 0035
- /ModDate: D:20130128081309
- /Producer: Microsoft® Office Word 2007
- /Title: Security Target Lite
- pdf_file_size_bytes: 885361
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 79
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |