Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Security Controller IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 including optional software libraries and dedicated firmware
BSI-DSZ-CC-0961-V6-2022
Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
BSI-DSZ-CC-1110-V5-2022
name Infineon Security Controller IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 including optional software libraries and dedicated firmware Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
not_valid_before 2022-03-23 2022-04-29
not_valid_after 2027-03-23 2027-04-29
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0961V6b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0961V6a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5a_pdf.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0961V6c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5c_pdf.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 9, 9), 'maintenance_title': 'Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5ma1a_pdf.pdf', 'maintenance_st_link': None})
state/cert/pdf_hash ca60b7d401ea5b292b25bb0426ef920082291d25880b7df4429d62087e4fc8d1 c4992b696670cb6164cb9142759a2ca47b81fd10566c6db8698bfd7f8430266d
state/cert/txt_hash 082414848c0704224f6f78cfb6d6e4ab60e3d2d5e128c8b83660c160591fe164 b52830c9efc77bd2c6bf96ed7ea4ee24825b5658849dd075d59bc00401e39212
state/report/pdf_hash 71d79f95c4ca83030af81fb0dd29d5af1cada640e5c72a40d8d66a1f71e42a8e efff6d940ecd114d57e089fcaa500637cda8fb4a5cef491bd40e15596faa6c51
state/report/txt_hash 3fc20323b3d063fc3d9057cdbdf23f4ce70c2f6f8671880e09b709ed7e0910e5 db55eda31873f6ed305fa9ff1edf60104631241d058287f3481fcff9a39b8daf
state/st/pdf_hash c767aa14d67092bf02d75b60df07cead3d3c3c636df79db6102dfd2371e2ab2f 0e99159be7aeec3da78267541aec787e8afa018c7d8d7fe5be97c5b67c8e8702
state/st/txt_hash 8a59ef0477229cefb6397a08bcdb5d047d0de718661d599c274787cb05a05fa2 897de2507e612fac27b77a6aa835c5aa6f1abcaea8668faae774b2dbf75455ec
heuristics/cert_id BSI-DSZ-CC-0961-V6-2022 BSI-DSZ-CC-1110-V5-2022
heuristics/report_references/directly_referenced_by None ANSSI-CC-2022/67, NSCIB-CC-175887-CR3, ANSSI-CC-2019/55-R01, ANSSI-CC-2019/57-R01, NSCIB-CC-0299277-CR, NSCIB-CC-0299278-CR, ANSSI-CC-2022/68, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01, ANSSI-CC-2019/56-R01, BSI-DSZ-CC-1162-V2-2023, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65, BSI-DSZ-CC-1110-V6-2023
heuristics/report_references/directly_referencing BSI-DSZ-CC-0961-V5-2020 BSI-DSZ-CC-1110-V4-2021
heuristics/report_references/indirectly_referenced_by None ANSSI-CC-2022/67, BSI-DSZ-CC-1243-2024, NSCIB-CC-175887-CR3, ANSSI-CC-2019/55-R01, ANSSI-CC-2019/57-R01, NSCIB-CC-0299277-CR, ANSSI-CC-2020/88-R01, NSCIB-CC-0299278-CR, ANSSI-CC-2022/68, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01, ANSSI-CC-2019/56-R01, BSI-DSZ-CC-1077-V2-2024, BSI-DSZ-CC-1162-V2-2023, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65, ANSSI-CC-2020/87-R01, BSI-DSZ-CC-1110-V6-2023
heuristics/st_references/directly_referenced_by None ANSSI-CC-2022/67, NSCIB-CC-175887-CR3, ANSSI-CC-2019/55-R01, ANSSI-CC-2019/57-R01, ANSSI-CC-2022/68, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01, ANSSI-CC-2019/56-R01, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65
heuristics/st_references/indirectly_referenced_by None ANSSI-CC-2022/67, NSCIB-CC-175887-CR3, ANSSI-CC-2019/55-R01, ANSSI-CC-2019/57-R01, ANSSI-CC-2022/68, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01, ANSSI-CC-2019/56-R01, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65
pdf_data/cert_filename 0961V6c_pdf.pdf 1110V5c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0961-V6-2022: 1
  • BSI-DSZ-CC-1110-V5-2022: 1
pdf_data/cert_metadata//CreationDate D:20220331154254+02'00' D:20220512164627+02'00'
pdf_data/cert_metadata//Keywords Common Criteria, Certification, Zertifizierung, 0961-V6, Infineon Technologies AG, SmartCard, PP-0084 "Common Criteria, Certification, Zertifizierung, Smartcard, PP-0084, Security IC, Infineon Technologies AG"
pdf_data/cert_metadata//ModDate D:20220331154348+02'00' D:20220512164813+02'00'
