Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware)
BSI-DSZ-CC-0879-V2-2015
Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software
BSI-DSZ-CC-0946-V2-2015
name Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware) Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software
not_valid_before 2015-11-13 2015-11-23
not_valid_after 2020-11-13 2020-11-23
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946V2b_pdf.pdf
security_level ALC_FLR.1, EAL6+ EAL5+, AVA_VAN.5, ALC_DVS.2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946V2a_pdf.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 3, 15), 'maintenance_title': 'Infineon Technologies AG Smartcard IC (Security Controller) M5072 G11 including optional Software Libraries RSA-EC-Toolbox', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946V2ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946V2ma1b_pdf.pdf'})
state/report/pdf_hash da11b379dff81087d1d15bd3009d5d6ed7fc2ecff81ec38dae827add9897112e 98457c545d96397f32eafdd8a8ed4884329787bc32f76c114aba179cb7dd21b5
state/report/txt_hash 59d7022a2ff2aac725e9c9450a279e8b767ea58b1c12f54f28d1a8ea3fcbbb4b 281eb51371b5af907a08bb9be3546418e7ae67b05e5c7858903665feaaef0e32
state/st/pdf_hash 65e7dd8d8eaa553369685ed7609af0e6e1a00b1d3de17e8c834f0280d6f55653 c89fc2d802ddb7704de4203d1df861e041ef54816f06d7aea197fa0503806929
state/st/txt_hash 60544dc1659f382805f1b901c8eb922808bbbe404f54d157625d34da25632db8 1da79870e1537c94d00cfb470a65937536503647a284bb89343450be17488fcc
heuristics/cert_id BSI-DSZ-CC-0879-V2-2015 BSI-DSZ-CC-0946-V2-2015
heuristics/report_references/directly_referenced_by ANSSI-CC-2017/09, ANSSI-CC-2017/08, ANSSI-CC-2016/67, BSI-DSZ-CC-0879-V3-2018, ANSSI-CC-2016/70 BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60
heuristics/report_references/directly_referencing BSI-DSZ-CC-0879-2014 BSI-DSZ-CC-0946-2014
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0879-V5-2022, BSI-DSZ-CC-1071-2019, ANSSI-CC-2018/22, ANSSI-CC-2017/08, ANSSI-CC-2017/09, BSI-DSZ-CC-0879-V3-2018, ANSSI-CC-2016/67, BSI-DSZ-CC-1071-V6-2023, BSI-DSZ-CC-1071-V4-2020, BSI-DSZ-CC-1071-V5-2021, BSI-DSZ-CC-1071-V3-2020, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-1084-2019, BSI-DSZ-CC-1071-V7-2023, ANSSI-CC-2016/70 BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2019/38, ANSSI-CC-2016/60
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0879-2014 BSI-DSZ-CC-0791-2012, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0946-2014
heuristics/st_references/directly_referenced_by ANSSI-CC-2016/67, ANSSI-CC-2016/66, ANSSI-CC-2017/08, ANSSI-CC-2017/09 ANSSI-CC-2019/38
heuristics/st_references/directly_referencing BSI-DSZ-CC-0782-2012 None
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2016/67, ANSSI-CC-2016/66, ANSSI-CC-2017/08, ANSSI-CC-2017/09 ANSSI-CC-2019/38
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0758-2012 None
pdf_data/report_filename 0879V2a_pdf.pdf 0946V2a_pdf.pdf
pdf_data/report_frontpage/DE/cc_security_level Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 SOGIS Recognition Agreement Common Criteria Part 3 conformant EAL 5 augmented by AVA_VAN.5 and ALC_DVS.2 SOGIS Recognition Agreement
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0879-V2-2015 BSI-DSZ-CC-0946-V2-2015
pdf_data/report_frontpage/DE/cert_item Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 2
    • RSA4096: 2
    • RSA-2048: 1
  • ECC:
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
    • ECC:
      • ECC: 7
  • RSA:
    • RSA2048: 2
    • RSA4096: 2
  • ECC:
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
    • ECC:
      • ECC: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 7 4
pdf_data/report_keywords/asymmetric_crypto/RSA
  • RSA2048: 2
  • RSA4096: 2
  • RSA-2048: 1
  • RSA2048: 2
  • RSA4096: 2
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0879-V2-2015: 23
  • BSI-DSZ-CC-0879-2014: 3
  • BSI-DSZ-CC-0946-V2-2015: 23
  • BSI-DSZ-CC-0946-2014: 3
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP.2 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.2 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.3 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM.1 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.4 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.5 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.4 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 3 7
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 6 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 3 1
pdf_data/report_keywords/cc_sar/ATE/ATE_COV.3 2 1
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN.2 2 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 2 6
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 6: 8
  • EAL 5: 10
  • EAL 4: 9
  • EAL 1: 7
  • EAL 2: 4
  • EAL 5+: 1
  • EAL6: 1
  • EAL6+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL 6 augmented: 3
  • EAL6 augmented: 1
  • EAL 5: 14
  • EAL 4: 9
  • EAL 1: 7
  • EAL 2: 4
  • EAL5+: 1
  • EAL6: 1
  • EAL 3: 4
  • EAL 6: 3
  • EAL 7: 4
  • EAL 5 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 10 14
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 8 3
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • B11 - Including optional Software Libraries RSA - EC - SHA-2 - Toolbox, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, 2, 2015-10-30, ETR Summary, TÜV Informationstechnik: 1
  • B11, 2, 2015-10-30, Evaluation Technical Report for Composite Evaluation, TÜV Informationstechnik (confidential document) [11] Configuration Management Scope ALC Maintenance for Common Criteria with Evaluation Assurance: 1
  • Software Libraries RSA - EC - SHA-2 – Toolbox, Version 0.4, 2014-10-20, Infineon Technologies AG (confidential document) [12] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (v1.03: 1
  • and certification procedure is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the product or resulting from the evaluation and certification: 1
  • optional Software Libraries RSA - EC – Toolbox, Version 0.3, 2015-09-28, Infineon Technologies AG (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
  • for the M5072 G11 with Crypto Libraries, Version 6, 2015-11-02, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M5072 G11, Version 6, 2015-11-02: 1
  • Informationstechnik GmbH (confidential document) 8 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
  • optional Software Libraries RSA - EC – ToolboxL, Version 0.3, 2015-09-28, Infineon Technologies AG (confidential document) [12] M5072 Security Guidelines User’s Manual, 2015-08-25, Infineon Technologies AG [13] SLE 97: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-2: 25
pdf_data/report_keywords/randomness/TRNG/TRNG 1 4
pdf_data/report_keywords/side_channel_analysis/FI/DFA 5 6
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • SPA: 5
  • DPA: 5
  • physical probing: 1
  • side channel: 1
  • SPA: 5
  • DPA: 6
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 5 6
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 4
  • AIS 36: 3
  • AIS31: 2
  • AIS 35: 2
  • AIS 14: 1
  • AIS 19: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 2
  • AIS31: 4
  • AIS32: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 4
  • AIS 36: 3
  • AIS 35: 2
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 1
pdf_data/report_keywords/standard_id/BSI/AIS31 2 4
pdf_data/report_keywords/standard_id/BSI/AIS47 2 1
pdf_data/report_keywords/standard_id/FIPS
  • FIPS186-4: 5
  • FIPS197: 2
  • FIPS180-4: 3
  • FIPS PUB 180-4: 1
  • FIPS PUB 186-4: 1
  • FIPS186-4: 4
  • FIPS197: 3
  • FIPS 186-4: 1
  • FIPS PUB 186-4: 1
pdf_data/report_keywords/standard_id/FIPS/FIPS186-4 5 4
pdf_data/report_keywords/standard_id/FIPS/FIPS197 2 3
pdf_data/report_keywords/standard_id/PKCS
  • PKCS #1: 2
  • PKCS #1: 2
  • PKCS#1: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 7 9
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES 2 3
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7148: 1
  • BSI TR-02102: 1
  • BSI 7138: 2
  • BSI 7125: 2
  • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 14 4
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 11 16
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 20 21
pdf_data/report_metadata//CreationDate D:20151123092937+01'00' D:20151207102520+01'00'
pdf_data/report_metadata//Keywords "BSI-DSZ-CC-0879-V2, Common Criteria, Certification, Zertifizierung, SmartCard IC, Sicherheits-IC" "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software, Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20151123103448+01'00' D:20151207110731+01'00'
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0879-V2-2015 Certification Report BSI-DSZ-CC-0946-V2-2015
pdf_data/report_metadata/pdf_file_size_bytes 1368683 1407969
pdf_data/st_filename 0879V2b_pdf.pdf 0946V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 13 20
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 18 14
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 6 5
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 1 2
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 1 2
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-2012: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 1 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.5: 3
  • ADV_IMP.2: 2
  • ADV_INT.3: 2
  • ADV_TDS.5: 3
  • ADV_SPM.1: 6
  • ADV_IMP: 1
  • ADV_IMP.1: 2
  • ADV_INT: 1
  • ADV_INT.2: 3
  • ADV_FSP: 1
  • ADV_FSP.4: 4
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_TDS.4: 2
  • ADV_CMC.5: 1
  • ADV_ARC.1: 2
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 4 1
pdf_data/st_keywords/cc_sar/ADV/ADV_INT.2 3 1
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.4 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 1 2
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 1 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 2
  • ALC_DVS.2: 4
  • ALC_FLR.1: 12
  • ALC_CMC.5: 2
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 2
  • ALC_CMS: 2
  • ALC_CMS.4: 1
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_DVS.1: 2
  • ALC_TAT: 1
  • ALC_TAT.2: 1
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 3
  • ALC_CMS: 1
  • ALC_TAT: 1
  • ALC_CMS.4: 1
  • ALC_TAT.1: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 4 9
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 1 3
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.3: 4
  • ATE_DPT.3: 1
  • ATE_FUN.2: 3
  • ATE_IND.2: 1
  • ATE_COV: 1
  • ATE_COV.2: 3
  • ATE_FUN: 1
  • ATE_FUN.1: 3
  • ATE_COV.2: 1
  • ATE_DPT.3: 4
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 3 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 1 4
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 3 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 3
  • AVA_VAN: 2
  • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 3 11
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 8
  • EAL6+: 109
  • EAL 6: 1
  • EAL6 augmented: 5
  • EAL 6 augmented: 1
  • EAL5: 7
  • EAL5+: 1
  • EAL 5: 4
  • EAL5 augmented: 3
  • EAL 5 augmented: 3
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 11 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 24 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 35 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 25 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 64 47
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 29 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 14 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 29 30
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 26
  • FDP_ACF.1: 23
  • FDP_SDI.1: 18
  • FDP_SDI.2: 16
  • FDP_ITT.1: 19
  • FDP_IFC.1: 16
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 19
  • FDP_ITC.2: 19
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_ACC.1: 23
  • FDP_ACF.1: 20
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ITT.1: 13
  • FDP_IFC.1: 10
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 17
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_PHP.3: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 26 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 23 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 16 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 19 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 19 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 19 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 18 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 16 15
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 21
  • FMT_MSA.3: 22
  • FMT_SMF.1: 17
  • FMT_LIM: 3
  • FMT_LIM.1: 8
  • FMT_LIM.2: 8
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 1
  • FMT_CKM.4: 1
  • FMT_MSA.1: 18
  • FMT_MSA.3: 19
  • FMT_SMF.1: 15
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 8 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 8 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 21 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 17 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST: 7
  • FPT_TST.2: 34
  • FPT_TST.1: 11
  • FPT_TST.2.1: 2
  • FPT_FLS.1: 20
  • FPT_PHP.3: 26
  • FPT_ITT.1: 17
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_TST: 7
  • FPT_TST.2: 36
  • FPT_TST.1: 11
  • FPT_FLS.1: 16
  • FPT_PHP.3: 14
  • FPT_ITT.1: 13
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_FLS: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 20 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 17 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 26 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 34 36
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 2 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 9
  • CBC:
    • CBC: 9
  • CFB:
    • CFB: 5
  • ECB:
    • ECB: 7
  • CBC:
    • CBC: 7
pdf_data/st_keywords/cipher_mode/CBC/CBC 9 7
pdf_data/st_keywords/cipher_mode/ECB/ECB 9 7
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 3 2
pdf_data/st_keywords/ecc_curve/NIST
  • K-163: 2
  • P-192: 4
  • K-163: 2
pdf_data/st_keywords/hash_function/MD/MD5/MD5 1 46
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 8
  • SHA1: 46
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 7
  • SHA-512: 2
  • SHA-2: 71
  • SHA256: 46
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 11
  • PRNG:
    • PRNG: 6
  • RNG:
    • RND: 2
    • RNG: 10
  • TRNG:
    • TRNG: 14
  • RNG:
    • RND: 2
    • RNG: 10
pdf_data/st_keywords/randomness/TRNG/TRNG 11 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 11
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 7
    • SPA: 6
    • DPA: 7
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
    • fault induction: 1
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 6
    • Side-channel: 1
    • SPA: 6
    • DPA: 7
    • Timing Attack: 1
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
  • fault induction: 1
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 11
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 7
  • SPA: 6
  • DPA: 7
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 6
  • Side-channel: 1
  • SPA: 6
  • DPA: 7
  • Timing Attack: 1
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 11 10
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 7 6
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
    • FIPS PUB 180-4: 4
  • NIST:
    • SP 800-67: 2
    • SP 800-38A: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 9
    • AIS32: 4
  • RFC:
    • RFC3447: 11
    • RFC 5639: 2
  • ISO:
    • ISO/IEC 18092: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9797-1: 3
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS PUB 197: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • RFC:
    • RFC3447: 11
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/BSI/AIS31 9 5
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-001 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-002 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-003 2 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 3
  • FIPS PUB 180-4: 4
  • FIPS PUB 197: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 3 2
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 18092: 2
  • ISO/IEC 7816-3: 1
  • ISO/IEC 9797-1: 3
  • ISO/IEC 7816-3: 1
pdf_data/st_keywords/standard_id/RFC/RFC 5639 2 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • DES:
      • DES: 22
    • 3DES:
      • 3DES: 6
      • Triple-DES: 1
      • TDES: 1
      • TDEA: 2
  • constructions:
    • MAC:
      • CBC-MAC: 4
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • 3DES: 17
      • Triple-DES: 2
      • TDES: 4
      • TDEA: 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 6 17
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 1 4
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 2
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 22 5
pdf_data/st_keywords/vendor/Infineon/Infineon 6 7
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 10 8
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 24 19
pdf_data/st_metadata//Author Hans-Ulrich Buchmüller Jürgen Noller
pdf_data/st_metadata//CreationDate D:20151102193054+01'00' D:20151002084025
pdf_data/st_metadata//Creator Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Keywords Dresden, contactless, multi interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, ACLB, USB, GPIO, 90nm TSMC, Infineon, RSA, Eliptic Curve, Library, multi interface, high end security controler, ARM CPU, ARM Core, robust, CCv3.1, EAL5+, secure controller, EAL5+, augmented, high attack potential, AVA_VAN.5, PP0035
pdf_data/st_metadata//ModDate D:20151102193054+01'00' D:20151002084025
pdf_data/st_metadata//Producer Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Subject Security Target Lite M7893 Integrity Guard Security Target Lite M5072 G11
pdf_data/st_metadata//Title Public Security Target Lite Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 1355244 926798
pdf_data/st_metadata/pdf_number_of_pages 108 82
dgst aceaef20acc1bffe 32ed1825f99fafee