name |
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I, HDD Encryption Unit: HDD Encryption Unit Type A Version: Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 Hardware Ic Key 1100 Ic Hdd 01 Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00
|
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
|
category |
Multi-Function Devices
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2011-03-29
|
2022-05-16
|
not_valid_after |
2016-04-08
|
2027-05-16
|
scheme |
JP
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0286_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1156V3b_pdf.pdf
|
status |
archived
|
active
|
manufacturer |
Ricoh Company, Ltd.
|
Infineon Technologies AG
|
manufacturer_web |
https://www.ricoh.com/
|
https://www.infineon.com/
|
security_level |
ALC_FLR.2, EAL3+ |
ALC_FLR.1, EAL6+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0286_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1156V3a_pdf.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1156V3c_pdf.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
4bb899d7d9c710bc9fa766575140275d8d2e3e86bc877c89c89acf4d9ac52b64
|
state/cert/txt_hash |
None
|
20ee72b290bf89722e09d78fe1dd5db9ded11bda984df805f35c76fc464a7130
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
12a4883778391bcdf4eda63a578cbe5a9aa160158be18b2e24d398394c5a47ce
|
aa3b13127fa52a08a3a80440a34bdf361086e101f0b4bb2e1493e5a0417996a0
|
state/report/txt_hash |
c96fc9f591da46027c15119973c4416ff440f848b3ac9502857149bd7f2c7f9c
|
24fe97d97a564515463599f169cff6a5b5af2e362be23536cf2f0b7b4f39745f
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
f590cacd6cb82566f6ebc69a0f8b42521e875f175bf35d15a7ca3e841b43a579
|
dc3ba671a4b9b810ccc1c093e58606502a49262c2b3190cb0e7fd0eda48b6189
|
state/st/txt_hash |
a88ef8d5a4bc65ec2d90a6d92df76468db5c3727a258261414da47b8cd3d11a7
|
d3771e77b6f9023b28c42edd1f2f318b4fa3d84cecf12fcc180ab2e0e60febd4
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0286
|
BSI-DSZ-CC-1156-V3-2022
|
heuristics/cert_lab |
None
|
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
1.1, 1.05, 1.01, 1.02, 02.00.00, 7.34, 1.03, 1.09, 01.12, 1.10, 1.00 |
80.310.03.0, 2.15.000, 05.03.4097, 1.13.002, 3.02.000, 3.33.003, 3.52.9708, 2.11.003, 01.30.0564, 1.10.007, 80.310.03.1 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
None
|
BSI-DSZ-CC-1156-V2-2021 |
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
None
|
BSI-DSZ-CC-1156-2021, BSI-DSZ-CC-1156-V2-2021 |
heuristics/scheme_data |
- cert_id:
C0286
- supplier: RICOH COMPANY, LTD.
- toe_overseas_name: Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:Fax Option Type 3351
DataOverwriteSecurity Unit:DataOverwriteSecurity Unit Type I
HDD Encryption Unit:HDD Encryption Unit Type A < Cont. >
- expiration_date: 2016-04
- claim: EAL3+
ALC_FLR.2
PP
- certification_date:
2011-03
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0286_it0300.html
- toe_japan_name: -----
- enhanced:
- product:
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:
Fax Option Type 3351
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type I
HDD Encryption Unit:
HDD Encryption Unit Type A
- toe_version:
-Software
System/Copy 1.02
Network Support 7.34
Scanner 01.12
Printer 1.02
Fax 02.00.00
RemoteFax 02.00.00
Web Support 1.05
Web Uapl 1.03
Network DocBox 1.00
animation 1.1
Option PCL 1.03
OptionPCLFont 1.01
Engine 1.00:01
OpePanel 1.10
LANG0 1.09
LANG1 1.09
-Hardware
Ic Key 1100
Ic Hdd 01
-Options
Data Erase Opt 1.01m
GWFCU3-20(WW) 02.00.00
- product_type:
Multi Function Product
- certification_date:
2011-03-29
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0286_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0286_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0286_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
- cert_id:
BSI-DSZ-CC-1156-V4-2024
- product: IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, …
- vendor: Infineon Technologies AG
- certification_date:
09.09.2024
- category: Smart Cards and similar devices
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1156.html
- enhanced:
- product:
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 and 80.310.03.1, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and 3.35.001 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
- applicant:
Infineon Technologies AG
Am Campeon 1-15
85579 Neubiberg
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL6+,ALC_FLR.1
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- certification_date:
09.09.2024
- expiration_date:
08.09.2029
- entries:
frozendict({'id': 'BSI-DSZ-CC-1156-V4-2024\n(Ausstellungsdatum / Certification Date 09.09.2024, gültig bis / valid until 08.09.2029) \nZertifizierungsreport / Certification Report', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides adding an optional cryptographic library, guidance were also changed and adapted.'}), frozendict({'id': 'BSI-DSZ-CC-1156-V3-2022\n(Ausstellungsdatum / Certification Date 16.05.2022, gültig bis / valid until 15.05.2027) \nZertifizierungsreport / Certification Report', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides other aspects, guidance were changed in this recertification.'}), frozendict({'id': 'BSI-DSZ-CC-1156-V2-2021', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides other aspects, software libraries were changed.'}), frozendict({'id': 'BSI-DSZ-CC-1156-2021 \n(Ausstellungsdatum / Certification Date 29.01.2021, gültig bis / valid until 28.01.2026) \nZertifizierungsreport / Certification Report', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1156V4a_pdf.pdf?__blob=publicationFile&v=5
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1156V4b_pdf.pdf?__blob=publicationFile&v=4
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1156V4c_pdf.pdf?__blob=publicationFile&v=5
- description:
The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
- subcategory: ICs, Cryptolib
|
heuristics/scheme_data/cert_id |
C0286
|
BSI-DSZ-CC-1156-V4-2024
|
heuristics/scheme_data/certification_date |
2011-03
|
09.09.2024
|
heuristics/scheme_data/enhanced |
- product:
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:
Fax Option Type 3351
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type I
HDD Encryption Unit:
HDD Encryption Unit Type A
- toe_version: -Software
System/Copy 1.02
Network Support 7.34
Scanner 01.12
Printer 1.02
Fax 02.00.00
RemoteFax 02.00.00
Web Support 1.05
Web Uapl 1.03
Network DocBox 1.00
animation 1.1
Option PCL 1.03
OptionPCLFont 1.01
Engine 1.00:01
OpePanel 1.10
LANG0 1.09
LANG1 1.09
-Hardware
Ic Key 1100
Ic Hdd 01
-Options
Data Erase Opt 1.01m
GWFCU3-20(WW) 02.00.00
- product_type: Multi Function Product
- certification_date:
2011-03-29
- cc_version: 3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
IEEE Std 2600.1-2009
- vendor: RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0286_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0286_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0286_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
- product:
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 and 80.310.03.1, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and 3.35.001 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
- applicant: Infineon Technologies AG
Am Campeon 1-15
85579 Neubiberg
- evaluation_facility:
TÜV Informationstechnik GmbH
- assurance_level:
EAL6+,ALC_FLR.1
- protection_profile:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- certification_date:
09.09.2024
- expiration_date: 08.09.2029
- entries: frozendict({'id': 'BSI-DSZ-CC-1156-V4-2024\n(Ausstellungsdatum / Certification Date 09.09.2024, gültig bis / valid until 08.09.2029) \nZertifizierungsreport / Certification Report', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides adding an optional cryptographic library, guidance were also changed and adapted.'}), frozendict({'id': 'BSI-DSZ-CC-1156-V3-2022\n(Ausstellungsdatum / Certification Date 16.05.2022, gültig bis / valid until 15.05.2027) \nZertifizierungsreport / Certification Report', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides other aspects, guidance were changed in this recertification.'}), frozendict({'id': 'BSI-DSZ-CC-1156-V2-2021', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides other aspects, software libraries were changed.'}), frozendict({'id': 'BSI-DSZ-CC-1156-2021 \n(Ausstellungsdatum / Certification Date 29.01.2021, gültig bis / valid until 28.01.2026) \nZertifizierungsreport / Certification Report', 'description': 'Certificate'})
- report_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1156V4a_pdf.pdf?__blob=publicationFile&v=5
- target_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1156V4b_pdf.pdf?__blob=publicationFile&v=4
- cert_link:
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1156V4c_pdf.pdf?__blob=publicationFile&v=5
- description:
The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL3 Augmented with ALC_FLR.2
|
EAL6+,ALC_FLR.1
|
heuristics/scheme_data/enhanced/cert_link |
https://www.ipa.go.jp/en/security/c0286_eimg.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1156V4c_pdf.pdf?__blob=publicationFile&v=5
|
heuristics/scheme_data/enhanced/certification_date |
2011-03-29
|
09.09.2024
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions.
TOE security functionality
The major security functions of this TOE are as follows:
-
Audit Function: Enables the TOE to record information related to security events and allows users to review it.
-
Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout.
-
Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs.
-
Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user.
-
Network Protection Function: Enables the TOE to protect network communications using encryption.
-
Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern.
-
Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption.
-
Security Management Function: Enables the TOE administrator to control security functions.
-
Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software.
-
Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
|
The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
|
TÜV Informationstechnik GmbH
|
heuristics/scheme_data/enhanced/product |
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit
MFP:
Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351
FCU:
Fax Option Type 3351
DataOverwriteSecurity Unit:
DataOverwriteSecurity Unit Type I
HDD Encryption Unit:
HDD Encryption Unit Type A
|
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 and 80.310.03.1, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and 3.35.001 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
|
heuristics/scheme_data/enhanced/protection_profile |
IEEE Std 2600.1-2009
|
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0286_erpt.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1156V4a_pdf.pdf?__blob=publicationFile&v=5
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0286_est.pdf
|
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1156V4b_pdf.pdf?__blob=publicationFile&v=4
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
1156V3c_pdf.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- DE:
- BSI-DSZ-CC-1156-V3-2022:
1
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 6:
1
- EAL 5:
1
- EAL 2:
1
- EAL 6 augmented:
1
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- Infineon:
- Infineon Technologies AG:
1
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
244417
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20220523080130+02'00'
- /Creator:
Writer
- /ModDate:
D:20220523080339+02'00'
- /Producer:
LibreOffice 6.3
- /Subject:
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
- /Title:
Certification Report BSI-DSZ-CC-1156-V3-2022
- pdf_hyperlinks:
|
pdf_data/report_filename |
c0286_erpt.pdf
|
1156V3a_pdf.pdf
|
pdf_data/report_frontpage |
|
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-1156-V3-2022
- cert_item:
IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
- developer:
Infineon Technologies AG
- cert_lab:
BSI
- ref_protection_profiles:
Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- cc_version:
PP conformant Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0286-01:
1
- Certification No. C0286:
1
|
- DE:
- BSI-DSZ-CC-1156-V3-2022:
23
- BSI-DSZ-CC-1156-V2-2021:
2
|
pdf_data/report_keywords/cc_claims |
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014:
3
- BSI-CC-PP-0084-:
1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
pdf_data/report_keywords/cc_sar/ALC |
|
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL3:
4
- EAL3 augmented:
1
|
- EAL 6:
4
- EAL 5:
4
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
- EAL5+:
1
- EAL6:
1
- EAL 6 augmented:
3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- Report Table 2: Deliverables of the TOE Please note that NRGTM functionality and toolbox are out of scope of this evaluation, hence no evaluated TOE guidance documentation applies. However, respective:
1
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch, S11, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 3, 9. May 2022, EVALUATION TECHNICAL REPORT SUMMARY (ETR:
1
- TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January:
1
- TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR for COMP)”, TÜV Informationstechnik GmbH (confidential document [11] Infineon Technologies AG Chipcard and Security Evaluation Documentation Life Cycle Support:
1
