Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
BSI-DSZ-CC-1107-V5-2024
IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware v80.505.04.1, optional CryptoSuite v04.05.007, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents
BSI-DSZ-CC-1206-V2-2024
name IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware v80.505.04.1, optional CryptoSuite v04.05.007, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents
not_valid_before 2024-09-04 2024-03-20
not_valid_after 2028-12-05 2029-03-20
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V5b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206V2b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V5a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206V2a_pdf.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1107V5c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206V2c_pdf.pdf
state/cert/pdf_hash 9dc01d9d970d0b4707dba038e05dacc4328d12382b2c92c69ab6db5ba28001c7 13859d8dbf2496e57d575daf028e80f404884cb386d6be798217f926d10d8eec
state/cert/txt_hash 25d22e66fbd62af82eb1f041903aba589997e109811fc6c631bf7f1c751ec75b 7b70cec56dbfcbe0bfe87c8c8549ea6612ac9fda7591214dfd3058d3e6318006
state/report/pdf_hash 51f0711acb469ae429d90936d5af0adcb71bca4402a648a76b46e4f61781131d 3e46c54172030caf6dc1629c8f3eaa72052ae2484c62ecefbd18d2501005bef4
state/report/txt_hash ee9662a9bd5407ebc6bf41c5d72f129f09ec358ef73a7920ad07d21489d6bb2f 287780ac7b2a3f681759dde8860fa5abde743cd35a6f85a978e87eaf862417e4
state/st/extract_ok False True
state/st/pdf_hash ef618c6cbe2bc308e69e55e99db7a539a8fd5756a45d8c9f0bfd5ed50a4363b6 9f20fe870f838a6c378d130557cab3f555f977221c00a3dbdec9c0b46e85971c
state/st/txt_hash f0460d25360fba5f733797f03d978ee2510a8dc590313210709136186655fc4d 816c87c9a440bbd8772104b86ac098268f0528c956c3f6c915dafb57097cf79b
heuristics/cert_id BSI-DSZ-CC-1107-V5-2024 BSI-DSZ-CC-1206-V2-2024
heuristics/extracted_versions 3.35.001, 2.15.000, 05.03.4097, 3.34.000, 1.13.002, 3.02.000, 80.306.16.0, 80.306.16.1, 80.312.02.0, 3.33.003, 3.52.9708, 2.11.003, 01.30.0564, 1.10.007 02.01.0040, 1.1.1, 04.05.007, 1.1.2, 80.505.04.1, 04.05.0040, 06.10.0002
heuristics/report_references/directly_referenced_by None BSI-DSZ-CC-1206-V3-2024
heuristics/report_references/directly_referencing BSI-DSZ-CC-1107-V4-2023 BSI-DSZ-CC-1206-2023
heuristics/report_references/indirectly_referenced_by None BSI-DSZ-CC-1206-V3-2024
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1107-V4-2023, BSI-DSZ-CC-1107-V3-2022 BSI-DSZ-CC-1206-2023
heuristics/scheme_data
  • cert_id: BSI-DSZ-CC-1107-V5-2024
  • product: IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, …
  • vendor: Infineon Technologies AG
  • certification_date: 04.09.2024
  • category: Smart Cards and similar devices
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1107.html
  • enhanced:
    • product: IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance
    • applicant: Infineon Technologies AG Am Campeon 1-15 85579 Neubiberg
    • evaluation_facility: TÜV Informationstechnik GmbH
    • assurance_level: EAL6+,ALC_FLR.1
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
    • certification_date: 04.09.2024
    • expiration_date: 04.12.2028
    • entries: frozendict({'id': 'BSI-DSZ-CC-1107-V5-2024', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.'}), frozendict({'id': 'BSI-DSZ-CC-1107-V4-2023', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Within this recertification penetration tests were performed, security objectives have been extended a flashloader has been added to the offered functionality and the guidance has been updated.'}), frozendict({'id': 'BSI-DSZ-CC-1107-V3-2022', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Within this recertification penetration tests were performed and the guidance has been updated.'}), frozendict({'id': 'BSI', 'description': '), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers. Besides other aspects, software libraries were changed.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5b_pdf.pdf?__blob=publicationFile&v=4
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1107V5c_pdf.pdf?__blob=publicationFile&v=2
    • description: The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
  • subcategory: ICs, Cryptolib
None
pdf_data/cert_filename 1107V5c_pdf.pdf 1206V2c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-1107-V5-2024: 1
  • BSI-DSZ-CC-1206-V2-2024: 1
pdf_data/cert_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 1
pdf_data/cert_metadata//Author Bundesamt für Sicherheit in der Informationstechnik Federal Office for Information Security
pdf_data/cert_metadata//Keywords Common Criteria, Certification, Zertifizierung, PP-0084, Infineon, Smart Card, IFX "Common Criteria, Certification, Zertifizierung, Smartcard, Security IC, Infineon Technologies AG"
pdf_data/cert_metadata//Subject Common Criteria, Certification, Zertifizierung, PP-0084, Infineon, Smart Card, IFX Common Criteria, Certification, Zertifizierung, Smartcard, Security IC, Infineon Technologies AG
pdf_data/cert_metadata//Title Certificate BSI-DSZ-CC-1107-V5-2024 Certificatet BSI-DSZ-CC-1206-V2-2024
pdf_data/cert_metadata/pdf_file_size_bytes 235059 235165
pdf_data/report_filename 1107V5a_pdf.pdf 1206V2a_pdf.pdf
pdf_data/report_frontpage/DE/cc_security_level Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 4 December 2028 SOGIS Recognition Agreement Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 19 March 2029
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-1107-V5-2024 BSI-DSZ-CC-1206-V2-2024
pdf_data/report_frontpage/DE/cert_item IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware v80.505.04.1, optional CryptoSuite v04.05.007, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDH/ECDH 2 1
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 9 4
pdf_data/report_keywords/asymmetric_crypto/FF/DH
  • Diffie-Hellman: 3
  • DH: 1
  • Diffie-Hellman: 3
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-1107-V5-2024: 23
  • BSI-DSZ-CC-1107-V4-2023: 4
  • BSI-DSZ-CC-1206-V2-2024: 19
  • BSI-DSZ-CC-1206-2023: 2
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084-2014 2 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 3
  • AGD:
    • AGD_PPUM: 3
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ADV:
    • ADV_ARC: 3
  • AGD:
    • AGD_HRM: 3
    • AGD_PRM: 5
    • AGD_PPM: 4
    • AGD_SHA: 3
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_DVS: 1
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ATE:
    • ATE_FUN: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sar/AGD
  • AGD_PPUM: 3
  • AGD_HRM: 3
  • AGD_PRM: 5
  • AGD_PPM: 4
  • AGD_SHA: 3
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 5
  • ALC_FLR: 3
  • ALC_CMC.5: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_FLR.1: 5
  • ALC_FLR: 3
  • ALC_DVS: 1
  • ALC_CMC.5: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_ITC: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • 2: Deliverables of the TOE Please note that NRG functionality and most toolbox functionality are out of scope of this evaluation (unless stated otherwise), hence no evaluated TOE guidance documentation applies: 1
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh T11 Security Target”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 2, 2024-09-02, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
    • TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) and Addendum to ETR for composite, Version V2, 2024-09-02, TÜV Informationstechnik GmbH: 1
    • AG Chipcard and Security Evaluation Documentation Life Cycle Support”, Infineon Technologies AG (confidential document) [12] 32-bit Security Controller – V11, Hardware Reference Manual, V6.2, 2020-12-21, Infineon: 1
    • Standards Compliance Verification”, Version 2, 2024-08-23, TÜV Informationstechnik GmbH (confidential document) [26] SLx3 (40 nm) Security Controllers Production and Personalization Manual Flash Loader V9 Field: 1