pdf_data/cert_metadata//Title Certificate BSI-DSZ-CC-0961-V6-2022 Certificate BSI-DSZ-CC-1110-V5-2022
pdf_data/cert_metadata/pdf_file_size_bytes 242060 257848
pdf_data/report_filename 0961V6a_pdf.pdf 1110V5a_pdf.pdf
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0961-V6-2022 BSI-DSZ-CC-1110-V5-2022
pdf_data/report_frontpage/DE/cert_item Infineon Security Controller IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 including optional software libraries and dedicated firmware Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 2 3
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 4 1
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0961-V6-2022: 20
  • BSI-DSZ-CC-0961-V5-2020: 3
  • BSI-DSZ-CC-1110-V5-2022: 23
  • BSI-DSZ-CC-1110-: 1
  • BSI-DSZ-CC-1110-V4-2021: 1
pdf_data/report_keywords/cc_sar/ADV/ADV_ARC 1 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 6: 4
  • EAL 5: 4
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL5+: 1
  • EAL 6 augmented: 3
  • EAL 6: 4
  • EAL 5: 4
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL5+: 1
  • EAL6: 1
  • EAL 6 augmented: 3
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • IFX_CCI_000018h, IFX_CCI_000023h, IFX_CCI_000024h, design step G13”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for the Product BSI-DSZ-CC-0961-V6-2022, v6.00, 2022-01-24: 1
  • Technical Report - Summary”, T-Systems International GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Version 6.00, 2022-01-24, ETR for composite evaluation (EFC), T-Systems International GmbH (confidential document) [11] See table 2 (“deliverables of the TOE”) for document name, revision and date. [12] See table: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • IFX_CCI_00001Dh, IFX_CCI_000021h, IFX_CCI_000022h design step H13”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for the Product BSI-DSZ-CC-1110-V5-2022, Version 1, 2022-03-29: 1
  • Technical Report - Summary”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Version 1, 2022-03-29, ETR for composite evaluation (EFC), TÜV Informationstechnik GmbH (confidential document) [11] See table 2 in section B.2 [12] See table 2 in section B.2 [13] See table 2 in section B.2: 1
  • Standards Compliance Verification”, Version 1, 2022-01-21, TÜV Informationstechnik GmbH (confidential document) [22] See table 2 in section B.2 35 / 38 Certification Report BSI-DSZ-CC-1110-V5-2022 C. Excerpts: 1
pdf_data/report_keywords/certification_process/OutOfScope
  • out of scope: 1
  • hence for CC these are out of scope: 1
  • context, are solely relevant in the GBIC context and not in the CC context (hence for CC these are out of scope). As a result of the evaluation the verdict PASS is confirmed for the following assurance: 1
  • out of scope: 2
  • note: Toolbox library is out of scope of the certification: 1
  • Table 2: Deliverables of the TOE Please note that NRG functionality, RFAPI and toolbox are out of scope of this evaluation, hence no evaluated TOE guidance documentation applies. However, respective: 1
  • and symmetric cryptography libraries and the supporting Toolbox libraries (note: Toolbox library is out of scope of the certification). The Flash Loader is a firmware located in the ROM and enables the download: 1
pdf_data/report_keywords/certification_process/OutOfScope/out of scope 1 2
pdf_data/report_keywords/crypto_scheme/MAC/MAC 1 2
pdf_data/report_keywords/eval_facility
  • DeutscheTelekom:
    • Deutsche Telekom Security: 2
  • TSystems:
    • T-Systems International: 2
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/hash_function/SHA
  • SHA2:
    • SHA-256: 1
  • SHA1:
    • SHA-1: 1
  • SHA2:
    • SHA-256: 2
    • SHA-224: 1
    • SHA-384: 1
    • SHA-512: 1
pdf_data/report_keywords/hash_function/SHA/SHA2
  • SHA-256: 1
  • SHA-256: 2
  • SHA-224: 1
  • SHA-384: 1
  • SHA-512: 1
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-256 1 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • SPA: 2
    • DPA: 2
  • FI:
    • physical tampering: 1
    • DFA: 2
  • other:
    • JIL: 5
  • SCA:
    • physical probing: 1
    • SPA: 2
    • DPA: 2
  • FI:
    • DFA: 2
pdf_data/report_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • DFA: 2
