Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software
BSI-DSZ-CC-0626-2009
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software
BSI-DSZ-CC-1025-V2-2019
name Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software
not_valid_before 2009-11-19 2019-12-17
not_valid_after 2019-09-01 2024-12-17
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0626b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V2b_pdf.pdf
status archived active
security_level EAL5+ ALC_FLR.1, EAL6+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0626a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V2a_pdf.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V2c_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None fa97d1d96f356a0a41d19b5d57637a731ca5bc3d0e6839ba70c4c28c2cdb9811
state/cert/txt_hash None 0d454e3ca4af8e792d796d794a2c06d89fe30d18bbff26bb106cc25a20709907
state/report/pdf_hash bbef53e635b9909e897d9d59b9a80570fc25906301272488be3c44705c880d65 dc2b35098ff19fbc343e556dfc6e1eb4390740682d6e5d1609a0175e769af347
state/report/txt_hash 16c5fcd9284828d7cda621145647aa173ac12fee17aa14457c4f78ba9b7a7aab e988b50798cad12563f7da7af98ab850b78b895544319e7e161dc43a4dc0c848
state/st/pdf_hash af73a2fd0652815c43d2b73ec89f9a627d54368477271036cc921c416de4393e fb1f35ea13769b6d773dc8ed703107c0ca12f1e25b68fe8a027b10b2357d9a8e
state/st/txt_hash e3e5f3eda603e1e5fecf1f6e993a0385b322e2b067687cfaa7d6899bfcd0c5df d0979135e372c95ebf0c6755dc44ca24b9ad32c39cfcab2f4a74853be3190308
heuristics/cert_id BSI-DSZ-CC-0626-2009 BSI-DSZ-CC-1025-V2-2019
heuristics/extracted_versions 1.1, 1.6, 1.0 -
heuristics/report_references/directly_referenced_by ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/12, ANSSI-CC-2011/16 BSI-DSZ-CC-1025-V3-2020
heuristics/report_references/directly_referencing BSI-DSZ-CC-0482-2008 BSI-DSZ-CC-1025-2018
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2011/79, ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/16, ANSSI-CC-2011/12, ANSSI-CC-2011/80 BSI-DSZ-CC-1025-V4-2021, BSI-DSZ-CC-1025-V3-2020, BSI-DSZ-CC-1025-V5-2023
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 BSI-DSZ-CC-1025-2018
heuristics/st_references/directly_referenced_by ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/12, ANSSI-CC-2011/16 None
heuristics/st_references/directly_referencing BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0482-2008 None
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/12, ANSSI-CC-2011/16 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008 None
pdf_data/cert_filename None 1025V2c_pdf.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • DE:
      • BSI-DSZ-CC-1025-V2-2019: 1
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0084-2014: 1
  • cc_security_level:
    • EAL:
      • EAL 6: 1
      • EAL 5: 1
      • EAL 2: 1
      • EAL 6 augmented: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.1: 1
      • ALC_FLR: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • Infineon:
      • Infineon Technologies AG: 1
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ISO:
      • ISO/IEC 15408: 2
      • ISO/IEC 18045: 2
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 286209
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20191218142732+01'00'
  • /Creator: Writer
  • /Keywords: Infineon Technologies AG, Common Criteria, Certification, IFX-CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software, security controller
  • /ModDate: D:20191218142905+01'00'
  • /Producer: LibreOffice 6.2
  • /Subject: Common Criteria Certification
  • /Title: Certificate BSI-DSZ-CC-1025-V2-2019
  • pdf_hyperlinks:
pdf_data/report_filename 0626a_pdf.pdf 1025V2a_pdf.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0626-2009
  • cert_item: Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-1025-V2-2019
  • cert_item: IFX-CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0626-2009 BSI-DSZ-CC-1025-V2-2019
pdf_data/report_frontpage/DE/cert_item Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software IFX-CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 4
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 3
    • ECC:
      • ECC: 4
pdf_data/report_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 1
  • ECDSA:
    • ECDSA: 2
  • ECDH:
    • ECDH: 1
  • ECDSA:
    • ECDSA: 3
  • ECC:
    • ECC: 4
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 2 3
pdf_data/report_keywords/asymmetric_crypto/RSA
  • RSA 2048: 4
  • RSA 1024: 1
  • RSA2048: 1
  • RSA4096: 1
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0626-2009: 22
  • BSI-DSZ-CC-0482-2008: 5
  • BSI-DSZ-CC-0626: 1
  • BSI-DSZ-CC-1025-V2-2019: 20
  • BSI-DSZ-CC-1025-2018: 3
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002-2001: 3
  • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_SCP: 4
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS.2: 6
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
    • ALC_LCD.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_MSU.3: 5
    • AVA_VLA.4: 6
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • AGD:
    • AGD_ARM: 1
    • AGD_HRM: 1
    • AGD_PPUM: 1
    • AGD_PRM: 1
    • AGD_ACL: 1
    • AGD_SCL: 1
    • AGD_HSL: 1
    • AGD_CCL: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
pdf_data/report_keywords/cc_sar/AGD
  • AGD_ADM: 2
  • AGD_USR: 2
  • AGD_ARM: 1
  • AGD_HRM: 1
  • AGD_PPUM: 1
  • AGD_PRM: 1
  • AGD_ACL: 1
  • AGD_SCL: 1
  • AGD_HSL: 1
  • AGD_CCL: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 6
  • ALC_DVS: 2
  • ALC_FLR: 2
  • ALC_LCD: 1
  • ALC_TAT: 2
  • ALC_LCD.2: 1
  • ALC_TAT.2: 1
  • ALC_FLR.1: 5
  • ALC_FLR: 3
  • ALC_CMC.5: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 6 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 2 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL 4: 5
  • EAL4: 7
  • EAL 1: 1
  • EAL 7: 1
  • EAL5+: 1
  • EAL1: 5
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL6: 3
  • EAL 5 augmented: 2
  • EAL 6: 4
  • EAL 5: 4
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL5+: 1
  • EAL6: 1
  • EAL 6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 5 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 3 4
pdf_data/report_keywords/cc_security_level/EAL/EAL6 3 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RNG: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • V1.0, Version 1.0 from 2009-11-02, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
    • RSA V1.6 and EC V1.1 and SHA-2 V1.0, Version 1.0 from 2009-10-28, Infineon Technologies AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
    • V1.0, Version 1.0 from 2009-11-02, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] Errata & Delta Sheet - SLE66C(L)(X)xxxPE(M/S) Controllers - Product and Boundout, 2009-04-08: 1
  • OutOfScope:
    • out of scope: 1
    • only modular exponentiatio n part) sizes, which are generally out of scope of evaluation in BSI scheme: 1
    • Level above 100 Bits verification (only modular exponentiatio n part) sizes, which are generally out of scope of evaluation in BSI scheme) 5 Cryptographic Primitive ECDSA signature generation [X962: 1
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • IFX_CCI_000011h IFX_CCI_00001Bh IFX_CCI_00001Eh IFX_CCI_000025h G12, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version V5, 2019-12-12, 1025- V2_ETR_191212_v4.pdf, TÜV: 1
    • GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • IFX_CCI_000011h IFX_CCI_00001Bh IFX_CCI_00001Eh IFX_CCI_000025h G12, TÜV Informatonstechnik GmbH (confidential document) [11] 32-bit Security Controller – V07 Security Guidelines, v1.01-2273, 2019-06-19, Infineon: 1
    • including optional Software Libraries and Flash Loader according Package 1 and Package 2” (confidential document), Infineon Technologies AG 7 Specifically all AIS referenced (in detail) in section B 9.1 29 / 34: 1
    • Standards Compliance Verification”, Version 2, 2019-09-27, TÜV Informationstechnik GmbH (confidential document) 30 / 34 BSI-DSZ-CC-1025-V2-2019 Certification Report C. Excerpts from the Criteria For the: 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • V1.0, Version 1.0 from 2009-11-02, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
  • RSA V1.6 and EC V1.1 and SHA-2 V1.0, Version 1.0 from 2009-10-28, Infineon Technologies AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
  • V1.0, Version 1.0 from 2009-11-02, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] Errata & Delta Sheet - SLE66C(L)(X)xxxPE(M/S) Controllers - Product and Boundout, 2009-04-08: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • IFX_CCI_000011h IFX_CCI_00001Bh IFX_CCI_00001Eh IFX_CCI_000025h G12, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version V5, 2019-12-12, 1025- V2_ETR_191212_v4.pdf, TÜV: 1
  • GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • IFX_CCI_000011h IFX_CCI_00001Bh IFX_CCI_00001Eh IFX_CCI_000025h G12, TÜV Informatonstechnik GmbH (confidential document) [11] 32-bit Security Controller – V07 Security Guidelines, v1.01-2273, 2019-06-19, Infineon: 1
  • including optional Software Libraries and Flash Loader according Package 1 and Package 2” (confidential document), Infineon Technologies AG 7 Specifically all AIS referenced (in detail) in section B 9.1 29 / 34: 1
  • Standards Compliance Verification”, Version 2, 2019-09-27, TÜV Informationstechnik GmbH (confidential document) 30 / 34 BSI-DSZ-CC-1025-V2-2019 Certification Report C. Excerpts from the Criteria For the: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 3
  • CFB:
    • CFB: 2
pdf_data/report_keywords/cipher_mode/CBC/CBC 1 3
pdf_data/report_keywords/cipher_mode/ECB/ECB 1 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 35
pdf_data/report_keywords/randomness/RNG/RNG 5 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • DPA: 2
    • SPA: 1
  • FI:
    • physical tampering: 1
    • fault injection: 1
  • other:
    • Bellcore attack: 1
    • JIL: 4
  • SCA:
    • physical probing: 1
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • DPA: 2
  • SPA: 1
  • physical probing: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS140: 1
  • BSI:
    • AIS 34: 3
    • AIS31: 1
    • AIS 31: 4
    • AIS 25: 3
    • AIS 26: 2
    • AIS 20: 1
    • AIS 32: 1
    • AIS 35: 1
    • AIS 36: 2
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
  • FIPS:
    • FIPS186-4: 4
    • FIPS197: 2
    • FIPS PUB 186-4: 1
  • PKCS:
    • PKCS1: 4
    • PKCS #1: 1
  • BSI:
    • AIS 34: 2
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 35: 2
    • AIS 36: 3
    • AIS 37: 1
    • AIS 38: 1
    • AIS 41: 1
    • AIS 46: 1
    • AIS 47: 1
    • AIS31: 5
  • RFC:
    • RFC5639: 4
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 25: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 3
  • AIS31: 1
  • AIS 31: 4
  • AIS 25: 3
  • AIS 26: 2
  • AIS 20: 1
  • AIS 32: 1
  • AIS 35: 1
  • AIS 36: 2
  • AIS 38: 1
  • AIS 34: 2
  • AIS 1: 1
  • AIS 14: 1
  • AIS 19: 1
  • AIS 20: 1
  • AIS 23: 1
  • AIS 25: 1
  • AIS 26: 1
  • AIS 31: 2
  • AIS 32: 1
  • AIS 35: 2
  • AIS 36: 3
  • AIS 37: 1
  • AIS 38: 1
  • AIS 41: 1
  • AIS 46: 1
  • AIS 47: 1
  • AIS31: 5
pdf_data/report_keywords/standard_id/BSI/AIS 25 3 1
pdf_data/report_keywords/standard_id/BSI/AIS 26 2 1
pdf_data/report_keywords/standard_id/BSI/AIS 31 4 2
pdf_data/report_keywords/standard_id/BSI/AIS 34 3 2
pdf_data/report_keywords/standard_id/BSI/AIS 35 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 36 2 3
pdf_data/report_keywords/standard_id/BSI/AIS31 1 5
pdf_data/report_keywords/standard_id/FIPS
  • FIPS140: 1
  • FIPS186-4: 4
  • FIPS197: 2
  • FIPS PUB 186-4: 1
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408:2005: 3
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
  • ISO/IEC 25: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 8
    • 3DES:
      • Triple-DES: 4
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • TDES: 3
      • Triple-DES: 1
      • TDEA: 1
  • constructions:
    • MAC:
      • CBC-MAC: 2
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 4
  • TDES: 3
  • Triple-DES: 1
  • TDEA: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 4 1
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 8 2
pdf_data/report_keywords/technical_report_id/BSI
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI 7149: 1
  • BSI TR-02102: 1
  • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 10
    • Infineon Technologies AG: 35
    • Infineon Technologies: 8
  • Philips:
    • Philips: 2
  • Infineon:
    • Infineon Technologies AG: 28
    • Infineon: 3
    • Infineon Technologies: 1
  • GD:
    • G&D: 2
    • Giesecke & Devrient: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 10 3
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 8 1
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 35 28
pdf_data/report_metadata//CreationDate D:20091130143833+01'00' D:20191218141620+01'00'
pdf_data/report_metadata//Keywords "Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software, Infineon, Common Criteria, Certification, Zertifizierung, SmartCard Controller" "Infineon Technologies AG, Common Criteria, Certification, IFX-CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software, security controller"
pdf_data/report_metadata//ModDate D:20091204071714+01'00' D:20191218142701+01'00'
pdf_data/report_metadata//Producer StarOffice 9 LibreOffice 6.2
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0626-2009 Certification Report BSI-DSZ-CC-1025-V2-2019
pdf_data/report_metadata/pdf_file_size_bytes 950135 498544
pdf_data/report_metadata/pdf_hyperlinks http://www.bsi.bund.de/ https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
pdf_data/report_metadata/pdf_number_of_pages 42 34
pdf_data/st_filename 0626b_pdf.pdf 1025V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 14
    • ECC:
      • ECC: 11
  • FF:
    • DH:
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 1
  • RSA:
    • RSA2048: 6
    • RSA4096: 6
  • ECC:
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 19
    • ECC:
      • ECC: 17
  • FF:
    • DH:
      • Diffie-Hellman: 9
    • DSA:
      • DSA: 1
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 11 17
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 9 6
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 14 19
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 4 9
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0266-2005: 1
    • BSI-DSZ-CC-0482-2008: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 1
  • O.TDES: 4
  • O.AES: 4
  • O.RND: 4
pdf_data/st_keywords/cc_claims/O/O.RND 1 4
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002: 2
  • BSI-CC-PP-0084-2014: 4
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 2
    • ACM_SCP.3: 4
    • ACM_SCP: 3
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.3: 5
    • ADV_HLD.3: 3
    • ADV_IMP.2: 3
    • ADV_INT.1: 3
    • ADV_LLD.1: 3
    • ADV_RCR.2: 3
    • ADV_SPM.3: 2
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.2: 4
    • ALC_LCD.2: 2
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.3: 4
    • AVA_VLA.4: 4
    • AVA_CCA.1: 2
    • AVA_SOF.1: 1
    • AVA_SOF: 5
  • ADV:
    • ADV_SPM: 2
    • ADV_ARC.1: 1
    • ADV_FSP.5: 3
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_TDS.5: 1
    • ADV_SPM.1: 6
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_CMC.5: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS: 3
    • ALC_DVS.2: 4
    • ALC_FLR.1: 11
    • ALC_CMC.5: 2
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 2
    • ALC_CMC: 1
    • ALC_CMC.4: 3
    • ALC_DVS.1: 2
    • ALC_DEL: 2
  • ATE:
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
    • ATE_COV: 1
    • ATE_COV.2: 3
  • AVA:
    • AVA_VAN.5: 5
  • ASE:
    • ASE_INT: 20
    • ASE_CCL: 9
    • ASE_SPD: 8
    • ASE_OBJ: 9
    • ASE_ECD: 4
    • ASE_REQ: 46
    • ASE_TSS: 16
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.3: 5
  • ADV_HLD.3: 3
  • ADV_IMP.2: 3
  • ADV_INT.1: 3
  • ADV_LLD.1: 3
  • ADV_RCR.2: 3
  • ADV_SPM.3: 2
  • ADV_FSP: 1
  • ADV_FSP.2: 1
  • ADV_SPM.1: 3
  • ADV_SPM: 2
  • ADV_ARC.1: 1
  • ADV_FSP.5: 3
  • ADV_IMP.2: 2
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 6
  • ADV_IMP: 1
  • ADV_IMP.1: 2
  • ADV_FSP: 1
  • ADV_FSP.4: 4
  • ADV_CMC.5: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 3 2
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 3 6
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 2
  • AGD_USR.1: 2
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 4
  • ALC_LCD.2: 2
  • ALC_TAT.2: 1
  • ALC_DVS: 3
  • ALC_DVS.2: 4
  • ALC_FLR.1: 11
  • ALC_CMC.5: 2
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS: 2
  • ALC_CMS.4: 2
  • ALC_CMC: 1
  • ALC_CMC.4: 3
  • ALC_DVS.1: 2
  • ALC_DEL: 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 2
  • ATE_DPT.2: 2
  • ATE_FUN.1: 1
  • ATE_IND.2: 2
  • ATE_COV.3: 4
  • ATE_DPT.3: 1
  • ATE_FUN.2: 1
  • ATE_IND.2: 1
  • ATE_COV: 1
  • ATE_COV.2: 3
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 2 3
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 2 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_MSU.3: 4
  • AVA_VLA.4: 4
  • AVA_CCA.1: 2
  • AVA_SOF.1: 1
  • AVA_SOF: 5
  • AVA_VAN.5: 5
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 5
  • EAL5+: 2
  • EAL 5: 4
  • EAL5 augmented: 2
  • EAL 5 augmented: 4
  • EAL6: 134
  • EAL6+: 131
  • EAL 6: 1
  • EAL6 augmented: 131
  • EAL 6 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_RND: 2
    • FCS_RND.1: 4
