name |
FIN.X RTOS SE V4.0 |
Infineon Technologies Security Controller M7794 A12 / G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
IT |
DE |
status |
archived |
archived |
not_valid_after |
25.07.2022 |
07.09.2022 |
not_valid_before |
25.07.2017 |
08.09.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_finx_rtos_se_4_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0964V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/tds_finx_rtos_se_4_lite03.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0964V3b_pdf.pdf |
manufacturer |
MBDA Italia S.p.A. |
Infineon Technologies AG |
manufacturer_web |
https://www.mbda-systems.com/ |
https://www.infineon.com/ |
security_level |
EAL4+, ALC_FLR.1 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
9cb1663e606ec87b |
91eb802fd8ee6745 |
heuristics/cert_id |
OCSI/CERT/RES/06/2014/RC |
BSI-DSZ-CC-0964-V3-2017 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2017-15361 |
heuristics/direct_transitive_cves |
{} |
CVE-2017-15361 |
heuristics/indirect_transitive_cves |
{} |
CVE-2017-15361 |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
4.0 |
2.00.002, 1.02.013 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
OCSI/CERT/LEO/08/2021/RC |
BSI-DSZ-CC-0964-V4-2019 |
heuristics/report_references/directly_referencing |
OCSI/CERT/RES/03/2012/RC |
{} |
heuristics/report_references/indirectly_referenced_by |
OCSI/CERT/LEO/08/2021/RC |
ANSSI-CC-2020/85, BSI-DSZ-CC-0964-V4-2019, ANSSI-CC-2020/84, ANSSI-CC-2020/83, BSI-DSZ-CC-0964-V5-2021 |
heuristics/report_references/indirectly_referencing |
OCSI/CERT/RES/03/2012/RC |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
SERTIT-116 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
SERTIT-116 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
rc_finx_rtos_se_4_v1.0.pdf |
0964V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by AVA_VAN.5 and ALC_DVS.2
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0964-V3-2017
- cert_item: Infineon Technologies Security Controller M7794 A12 / G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
|
pdf_data/report_keywords/cc_cert_id |
- IT:
- OCSI/CERT/RES/03/2012/RC: 1
- OCSI/CERT/RES/06/2014/RC: 35
|
- DE:
- BSI-DSZ-CC-0964-V2-: 1
- BSI-DSZ-CC-0964-V2-2017: 2
- BSI-DSZ-CC-0964-V3-2017: 25
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL2: 1
- EAL4: 9
- EAL4+: 1
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 9
- EAL 5: 14
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_STG.3: 1
- FAU_STG.4: 1
- FCS:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 1
- Giesecke & Devrient: 1
- Infineon:
- Infineon: 3
- Infineon Technologies: 18
- Infineon Technologies AG: 22
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
- ECC:
- RSA:
- RSA-2048: 2
- RSA2048: 1
- RSA4096: 1
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 5
- physical tampering: 1
- SCA:
- DPA: 5
- SPA: 5
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 1
- AIS 23: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- AIS 46: 1
- AIS31: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- ISO/IEC 18092: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Controller Family SLE 70 Programmer’s Reference Manual, 2017-05-10, Infineon Technologies AG, (confidential document) [17] SLE 77 Controller Family Errata Sheet, Version 6.1, 2017-06-21, Infineon Technologies AG: 1
- Evaluation Technical Report for Composite Evaluation (ETR-COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 1.1, 2014-12-09, Configuration Management Scope M7794: 1
- M7794 A12/G12 Including optional software libraries RSA – EC - Toolbox”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0964-V3-2017, Version 2, 2017-08-28, Evaluation: 1
- Payment Applications Hardware Reference Manual, Version 1.1, 2011-11-02, Infineon Technologies AG, (confidential document) [14] AMM Advanced Mode for Mifare Compatible Technology Addendum to M7794 Hardware Reference: 1
- Report Summary, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9: 1
- Rev.1.1, Version 1.0, 2011-11-03, Infineon Technologies AG, (confidential document) [15] Option 2 for Fast Startup, 2014-11-20, Infineon Technologies AG, (confidential document) [16: 1
- Version 1.02.013, 2017-05-10, Infineon Technologies AG, (confidential document) [20] SLE77 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (2.00.002: 1
- Version 2.00.002, 2017-05-10, Infineon Technologies AG, (confidential document) [21] SLx 70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies: 1
- and G12 including optional Software Libraries RSA – EC – Toolbox (confidential document) [12] M7794 Security Guidelines, 2017-06-28, Infineon Technologies AG, (confidential document) [13: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) 27 / 42 Certification Report BSI-DSZ-CC-0964-V3-2017 This page is intentionally left blank. 28 : 1
- document) [18] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG, (confidential document) [19] SLE77 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (1.02.013: 1
|
pdf_data/report_metadata |
- /Author: ocsi
- /CreationDate: D:20170727120322+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20170727120322+02'00'
- /Producer: Microsoft® Word 2010
- /Title: Rapporto di Certificazione del prodotto “FIN.X RTOS SE V4.0”