- 2,19 April 2021, Infineon Technologies AG (confidential document) [12] SLC36 32-bit Security Controller – V16 Hardware Reference Manual, Version 5.2, 21. December:
1
- Standards Compliance Verification”, Version 2, 25. June 2021, TÜV Informationstechnik GmbH (confidential document) 35 / 39 Certification Report BSI-DSZ-CC-1156-V3-2022 C. Excerpts from the Criteria For the:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
- MAC:
- KEX:
- KA:
- Key agreement:
2
- Key Agreement:
1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik:
5
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256:
2
- SHA-224:
1
- SHA-384:
1
- SHA-512:
1
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- physical probing:
1
- SPA:
4
- DPA:
4
- FI:
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
- FIPS:
- FIPS197:
3
- FIPS186-4:
10
- FIPS180-4:
7
- FIPS PUB 186-4:
1
- PKCS:
- BSI:
- AIS 34:
3
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
2
- AIS 23:
1
- AIS 25:
1
- AIS 26:
1
- AIS 27:
1
- AIS 31:
2
- AIS 32:
1
- AIS 35:
2
- AIS 36:
2
- AIS 37:
1
- AIS 38:
1
- AIS 41:
1
- AIS 46:
1
- AIS 47:
1
- AIS31:
4
- AIS20:
5
- RFC:
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- Triple-DES:
2
- TDES:
4
- TDEA:
1
- constructions:
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES |
1
|
8
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG:
22
- Infineon:
3
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
577395
- pdf_is_encrypted:
True
- pdf_number_of_pages:
38
- /Author:
IPA/JISEC
- /Company: IPA
- /CreationDate:
D:20110726170118+09'00'
- /Creator:
Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate:
D:20110726170221+09'00'
- /Producer:
Acrobat Distiller 8.3.0 (Windows)
- /Title:
CRP-e
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1028934
- pdf_is_encrypted:
False
- pdf_number_of_pages:
39
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20220523071607+02'00'
- /Creator:
Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SmartCard, Infineon Technologies AG, PP-0084"
- /ModDate:
D:20220523080011+02'00'
- /Producer:
LibreOffice 6.3
- /Subject: IFX_CCI_00004Fh, IFX_CCI_000050h, IFX_CCI_000051h, IFX_CCI_000052h, IFX_CCI_000053h, IFX_CCI_000054h, IFX_CCI_000055h, IFX_CCI_000056h, IFX_CCI_000057h, IFX_CCI_000058h, IFX_CCI_00005Ch design step S11 with firmware 80.310.03.0 & 80.310.03.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
- /Title:
Certification Report BSI-DSZ-CC-1156-V3-2022
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
pdf_data/report_metadata//Author |
IPA/JISEC
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20110726170118+09'00'
|
D:20220523071607+02'00'
|
pdf_data/report_metadata//Creator |
Word 用 Acrobat PDFMaker 8.1
|
Writer
|
pdf_data/report_metadata//ModDate |
D:20110726170221+09'00'
|
D:20220523080011+02'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.3.0 (Windows)
|
LibreOffice 6.3
|
pdf_data/report_metadata//Title |
CRP-e
|
Certification Report BSI-DSZ-CC-1156-V3-2022
|
pdf_data/report_metadata/pdf_file_size_bytes |
577395
|
1028934
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
pdf_data/report_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
38
|
39
|
pdf_data/st_filename |
c0286_est.pdf
|
1156V3b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- D:
- O:
- O.STORAGE:
9
- O.DOC:
14
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
20
- O.INTERFACE:
8
- O.SOFTWARE:
8
- O.AUDIT:
9
- T:
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
- A:
- A.ACCESS:
5
- A.USER:
4
- A.ADMIN:
10
- OE:
- OE.AUDIT_STORAGE:
3
- OE.AUDIT_ACCESS:
2
- OE.INTERFACE:
4
- OE.PHYSICAL:
5
- OE.USER:
18
- OE.ADMIN:
8
- OE.AUDIT:
3
- OE.AUDIT_ACCESS_AUTHORIZED:
1
|
- O:
- O.RND:
1
- O.TDES:
2
- O.AES:
2
- O.RSA:
5
- O.ECC:
5
- O.AES-TDES-MAC:
5
- O.HASH:
5
- T:
|
pdf_data/st_keywords/cc_claims/O |
- O.STORAGE:
9
- O.DOC:
14
- O.FUNC:
8
- O.PROT:
8
- O.CONF:
16
- O.USER:
20
- O.INTERFACE:
8
- O.SOFTWARE:
8
- O.AUDIT:
9
|
- O.RND:
1
- O.TDES:
2
- O.AES:
2
- O.RSA:
5
- O.ECC:
5
- O.AES-TDES-MAC:
5
- O.HASH:
5
|
pdf_data/st_keywords/cc_claims/T |
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
|
- ADV_ARC.1:
1
- ADV_FSP.5: 4
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ADV_SPM.1: 6
- ADV_IMP: 1
- ADV_FSP: 1
- ADV_FSP.4: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.2: 3
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 2
- ALC_LCD.1:
1
|
- ALC_DVS: 1
- ALC_FLR.1: 4
- ALC_CMC.5: 3
- ALC_CMS.5: 3
- ALC_DEL.1:
1
- ALC_DVS.2: 1
- ALC_LCD.1:
1
- ALC_TAT.3: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMC: 1
- ALC_FLR: 1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ASE_INT: 14
- ASE_CCL: 4
- ASE_SPD: 4
- ASE_OBJ: 5
- ASE_ECD: 4
- ASE_REQ: 33
- ASE_TSS: 5
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2:
1
|
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2:
1
- ATE_COV: 1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
- EAL6+:
2
- EAL6:
5
- EAL 6:
2
- EAL5+:
1
- EAL6 augmented:
2
- EAL 6 augmented:
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_STG.1:
9
- FAU_STG.4:
7
- FAU_SAR.1:
9
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FCS:
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1:
1
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC.1:
32
- FDP_ACF.1:
30
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
4
- FDP_ACF.1.4:
3
- FDP_ACF.1.3:
6
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
2
- FDP_RIP.1:
8
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
- FIA:
- FIA_AFL.1:
7
- FIA_UAU.7:
7
- FIA_SOS.1:
7
- FIA_UID.1:
16
- FIA_UAU.1:
13
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
8
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1:
6
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_SMF.1:
22
- FMT_SMR.1:
28
- FMT_MSA.3:
22
- FMT_MSA.1:
20
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
12
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_FDI_EXP:
4
- FPT_FDI_EXP.1:
10
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_STM.1.1:
1
- FPT_TST.1:
5
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_SSL.3:
9
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1:
1
|
- FAU:
- FAU_SAS:
4
- FAU_SAS.1:
6
- FAU_GEN:
1
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG:
37
- FCS_COP:
40
- FCS_CKM:
30
- FCS_RNG.1:
23
- FCS_CKM.1:
21
- FCS_CKM.4:
20
- FCS_COP.1:
14
- FCS_CKM.2:
3
- FDP:
- FDP_SDC:
2
- FDP_SDC.1:
5
- FDP_SDI.2:
5
- FDP_ITT.1:
4
- FDP_IFC.1:
8
- FDP_UCT.1:
9
- FDP_UIT.1:
9
- FDP_ACC:
10
- FDP_ACF:
11
- FDP_ACC.1:
18
- FDP_ACF.1:
15
- FDP_ITC.1:
18
- FDP_ITC.2:
18
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
1
- FDP_SDI.1:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_SDC.1.1:
1
- FDP_UCT.1.1:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FIA:
- FIA_API:
2
- FIA_API.1:
7
- FIA_UID:
7
- FIA_UID.1:
6
- FIA_UID.2:
3
- FIA_API.1.1:
1
- FMT:
- FMT_LIM:
16
- FMT_LIM.1:
8
- FMT_LIM.2:
6
- FMT_MSA.1:
8
- FMT_MSA.3:
11
- FMT_SMF.1:
11
- FMT_SMR.1:
16
- FMT_MTD:
10
- FMT_SMR:
8
- FMT_SMF:
8
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
1
- FPT:
- FPT_TST.2:
28
- FPT_TST:
5
- FPT_TST.1:
11
- FPT_FLS.1:
6
- FPT_PHP.3:
4
- FPT_ITT.1:
4
- FPT_TST.2.1:
1
- FRU:
- FTP:
- FTP_ITC.1:
15
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1:
4
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_STG.1:
9
- FAU_STG.4:
7
- FAU_SAR.1:
9
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
|
- FAU_SAS:
4
- FAU_SAS.1:
6
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
10
- FCS_COP.1:
9
- FCS_CKM.2:
2
- FCS_CKM.4:
7
- FCS_CKM.1.1: 1
- FCS_COP.1.1: 1
|
- FCS_RNG: 37
- FCS_COP: 40
- FCS_CKM: 30
- FCS_RNG.1: 23
- FCS_CKM.1:
21
- FCS_CKM.4:
20
- FCS_COP.1:
14
- FCS_CKM.2:
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
10
|
21
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
3
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
7
|
20
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
14
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
32
- FDP_ACF.1:
30
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
4
- FDP_ACF.1.4:
3
- FDP_ACF.1.3:
6
- FDP_IFF: 1
- FDP_IFC: 1
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
2
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_IFC.1:
4
|
- FDP_SDC: 2
- FDP_SDC.1: 5
- FDP_SDI.2: 5
- FDP_ITT.1: 4
- FDP_IFC.1:
8
- FDP_UCT.1: 9
- FDP_UIT.1: 9
- FDP_ACC: 10
- FDP_ACF: 11
- FDP_ACC.1:
18
- FDP_ACF.1:
15
- FDP_ITC.1:
18
- FDP_ITC.2:
18
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
1
- FDP_SDI.1: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_SDC.1.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
32
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
30
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
6
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
2
|
18
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
2
|
18
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1: 7
- FIA_UAU.7: 7
- FIA_SOS.1: 7
- FIA_UID.1:
16
- FIA_UAU.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7.1: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
|
- FIA_API: 2
- FIA_API.1: 7
- FIA_UID: 7
- FIA_UID.1:
6
- FIA_UID.2: 3
- FIA_API.1.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
16
|
6
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_SMF.1:
22
- FMT_SMR.1:
28
- FMT_MSA.3:
22
- FMT_MSA.1:
20
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
12
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_LIM: 16
- FMT_LIM.1: 8
- FMT_LIM.2: 6
- FMT_MSA.1:
8
- FMT_MSA.3:
11
- FMT_SMF.1:
11
- FMT_SMR.1:
16
- FMT_MTD: 10
- FMT_SMR: 8
- FMT_SMF: 8
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
20
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
22
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
12
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
22
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
28
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FDI_EXP: 4
- FPT_FDI_EXP.1: 10
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1:
5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
- FPT_TST.2: 28
- FPT_TST: 5
- FPT_TST.1:
11
- FPT_FLS.1: 6
- FPT_PHP.3: 4
- FPT_ITT.1: 4
- FPT_TST.2.1: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
5
|
11
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
12
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1: 1
|
- FTP_ITC.1:
15
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
12
|
15
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- SCA:
- Leak-Inherent:
5
- Physical Probing:
2
- side channel:
1
- SPA:
1
- DPA:
2
- FI:
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- BSI:
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
- FIPS:
- BSI:
- RFC:
- ISO:
- ISO/IEC 7816-3:
1
- ISO/IEC 14443:
6
- ISO/IEC 18092:
4
- ISO/IEC 14443-4:
1
- ISO/IEC14443-3:
1
- ICAO:
- CC:
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
|
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- TDES:
16
- Triple-DES:
1
- TDEA:
1
- miscellaneous:
- constructions:
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
2
|
19
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon Technologies:
7
- Infineon Technologies AG:
13
- Infineon:
3
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
789628
- pdf_is_encrypted:
False
- pdf_number_of_pages:
88
- /Creator:
MP_2851_P2600_ST_1.00_ENG20110520.doc - Microsoft Word
- /CreationDate:
D:20110601142541
- /Title:
MP_2851_P2600_ST_1.00_ENG20110520.doc
- /Author:
p000266068
- /Producer:
Acrobat PDFWriter 5.0 Windows NT
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
2104697
- pdf_is_encrypted:
False
- pdf_number_of_pages:
75
- /Title:
Confidential Security Target
- /Author:
Heinkel Steffen (IFAG CCS SQM PS)
- /Keywords: Infineon
- /Creator:
Microsoft® Word 2016
- /CreationDate:
D:20220509140744+02'00'
- /ModDate: D:20220509140744+02'00'
- /Producer:
Microsoft® Word 2016
- pdf_hyperlinks:
mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.infineon.com/
|
pdf_data/st_metadata//Author |
p000266068
|
Heinkel Steffen (IFAG CCS SQM PS)
|
pdf_data/st_metadata//CreationDate |
D:20110601142541
|
D:20220509140744+02'00'
|
pdf_data/st_metadata//Creator |
MP_2851_P2600_ST_1.00_ENG20110520.doc - Microsoft Word
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Producer |
Acrobat PDFWriter 5.0 Windows NT
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Title |
MP_2851_P2600_ST_1.00_ENG20110520.doc
|
Confidential Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
789628
|
2104697
|
pdf_data/st_metadata/pdf_hyperlinks |
|
mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
88
|
75
|
dgst |
8a8d0f5b96ee95fb
|
30597f1bc54c13c1
|