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • 2, 2024-02-27, “EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY)”, TÜV Informationstechnik, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • the Product, Version 2, 2024- 02-27, “ETR for Composite Evaluation”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 0.4, 2024-01-25 (confidential document) [12] also: 1
    • Controller – V24), Hardware Reference Manual”, Version 5.0, 2023-12-11, Infineon Technologies AG (confidential document) [13] also referred to as [AGD_PRM], “TEGRION™ SLx2 security controller family, Programmer's: 1
    • Manual, SLx2_DFP”, Version 1.3.0, 2023-10-19, Infineon Technologies AG (confidential document) [14] also referred to as [AGD_SG], “SLC21, 32-bit Security Controller – V24, Security Guidelines: 1
    • 1.00-3001, 2023.07-26, Infineon Technologies AG (confidential document) [15] also referred to as [AGD_PPM], “SLC21 (32-bit Security Controller – V24), Production and: 1
    • manual, Flash Loader V10”, Version 10.01, 2023-06- 28, Infineon Technologies AG (confidential document) [16] also referred to as [AGD_CryptoUM], “Crypto2304T V4, User Manual”, Version 2.0, 2023-07-14: 1
    • Technologies AG (confidential document) [17] also referred to as [AGD_ES], “TEGRION™ SLC21 (32-bit Security Controller – V24) Errata sheet: 1
    • Version 3.0, 2024-01-09, Infineon Technologies AG (confidential document) [18] “SINGLE EVALUATION REPORT ADDENDUM to ETR-Part ADV Cryptographic Standards Compliance: 1
    • Version 4, 2024-02-27, TÜV Informationstechnik GmbH (confidential document) [19] also referred to as [AGD_CS], “CS-SLC21V24 CryptoSuite 32-bit Security Controller User: 1
    • manual”, Version 4.05.007, 2023-11-08, Infineon Technologies AG (confidential document) 7 See section 9.1 on usage of specific AIS. 30 / 34 BSI-DSZ-CC-1206-V2-2024 Certification Report: 1
    • Note (ReadMe_AsconMise-v1.1.3.md)”, Version 1.1.3, 2023-09-13, Infineon Technologies AG (confidential document) [21] also referred to as [AGD_SHA], “SHA256 MISE Application Note (ReadMe_ShaMise-v1.1.2.md: 1
    • 1.1.2, 2023-09-13, Infineon Technologies AG (confidential document) 31 / 34 Certification Report BSI-DSZ-CC-1206-V2-2024 C. Excerpts from the Criteria For the: 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh T11 Security Target”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, Version 2, 2024-09-02, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
  • TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) and Addendum to ETR for composite, Version V2, 2024-09-02, TÜV Informationstechnik GmbH: 1
  • AG Chipcard and Security Evaluation Documentation Life Cycle Support”, Infineon Technologies AG (confidential document) [12] 32-bit Security Controller – V11, Hardware Reference Manual, V6.2, 2020-12-21, Infineon: 1
  • Standards Compliance Verification”, Version 2, 2024-08-23, TÜV Informationstechnik GmbH (confidential document) [26] SLx3 (40 nm) Security Controllers Production and Personalization Manual Flash Loader V9 Field: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • 2, 2024-02-27, “EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY)”, TÜV Informationstechnik, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • the Product, Version 2, 2024- 02-27, “ETR for Composite Evaluation”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 0.4, 2024-01-25 (confidential document) [12] also: 1
  • Controller – V24), Hardware Reference Manual”, Version 5.0, 2023-12-11, Infineon Technologies AG (confidential document) [13] also referred to as [AGD_PRM], “TEGRION™ SLx2 security controller family, Programmer's: 1
  • Manual, SLx2_DFP”, Version 1.3.0, 2023-10-19, Infineon Technologies AG (confidential document) [14] also referred to as [AGD_SG], “SLC21, 32-bit Security Controller – V24, Security Guidelines: 1
  • 1.00-3001, 2023.07-26, Infineon Technologies AG (confidential document) [15] also referred to as [AGD_PPM], “SLC21 (32-bit Security Controller – V24), Production and: 1
  • manual, Flash Loader V10”, Version 10.01, 2023-06- 28, Infineon Technologies AG (confidential document) [16] also referred to as [AGD_CryptoUM], “Crypto2304T V4, User Manual”, Version 2.0, 2023-07-14: 1
  • Technologies AG (confidential document) [17] also referred to as [AGD_ES], “TEGRION™ SLC21 (32-bit Security Controller – V24) Errata sheet: 1
  • Version 3.0, 2024-01-09, Infineon Technologies AG (confidential document) [18] “SINGLE EVALUATION REPORT ADDENDUM to ETR-Part ADV Cryptographic Standards Compliance: 1
  • Version 4, 2024-02-27, TÜV Informationstechnik GmbH (confidential document) [19] also referred to as [AGD_CS], “CS-SLC21V24 CryptoSuite 32-bit Security Controller User: 1
  • manual”, Version 4.05.007, 2023-11-08, Infineon Technologies AG (confidential document) 7 See section 9.1 on usage of specific AIS. 30 / 34 BSI-DSZ-CC-1206-V2-2024 Certification Report: 1
  • Note (ReadMe_AsconMise-v1.1.3.md)”, Version 1.1.3, 2023-09-13, Infineon Technologies AG (confidential document) [21] also referred to as [AGD_SHA], “SHA256 MISE Application Note (ReadMe_ShaMise-v1.1.2.md: 1
  • 1.1.2, 2023-09-13, Infineon Technologies AG (confidential document) 31 / 34 Certification Report BSI-DSZ-CC-1206-V2-2024 C. Excerpts from the Criteria For the: 1
pdf_data/report_keywords/cipher_mode/CBC/CBC 4 1
pdf_data/report_keywords/cipher_mode/CCM/CCM 3 2
pdf_data/report_keywords/cipher_mode/CFB/CFB 2 1
pdf_data/report_keywords/cipher_mode/CTR/CTR 2 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/crypto_scheme/KA
  • Key agreement: 3
  • Key Agreement: 1
  • Key agreement: 2
pdf_data/report_keywords/crypto_scheme/KA/Key agreement 3 2
pdf_data/report_keywords/crypto_scheme/MAC/MAC 5 1
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 6 5
pdf_data/report_keywords/hash_function/SHA/SHA2
  • SHA-256: 2
  • SHA-224: 1
  • SHA-384: 1
  • SHA-512: 1
  • SHA256: 9
  • SHA-256: 3
  • SHA-2: 1
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-256 2 3
pdf_data/report_keywords/javacard_api_const
  • curves:
    • FRP256V1: 1
pdf_data/report_keywords/randomness/RNG/RNG 16 12
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • SPA: 4
    • DPA: 4
  • FI:
    • DFA: 4
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/side_channel_analysis/FI
  • DFA: 4
  • physical tampering: 1
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 1: 1
  • AIS 14: 1
  • AIS 19: 1
  • AIS 20: 2
  • AIS 25: 1
  • AIS 26: 1
  • AIS 27: 1
  • AIS 31: 2
  • AIS 32: 1
  • AIS 35: 3
  • AIS 36: 3
  • AIS 37: 1
  • AIS 38: 1
  • AIS 41: 1
  • AIS 46: 1
  • AIS 47: 1
  • AIS31: 4
  • AIS20: 5
  • AIS 34: 2
  • AIS 1: 1
  • AIS 14: 1
  • AIS 19: 1
  • AIS 20: 1
  • AIS 23: 1
  • AIS 25: 1
  • AIS 26: 1
  • AIS 27: 1
  • AIS 31: 2
  • AIS 32: 1
  • AIS 35: 2
  • AIS 36: 3
  • AIS 37: 1
  • AIS 38: 1
  • AIS 39: 1
  • AIS 41: 1
  • AIS 46: 1
  • AIS 47: 1
pdf_data/report_keywords/standard_id/BSI/AIS 20 2 1
pdf_data/report_keywords/standard_id/BSI/AIS 35 3 2
pdf_data/report_keywords/standard_id/FIPS
  • FIPS197: 3
  • FIPS186-4: 11
  • FIPS180-4: 7
  • FIPS PUB 186-4: 1
  • FIPS197: 4
  • FIPS186-4: 7
  • FIPS 186-4: 6
  • FIPS180-4: 4
  • FIPS 197: 1
  • FIPS PUB 180-4: 1
  • FIPS PUB 186-4: 1
pdf_data/report_keywords/standard_id/FIPS/FIPS180-4 7 4
pdf_data/report_keywords/standard_id/FIPS/FIPS186-4 11 7
pdf_data/report_keywords/standard_id/FIPS/FIPS197 3 4
pdf_data/report_keywords/standard_id/PKCS
  • PKCS #1: 16
  • PKCS#3: 2
  • PKCS #1: 6
  • PKCS#1: 3
pdf_data/report_keywords/standard_id/PKCS/PKCS #1 16 6
pdf_data/report_keywords/standard_id/RFC
  • RFC5639: 5
  • RFC 5639: 1
  • RFC5639: 2
pdf_data/report_keywords/standard_id/RFC/RFC5639 5 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • Triple-DES: 2
      • TDES: 2
      • TDEA: 1
  • constructions:
    • MAC:
      • CMAC: 3
  • AES_competition:
    • AES:
      • AES: 5
      • AES-: 1
  • LWC_competition:
    • ASCON:
      • ASCON: 4
      • Ascon: 1
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES
  • AES: 6
  • AES: 5
  • AES-: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 6 5
pdf_data/report_keywords/vendor/Infineon
  • Infineon Technologies AG: 23
  • Infineon: 3
  • Infineon Technologies AG: 15
  • Infineon: 1
  • Infineon Technologies: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 3 1
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 23 15
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationstechnik Federal Office for Information Security
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, PP-0084, Smart Card, IFX, Infineon" "Common Criteria, Certification, Zertifizierung, Smartcard, Security IC, Infineon Technologies AG"
pdf_data/report_metadata//Subject Common Criteria, Certification, Zertifizierung, PP-0084, Smart Card, IFX, Infineon Common Criteria, Certification, Zertifizierung, Smartcard, Security IC, Infineon Technologies AG
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-1107-V5-2024 Certification Report BSI-DSZ-CC-1206-V2-2024
pdf_data/report_metadata/pdf_file_size_bytes 942242 477448
pdf_data/report_metadata/pdf_number_of_pages 41 34
pdf_data/st_filename 1107V5b_pdf.pdf 1206V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 23 16
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 5 6
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 6 5
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 5 2
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 1 2
pdf_data/st_keywords/cc_claims/O
  • O.RND: 1
  • O.TDES: 2
  • O.AES: 2
  • O.RSA: 5
  • O.ECC: 5
  • O.AES-TDES-MAC: 5
  • O.HASH: 5
  • O.AES: 3
  • O.AES-CMAC: 4
  • O.FFC: 4
  • O.RSA: 4
  • O.ECC: 4
  • O.RND: 3
  • O.MISE: 4
pdf_data/st_keywords/cc_claims/O/O.AES 2 3
pdf_data/st_keywords/cc_claims/O/O.ECC 5 4
pdf_data/st_keywords/cc_claims/O/O.RND 1 3
pdf_data/st_keywords/cc_claims/O/O.RSA 5 4
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.5: 4
  • ADV_IMP.2: 2
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 6
  • ADV_IMP: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 2
  • ADV_ARC.1: 1
  • ADV_FSP.5: 4
  • ADV_FSP.4: 2
  • ADV_IMP.2: 2
  • ADV_IMP.1: 1
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 6 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 1
  • ALC_FLR.1: 4
  • ALC_CMC.5: 3
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS: 1
  • ALC_CMS.4: 1
  • ALC_CMC: 1
  • ALC_FLR: 1
  • ALC_FLR.1: 4
  • ALC_CMC.5: 3
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_CMS.4: 2
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL 4 3
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD 4 3
pdf_data/st_keywords/cc_sar/ASE/ASE_INT 14 10
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ 6 4
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ 36 30
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS 5 6
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.3: 2
  • ATE_DPT.3: 1
  • ATE_FUN.2: 1
  • ATE_IND.2: 1
  • ATE_COV: 1
  • ATE_COV.3: 2
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.2: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6+: 2
  • EAL6: 5
  • EAL 6: 2
  • EAL6 augmented: 2
  • EAL 6 augmented: 2
  • EAL6: 3
  • EAL 6: 2
  • EAL6 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL6 5 3
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented 2 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 4
  • FAU_SAS.1: 6
  • FAU_GEN: 1
  • FAU_SAS.1.1: 1
  • FAU_SAS.1: 4
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 6 4
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 37
  • FCS_COP: 40
  • FCS_CKM: 30
  • FCS_RNG.1: 23
  • FCS_CKM.1: 21
  • FCS_CKM.4: 20
  • FCS_COP.1: 14
  • FCS_CKM.2: 3
  • FCS_RNG: 26
  • FCS_COP: 51
  • FCS_CKM.4: 26
  • FCS_CKM: 22
  • FCS_RNG.1: 11
  • FCS_CKM.1: 20
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 5
  • FCS_CKM.2: 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 30 22
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 21 20
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 3 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 20 26
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 40 51
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 14 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 37 26
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 23 11
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC: 2
  • FDP_SDC.1: 5
  • FDP_SDI.2: 5
  • FDP_ITT.1: 4
  • FDP_IFC.1: 8
  • FDP_UCT.1: 10
  • FDP_UIT.1: 12
  • FDP_ACC: 13
  • FDP_ACF: 15
  • FDP_ACC.1: 18
  • FDP_ACF.1: 15
  • FDP_ITC.1: 18
  • FDP_ITC.2: 18
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 1
  • FDP_SDI.1: 1
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_SDC.1.1: 1
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_SDC.1: 5
  • FDP_SDI.2: 3
  • FDP_ACC: 14
  • FDP_ACF: 15
  • FDP_ITC.1: 20
  • FDP_ITC.2: 20
  • FDP_SDC.1.1: 1
  • FDP_SDI.1: 1
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITT.1: 6
  • FDP_IFC.1: 8
  • FDP_ACC.1: 6
  • FDP_ACF.1: 12
  • FDP_ACC.2: 1
  • FDP_UCT.1: 3
  • FDP_UIT.1: 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 13 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 18 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 15 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 18 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 18 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 4 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 5 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 10 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 12 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_API 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 7 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 7 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 6 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 3 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 16
  • FMT_LIM.1: 7
  • FMT_LIM.2: 6
  • FMT_MSA.1: 8
  • FMT_MSA.3: 11
  • FMT_SMF.1: 11
  • FMT_SMR.1: 16
  • FMT_MTD: 11
  • FMT_SMR: 8
  • FMT_SMF: 8
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 1
  • FMT_MSA: 21
  • FMT_SMF: 19
  • FMT_SMR: 14
  • FMT_LIM: 8
  • FMT_MTD: 9
  • FMT_LIM.1: 5
  • FMT_LIM.2: 5
  • FMT_MSA.3: 5
  • FMT_MSA.1: 4
  • FMT_SMR.1: 11
  • FMT_SMF.1: 5
  • FMT_MTD.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 16 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 7 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 6 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 8 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 11 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 11 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF 8 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 11 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 8 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 16 11
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST.2: 28
  • FPT_TST: 5
  • FPT_TST.1: 11
  • FPT_FLS.1: 7
  • FPT_PHP.3: 4
  • FPT_ITT.1: 4
  • FPT_FLS: 11
  • FPT_TST.2.1: 1
  • FPT_TST.1: 5
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FLS.1: 8
  • FPT_PHP.3: 12
  • FPT_ITT.1: 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 7 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 4 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 4 12
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 11 5
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 5 4
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 18
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 4
  • FTP_ITC.1: 5
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 18 5
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 4
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 3
  • CFB:
    • CFB: 4
  • ECB:
    • ECB: 7
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 3
  • CFB:
    • CFB: 3
  • CCM:
    • CCM: 3
pdf_data/st_keywords/cipher_mode/CBC/CBC 2 3
pdf_data/st_keywords/cipher_mode/CFB/CFB 4 3
pdf_data/st_keywords/cipher_mode/ECB/ECB 4 7
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 4
pdf_data/st_keywords/crypto_scheme/KA
  • Key Agreement: 1
  • Key agreement: 2
pdf_data/st_keywords/crypto_scheme/MAC/MAC 9 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • secp256k1: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 10
    • SHA2:
      • SHA-256: 4
      • SHA-2: 5
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 1
    • SHA2:
      • SHA256: 12
      • SHA-224: 1
      • SHA-384: 1
      • SHA-512: 1
      • SHA-256: 1
      • SHA-2: 3
      • SHA2: 1
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 10
  • SHA-1: 4
  • SHA1: 1
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 10 4
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 4
  • SHA-2: 5
  • SHA256: 12
  • SHA-224: 1
  • SHA-384: 1
  • SHA-512: 1
  • SHA-256: 1
  • SHA-2: 3
  • SHA2: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-2 5 3
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 4 1
pdf_data/st_keywords/javacard_api_const
  • curves:
    • FRP256V1: 2
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 2
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 53
    • RND: 2
  • RNG:
    • RND: 4
    • RNG: 41
pdf_data/st_keywords/randomness/RNG/RND 2 4
pdf_data/st_keywords/randomness/RNG/RNG 53 41
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 5
    • Physical Probing: 2
    • side channel: 1
    • SPA: 1
    • DPA: 2
  • FI:
    • Malfunction: 5
    • DFA: 2
  • SCA:
    • Leak-Inherent: 2
    • Physical Probing: 2
    • physical probing: 1
    • side-channel: 5
    • side channel: 1
  • FI:
    • Malfunction: 2
  • other:
    • JIL: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 5
  • DFA: 2
  • Malfunction: 2
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 5 2
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 5
  • Physical Probing: 2
  • side channel: 1
  • SPA: 1
  • DPA: 2
  • Leak-Inherent: 2
  • Physical Probing: 2
  • physical probing: 1
  • side-channel: 5
  • side channel: 1
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 5 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS31: 9
  • RFC:
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 14443: 6
    • ISO/IEC 18092: 4
    • ISO/IEC 14443-4: 1
    • ISO/IEC14443-3: 1
  • ICAO:
    • ICAO: 1
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 7
    • FIPS 180-4: 6
    • FIPS 186-4: 20
    • FIPS PUB 197: 1
  • NIST:
    • SP 800-38A: 5
    • SP 800-38B: 4
    • SP 800-56A: 3
    • SP 800-186: 2
    • SP 800-22: 3
    • SP 800-38C: 3
    • SP 800-108: 3
    • SP 800-90A: 4
    • NIST SP 800-186: 1
  • PKCS:
    • PKCS#3: 3
    • PKCS#1: 17
  • BSI:
    • AIS 31: 11
    • AIS 46: 3
    • AIS 20: 4
  • RFC:
    • RFC 5639: 3
    • RFC 7748: 1
  • ICAO:
    • ICAO: 4
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 9
  • AIS 31: 11
  • AIS 46: 3
  • AIS 20: 4
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 1
  • FIPS 197: 7
  • FIPS 180-4: 6
  • FIPS 186-4: 20
  • FIPS PUB 197: 1
pdf_data/st_keywords/standard_id/ICAO/ICAO 1 4
pdf_data/st_keywords/standard_id/RFC
  • RFC 5639: 1
  • RFC 5639: 3
  • RFC 7748: 1
pdf_data/st_keywords/standard_id/RFC/RFC 5639 1 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 19
  • DES:
    • DES:
      • DES: 2
    • 3DES:
      • TDES: 16
      • Triple-DES: 1
      • TDEA: 1
  • miscellaneous:
    • SM4:
      • SM4: 1
  • constructions:
    • MAC:
      • CMAC: 4
  • AES_competition:
    • AES:
      • AES: 30
  • LWC_competition:
    • ASCON:
      • Ascon: 4
      • ASCON: 5
  • miscellaneous:
    • SM4:
      • SM4: 1
  • constructions:
    • MAC:
      • CMAC: 6
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 19 30
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC 4 6
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/vendor/Infineon/Infineon 3 4
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 13 9
pdf_data/st_metadata None
  • pdf_file_size_bytes: 2179969
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 59
  • /Author: Urian Rainer (IFAG DSS SQM PS CERT)
  • /Keywords: Infineon
  • /Title: IFX_CCI_00068h Security Target
  • pdf_hyperlinks: mailto:[email protected], http://www.infineon.com/
dgst 8fc68a5019758001 bff164cedfe33f61