Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software
BSI-DSZ-CC-0626-2009
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
name Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
category ICs, Smart Cards and Smart Card-Related Devices and Systems Data Protection
not_valid_after 01.09.2019 08.11.2019
not_valid_before 19.11.2009 07.11.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0626a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0626b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
manufacturer Infineon Technologies AG Kanguru Solutions
manufacturer_web https://www.infineon.com/ https://www.kanguru.com
security_level EAL5+ ALC_FLR.1, EAL2+
dgst 8e01b1f798f57a26 eda06ca3c208ebd0
heuristics/cert_id BSI-DSZ-CC-0626-2009 BSI-DSZ-CC-0772-2014
heuristics/extracted_sars ADV_LLD.1, AVA_VLA.4, ALC_DVS.2, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ADV_INT.1, ADV_IMP.2, ADV_SPM.3, ALC_LCD.2, ATE_COV.2, AVA_SOF.1, ADV_HLD.3, AGD_USR.1, AVA_MSU.3, AGD_ADM.1, ADV_RCR.2, AVA_CCA.1, ATE_DPT.2, ADV_FSP.3 ASE_CCL.1, ALC_DEL.1, ALC_DVS.2, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ADV_TDS.1, ADV_IMP.2, ATE_COV.1, ASE_SPD.1, ASE_REQ.2, ALC_LCD.2, APE_INT.1, AGD_OPE.1, APE_CCL.1, ALC_TAT.3, APE_REQ.2, APE_ECD.1, ATE_DPT.4, ASE_ECD.1, ADV_INT.3, ALC_CMS.2, ADV_SPM.1, AVA_VAN.2, ALC_CMC.2, ASE_INT.1, APE_OBJ.2, AGD_PRE.1, APE_SPD.1, ADV_FSP.2, ALC_FLR.1, ASE_OBJ.2
heuristics/extracted_versions 1.1, 1.6, 1.0 3.2.0.3, 1.2.1.8, 02.03.10, 5.0.2.6, 2.0.0.0
heuristics/report_references/directly_referenced_by ANSSI-CC-2011/12, ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/16 {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-0482-2008 {}
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2011/79, ANSSI-CC-2011/16, ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/12, ANSSI-CC-2011/80 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0399-2007 {}
heuristics/st_references/directly_referenced_by ANSSI-CC-2011/12, ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/16 {}
heuristics/st_references/directly_referencing BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0482-2008 {}
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2011/12, ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/16 {}
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008 {}
maintenance_updates
protection_profiles
pdf_data/report_filename 0626a_pdf.pdf 0772a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0626-2009
    • cert_item: Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • cert_lab: BSI
    • developer: Kanguru Solutions
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0482-2008: 5
    • BSI-DSZ-CC-0626: 1
    • BSI-DSZ-CC-0626-2009: 22
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 3
  • BSI:
    • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 5: 3
    • EAL 5 augmented: 2
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 1: 7
    • EAL 2: 8
    • EAL 2 augmented: 3
    • EAL 3: 4
    • EAL 4: 7
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL2: 2
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 4
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 2
    • ALC_TAT.2: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 5
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_SOS.1: 1
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_UID.2: 4
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 10
    • Infineon Technologies: 8
    • Infineon Technologies AG: 35
  • Philips:
    • Philips: 2
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • Triple-DES: 4
    • DES:
      • DES: 8
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
    • RSA 2048: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 35
  • SHA:
    • SHA2:
      • SHA-256: 13
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 5
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 1
  • other:
    • Bellcore attack: 1
    • JIL: 4
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 25: 3
    • AIS 26: 2
    • AIS 31: 4
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 1
    • AIS 36: 2
    • AIS 38: 1
    • AIS31: 1
  • FIPS:
    • FIPS140: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • RSA V1.6 and EC V1.1 and SHA-2 V1.0, Version 1.0 from 2009-10-28, Infineon Technologies AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
    • V1.0, Version 1.0 from 2009-11-02, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
    • V1.0, Version 1.0 from 2009-11-02, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] Errata & Delta Sheet - SLE66C(L)(X)xxxPE(M/S) Controllers - Product and Boundout, 2009-04-08: 1
  • ConfidentialDocument:
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20091130143833+01'00'