    • FCS_COP.1: 53
    • FCS_CKM.1: 51
    • FCS_COP.1.1: 5
    • FCS_CKM.4: 31
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 7
    • FCS_CKM.4.1: 3
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ITT.1: 3
    • FDP_IFC.1: 14
    • FDP_ACC.1: 25
    • FDP_ACF.1: 15
    • FDP_SDI.1: 17
    • FDP_SDI.2: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 25
    • FDP_ITC.2: 24
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC.1.1: 3
    • FDP_ITC.1.2: 3
    • FDP_ITC.1.3: 3
    • FDP_ITC.2.1: 3
    • FDP_ITC.2.2: 3
    • FDP_ITC.2.3: 3
    • FDP_ITC.2.4: 3
    • FDP_ITC.2.5: 3
    • FDP_CKM.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MSA.3: 16
    • FMT_MSA.1: 15
    • FMT_SMF.1: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 9
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 33
    • FMT_MSA.2.1: 3
  • FPT:
    • FPT_TST.2: 26
    • FPT_FLS.1: 6
    • FPT_SEP.1: 6
    • FPT_PHP.3: 7
    • FPT_ITT.1: 3
    • FPT_TST.1: 11
    • FPT_TST.2.1: 2
    • FPT_AMT.1: 4
    • FPT_TDC.1: 3
    • FPT_TST: 2
  • FRU:
    • FRU_FLT.2: 6
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 3
  • FAU:
    • FAU_SAS.1: 12
    • FAU_SAS: 3
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 16
    • FCS_COP: 114
    • FCS_CKM: 76
    • FCS_RNG: 47
    • FCS_COP.1: 25
    • FCS_CKM.4: 31
    • FCS_CKM.1: 32
    • FCS_CKM.2: 6
  • FDP:
    • FDP_ACC.1: 27
    • FDP_ACF.1: 23
    • FDP_SDI.2: 13
    • FDP_SDC.1: 12
    • FDP_ITT.1: 14
    • FDP_IFC.1: 16
    • FDP_UCT.1: 16
    • FDP_UIT.1: 16
    • FDP_ACC: 17
    • FDP_ACF: 17
    • FDP_SDC: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 26
    • FDP_ITC.2: 26
    • FDP_SDI.1: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_SDC.1.1: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_AFC: 1
    • FDP_PHP.3: 1
  • FIA:
    • FIA_API.1: 13
    • FIA_API: 3
    • FIA_API.1.1: 1
    • FIA_SOS.2: 2
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
  • FMT:
    • FMT_MSA.1: 17
    • FMT_MSA.3: 20
    • FMT_SMF.1: 15
    • FMT_LIM.1: 12
    • FMT_LIM.2: 11
    • FMT_LIM: 29
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_ACF: 1
  • FPT:
    • FPT_TST.2: 31
    • FPT_TST: 5
    • FPT_FLS.1: 20
    • FPT_PHP.3: 17
    • FPT_ITT.1: 15
    • FPT_TST.1: 11
    • FPT_TST.2.1: 1
    • FPT_ITC.1: 2
  • FRU:
    • FRU_FLT.2: 9
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 4
  • FAU_SAS.1: 12
  • FAU_SAS: 3
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 4 12
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 2
  • FCS_RND.1: 4
  • FCS_COP.1: 53
  • FCS_CKM.1: 51
  • FCS_COP.1.1: 5
  • FCS_CKM.4: 31
  • FCS_CKM.1.1: 5
  • FCS_CKM.2: 7
  • FCS_CKM.4.1: 3
  • FCS_RND.1.1: 1
  • FCS_RNG.1: 16
  • FCS_COP: 114
  • FCS_CKM: 76
  • FCS_RNG: 47
  • FCS_COP.1: 25
  • FCS_CKM.4: 31
  • FCS_CKM.1: 32
  • FCS_CKM.2: 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 51 32
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 7 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 53 25
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITT.1: 3
  • FDP_IFC.1: 14
  • FDP_ACC.1: 25
  • FDP_ACF.1: 15
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 25
  • FDP_ITC.2: 24
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC.1.1: 3
  • FDP_ITC.1.2: 3
  • FDP_ITC.1.3: 3
  • FDP_ITC.2.1: 3
  • FDP_ITC.2.2: 3
  • FDP_ITC.2.3: 3
  • FDP_ITC.2.4: 3
  • FDP_ITC.2.5: 3
  • FDP_CKM.2: 1
  • FDP_ACC.1: 27
  • FDP_ACF.1: 23
  • FDP_SDI.2: 13
  • FDP_SDC.1: 12
  • FDP_ITT.1: 14
  • FDP_IFC.1: 16
  • FDP_UCT.1: 16
  • FDP_UIT.1: 16
  • FDP_ACC: 17
  • FDP_ACF: 17
  • FDP_SDC: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 26
  • FDP_ITC.2: 26
  • FDP_SDI.1: 1
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_SDC.1.1: 1
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_AFC: 1
  • FDP_PHP.3: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 25 27
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 15 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 14 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 25 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 24 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 3 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 17 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 15 13
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM.1: 4
  • FMT_LIM.2: 4
