Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
BSI-DSZ-CC-0926-V2-2017
Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
BSI-DSZ-CC-0827-V2-2014
name Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
not_valid_before 2017-09-05 2014-04-30
not_valid_after 2022-09-04 2019-09-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2a_pdf.pdf
state/report/pdf_hash 47d1c43c3c0419518362d0b36593364404f11ee1bb7cd9539527c5543af56f0a 73e1e36ac72df9017049ff5ab8e33e80dd1e25214a4ec4a8af40d094af3f3357
state/report/txt_hash 1a2dcf79c2bc09342ddd70f531f2519726684ce51b9b39406980aab1a49ead20 8f78cd6183c4d8f47c68b63a8435382a0a4267dea897d90aa83107a82140d853
state/st/pdf_hash f0d25e9cfff6b222d810b5200400fb73f540ea91ff49ba3d16c876c5d6ba6486 36c632f0e7e97ad990a45b8a94dfa9f36d1535b9b87537d8da20ce9156ae76fe
state/st/txt_hash 7532abfca18166fd13198b2d8d0d75bb5026e728ba21eb62f82f5115c6db62c8 91b00be9da132d9f06300e5b6e13f667a810a9760bfb8e06324d9d0aaa59034d
heuristics/cert_id BSI-DSZ-CC-0926-V2-2017 BSI-DSZ-CC-0827-V2-2014
heuristics/cpe_matches cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* None
heuristics/extracted_versions 2.00.002, 1.02.013 1.01.0008, 1.03.006
heuristics/related_cves CVE-2017-15361 None
heuristics/report_references/directly_referenced_by None BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-2014
heuristics/report_references/directly_referencing BSI-DSZ-CC-0926-2014 BSI-DSZ-CC-0827-2013
heuristics/report_references/indirectly_referenced_by None CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1069-2018, ANSSI-CC-2019/38, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V7-2018
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013 BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012
pdf_data/report_filename 0926V2a_pdf.pdf 0827V2a_pdf.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0926-V2-2017
  • cert_item: Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
  • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0827-V2-2014
  • cert_item: Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0926-V2-2017 BSI-DSZ-CC-0827-V2-2014
pdf_data/report_frontpage/DE/cert_item Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 6 5
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDH/ECDH 1 3
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 4 7
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 1 2
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA4096 1 2
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0926-V2-2017: 25
  • BSI-DSZ-CC-0926-2014: 3
  • BSI-DSZ-CC-0827-V2-2014: 23
  • BSI-DSZ-CC-0827-2013: 3
  • BSI-DSZ-CC-S-0023-2013: 1
  • BSI-DSZ-CC-S-0015-2012: 1
pdf_data/report_keywords/cc_claims/O/O.C 1 2
pdf_data/report_keywords/cc_claims/R/R.O 1 2
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0035-2007: 2
  • BSI-CC-PP- 0035-2007: 1
  • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0035-2007 2 4
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.5 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.2 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.4 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 3 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 14
  • EAL 4: 9
  • EAL 1: 7
  • EAL 2: 4
  • EAL 5+: 1
  • EAL 6: 4
  • EAL 3: 4
  • EAL 7: 4
  • EAL 5 augmented: 3
  • EAL 5: 8
  • EAL 4: 2
  • EAL1: 7
  • EAL4: 7
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL 5 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 9 2
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 14 8
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • A12 and G12 Including optional Software Libraries RSA - EC - Toolbox”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0926-V2-2017, Version 3, 2017-08-28, “Evaluation: 1
  • Report (ETR Sumamry)”, TÜV Informationstechnik GmbH, (confidential document) 8 specifically • AIS 19, Version 9, Anwendungshinweise und Interpretationen zum Schema (AIS) • AIS: 1
  • 3, 2017-08-28, “Evaluation Technical Report for Composite Evaluation”, TÜV Informationstechnik (confidential document) [11] “Configuration Management Scope M7793 A12 and G12 including optional Software Libraries RSA –: 1
  • – Toolbox”, Version 1.3, 2013-11-11, Infineon Technologies AG (confidential document) [12] M7793 Security Guidelines User’s Manual, 2017-06-28, Infineon Technologies AG (confidential: 1
  • 13] M7790 & M7793 Hardware Reference Manual, Version 1.2, 2014-09-05, Infineon Technologies AG (confidential document) [14] 16-bit Security Controller Family SLE 70 Programmer’s Reference Manual, Version 9.5: 1
  • Infineon Technologies AG (confidential document) [15] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG (confidential document) [16: 1
  • / ECC / Toolbox User Interface (1.02.013), Version 1.02.013, 2017-05-10, Infineon Technologies AG (confidential document) [17] SLE77 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (2.00.002: 1
  • Version 2.00.002, 2017-05-10, Infineon Technologies AG (confidential document) [18] SLx 70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies: 1
  • confidential document) [19] SLE 77 Controller Family Errata Sheet, Version 6.1, 2017-06-21, Infineon Technologies AG: 1
  • Software Libraries RSA - EC – Toolbox – FTL, Version 1.6, 2014-02-21, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900 A22 and G11 including optional Software Libraries RSA – EC –: 1
  • the M9900 A22 and G11 with Crypto Libraries, Version 4, 2014-04-02, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M9900 A21, Version 4, 2014-04-02: 1
  • Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
  • optional Software Libraries RSA - EC – Toolbox – FTL, Version 0.6, 2014-01-27, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006),2012-08-16: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 3
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 29
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-192: 4
    • K-163: 2
pdf_data/report_keywords/randomness/RNG/RNG 2 3
pdf_data/report_keywords/randomness/TRNG/TRNG 2 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 34: 2
    • AIS 31: 2
    • AIS 36: 3
    • AIS 35: 2
    • AIS 19: 1
    • AIS 14: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 37: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
  • FIPS:
    • FIPS186-4: 4
    • FIPS197: 3
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • BSI:
    • AIS32: 1
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 36: 3
    • AIS31: 2
    • AIS 35: 2
    • AIS 20: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 2
  • RFC:
    • RFC5639: 5
    • RFC 5639: 1
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS 35: 2
  • AIS 19: 1
  • AIS 14: 1
  • AIS 23: 1
  • AIS 25: 1
  • AIS 26: 1
  • AIS 32: 1
  • AIS 37: 1
  • AIS 38: 1
  • AIS32: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 3
  • AIS 36: 3
  • AIS31: 2
  • AIS 35: 2
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 2
pdf_data/report_keywords/standard_id/BSI/AIS 25 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 26 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 31 2 3
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 5 8
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 2
  • 3DES: 1
  • Triple-DES: 3
  • TDES: 3
  • TDEA: 1
  • 3DES: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 2 3
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 4 3
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7148: 1
  • BSI TR-02102: 1
  • BSI 7125: 2
  • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies: 18
    • Infineon Technologies AG: 21
    • Infineon: 4
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 1
  • Infineon:
    • Infineon Technologies: 17
    • Infineon Technologies AG: 21
    • Infineon: 5
pdf_data/report_keywords/vendor/Infineon/Infineon 4 5
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 18 17
pdf_data/report_metadata//Author Bundesamt für Sicherheit in der Informationtechnik Bundesamt für Sicherheit in der Informationstechnik
pdf_data/report_metadata//CreationDate D:20170920071317+02'00' D:20140519170621+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, SmartCard, Infineon, Security Controller" "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20170925104644+02'00' D:20140519171035+02'00'
pdf_data/report_metadata//Producer LibreOffice 5.2 LibreOffice 3.6
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0926-V2-2017 Certification Report BSI-DSZ-CC-0827-V2-2014
pdf_data/report_metadata/pdf_file_size_bytes 1186681 1267084
pdf_data/report_metadata/pdf_number_of_pages 42 44
pdf_data/st_filename 0926V2b_pdf.pdf 0827V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 10 20
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 4 6
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 12 14
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 4 5
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 1 2
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 1 2
pdf_data/st_keywords/cc_claims/O/O.RND 3 1
pdf_data/st_keywords/cc_claims/T/T.RND 3 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 4 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_CMS: 1
  • ALC_CMS.4: 1
  • ALC_DVS.1: 1
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 3
  • ALC_CMS: 1
  • ALC_TAT: 1
  • ALC_CMS.4: 1
  • ALC_TAT.1: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 1 3
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 4
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 1 4
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 3 4
pdf_data/st_keywords/cc_security_level/EAL/EAL5 5 7
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 3
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS 5 4
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 8 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 8 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 22 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 3 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 20 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 31 47
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 30 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 14 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 26 30
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 19
  • FDP_ACF.1: 15
  • FDP_SDI.1: 12
  • FDP_SDI.2: 12
  • FDP_ITT.1: 4
  • FDP_IFC.1: 6
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 14
  • FDP_ITC.2: 14
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_ACC.1: 23
  • FDP_ACF.1: 20
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ITT.1: 13
  • FDP_IFC.1: 10
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 17
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_PHP.3: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 19 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 15 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 6 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 14 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 14 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 4 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 12 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 12 15
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 14
  • FMT_MSA.3: 15
  • FMT_SMF.1: 11
  • FMT_LIM: 3
  • FMT_LIM.1: 5
  • FMT_LIM.2: 5
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 3
  • FMT_MSA.1: 18
  • FMT_MSA.3: 19
  • FMT_SMF.1: 15
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 5 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 14 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 15 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 11 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST: 7
  • FPT_TST.2: 31
  • FPT_TST.1: 11
  • FPT_FLS.1: 5
  • FPT_PHP.3: 4
  • FPT_ITT.1: 4
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_TST: 7
  • FPT_TST.2: 36
  • FPT_TST.1: 11
  • FPT_FLS.1: 16
  • FPT_PHP.3: 14
  • FPT_ITT.1: 13
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_FLS: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 5 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 4 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 4 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 31 36
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 5 8
pdf_data/st_keywords/cipher_mode/CBC/CBC 4 7
pdf_data/st_keywords/cipher_mode/ECB/ECB 6 7
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 6
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
  • KA:
    • Key Agreement: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 4
    • K-163: 2
pdf_data/st_keywords/hash_function/MD/MD5/MD5 10 47
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 10 47
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 10 47
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 6
  • PRNG:
    • PRNG: 5
  • RNG:
    • RND: 6
    • RNG: 9
  • TRNG:
    • TRNG: 14
  • RNG:
    • RNG: 11
    • RND: 2
pdf_data/st_keywords/randomness/RNG/RND 6 2
pdf_data/st_keywords/randomness/RNG/RNG 9 11
pdf_data/st_keywords/randomness/TRNG/TRNG 6 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • side channel: 1
    • SPA: 4
    • DPA: 6
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 6
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 6
    • Side-channel: 1
    • SPA: 6
    • DPA: 7
    • Timing Attack: 1
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI/DFA 6 7
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 10
  • Physical Probing: 2
  • side channel: 1
  • SPA: 4
  • DPA: 6
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 6
  • Side-channel: 1
  • SPA: 6
  • DPA: 7
  • Timing Attack: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 6 7
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 4 6
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 1 6
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • NIST:
    • SP 800-38A: 1
  • BSI:
    • AIS31: 3
  • RFC:
    • RFC3447: 4
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 97971: 2011: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 197: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • RFC:
    • RFC3447: 11
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 3
  • AIS31: 5
  • AIS32: 4
pdf_data/st_keywords/standard_id/BSI/AIS31 3 5
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 1 2
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816-3: 1
  • ISO/IEC 97971: 2011: 1
  • ISO/IEC 7816-3: 1
pdf_data/st_keywords/standard_id/RFC/RFC3447 4 11
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 17
  • DES:
    • DES:
      • DES: 3
    • 3DES:
      • 3DES: 9
      • TDES: 5
      • Triple-DES: 1
      • TDEA: 1
  • constructions:
    • MAC:
      • CBC-MAC: 5
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • 3DES: 17
      • Triple-DES: 2
      • TDES: 4
      • TDEA: 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 17 27
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 9 17
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA 1 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 5 4
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 2
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 3 5
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/vendor/Infineon/Infineon 3 6
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 12 7
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 16 20
pdf_data/st_metadata//Author Steffen Heinkel Jürgen Noller
pdf_data/st_metadata//CreationDate D:20170804113341+02'00' D:20140305150457Z
pdf_data/st_metadata//Creator Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Keywords M7793, EAL5+, attack potential high, AVA_VAN.5 Dresden, TSMC, Infineon, RSA, Eliptic Curve, Library, multi interface, high end security controler, ARM CPU, ARM Core, robust, CCv3.1, EAL5+, secure controller, EAL5+, augmented, high attack potential, AVA_VAN.5, PP0035
pdf_data/st_metadata//ModDate D:20170804113341+02'00' D:20140520092728+02'00'
pdf_data/st_metadata//Producer Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Subject Security Target Lite M7793 Security Target Lite A22 and G11
pdf_data/st_metadata//Title Public Security Target Lite Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 1016215 964080
pdf_data/st_metadata/pdf_number_of_pages 75 84
dgst a6b4ebcac512f88e 5d83a59f8c44527c