  • /Creator: Writer
  • /Keywords: "Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software, Infineon, Common Criteria, Certification, Zertifizierung, SmartCard Controller"
  • /ModDate: D:20091204071714+01'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0626-2009
  • pdf_file_size_bytes: 950135
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141121083051+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
  • /ModDate: D:20141121113713+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0772-2014
  • pdf_file_size_bytes: 1643286
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
pdf_data/st_filename 0626b_pdf.pdf 0772b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0266-2005: 1
    • BSI-DSZ-CC-0482-2008: 1
  • DE:
    • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 2
  • BSI:
    • BSI-PP- 0025: 13
    • BSI-PP-0025: 6
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 4
    • EAL5: 5
    • EAL5 augmented: 2
    • EAL5+: 2
  • EAL:
    • EAL2: 4
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 2
    • ACM_SCP: 3
    • ACM_SCP.2: 1
    • ACM_SCP.3: 4
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 5
    • ADV_HLD.3: 3
    • ADV_IMP.2: 3
    • ADV_INT.1: 3
    • ADV_LLD.1: 3
    • ADV_RCR.2: 3
    • ADV_SPM.1: 3
    • ADV_SPM.3: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.2: 4
    • ALC_LCD.2: 2
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_CCA.1: 2
    • AVA_MSU.3: 4
    • AVA_SOF: 5
    • AVA_SOF.1: 1
    • AVA_VLA.4: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_SPM.1: 2
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 51
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 7
    • FCS_CKM.4: 31
    • FCS_CKM.4.1: 3
    • FCS_COP.1: 53
    • FCS_COP.1.1: 5
    • FCS_RND: 2
    • FCS_RND.1: 4
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_CKM.2: 1
    • FDP_IFC.1: 14
    • FDP_ITC.1: 25
    • FDP_ITC.1.1: 3
    • FDP_ITC.1.2: 3
    • FDP_ITC.1.3: 3
    • FDP_ITC.2: 24
    • FDP_ITC.2.1: 3
    • FDP_ITC.2.2: 3
    • FDP_ITC.2.3: 3
    • FDP_ITC.2.4: 3
    • FDP_ITC.2.5: 3
    • FDP_ITT.1: 3
    • FDP_SDI.1: 17
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 15
    • FDP_SDI.2.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 33
    • FMT_MSA.2.1: 3
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
  • FPT:
    • FPT_AMT.1: 4
    • FPT_FLS.1: 6
    • FPT_ITT.1: 3
    • FPT_PHP.3: 7
    • FPT_SEP.1: 6
    • FPT_TDC.1: 3
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.2: 26
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 6
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 3
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
    • FCS_RNG: 2
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD: 12
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 2
    • FMT_SMF: 20
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RCV.4: 8
    • FPT_RCV.4.1: 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 8
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 22
      • Triple-DES: 1
    • DES:
      • DES: 11
  • constructions:
    • MAC:
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 11
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 14
  • FF:
    • DH:
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 50
      • SHA-224: 1
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 8
  • RNG:
    • RNG: 14
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 4
    • Malfunction: 15
    • malfunction: 3
  • SCA:
    • DPA: 10
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 4
  • other:
    • reverse engineering: 2
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 10
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS 180-3: 1
    • FIPS PUB 180-3: 1
  • ISO:
    • ISO/IEC 7816: 6
    • ISO/IEC 7816-3: 1
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 192 – 512 bit key length Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) Advanced security sensors and physical countermeasures (e.g. shielding: 1
    • out of scope: 1
    • single DES is out of scope of the evaluation: 1
  • OutOfScope:
    • 11 1.5.4.3 Out of scope : 1
    • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
    • Out of scope: 2
    • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
pdf_data/st_metadata
  • /Author: Steffen Heinkel
  • /CreationDate: D:20091029135231Z
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Public Security Target for Certification on level EAL5 augmented (EAL5+)
  • /ModDate: D:20091204071951+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: CC EAL5+ Certification Security Target
  • /Title: Security Target
  • pdf_file_size_bytes: 1052429
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different