  • FMT_MSA.3: 16
  • FMT_MSA.1: 15
  • FMT_SMF.1: 9
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 9
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 33
  • FMT_MSA.2.1: 3
  • FMT_MSA.1: 17
  • FMT_MSA.3: 20
  • FMT_SMF.1: 15
  • FMT_LIM.1: 12
  • FMT_LIM.2: 11
  • FMT_LIM: 29
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_ACF: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 4 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 4 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 15 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 16 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 9 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 9 6
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST.2: 26
  • FPT_FLS.1: 6
  • FPT_SEP.1: 6
  • FPT_PHP.3: 7
  • FPT_ITT.1: 3
  • FPT_TST.1: 11
  • FPT_TST.2.1: 2
  • FPT_AMT.1: 4
  • FPT_TDC.1: 3
  • FPT_TST: 2
  • FPT_TST.2: 31
  • FPT_TST: 5
  • FPT_FLS.1: 20
  • FPT_PHP.3: 17
  • FPT_ITT.1: 15
  • FPT_TST.1: 11
  • FPT_TST.2.1: 1
  • FPT_ITC.1: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 6 20
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 3 15
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 7 17
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 2 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 26 31
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 2 1
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 6 9
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 3
  • FTP_TRP.1: 3
  • FTP_ITC.1: 21
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 4
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 3 21
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 3 4
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 1
  • single DES is out of scope of the evaluation: 1
  • 192 – 512 bit key length Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) Advanced security sensors and physical countermeasures (e.g. shielding: 1
  • out of scope: 3
  • certification. The user operating system and further applications implemented on the TOE are also out of scope of this certification. To summarize, if used with the PCD software the certification view equals to: 1
  • is enabled to communicate via the selected interfaces. The surrounding environment is in both cases out of scope. Note 1: The cryptographic libraries RSA, EC and Toolbox are delivery options. Therefore the TOE: 1
  • SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. End of note: 1
pdf_data/st_keywords/certification_process/OutOfScope/out of scope 1 3
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • ECB:
    • ECB: 16
  • CBC:
    • CBC: 14
  • CTR:
    • CTR: 8
  • CFB:
    • CFB: 6
pdf_data/st_keywords/cipher_mode/ECB/ECB 1 16
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 2
    • Key Agreement: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 2
      • SHA-512: 1
      • SHA-224: 1
      • SHA-384: 1
      • SHA-2: 50
  • SHA:
    • SHA1:
      • SHA1: 11
    • SHA2:
      • SHA256: 11
  • MD:
    • MD5:
      • MD5: 11
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 1
  • SHA1: 11
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 2
  • SHA-512: 1
  • SHA-224: 1
  • SHA-384: 1
  • SHA-2: 50
  • SHA256: 11
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 8
    • RND: 2
  • TRNG:
    • TRNG: 3
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 5
    • RNG: 25
pdf_data/st_keywords/randomness/RNG/RND 2 5
pdf_data/st_keywords/randomness/RNG/RNG 8 25
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 15
  • malfunction: 3
  • DFA: 4
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
  • fault injection: 2
pdf_data/st_keywords/side_channel_analysis/FI/DFA 4 7
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 15 12
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 3 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 10
  • Physical Probing: 2
  • DPA: 10
  • SPA: 4
  • Leak-Inherent: 12
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 11
  • Side-channel: 1
  • side-channel: 1
  • SPA: 6
  • DPA: 7
  • Timing Attack: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 10 7
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 10 12
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 4 6
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering 2 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-3: 1