  • DFA: 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 1
    • FIPS 197: 1
  • NIST:
    • SP 800-38A: 1
    • SP 800-38B: 1
  • PKCS:
    • PKCS #1: 2
  • BSI:
    • AIS 34: 1
    • AIS1: 1
    • AIS14: 1
    • AIS19: 1
    • AIS20: 3
    • AIS25: 2
    • AIS26: 1
    • AIS31: 4
    • AIS39: 3
    • AIS46: 4
    • AIS32: 1
    • AIS34: 1
    • AIS35: 2
    • AIS36: 3
    • AIS38: 1
    • AIS 31: 1
    • AIS 35: 1
    • AIS 27: 1
    • AIS 36: 1
    • AIS 38: 1
  • RFC:
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14888-3: 1
    • ISO/IEC 11770-3: 1
    • ISO/IEC 18033: 2
    • ISO/IEC 9797-1: 1
  • FIPS:
    • FIPS197: 3
    • FIPS186-4: 6
    • FIPS 180-4: 7
  • PKCS:
    • PKCS #1: 16
  • BSI:
    • AIS 34: 2
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 27: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 1
    • AIS 38: 1
    • AIS 41: 1
    • AIS 46: 1
    • AIS 47: 1
    • AIS20: 1
    • AIS31: 2
  • RFC:
    • RFC5639: 5
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 1
  • AIS1: 1
  • AIS14: 1
  • AIS19: 1
  • AIS20: 3
  • AIS25: 2
  • AIS26: 1
  • AIS31: 4
  • AIS39: 3
  • AIS46: 4
  • AIS32: 1
  • AIS34: 1
  • AIS35: 2
  • AIS36: 3
  • AIS38: 1
  • AIS 31: 1
  • AIS 35: 1
  • AIS 27: 1
  • AIS 36: 1
  • AIS 38: 1
  • AIS 34: 2
  • AIS 1: 1
  • AIS 14: 1
  • AIS 19: 1
  • AIS 20: 1
  • AIS 23: 1
  • AIS 25: 1
  • AIS 26: 1
  • AIS 27: 1
  • AIS 31: 2
  • AIS 32: 1
  • AIS 35: 2
  • AIS 36: 2
  • AIS 37: 1
  • AIS 38: 1
  • AIS 41: 1
  • AIS 46: 1
  • AIS 47: 1
  • AIS20: 1
  • AIS31: 2
pdf_data/report_keywords/standard_id/BSI/AIS 31 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 34 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 35 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 36 1 2
pdf_data/report_keywords/standard_id/BSI/AIS20 3 1
pdf_data/report_keywords/standard_id/BSI/AIS31 4 2
pdf_data/report_keywords/standard_id/FIPS
  • FIPS PUB 186-4: 1
  • FIPS 197: 1
  • FIPS197: 3
  • FIPS186-4: 6
  • FIPS 180-4: 7
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
  • ISO/IEC 14888-3: 1
  • ISO/IEC 11770-3: 1
  • ISO/IEC 18033: 2
  • ISO/IEC 9797-1: 1
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
pdf_data/report_keywords/standard_id/PKCS/PKCS #1 2 16
pdf_data/report_keywords/standard_id/RFC
  • RFC 5639: 1
  • RFC5639: 5
  • RFC 5639: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDEA 2 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 2 3
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 3 2
pdf_data/report_keywords/vendor/Infineon/Infineon 24 25
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 8 7
pdf_data/report_metadata//CreationDate D:20220331153129+02'00' D:20220512163250+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, 0961-V6, Infineon Technologies AG, SmartCard, PP-0084" "Common Criteria, Certification, Zertifizierung, Smartcard, PP-0084, Security IC, Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20220331154055+02'00' D:20220512164606+02'00'
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0961-V6-2022 Certification Report BSI-DSZ-CC-1110-V5-2022
pdf_data/report_metadata/pdf_file_size_bytes 761877 909217
pdf_data/report_metadata/pdf_number_of_pages 31 38
pdf_data/st_filename 0961V6b_pdf.pdf 1110V5b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 18 21
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 12 14
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 31 33
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 3
  • ALC_DVS.2: 3
  • ALC_FLR.1: 10
  • ALC_CMC.5: 2
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS: 2
  • ALC_CMS.4: 3
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_DEL: 2
  • ALC_DVS: 2
  • ALC_DVS.2: 3
  • ALC_FLR.1: 10
  • ALC_CMC.5: 2
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS: 2
  • ALC_CMS.4: 3
  • ALC_CMC: 1
  • ALC_CMC.4: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 3 2
pdf_data/st_keywords/cc_sar/ASE/ASE_INT 18 22
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ 65 64
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS 25 26
