This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon Smart Card IC (Security Controller) SLE66CX680PE / M1534-a14, SLE66CX360PE / M1536-a14, SLE66CX182PE / M1564-a14, SLE66CX480PE / M1565-a14 and SLE66CX482PE / M1577-a14 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and with specific IC dedicated software BSI-DSZ-CC-0628-2009 |
S3K250A /S3K232A /S3K212A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software ANSSI-CC-2017/13 |
|
---|---|---|
name | Infineon Smart Card IC (Security Controller) SLE66CX680PE / M1534-a14, SLE66CX360PE / M1536-a14, SLE66CX182PE / M1564-a14, SLE66CX480PE / M1565-a14 and SLE66CX482PE / M1577-a14 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and with specific IC dedicated software | S3K250A /S3K232A /S3K212A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software |
not_valid_before | 2009-12-03 | 2017-03-17 |
not_valid_after | 2019-09-01 | 2022-03-17 |
scheme | DE | FR |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0628b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_13en.pdf.pdf |
manufacturer | Infineon Technologies AG | Samsung Electronics Co., Ltd. |
manufacturer_web | https://www.infineon.com/ | https://www.samsung.com |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0628a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_13fr.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
state/report/pdf_hash | 475e5b754781e1dd3625b96136959050c2f99662ebb05e1966d59eb913cb3cab | 6b9f981765815edc941319d9d8eab39145f40f6257d99957c0ba317711e5292a |
state/report/txt_hash | fa072a2319ee6e0973ce20eefd34a8c85ad5b8563c4498e3a8be47456c0150ef | 8f5f7ff8ca34de9f10d96469c52f482ba199d1bec0b9a239a8aef41bd57945c9 |
state/st/pdf_hash | c6b4937774cfdc473131e3416f8055aede7258e6a1fc79994ac0c91ab4fbe94c | a95414ff2dc792d9d02eb7f2465173cf545d384fc4ce4da29a7bc3e03b09d525 |
state/st/txt_hash | a73b72b14097078609a7a35b4a6558bf6cdbd0af7801d1560c37af0ce85c2971 | 5a4852bb3483636e5c123e8eccdff17825aabd707250df52a0366a6540162148 |
heuristics/cert_id | BSI-DSZ-CC-0628-2009 | ANSSI-CC-2017/13 |
heuristics/cert_lab | BSI | CEA |
heuristics/extracted_versions | 1.1, 1.6, 1.0 | 32 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0663-2009 | ANSSI-CC-2018/14 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0437-2008 | ANSSI-CC-2017/11 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-0663-2009 | ANSSI-CC-2019/03, ANSSI-CC-2019/61, ANSSI-CC-2018/14, ANSSI-CC-2021/05 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0223-2003 | ANSSI-CC-2017/11 |
heuristics/scheme_data | None |
|
heuristics/st_references/directly_referencing | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0437-2008 | None |
heuristics/st_references/indirectly_referencing | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0437-2008 | None |
pdf_data/report_filename | 0628a_pdf.pdf | ANSSI-CC-2017_13fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM | 2 | 1 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 7 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 2 | 1 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 5 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 3 | 2 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 4 | 1 |
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 8 | 2 |
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | |
pdf_data/report_metadata//CreationDate | D:20091214091103+01'00' | |
pdf_data/report_metadata//Creator | Writer | PDFCreator Version 1.2.1 |
pdf_data/report_metadata//Keywords | Common Criteria, Certification, Infineon Smart Card IC (Security Controller), Infineon Techologies AG | |
pdf_data/report_metadata//ModDate | D:20091218102812+01'00' | |
pdf_data/report_metadata//Producer | StarOffice 9 | GPL Ghostscript 9.02 |
pdf_data/report_metadata//Subject | Common Criteria Certification | |
pdf_data/report_metadata//Title | Certification Report | ANSSI-CC-2017_13fr |
pdf_data/report_metadata/pdf_file_size_bytes | 1119851 | 240945 |
pdf_data/report_metadata/pdf_hyperlinks | https://www.bsi.bund.de, https://www.bsi.bund.de/ | |
pdf_data/report_metadata/pdf_number_of_pages | 40 | 18 |
pdf_data/st_filename | 0628b_pdf.pdf | ANSSI_cible2017_13en.pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 11 | 30 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 9 | 15 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 14 | 21 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 1 | 6 |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 1 | 6 |
pdf_data/st_keywords/cc_claims/T/T.RND | 1 | 5 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 4 | 7 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 4 | 2 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 4 | 2 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 5 | 6 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 2 | 1 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 4 | 12 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 51 | 26 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 7 | 4 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 31 | 17 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 53 | 21 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 15 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 14 | 21 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 25 | 13 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 24 | 13 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 3 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 17 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 15 | 8 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 4 | 28 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 4 | 32 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 15 | 12 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 9 | 6 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 6 | 22 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 3 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 7 | 20 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 6 | 17 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 3 | 2 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 3 | 11 |
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 1 | 3 |
pdf_data/st_keywords/cplc_data | |
|
pdf_data/st_keywords/crypto_scheme | |
|
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 | 1 | 2 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 | 1 | 2 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 | 1 | 2 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 2 | 11 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 15 | 26 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 3 | 13 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 10 | 8 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 10 | 23 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 2 | 4 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 2 | 5 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 10 | 5 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-3 | 1 | 6 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 1 | 6 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 11 | 10 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC | 4 | 2 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Steffen Heinkel | Windows 사용자 |
pdf_data/st_metadata//CreationDate | D:20091110124433 | D:20161126075616+09'00' |
pdf_data/st_metadata//Creator | Microsoft® Office Word 2007 | Microsoft® Word 2010 |
pdf_data/st_metadata//ModDate | D:20091110124433 | D:20161201203347+09'00' |
pdf_data/st_metadata//Producer | Microsoft® Office Word 2007 | Microsoft® Word 2010 |
pdf_data/st_metadata//Title | Security Target | ST_Klallam7_Ver1.1 |
pdf_data/st_metadata/pdf_file_size_bytes | 990609 | 1034685 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | |
pdf_data/st_metadata/pdf_is_encrypted | False | True |
pdf_data/st_metadata/pdf_number_of_pages | 62 | 110 |
dgst | 953026ce748ad946 | dd769c19a40d1a27 |