- pdf_file_size_bytes: 805511
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20170920110235+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SmartCard, Security IC, Infineon Technologies AG, PP-0035"
- /ModDate: D:20170920112710+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0964-V3-2017
- pdf_file_size_bytes: 1146771
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
pdf_data/st_filename |
tds_finx_rtos_se_4_lite03.pdf |
0964V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 4
- EAL4 augmented: 2
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 4
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 5
- ASE_CCL.1: 1
- ASE_ECD: 5
- ASE_ECD.1: 1
- ASE_INT: 6
- ASE_INT.1: 1
- ASE_OBJ: 5
- ASE_OBJ.2: 1
- ASE_REQ: 20
- ASE_REQ.2: 1
- ASE_SPD: 6
- ASE_SPD.1: 1
- ASE_TSS: 5
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 3
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 17
- FCS_CKM.1: 64
- FCS_CKM.1.1: 7
- FCS_CKM.2: 16
- FCS_CKM.2.1: 2
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 1
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 24
- FCS_COP.1.1: 4
- FCS_COP.1.2: 1
- FCS_RNG_EXT.1: 1
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 3
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 2
- FDP_UIT.1: 7
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_AFL_EXT.1: 3
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 14
- FIA_SOS.1.1: 3
- FIA_UAU.1: 1
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 3
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 2
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FIA_USB.1: 12
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 17
- FMT_MOF.1.1: 2
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.2: 8
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 52
- FMT_MTD.1.1: 7
- FMT_REV.1: 25
- FMT_REV.1.1: 2
- FMT_SAE.1: 8
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 24
- FPT_FLS.1.1: 5
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.2: 7
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 2
- FTA_TAB.1: 8
- FTA_TAB.1.1: 2
- FTA_TAH.1: 8
- FTA_TAH.1.1: 2
- FTA_TAH.1.2: 2
- FTA_TAH.1.3: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 2
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 8
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 22
- FCS_CKM.2: 3
- FCS_CKM.4: 20
- FCS_COP: 31
- FCS_COP.1: 30
- FCS_RNG: 14
- FCS_RNG.1: 27
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 6
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITT.1: 4
- FDP_SDI.1: 12
- FDP_SDI.1.1: 1
- FDP_SDI.2: 12
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 2
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 3
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 12
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 5
- FPT_ITT.1: 4
- FPT_PHP.3: 4
- FPT_TST: 7
- FPT_TST.1: 11
- FPT_TST.2: 31
- FPT_TST.2.1: 1
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHUSER: 3
- A.CONNECT: 3
- A.DETECT: 4
- A.MANAGE: 3
- A.PEER_FUNC: 2
- A.PEER_MGT: 2
- A.PHYSICAL: 3
- A.TRAINEDUSER: 3
- O:
- O.ACCESS: 10
- O.ACCESS_HISTORY: 4
- O.AUDIT_GENERATION: 8
- O.AUDIT_PROTECTION: 5
- O.AUDIT_REVIEW: 5
- O.CRYPTO_MEDIA: 7
- O.CRYPTO_NET: 13
- O.DISCRETIONARY_ACCESS: 11
- O.DISCRETIONARY_USER_CONTROL: 7
- O.DISPLAY_BANNER: 3
- O.ENFORCEMENT: 3
- O.MANAGE: 19
- O.PROTECT: 13
- O.RESIDUAL_INFORMATION: 4
- O.RUNTIME: 8
- O.TRUSTED_CHANNEL: 6
- O.USER_AUTHENTICATION: 12
- O.USER_IDENTIFICATION: 5
- OE:
- OE.ADMIN: 1
- OE.INFO_PROTECT: 1
- OE.INSTALL: 1
- OE.MAINTENANCE: 1
- OE.PHYSICAL: 4
- OE.RECOVER: 1
- OE.TRUSTED: 6
- T:
- T.ASSETS_COMPROMISE: 7
- T.AUDIT_COMPROMISE: 4
- T.COMM: 4
- T.MASQUERADE: 3
- T.RESIDUAL_DATA: 2
- T.TSFDATA: 3
- T.TSFFUNC: 4
- T.UNATTENDED_SESSION: 2
- T.UNAUTHORIZED_ACCESS: 7
- T.UNIDENTIFIED_ACTIONS: 2
- T.USER: 5
- T.USERDATA: 3
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 3
- Infineon Technologies: 13
- Infineon Technologies AG: 12
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 11
- TDES: 6
- Triple-DES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 1
- RSA4096: 1
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 6
- Malfunction: 12
- malfunction: 1
- SCA:
- DPA: 6
- Leak-Inherent: 11
- Physical Probing: 2
- SPA: 4
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-2012-09-003: 1
- CCMB-2012-09-001: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 186-2: 1
- FIPS 186-4: 2
- FIPS PUB 186-2: 4
- FIPS PUB 186-4: 3
- FIPS140: 2
- FIPS186: 1
- FIPS186-2: 8
- FIPS186-3: 1
- FIPS186-4: 9
- RFC:
- RFC 2898: 2
- RFC 4252: 7
- RFC 4253: 6
- RFC 6668: 5
- RFC4253: 4
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- ISO:
- ISO/IEC 18092: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 97971: 2011: 1
- NIST:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users but cannot be used to store: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Author: Infineon Technologies AG
- /CreationDate: D:20170901105059+02'00'
- /Creator: Microsoft Word - M7794SecurityTargetLite.docx
- /Keywords: M7794, CC, EAL5+, smartcard, security controller
- /ModDate: D:20170901105059+02'00'
- /Producer: Nuance PDF Create 8
- /Title: Security Target Lite of M7794
- pdf_file_size_bytes: 1335680
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |