This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon Smart Card IC (Security Controller) SLE66CX680PE / M1534-a14, SLE66CX360PE / M1536-a14, SLE66CX182PE / M1564-a14, SLE66CX480PE / M1565-a14 and SLE66CX482PE / M1577-a14 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and with specific IC dedicated software BSI-DSZ-CC-0628-2009 |
Samsung S3FT9PF/ S3FT9PT/ S3FT9PS 16-bit ISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software (révision 0) ANSSI-CC-2018/25 |
|
---|---|---|
name | Infineon Smart Card IC (Security Controller) SLE66CX680PE / M1534-a14, SLE66CX360PE / M1536-a14, SLE66CX182PE / M1564-a14, SLE66CX480PE / M1565-a14 and SLE66CX482PE / M1577-a14 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and with specific IC dedicated software | Samsung S3FT9PF/ S3FT9PT/ S3FT9PS 16-bit ISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software (révision 0) |
not_valid_before | 2009-12-03 | 2018-07-18 |
not_valid_after | 2019-09-01 | 2023-07-18 |
scheme | DE | FR |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0628b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2018_25en.pdf |
manufacturer | Infineon Technologies AG | Samsung Electronics Co., Ltd. |
manufacturer_web | https://www.infineon.com/ | https://www.samsung.com |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0628a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018-25fr.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'PKI Secure Kernel Protection Profile 1.1', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/PKISKPP%20v1.1.pdf', 'pp_ids': None}) | |
state/report/pdf_hash | 475e5b754781e1dd3625b96136959050c2f99662ebb05e1966d59eb913cb3cab | 546ac1c39f09e9653b439b7ad16e930749d112f8254fc073f22b08cab48bc31e |
state/report/txt_hash | fa072a2319ee6e0973ce20eefd34a8c85ad5b8563c4498e3a8be47456c0150ef | 802576a1c2b72beb749fc8444bd513c578846d07ab2793ff8ec27491432661a5 |
state/st/pdf_hash | c6b4937774cfdc473131e3416f8055aede7258e6a1fc79994ac0c91ab4fbe94c | 290bb6a279776f2168a95831a4dce211646841e2cf944a6abcf3361220d02872 |
state/st/txt_hash | a73b72b14097078609a7a35b4a6558bf6cdbd0af7801d1560c37af0ce85c2971 | 77f3a3d89a049e12571d3fb9f98de169586187b5ac7d966a599c5b560f0e8821 |
heuristics/cert_id | BSI-DSZ-CC-0628-2009 | ANSSI-CC-2018/25 |
heuristics/cert_lab | BSI | CEA |
heuristics/extracted_versions | 1.1, 1.6, 1.0 | 0, 16 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0663-2009 | ANSSI-CC-2019/18 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0437-2008 | ANSSI-CC-2014/58 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-0663-2009 | ANSSI-CC-2019/18 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0223-2003 | ANSSI-CC-2013/23, ANSSI-CC-2014/58, ANSSI-CC-2014/37 |
heuristics/scheme_data | None |
|
heuristics/st_references/directly_referencing | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0437-2008 | None |
heuristics/st_references/indirectly_referencing | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0437-2008 | None |
pdf_data/report_filename | 0628a_pdf.pdf | anssi-cc-2018-25fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM | 2 | 1 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 7 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 2 | 1 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 5 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 3 | 2 |
pdf_data/report_keywords/cc_security_level/EAL/EAL6 | 3 | 1 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 4 | 1 |
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/crypto_engine | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 4 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS 34 | 3 | 1 |
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 8 | 2 |
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//CreationDate | D:20091214091103+01'00' | D:20180727164703+02'00' |
pdf_data/report_metadata//Creator | Writer | Acrobat PDFMaker 11 pour Word |
pdf_data/report_metadata//Keywords | Common Criteria, Certification, Infineon Smart Card IC (Security Controller), Infineon Techologies AG | ANSSI-CC-CER-F-07.026 |
pdf_data/report_metadata//ModDate | D:20091218102812+01'00' | D:20180730165817+02'00' |
pdf_data/report_metadata//Producer | StarOffice 9 | Adobe PDF Library 11.0 |
pdf_data/report_metadata//Subject | Common Criteria Certification | |
pdf_data/report_metadata//Title | Certification Report | |
pdf_data/report_metadata/pdf_file_size_bytes | 1119851 | 333511 |
pdf_data/report_metadata/pdf_hyperlinks | https://www.bsi.bund.de, https://www.bsi.bund.de/ | mailto:[email protected], http://www.ssi.gouv.fr/ |
pdf_data/report_metadata/pdf_number_of_pages | 40 | 17 |
pdf_data/st_filename | 0628b_pdf.pdf | anssi-cible-2018_25en.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 11 | 25 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 9 | 7 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 4 | 2 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 1 | 2 |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 1 | 5 |
pdf_data/st_keywords/cc_claims/T/T.RND | 1 | 5 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 4 | 7 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 4 | 2 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 4 | 2 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 5 | 6 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 2 | 1 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 4 | 12 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 51 | 26 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 7 | 4 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 31 | 14 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 53 | 24 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 15 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 14 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 25 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 24 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 3 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 17 | 1 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 4 | 24 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 4 | 28 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 15 | 12 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 16 | 13 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 9 | 6 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 6 | 21 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 3 | 15 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 7 | 20 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 6 | 17 |
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 1 | 3 |
pdf_data/st_keywords/cplc_data | |
|
pdf_data/st_keywords/crypto_engine | |
|
pdf_data/st_keywords/crypto_scheme | |
|
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 | 1 | 2 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 | 1 | 2 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 | 1 | 2 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 2 | 10 |
pdf_data/st_keywords/randomness/RNG/RNG | 8 | 3 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 4 | 5 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 15 | 27 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 3 | 11 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 10 | 9 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 10 | 23 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 2 | 4 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 4 | 8 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 10 | 4 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-3 | 1 | 6 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES | 22 | 6 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 11 | 9 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC | 4 | 2 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//CreationDate | D:20091110124433 | D:20180320160628+09'00' |
pdf_data/st_metadata//Creator | Microsoft® Office Word 2007 | Microsoft® Word 2010 |
pdf_data/st_metadata//ModDate | D:20091110124433 | D:20180730165828+02'00' |
pdf_data/st_metadata//Producer | Microsoft® Office Word 2007 | Microsoft® Word 2010 |
pdf_data/st_metadata//Title | Security Target | |
pdf_data/st_metadata/pdf_file_size_bytes | 990609 | 836157 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/ | |
pdf_data/st_metadata/pdf_number_of_pages | 62 | 68 |
dgst | 953026ce748ad946 | eeb88804be0df26e |