pdf_data/st_keywords/cc_security_level/EAL/EAL6 166 169
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented 162 165
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ 162 165
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 157 228
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 42 54
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 7 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 43 50
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 191 295
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 39 54
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 35 39
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 35 39
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC.1 11 12
pdf_data/st_keywords/cc_sfr/FIA/FIA_API 4 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 3 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 31 35
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • certification. The user operating system and further applications implemented on the TOE are also out of scope of this certification. To summarize, if used with the PCD software the certification view equals to: 1
  • is enabled to communicate via the selected interfaces. The surrounding environment is in both cases out of scope. The CIPURSE™ CL is delivered as object code and in this way integrated in the user software. Note: 1
  • out of scope: 2
  • certification. The user operating system and further applications implemented on the TOE are also out of scope of this certification. To summarize, if used with the PCD software the certification view equals to: 1
  • is enabled to communicate via the selected interfaces. The surrounding environment is in both cases out of scope. The CIPURSE™ CL is delivered as object code and in this way integrated in the user software. The: 1
pdf_data/st_keywords/crypto_scheme/MAC/MAC 2 3
pdf_data/st_keywords/hash_function/MD/MD5/MD5 27 40
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 26 31
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 1 11
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 26
  • SHA256: 1
  • SHA-256: 29
  • SHA256: 10
  • SHA-2: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 26 29
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 1 10
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 18 19
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 2
  • FIPS 197: 2
  • FIPS PUB 186-4: 1
  • FIPS 140-2: 2
  • FIPS PUB 197: 2
  • FIPS PUB 180-4: 2
  • FIPS 197: 2
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816-3: 1
  • ISO/IEC 18033-3: 8
  • ISO/IEC 9797-1: 7
  • ISO/IEC 9798-2: 2
  • ISO/IEC 14888-3: 1
  • ISO/IEC 11770-3: 1
  • ISO/IEC 18033: 2
  • ISO/IEC 14443-4: 4
  • ISO/IEC 18092: 2
  • ISO/IEC 18033-3: 8
  • ISO/IEC 9797-1: 7
  • ISO/IEC 9798-2: 2
  • ISO/IEC 14888-3: 1
  • ISO/IEC 11770-3: 1
  • ISO/IEC 18033: 2
  • ISO/IEC14443-3: 1
pdf_data/st_keywords/standard_id/NIST
  • SP 800-38A: 16
  • SP 800-67: 4
  • SP 800-38B: 4
  • SP 800-22: 1
  • NIST SP 800-90A: 2
  • SP 800-38A: 16
  • SP 800-67: 4
  • SP 800-38B: 4
  • SP 800-22: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 88 97
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 4 7
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 56 67
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC 33 42
pdf_data/st_keywords/vendor/Infineon/Infineon 18 20
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 24 23
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 16 19
pdf_data/st_metadata//CreationDate D:20220127073848+01'00' D:20220328142816+02'00'
pdf_data/st_metadata//Keywords contact based interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high resistance, Infineon, RSA, Elliptic Curve, asymmetric libraries, CCv3.1, PP0084, 65nm contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high resistance, Infineon, RSA, Elliptic Curve, asymmetric libraries, CCv3.1, PP0084, ACLB, 65nm
pdf_data/st_metadata//ModDate D:20220127073848+01'00' D:20220328142816+02'00'
pdf_data/st_metadata/pdf_file_size_bytes 2320125 2525769
pdf_data/st_metadata/pdf_number_of_pages 162 164
dgst 8846b48323e9c2e6 158dba651191a5b8