    • FIPS 180-3: 1
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 10
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 7816: 6
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-002: 1
  • FIPS:
    • FIPS 197: 4
    • FIPS PUB 140-2: 1
    • FIPS 140-2: 1
  • NIST:
    • SP 800-67: 5
    • SP 800-38A: 11
    • SP 800-108: 1
  • PKCS:
    • PKCS#1: 8
    • PKCS #1: 2
  • BSI:
    • AIS32: 8
    • AIS31: 13
    • AIS20: 1
  • RFC:
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 14443-4: 3
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9797-1: 2
    • ISO/IEC 14888-3: 6
    • ISO/IEC 11770-3: 1
    • ISO/IEC 9798-2: 1
    • ISO/IEC 15946-1: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 10
  • AIS32: 8
  • AIS31: 13
  • AIS20: 1
pdf_data/st_keywords/standard_id/BSI/AIS31 10 13
pdf_data/st_keywords/standard_id/CC
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-002: 1
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 180-3: 1
  • FIPS 180-3: 1
  • FIPS 197: 4
  • FIPS PUB 140-2: 1
  • FIPS 140-2: 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816-3: 1
  • ISO/IEC 7816: 6
  • ISO/IEC 14443-4: 3
  • ISO/IEC 7816-3: 1
  • ISO/IEC 9797-1: 2
  • ISO/IEC 14888-3: 6
  • ISO/IEC 11770-3: 1
  • ISO/IEC 9798-2: 1
  • ISO/IEC 15946-1: 1
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 1
  • PKCS#1: 8
  • PKCS #1: 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 1 8
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 11
    • 3DES:
      • 3DES: 22
      • Triple-DES: 1
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 50
      • AES-128: 3
  • DES:
    • DES:
      • DES: 29
    • 3DES:
      • TDES: 27
      • Triple-DES: 4
      • TDEA: 3
      • TripleDES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 8
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 22
  • Triple-DES: 1
  • TDES: 27
  • Triple-DES: 4
  • TDEA: 3
  • TripleDES: 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 4
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 11 29
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 4
  • CBC-MAC: 8
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/vendor/Infineon
  • Infineon Technologies AG: 8
  • Infineon: 2
  • Infineon Technologies AG: 32
  • Infineon: 15
  • Infineon Technologies: 22
pdf_data/st_keywords/vendor/Infineon/Infineon 2 15
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 8 32
pdf_data/st_metadata
  • pdf_file_size_bytes: 1052429
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
  • /CreationDate: D:20091029135231Z
  • /Subject: CC EAL5+ Certification Security Target
  • /Author: Steffen Heinkel
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Public Security Target for Certification on level EAL5 augmented (EAL5+)
  • /Producer: Microsoft® Office Word 2007
  • /ModDate: D:20091204071951+01'00'
  • /Title: Security Target
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1901252
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 129
  • /Author: Noller
  • /Keywords: Infineon
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20190930143846+02'00'
  • /ModDate: D:20190930143846+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks: http://www.infineon.com/, http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html, http://www.ietf.org/rfc/rfc5639.txt, http://www.bsi.bund.de/, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.osptalliance.org/resources/documentation
pdf_data/st_metadata//Author Steffen Heinkel Noller
pdf_data/st_metadata//CreationDate D:20091029135231Z D:20190930143846+02'00'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 Microsoft® Word 2016
pdf_data/st_metadata//Keywords Public Security Target for Certification on level EAL5 augmented (EAL5+) Infineon
pdf_data/st_metadata//ModDate D:20091204071951+01'00' D:20190930143846+02'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Microsoft® Word 2016
pdf_data/st_metadata/pdf_file_size_bytes 1052429 1901252
pdf_data/st_metadata/pdf_hyperlinks http://www.infineon.com/, http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html, http://www.ietf.org/rfc/rfc5639.txt, http://www.bsi.bund.de/, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.osptalliance.org/resources/documentation
pdf_data/st_metadata/pdf_number_of_pages 64 129
dgst 8e01b1f798f57a26 2431b01a2c33e02f