name |
Outbound Downgrade Filter of ASDE Link-1 Forward Filter version 1.5 |
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
DE |
status |
archived |
active |
not_valid_after |
01.09.2019 |
23.11.2026 |
not_valid_before |
14.06.2007 |
23.11.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V6c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0342a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V6a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0342b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V6b_pdf.pdf |
manufacturer |
NATO C3 Agency |
Infineon Technologies AG |
manufacturer_web |
https://www.nc3a.nato.int/ |
https://www.infineon.com/ |
security_level |
EAL4 |
EAL6+, ALC_FLR.1 |
dgst |
796654551c4f90ff |
aa03140b60327aad |
heuristics/cert_id |
BSI-DSZ-CC-0342-2007 |
BSI-DSZ-CC-0891-V6-2021 |
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_ENV.1, ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
1.5 |
2.02.010, 2.07.003, 2.03.008, 1.01 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
2021-43-INF-4154, 2018-20-INF-4155, BSI-DSZ-CC-0891-V7-2024, 2021-44-INF-4142 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V4-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/42-R01, BSI-DSZ-CC-0891-V7-2024, ANSSI-CC-2020/44-R01, 2021-44-INF-4142, ANSSI-CC-2020/45-R01, 2021-43-INF-4154, 2018-20-INF-4155, ANSSI-CC-2020/49-R01, ANSSI-CC-2020/43-R01 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
2021-43-INF-4154, 2018-20-INF-4155, 2021-44-INF-4142 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
2021-43-INF-4154, 2018-20-INF-4155, 2021-44-INF-4142 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
- maintenance_date: 28.01.2022
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V6ma01a_pdf.pdf
- maintenance_st_link: None
- maintenance_title: Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
|
0891V6c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V5-2021: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon: 1
- Infineon Technologies AG: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211021080400+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware including the Flash Loader enhanced by the Mutual Authentication Extension, Infineon Technologies AG
- /ModDate: D:20211021080739+02'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-0891-V5-2021
- pdf_file_size_bytes: 254179
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
0342a.pdf |
0891V6a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0342-2007
- cert_item: Outbound Downgrade Filter of ASDE Link-1 Forward Filter version 1.5
- cert_lab: BSI
- developer: NATO C3 Agency
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0891-V6-2021
- cert_item: Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0342: 2
- BSI-DSZ-CC-0342-2007: 20
|
- DE:
- BSI-DSZ-CC-0891-V4-2019: 3
- BSI-DSZ-CC-0891-V6-2021: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 5
- EAL 6 augmented: 3
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 2
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 3
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 4
- ALC_LCD.1: 1
- ALC_TAT.3: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- T:
- T.BYPASS: 1
- T.MODE_SYNC: 1
- T.NEGLIGENCE: 1
- T.OPERATOR_DOES_NOT_EXIT: 1
- T.TOE_REPROGRAM: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 9
- Infineon Technologies AG: 20
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 23
- SHA-256: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- fault injection: 1
- physical tampering: 1
- SCA:
- DPA: 3
- SPA: 3
- physical probing: 1
- side channel: 2
- other:
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
- BSI:
- BSI 12: 1
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 1
- AIS 23: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 5
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS31: 4
- FIPS:
- FIPS180-4: 2
- FIPS186-4: 8
- FIPS197: 2
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- document) [8] Evaluation Technical Report, version 1.0, 13.04.2007, CSC Deutschland Solutions GmbH (confidential document) [9] System Installation Manual, Link 1 Forward Filter (LFF) for Air Situation Data Exchange (ASDE: 1
- version 1.12, date of issue: 01.02.2007 , Link1 Forward Filter (L1FF), NATO C3 Agency (confidential document) [7] Security Target BSI-DSZ-CC-0342, 1.13, date of issue: 06.02.2007 , Link1 Forward Filter (L1FF: 1
|
- ConfidentialDocument:
- Common Criteria EAL6 augmented / EAL6+ M7892 Design Steps D11 and G12”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for certification BSI-DSZ-CC-0891-V6-2021, Version 1, 2021-10-22: 1
- EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) [11] M7892 SOLID FLASH™ Controller for Security Applications Hardware Reference Manual, Version 3: 1
- TECHNICAL REPORT SUMMARY (ETR SUMMARY),TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- OutOfScope:
- 1976 – 4096 (note: TOE supports larger and smaller key sizes, which are generally out of scope of evaluation in BSI scheme: 1
- 8.1.3.1]. 1976 – 4096 (note: TOE supports larger and smaller key sizes, which are generally out of scope of evaluation in BSI scheme) yes 11. RSA key generation using CryptoGeneratePrime Mask (ACL v2.03: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20070620141252+02'00'
- /Creator: Acrobat PDFMaker 7.0.7 für Word
- /Keywords: Common Criteria, Certification, Zertifizierung, NATO C3 Agency, Outbound Downgrade Filter of ASDE Link 1-Forward Filter version 1.5
- /ModDate: D:20070913161012+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070620121235
- /Title: Certification Report BSI-DSZ-CC-0342-2007
- pdf_file_size_bytes: 292570
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211206072720+01'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
- /ModDate: D:20211206092306+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Certification Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) from Infineon Technologies AG
- /Title: Certification Report BSI-DSZ-CC-0891-V6-2021
- pdf_file_size_bytes: 878461
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
pdf_data/st_filename |
0342b.pdf |
0891V6b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4+: 1
- EAL6: 7
- EAL6 augmented: 4
- EAL6+: 5
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 5
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.4: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_SPM: 2
- ADV_SPM.1: 6
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 3
- ALC_CMC.5: 3
- ALC_CMS: 2
- ALC_CMS.4: 2
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_FLR.1: 11
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 3
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG.2: 3
- FAU_STG.4: 3
- FDP:
- FDP_ACC.1: 11
- FDP_ACF.1: 6
- FDP_ETC.2: 9
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 14
- FDP_IFC.2: 35
- FDP_IFC.2.2: 3
- FDP_IFF.1: 32
- FDP_IFF.1.1: 5
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 5
- FDP_IFF.1.4: 5
- FDP_IFF.1.5: 6
- FDP_IFF.1.6: 5
- FDP_IFF.2: 3
- FDP_ITC.1: 3
- FDP_ITC.2: 12
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_UAU.2: 5
- FIA_UID.2: 5
- FMT:
- FMT_MSA.1: 27
- FMT_MSA.1.1: 6
- FMT_MSA.3: 25
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_TST.1: 1
- FPT:
- FPT_AMT.1: 8
- FPT_AMT.1.1: 1
- FPT_FLS.1: 21
- FPT_FLS.1.1: 2
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 3
- FPT_STM.1: 5
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT.1: 7
- FRU_FLT.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC.2: 1
- FTP_TRP.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 94
- FCS_CKM.1: 33
- FCS_CKM.2: 4
- FCS_CKM.4: 29
- FCS_COP: 114
- FCS_COP.1: 24
- FCS_RNG: 7
- FCS_RNG.1: 13
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 17
- FDP_ACC.1: 27
- FDP_ACC.1.1: 1
- FDP_ACF: 17
- FDP_ACF.1: 26
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 16
- FDP_ITC.1: 27
- FDP_ITC.2: 27
- FDP_ITT.1: 18
- FDP_SDC: 2
- FDP_SDC.1: 9
- FDP_SDC.1.1: 1
- FDP_SDI.1: 15
- FDP_SDI.1.1: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_API: 2
- FIA_API.1: 11
- FIA_API.1.1: 1
- FMT:
- FMT_CKM.4: 1
- FMT_LIM: 27
- FMT_LIM.1: 9
- FMT_LIM.2: 8
- FMT_MSA.1: 18
- FMT_MSA.1.1: 1
- FMT_MSA.3: 24
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FPT:
- FPT_FLS.1: 18
- FPT_ITT: 3
- FPT_ITT.1: 14
- FPT_LIM: 2
- FPT_LIM.1: 2
- FPT_PHP.3: 24
- FPT_TST: 5
- FPT_TST.1: 11
- FPT_TST.2: 33
- FPT_TST.2.1: 2
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- T:
- T.BYPASS: 3
- T.MODE_SYNC: 2
- T.NEGLIGENCE: 3
- T.OPERATOR_DOES_NOT_EXIT: 2
- T.TOE_REPROGRAM: 3
|
- O:
- O.AES: 10
- O.RND: 3
- O.SHA: 6
- O.TDES: 10
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 13
- Infineon Technologies: 10
- Infineon Technologies AG: 20
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 2
- RSA4096: 2
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 63
- SHA-256: 3
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 2
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library v2.02.010: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 9
- Malfunction: 8
- fault induction: 1
- SCA:
- DPA: 12
- Leak-Inherent: 12
- Physical Probing: 2
- SPA: 7
- physical probing: 1
- side channel: 10
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 4
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 2
- FIPS PUB 197: 2
- FIPS PUB 800-38: 1
- ISO:
- ISO/IEC 10118: 2
- ISO/IEC 11770-: 1
- ISO/IEC 11770-3: 2
- ISO/IEC 14888-3: 2
- ISO/IEC 18033: 2
- ISO/IEC 18092: 4
- ISO/IEC 9797-1: 2
- ISO/IEC 9798-2: 1
- ISO/IEC14443-3: 1
- NIST:
- SP 800-38A: 8
- SP 800-67: 4
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use- case and the authentication functionality is no longer available. 1 Bundesamt: 1
- SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. CC Developer: 1
- out of scope: 3
- related to the TOE authentication is regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. The following: 1
|
pdf_data/st_metadata |
- /Author: NATO Wim Hoekstra / Peter Rehäußer
- /CreationDate: D:20070419153238+02'00'
- /Creator: PDFCreator Version 0.9.2
- /Keywords: BSI-DSZ-CC-0342, LINK1 FORWARD FILTER, Outbound Downgrade Filter of ASDE
- /ModDate: D:20070913162511+02'00'
- /Producer: AFPL Ghostscript 8.54
- /Subject: SECURITY TARGET Certification
- /Title: Outbound Downgrade Filter of ASDE LINK1 FORWARD FILTER (L1FF) BSI-DSZ-CC-0342
- pdf_file_size_bytes: 456520
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 92
|
- /Author: Infineon Technologies AG
- /CreationDate: D:20211026173220+02'00'
- /Creator: Microsoft Word - M7892_D11_G12_Security_Lite.docx
- /Keywords: 32-bit security controller
- /ModDate: D:20211026173220+02'00'
- /Producer: Nuance PDF Create 8
- /Title: Microsoft Word - M7892_D11_G12_Security_Lite.docx
- pdf_file_size_bytes: 1022714
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 114
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |