Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
AR-FR24 VERSION M.10
JISEC-CC-CRP-C0123
Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
BSI-DSZ-CC-0782-V2-2015
name AR-FR24 VERSION M.10 Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 07.10.2013 03.11.2020
not_valid_before 16.11.2007 03.11.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0123_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0123_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V2b_pdf.pdf
manufacturer Sharp Corporation Infineon Technologies AG
manufacturer_web https://sharp-world.com/ https://www.infineon.com/
security_level EAL3+, ADV_SPM.1 EAL6+, ALC_FLR.1
dgst a62ce002e7469a17 2d45405ac06dae61
heuristics/cert_id JISEC-CC-CRP-C0123 BSI-DSZ-CC-0782-V2-2015
heuristics/cert_lab [] BSI
heuristics/cpe_matches {} cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2017-15361
heuristics/direct_transitive_cves {} CVE-2017-15361
heuristics/indirect_transitive_cves {} CVE-2017-15361
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, APE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ADV_CMC.5, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 10 1.02.013, 1.01
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0956-2016, ANSSI-CC-2017/59, NSCIB-CC-15-77633-CR, ANSSI-CC-2017/09, ANSSI-CC-2016/81, ANSSI-CC-2017/08, ANSSI-CC-2016/64, BSI-DSZ-CC-0976-2015, ANSSI-CC-2016/70, KECS-ISIS-0676-2015, ANSSI-CC-2017/66, KECS-ISIS-0677-2015, BSI-DSZ-CC-0967-2016, BSI-DSZ-CC-0782-V3-2017, ANSSI-CC-2016/80, ANSSI-CC-2017/65, ANSSI-CC-2017/06, ANSSI-CC-2016/66, BSI-DSZ-CC-0938-2016, ANSSI-CC-2017/05, BSI-DSZ-CC-0968-2016
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0782-2012
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2019/04, KECS-ISIS-1139-2021, BSI-DSZ-CC-0956-2016, ANSSI-CC-2017/59, NSCIB-CC-15-77633-CR, BSI-DSZ-CC-0976-V3-2019, ANSSI-CC-2017/09, BSI-DSZ-CC-0976-V4-2021, BSI-DSZ-CC-1243-2024, ANSSI-CC-2017/05, ANSSI-CC-2017/08, ANSSI-CC-2016/81, KECS-ISIS-1113-2021, ANSSI-CC-2016/64, BSI-DSZ-CC-0976-2015, KECS-ISIS-1140-2021, ANSSI-CC-2018/22, ANSSI-CC-2016/70, BSI-DSZ-CC-0976-V2-2018, KECS-ISIS-0676-2015, ANSSI-CC-2017/66, ANSSI-CC-2017/74, KECS-ISIS-0677-2015, NSCIB-CC-196231-CR, BSI-DSZ-CC-0967-2016, NSCIB-CC-195748-CR, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27, ANSSI-CC-2016/80, ANSSI-CC-2017/65, ANSSI-CC-2017/06, ANSSI-CC-2016/66, BSI-DSZ-CC-0938-2016, BSI-DSZ-CC-0985-2018, BSI-DSZ-CC-0782-V5-2020, BSI-DSZ-CC-0987-2019, BSI-DSZ-CC-0782-V6-2024, BSI-DSZ-CC-0968-2016
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0123
  • certification_date: 01.11.2007
  • claim: EAL3+ ADV_SPM.1
  • enhanced:
    • assurance_level: EAL3+ADV_SPM.1
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0123_eimg.pdf
    • description: PRODUCT DESCRIPTION The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as “MFD”). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. As countermeasures against information leakage that residual image data in the MFD induce, the TOE has such security functions as cryptographic operation and data clear. The cryptographic operation function encrypts the image data of each fax job before spooled to the Flash memory in the MFD. The data clear function overwrites random or fixed values over the storage area that the spooled image data occupy when the MFD finishes or aborts each job of copy, printer, network scanner or fax functions.
    • evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
    • product: AR-FR24
    • product_type: IT Product (data protection function in Multi Function Device)
    • report_link: https://www.ipa.go.jp/en/security/c0123_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0123_est.pdf
    • toe_version: VERSION M.10
    • vendor: Sharp Corporation
  • expiration_date: 01.10.2013
  • supplier: Sharp Corporation
  • toe_japan_name: AR-FR24 VERSION M.10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0123_it7143.html
  • toe_overseas_name: AR-FR24 VERSION M.10
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2017/08, BSI-DSZ-CC-0967-2016, BSI-DSZ-CC-0976-2015, ANSSI-CC-2016/66, BSI-DSZ-CC-0956-2016, KECS-ISIS-0676-2015, NSCIB-CC-15-77633-CR, ANSSI-CC-2017/09, BSI-DSZ-CC-0938-2016, ANSSI-CC-2017/06, ANSSI-CC-2017/05, ANSSI-CC-2016/67, KECS-ISIS-0677-2015, BSI-DSZ-CC-0968-2016
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2017/08, BSI-DSZ-CC-0967-2016, BSI-DSZ-CC-0976-2015, ANSSI-CC-2016/66, ANSSI-CC-2016/67, BSI-DSZ-CC-0956-2016, KECS-ISIS-0676-2015, NSCIB-CC-15-77633-CR, ANSSI-CC-2017/09, BSI-DSZ-CC-0938-2016, ANSSI-CC-2017/06, ANSSI-CC-2017/05, KECS-ISIS-0677-2015, BSI-DSZ-CC-0968-2016
heuristics/protection_profiles {} f6d23054061d72ba
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/report_filename c0123_erpt.pdf 0782V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 SOGIS Recognition Agreement
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 conformant extended
    • cert_id: BSI-DSZ-CC-0782-V2-2015
    • cert_item: Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0123-01: 1
    • Certification No. C0123: 1
  • DE:
    • BSI-DSZ-CC-0782-2012: 2
    • BSI-DSZ-CC-0782-V2-2015: 25
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
    • EAL3 augmented: 2
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 10
    • EAL 5: 8
    • EAL 5+: 1
    • EAL 6: 8
    • EAL 6 augmented: 3
    • EAL 7: 4
    • EAL4: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_SPM.1: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 2
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 2
    • ADV_SPM: 1
    • ADV_SPM.1: 2
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 2
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 3
    • ALC_FLR.1: 6
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 3
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 2
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 2
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.OPERATOR: 1
  • T:
    • T.RECOVER: 1
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 27
    • Infineon Technologies: 9
    • Infineon Technologies AG: 20
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
    • Rijndael:
      • Rijndael: 2
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 3
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 25
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 3
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/ecc_curve
  • Brainpool:
    • brainpoolP160t1: 1
    • brainpoolP192r1: 2
    • brainpoolP192t1: 1
  • NIST:
    • P-192: 4
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 32
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • SPA: 3
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 18045:2005: 1
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 4
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS31: 2
    • AIS47: 1
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
    • FIPS180-4: 2
    • FIPS186-4: 5
    • FIPS197: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18092: 2
  • PKCS:
    • PKCS #1: 3
  • RFC:
    • RFC 5639: 1
    • RFC5639: 5
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • EC - SHA-2 - Toolbox, Version 1.5, 2013-08-08, Infineon Technologies AG (confidential document) [12] SLE 70 Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface, Version 1.02.013: 1
    • Including optional Software Libraries RSA - EC - SHA-2 – Toolbox, Version 0.3, 2015-10-13 (confidential document) [7] Security Target Lite M7892 B11 Recertification Including optional Software Libraries RSA - EC: 1
    • M7892 B11, Version 6, 2015-10-21, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) 10 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
    • M7892 B11, Version 7, 2015-10-21, TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] Configuration Management Scope M7892 B11 FW Update including optional Software Libraries RSA: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110526173838+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110526173917+09'00'
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 874958
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 24
pdf_data/st_filename c0123_est.pdf 0782V2b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-2012-MA-01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL6: 7
    • EAL6 augmented: 5
    • EAL6+: 4
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 4
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 12
    • ADV_HLD.1: 3
    • ADV_HLD.2: 2
    • ADV_RCR.1: 4
    • ADV_SPM.1: 13
  • AGD:
    • AGD_ADM.1: 9
    • AGD_USR.1: 5
  • ALC:
    • ALC_DVS.1: 4
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN: 1
    • ATE_FUN.1: 4
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_CMC.5: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 2
    • ADV_SPM: 1
    • ADV_SPM.1: 6
    • ADV_TDS: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 3
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 2
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 2
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 4
    • ALC_FLR.1: 12
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.3: 2
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 2
    • ATE_FUN.2: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 14
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 8
    • FCS_COP.1: 14
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_IFC.1: 3
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_SOS.1: 13
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 17
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 13
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 4
    • FMT_MSA.2: 17
    • FMT_MSA.2.1: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM: 1
    • FPT_RVM.1: 16
    • FPT_RVM.1.1: 1
  • FTP:
    • FTP_RVM.1: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 24
    • FCS_CKM.1: 34
    • FCS_CKM.2: 5
    • FCS_CKM.4: 24
    • FCS_COP: 58
    • FCS_COP.1: 28
    • FCS_RNG: 13
    • FCS_RNG.1: 28
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 16
    • FDP_ITC.1: 18
    • FDP_ITC.2: 18
    • FDP_ITT.1: 18
    • FDP_SDI.1: 18
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 16
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 3
    • FMT_LIM.1: 8
    • FMT_LIM.2: 8
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 20
    • FPT_ITT.1: 17
    • FPT_LIM.2: 1
    • FPT_PHP.3: 25
    • FPT_TST: 5
    • FPT_TST.1: 12
    • FPT_TST.2: 36
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A.OPERATOR: 5
  • O:
    • O.REMOVE: 8
    • O.RESIDUAL: 6
  • OE:
    • OE.ERASEALL: 3
    • OE.OPERATE: 3
  • T:
    • T.RECOVER: 6
  • O:
    • O.RND: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 10
    • Infineon Technologies: 17
    • Infineon Technologies AG: 8
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
    • Rijndael:
      • Rijndael: 4
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • 3DES:
      • 3DES: 17
      • TDES: 2
      • Triple-DES: 3
    • DES:
      • DES: 10
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 13
    • ECDH:
      • ECDH: 6
    • ECDSA:
      • ECDSA: 14
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 2
  • RSA:
    • RSA-2048: 1
    • RSA2048: 1
    • RSA4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 63
      • SHA-256: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 7
  • RNG:
    • RND: 2
    • RNG: 10
  • TRNG:
    • DTRNG: 1
    • TRNG: 12
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CFB:
    • CFB: 5
  • ECB:
    • ECB: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • K-163: 2
    • P-192: 4
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 11
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 7
    • Malfunction: 10
    • malfunction: 1
  • SCA:
    • DPA: 9
    • Leak-Inherent: 10
    • Physical Probing: 1
    • SPA: 1
    • side-channel: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 1: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
  • FIPS:
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
  • BSI:
    • AIS31: 9
    • AIS32: 5
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 3
  • ISO:
    • ISO/IEC 15496-2: 1
    • ISO/IEC 15496-3: 1
    • ISO/IEC 18092: 4
    • ISO/IEC 7816-3: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3447: 1
    • RFC 5639: 1
    • RFC3447: 11
pdf_data/st_metadata
  • /Author: K.Nakagawa
  • /Company: Sharp Corporation
  • /CreationDate: D:20110524153336+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /GTS_PDFXConformance: PDF/X-1a:2001
  • /GTS_PDFXVersion: PDF/X-1:2001
  • /ModDate: D:20110526172010+09'00'
  • /Producer: Acrobat Distiller 8.2.6 (Windows)
  • /Subject: AR-FR24
  • /Title: Security Target
  • /Trapped: /False
  • pdf_file_size_bytes: 748188
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
  • /Author: Hans-UlrichBuchmüller
  • /CreationDate: D:20151021145115+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Dresden, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0084, 90nm
  • /ModDate: D:20151021145115+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Common Criteria EAL6+ Security Target Lite
  • /Title: Public Security Target Lite
  • pdf_file_size_bytes: 1212364
  • pdf_hyperlinks: http://www.infineon.com/, http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 96
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different