This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software BSI-DSZ-CC-0926-V2-2017 |
Secure Element S3B512C/SC3512C (32-bit RISC Microcontroller) with optional AT1 Secure Library and Fingerprint Library including specific IC Dedicated software (Référence S3B512C_20210830) ANSSI-CC-2021/62 |
|
---|---|---|
name | Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software | Secure Element S3B512C/SC3512C (32-bit RISC Microcontroller) with optional AT1 Secure Library and Fingerprint Library including specific IC Dedicated software (Référence S3B512C_20210830) |
not_valid_before | 2017-09-05 | 2021-12-27 |
not_valid_after | 2022-09-04 | 2026-12-27 |
scheme | DE | FR |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926V2b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_62en.pdf |
status | archived | active |
manufacturer | Infineon Technologies AG | Samsung Electronics Co., Ltd. |
manufacturer_web | https://www.infineon.com/ | https://www.samsung.com |
security_level | EAL5+, AVA_VAN.5, ALC_DVS.2 | ASE_TSS.2, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926V2a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_62.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021-62.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
state/cert/convert_garbage | False | True |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | 4ecc748049ae8a48189faf5d1c323a576fa656b722de82e1e776c8fd437857bc |
state/cert/txt_hash | None | 1915bff64b1d19e91196e0486ce9d4d18427e061b65db7c69541044773c8a08f |
state/report/convert_garbage | False | True |
state/report/pdf_hash | 47d1c43c3c0419518362d0b36593364404f11ee1bb7cd9539527c5543af56f0a | 093f717327d8a707aa1aa8aa87737954b511ed95297b24444defaa6a045fb144 |
state/report/txt_hash | 1a2dcf79c2bc09342ddd70f531f2519726684ce51b9b39406980aab1a49ead20 | fbb45abffbaf99999ed1eed60ff33fb25a660076d78c41b9a7e3fdfcb813ab6f |
state/st/pdf_hash | f0d25e9cfff6b222d810b5200400fb73f540ea91ff49ba3d16c876c5d6ba6486 | c1e5e4083308119bab27cc3fb21f812e3c804c3aee569f42d6d4f50b82ffb6e3 |
state/st/txt_hash | 7532abfca18166fd13198b2d8d0d75bb5026e728ba21eb62f82f5115c6db62c8 | 6fcebf9b38a40c7b3f231f795f5321b92519d6ab0095d409083b58ec28382cc3 |
heuristics/cert_id | BSI-DSZ-CC-0926-V2-2017 | ANSSI-CC-2021/62 |
heuristics/cert_lab | BSI | None |
heuristics/cpe_matches | cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* | None |
heuristics/extracted_versions | 2.00.002, 1.02.013 | 32 |
heuristics/related_cves | CVE-2017-15361 | None |
heuristics/report_references/directly_referenced_by | None | ANSSI-CC-2021/62-R01 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0926-2014 | None |
heuristics/report_references/indirectly_referenced_by | None | ANSSI-CC-2022/63, ANSSI-CC-2021/62-R01 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013 | None |
heuristics/scheme_data | None |
|
pdf_data/cert_filename | None | certificat-anssi-cc-2021-62.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | 0926V2a_pdf.pdf | anssi-cc-2021_62.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 6 | 2 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 3 | 1 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN | 2 | 1 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 | 4 | 1 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/TRNG |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 4 | 1 |
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name/IBM |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationtechnik | [email protected] |
pdf_data/report_metadata//CreationDate | D:20170920071317+02'00' | D:20220107144838+01'00' |
pdf_data/report_metadata//Creator | Writer | Microsoft® Word 2019 |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, SmartCard, Infineon, Security Controller" | [ANSSI Crypto] |
pdf_data/report_metadata//ModDate | D:20170925104644+02'00' | D:20220107144838+01'00' |
pdf_data/report_metadata//Producer | LibreOffice 5.2 | Microsoft® Word 2019 |
pdf_data/report_metadata//Subject | Common Criteria Certification | [Nom du produit] |
pdf_data/report_metadata/pdf_file_size_bytes | 1186681 | 2387567 |
pdf_data/report_metadata/pdf_number_of_pages | 42 | 13 |
pdf_data/st_filename | 0926V2b_pdf.pdf | anssi-cible-cc-2021_62en.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 10 | 21 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 4 | 17 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 12 | 23 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 1 | 6 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 3 | 6 |
pdf_data/st_keywords/cc_claims/T/T.RND | 3 | 5 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 2 | 5 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 | 4 | 3 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 9 | 2 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 11 | 5 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 3 | 1 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 3 | 1 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 5 | 8 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 8 | 12 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 8 | 21 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 22 | 32 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 3 | 6 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 20 | 22 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 31 | 51 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 30 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 14 | 17 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 26 | 14 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 19 | 24 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 15 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 6 | 27 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 14 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 14 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 4 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 12 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 12 | 8 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 3 | 22 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 5 | 28 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 5 | 32 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 14 | 12 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 15 | 16 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 11 | 9 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 5 | 22 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 4 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 4 | 20 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 5 | 17 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 6 | 4 |
pdf_data/st_keywords/cplc_data | |
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 2 | 3 |
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 | 10 | 2 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 | 10 | 6 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 6 | 11 |
pdf_data/st_keywords/randomness/RNG/RNG | 9 | 8 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 6 | 1 |
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 6 | 4 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 12 | 26 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 1 | 11 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 6 | 8 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 10 | 23 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 2 | 4 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 1 | 3 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 17 | 42 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 5 | 13 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 1 | 6 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 3 | 8 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Steffen Heinkel | Windows 사용자 |
pdf_data/st_metadata//CreationDate | D:20170804113341+02'00' | D:20210902112715+09'00' |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Microsoft® Word 2016 |
pdf_data/st_metadata//ModDate | D:20170804113341+02'00' | D:20210902112715+09'00' |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Microsoft® Word 2016 |
pdf_data/st_metadata//Title | Public Security Target Lite | ST_Klallam7_Ver1.1 |
pdf_data/st_metadata/pdf_file_size_bytes | 1016215 | 3516568 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.bsi.bund.de/, http://www.infineon.com/ | http://www.ecc-brainpool.org/, http://www.samsungsemi.com/, mailto:[email protected] |
pdf_data/st_metadata/pdf_number_of_pages | 75 | 112 |
dgst | a6b4ebcac512f88e | 8d798205eaf3159d |