This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Common Criteria Protection Profile for Application Firmware of Secure Smartcard Reader for National Electronic Identity Verification System None |
Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware) BSI-DSZ-CC-0891-V2-2016 |
|
---|---|---|
name | Common Criteria Protection Profile for Application Firmware of Secure Smartcard Reader for National Electronic Identity Verification System | Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware) |
scheme | TR | DE |
not_valid_after | 03.12.2018 | 20.12.2021 |
not_valid_before | 03.12.2015 | 20.12.2016 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KEC%20PP%20Certification%20Report.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V2a_pdf.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Protection%20Profile%20for%20Secure%20Smartcard%20Reader%20Application%20Firmware_v2.5.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V2b_pdf.pdf |
manufacturer | TÜBİTAK BİLGEM UEKAE | Infineon Technologies AG |
manufacturer_web | https://www.uekae.tubitak.gov.tr | https://www.infineon.com/ |
security_level | EAL4+, ALC_DVS.2 | EAL6+, ALC_FLR.1 |
dgst | 8555499546529d0c | 48330255bfb2c924 |
heuristics/cert_id | BSI-DSZ-CC-0891-V2-2016 | |
heuristics/cert_lab | [] | BSI |
heuristics/extracted_sars | ALC_DVS.2, AVA_VAN.5 | ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, APE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, APE_CCL.1, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions | - | 2.02.010, 2.03.008, 1.01 |
heuristics/report_references/directly_referenced_by | {} | NSCIB-CC-16-95781-CR, ANSSI-CC-2018/21, BSI-DSZ-CC-0945-V2-2018, ANSSI-CC-2017/07, ANSSI-CC-2017/21, BSI-DSZ-CC-0961-V2-2018, ANSSI-CC-2017/83, ANSSI-CC-2017/54, BSI-DSZ-CC-0980-2017, ANSSI-CC-2017/82, ANSSI-CC-2018/11, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/76, ANSSI-CC-2017/81, ANSSI-CC-2017/20, ANSSI-CC-2018/24, ANSSI-CC-2017/19, BSI-DSZ-CC-1003-2018, ANSSI-CC-2017/22 |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-0891-2015 |
heuristics/report_references/indirectly_referenced_by | {} | BSI-DSZ-CC-1221-2024, BSI-DSZ-CC-1172-2022, ANSSI-CC-2019/56, ANSSI-CC-2020/88-R01, BSI-DSZ-CC-1162-V2-2023, ANSSI-CC-2022/07, ANSSI-CC-2018/57, BSI-DSZ-CC-1243-2024, ANSSI-CC-2020/55, BSI-DSZ-CC-0976-V4-2021, BSI-DSZ-CC-1211-2023, ANSSI-CC-2022/33, ANSSI-CC-2020/42-R01, ANSSI-CC-2018/32, BSI-DSZ-CC-1162-2021, ANSSI-CC-2020/56, ANSSI-CC-2019/57-R01, KECS-ISIS-1031-2020, BSI-DSZ-CC-1147-V2-2023, ANSSI-CC-2018/53, NSCIB-CC-146301-CR2, BSI-DSZ-CC-1077-2020, BSI-DSZ-CC-1162-V3-2024, BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-0945-V3-2018, ANSSI-CC-2018/11, BSI-DSZ-CC-1034-2019, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-1003-2018, BSI-DSZ-CC-1148-V2-2023, 2021-44-INF-4142, ANSSI-CC-2019/07, ANSSI-CC-2017/22, BSI-DSZ-CC-0961-V3-2018, BSI-DSZ-CC-1148-2020, ANSSI-CC-2020/58, BSI-DSZ-CC-0891-V7-2024, BSI-DSZ-CC-1110-V5-2022, ANSSI-CC-2019/56-R01, BSI-DSZ-CC-1076-2020, NSCIB-CC-16-95781-CR, ANSSI-CC-2022/68, ANSSI-CC-2020/49-R01, ANSSI-CC-2018/21, BSI-DSZ-CC-0961-V7-2024, ANSSI-CC-2017/07, BSI-DSZ-CC-1117-2019, JISEC-CC-CRP-C0649-01-2019, BSI-DSZ-CC-1055-2018, BSI-DSZ-CC-1110-V6-2023, ANSSI-CC-2018/56v2, ANSSI-CC-2017/21, ANSSI-CC-2020/87-R01, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-0961-V2-2018, NSCIB-CC-0075541-CR2, ANSSI-CC-2018/57v2, ANSSI-CC-2019/57, ANSSI-CC-2017/82, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1176-2023, BSI-DSZ-CC-0891-V3-2018, JISEC-CC-CRP-C0648-01-2019, ANSSI-CC-2017/76, ANSSI-CC-2020/88, ANSSI-CC-2020/49, ANSSI-CC-2020/59, ANSSI-CC-2018/24, ANSSI-CC-2017/19, ANSSI-CC-2020/64, ANSSI-CC-2019/09, BSI-DSZ-CC-1033-2019, ANSSI-CC-2022/19, ANSSI-CC-2022/64, BSI-DSZ-CC-0961-V6-2022, ANSSI-CC-2020/62, NSCIB-CC-0299278-CR, ANSSI-CC-2022/65, ANSSI-CC-2019/31, ANSSI-CC-2020/43-R01, BSI-DSZ-CC-0961-V4-2019, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-1112-2020, BSI-DSZ-CC-0961-V5-2020, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-1147-2020, 