This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon Smart Card IC (Security Controller) SLE66CX680PE / M1534-a14, SLE66CX360PE / M1536-a14, SLE66CX182PE / M1564-a14, SLE66CX480PE / M1565-a14 and SLE66CX482PE / M1577-a14 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and with specific IC dedicated software BSI-DSZ-CC-0628-2009 |
S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software (Revision 1 & 2) ANSSI-CC-2019/22 |
|
---|---|---|
name | Infineon Smart Card IC (Security Controller) SLE66CX680PE / M1534-a14, SLE66CX360PE / M1536-a14, SLE66CX182PE / M1564-a14, SLE66CX480PE / M1565-a14 and SLE66CX482PE / M1577-a14 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and with specific IC dedicated software | S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software (Revision 1 & 2) |
not_valid_before | 2009-12-03 | 2019-05-13 |
not_valid_after | 2019-09-01 | 2024-05-13 |
scheme | DE | FR |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0628b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019-22fr.pdf |
manufacturer | Infineon Technologies AG | Samsung Electronics Co., Ltd. |
manufacturer_web | https://www.infineon.com/ | https://www.samsung.com |
security_level | EAL5+ | ASE_TSS.2, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0628a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019-22fr.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
state/report/pdf_hash | 475e5b754781e1dd3625b96136959050c2f99662ebb05e1966d59eb913cb3cab | bf4096c62e59769d5cadddc47f5135e3127d4e8a12e41a8b7e9260451b8ec6ed |
state/report/txt_hash | fa072a2319ee6e0973ce20eefd34a8c85ad5b8563c4498e3a8be47456c0150ef | d828d1eb1dcb295dadf75014efa2a41546865258b7d0af1c104e6ce1c2637bdf |
state/st/pdf_hash | c6b4937774cfdc473131e3416f8055aede7258e6a1fc79994ac0c91ab4fbe94c | bf4096c62e59769d5cadddc47f5135e3127d4e8a12e41a8b7e9260451b8ec6ed |
state/st/txt_hash | a73b72b14097078609a7a35b4a6558bf6cdbd0af7801d1560c37af0ce85c2971 | d828d1eb1dcb295dadf75014efa2a41546865258b7d0af1c104e6ce1c2637bdf |
heuristics/cert_id | BSI-DSZ-CC-0628-2009 | ANSSI-CC-2019/22 |
heuristics/cert_lab | BSI | CEA |
heuristics/extracted_sars | ATE_DPT.2, ADV_INT.1, ALC_TAT.2, ALC_DVS.2, AGD_ADM.1, ADV_FSP.3, ATE_COV.2, ALC_LCD.2, AVA_SOF.1, ATE_FUN.1, AVA_CCA.1, ATE_IND.2, ADV_HLD.3, ADV_IMP.2, AVA_MSU.3, ADV_SPM.3, AVA_VLA.4, AGD_USR.1, ADV_RCR.2, ADV_LLD.1 | ASE_TSS.2, AVA_VAN.5 |
heuristics/extracted_versions | 1.1, 1.6, 1.0 | 2, 16, 1 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0663-2009 | ANSSI-CC-2020/06 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0437-2008 | ANSSI-CC-2018/31 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-0663-2009 | ANSSI-CC-2020/06 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0223-2003 | ANSSI-CC-2016/01, ANSSI-CC-2016/65, ANSSI-CC-2014/20, ANSSI-CC-2015/60, ANSSI-CC-2014/84, ANSSI-CC-2018/31 |
heuristics/scheme_data | None |
|
heuristics/st_references/directly_referencing | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0437-2008 | ANSSI-CC-2018/31 |
heuristics/st_references/indirectly_referencing | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0437-2008 | ANSSI-CC-2018/31 |
pdf_data/report_filename | 0628a_pdf.pdf | anssi-cc-2019-22fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM | 2 | 1 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 2 | 1 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 3 | 2 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 4 | 1 |
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/crypto_engine | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 4 | 2 |
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 8 | 2 |
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | DUCLOS Charlene |
pdf_data/report_metadata//CreationDate | D:20091214091103+01'00' | D:20190624113019+02'00' |
pdf_data/report_metadata//Creator | Writer | Microsoft® Word 2010 |
pdf_data/report_metadata//Keywords | Common Criteria, Certification, Infineon Smart Card IC (Security Controller), Infineon Techologies AG | ANSSI-CC-CER-F-07.29 |
pdf_data/report_metadata//ModDate | D:20091218102812+01'00' | D:20190624113019+02'00' |
pdf_data/report_metadata//Producer | StarOffice 9 | Microsoft® Word 2010 |
pdf_data/report_metadata//Subject | Common Criteria Certification | S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software |
pdf_data/report_metadata//Title | Certification Report | ANSSI-CC-2019/22 |
pdf_data/report_metadata/pdf_file_size_bytes | 1119851 | 831150 |
pdf_data/report_metadata/pdf_hyperlinks | https://www.bsi.bund.de, https://www.bsi.bund.de/ | mailto:[email protected], http://www.ssi.gouv.fr/ |
pdf_data/report_metadata/pdf_number_of_pages | 40 | 17 |
pdf_data/st_filename | 0628b_pdf.pdf | anssi-cc-2019-22fr.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 11 | 1 |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_engine | |
|
pdf_data/st_keywords/eval_facility | |
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 11 | 2 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata//Author | Steffen Heinkel | DUCLOS Charlene |
pdf_data/st_metadata//CreationDate | D:20091110124433 | D:20190624113019+02'00' |
pdf_data/st_metadata//Creator | Microsoft® Office Word 2007 | Microsoft® Word 2010 |
pdf_data/st_metadata//Keywords | Public Security Target for Certification on level EAL5 augmented (EAL5+) | ANSSI-CC-CER-F-07.29 |
pdf_data/st_metadata//ModDate | D:20091110124433 | D:20190624113019+02'00' |
pdf_data/st_metadata//Producer | Microsoft® Office Word 2007 | Microsoft® Word 2010 |
pdf_data/st_metadata//Subject | CC EAL5+ Certification Security Target | S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software |
pdf_data/st_metadata//Title | Security Target | ANSSI-CC-2019/22 |
pdf_data/st_metadata/pdf_file_size_bytes | 990609 | 831150 |
pdf_data/st_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | |
pdf_data/st_metadata/pdf_number_of_pages | 62 | 17 |
dgst | 953026ce748ad946 | f0530d1f25533d1b |