2021-43-INF-4154, ANSSI-CC-2020/08, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-0945-V2-2018, ANSSI-CC-2019/55-R01, BSI-DSZ-CC-1219-2024, ANSSI-CC-2019/58-R01, BSI-DSZ-CC-1077-V2-2024, ANSSI-CC-2018/58, ANSSI-CC-2022/08, ANSSI-CC-2020/44, ANSSI-CC-2022/20, BSI-DSZ-CC-0976-V2-2018, BSI-DSZ-CC-0869-V2-2019, ANSSI-CC-2020/33, ANSSI-CC-2017/54, 2017-17-INF-3169, ANSSI-CC-2020/43, NSCIB-CC-0299277-CR, BSI-DSZ-CC-1098-2020, BSI-DSZ-CC-0980-2017, 2017-19-INF-3171, BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2019/55, ANSSI-CC-2020/87, NSCIB-CC-0112113-CR, ANSSI-CC-2017/81, NSCIB-CC-22-0286910-CR, BSI-DSZ-CC-0891-V5-2021, NSCIB-CC-0286907-CR, ANSSI-CC-2020/07, 2018-20-INF-4155, ANSSI-CC-2019/58, BSI-DSZ-CC-1220-2024, NSCIB-CC-175887-CR3, ANSSI-CC-2018/58v2, ANSSI-CC-2017/83, ANSSI-CC-2018/32v2, BSI-DSZ-CC-1147-V3-2023, ANSSI-CC-2018/56, 2017-18-INF-3170, ANSSI-CC-2020/45-R01, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2020/57, ANSSI-CC-2017/20, BSI-DSZ-CC-1110-V7-2024, ANSSI-CC-2020/63, ANSSI-CC-2020/44-R01, ANSSI-CC-2022/67, ANSSI-CC-2020/42, ANSSI-CC-2020/45, ANSSI-CC-2020/60, ANSSI-CC-2020/61, BSI-DSZ-CC-1112-V2-2021 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012 |
heuristics/st_references/directly_referenced_by | {} | NSCIB-CC-16-95781-CR, ANSSI-CC-2018/21, ANSSI-CC-2017/07, ANSSI-CC-2017/21, ANSSI-CC-2017/83, ANSSI-CC-2020/33, ANSSI-CC-2017/54, ANSSI-CC-2017/82, ANSSI-CC-2018/11, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/76, ANSSI-CC-2017/81, 2016-31-INF-2102, 2016-32-INF-2110, ANSSI-CC-2017/20, ANSSI-CC-2018/24, ANSSI-CC-2017/19, BSI-DSZ-CC-1003-2018, 2016-30-INF-2094, ANSSI-CC-2017/22 |
heuristics/st_references/indirectly_referenced_by | {} | BSI-DSZ-CC-1112-2020, BSI-DSZ-CC-0891-V4-2019, NSCIB-CC-16-95781-CR, ANSSI-CC-2018/21, ANSSI-CC-2017/07, BSI-DSZ-CC-1000-2023, ANSSI-CC-2017/21, ANSSI-CC-2020/44, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2017/83, BSI-DSZ-CC-1000-V2-2025, BSI-DSZ-CC-0869-V2-2019, ANSSI-CC-2020/33, ANSSI-CC-2017/54, 2017-17-INF-3169, NSCIB-CC-146301-CR2, ANSSI-CC-2020/43, 2017-18-INF-3170, 2017-19-INF-3171, ANSSI-CC-2017/82, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2018/11, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-1034-2019, ANSSI-CC-2017/76, ANSSI-CC-2017/81, NSCIB-CC-0112113-CR, ANSSI-CC-2020/49, 2016-32-INF-2110, BSI-DSZ-CC-1105-2020, ANSSI-CC-2017/20, 2016-31-INF-2102, ANSSI-CC-2018/24, ANSSI-CC-2017/19, BSI-DSZ-CC-1003-2018, ANSSI-CC-2019/09, BSI-DSZ-CC-1033-2019, 2016-30-INF-2094, ANSSI-CC-2020/45, ANSSI-CC-2020/42, ANSSI-CC-2017/22, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1112-V2-2021, OCSI/CERT/CCL/14/2022/RC |
heuristics/protection_profiles | {} | cf0f01bcd7be3e9c |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/report_filename | KEC PP Certification Report.pdf | 0891V2a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Protection Profile for Secure Smartcard Reader Application Firmware_v2.5.pdf | 0891V2b_pdf.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |