Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware)
BSI-DSZ-CC-0879-V2-2015
Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
BSI-DSZ-CC-0782-2012
name Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware) Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)
not_valid_before 2015-11-13 2012-09-11
not_valid_after 2020-11-13 2019-09-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782a_pdf.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2013, 9, 5), 'maintenance_title': 'Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782_ma1b_pdf.pdf'})
state/report/pdf_hash da11b379dff81087d1d15bd3009d5d6ed7fc2ecff81ec38dae827add9897112e fd5d3dc64a1af17b8e9da4db2d8c33d656a83c390234a259c9fb9592d67de86d
state/report/txt_hash 59d7022a2ff2aac725e9c9450a279e8b767ea58b1c12f54f28d1a8ea3fcbbb4b 7259bd2c4d4844ff06b917ae2a7edb99ba45f38b3933e8d4d1a21603cac01241
state/st/pdf_hash 65e7dd8d8eaa553369685ed7609af0e6e1a00b1d3de17e8c834f0280d6f55653 3b0deb7b20087522360f58971c491fce892a50cdb4ef880b00d251c38639f84d
state/st/txt_hash 60544dc1659f382805f1b901c8eb922808bbbe404f54d157625d34da25632db8 2ca85f3513c08a46de9af328bbb6697e7dcae4110466c453d48990e5b3ef270f
heuristics/cert_id BSI-DSZ-CC-0879-V2-2015 BSI-DSZ-CC-0782-2012
heuristics/cpe_matches None cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:*
heuristics/direct_transitive_cves None CVE-2017-15361
heuristics/indirect_transitive_cves None CVE-2017-15361
heuristics/related_cves None CVE-2017-15361
heuristics/report_references/directly_referenced_by ANSSI-CC-2017/09, ANSSI-CC-2017/08, ANSSI-CC-2016/67, BSI-DSZ-CC-0879-V3-2018, ANSSI-CC-2016/70 ANSSI-CC-2014/54, BSI-DSZ-CC-0879-2014, KECS-ISIS-0579-2015, BSI-DSZ-CC-0782-V2-2015, ANSSI-CC-2015/45, BSI-DSZ-CC-0869-2015, BSI-DSZ-CC-0889-2013, CRP279, BSI-DSZ-CC-0868-2014, ANSSI-CC-2014/53, BSI-DSZ-CC-0891-2015, CRP278, BSI-DSZ-CC-0921-2014
heuristics/report_references/directly_referencing BSI-DSZ-CC-0879-2014 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0879-2014 None
heuristics/st_references/directly_referenced_by ANSSI-CC-2016/67, ANSSI-CC-2016/66, ANSSI-CC-2017/08, ANSSI-CC-2017/09 ANSSI-CC-2014/54, 21.0.01/TSE-CCCS-23, BSI-DSZ-CC-0879-2014, KECS-ISIS-0579-2015, BSI-DSZ-CC-0879-V2-2015, BSI-DSZ-CC-0889-2013, CRP279, SERTIT-091, BSI-DSZ-CC-0868-2014, ANSSI-CC-2014/53, CRP278, SERTIT-079
heuristics/st_references/directly_referencing BSI-DSZ-CC-0782-2012 BSI-DSZ-CC-0758-2012
pdf_data/report_filename 0879V2a_pdf.pdf 0782a_pdf.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0879-V2-2015
  • cert_item: Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
  • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 SOGIS Recognition Agreement
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0782-2012
  • cert_item: Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware
  • developer: Infineon Technologies AG
  • cert_lab: BSI
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0879-V2-2015 BSI-DSZ-CC-0782-2012
pdf_data/report_frontpage/DE/cert_item Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 2
    • RSA4096: 2
    • RSA-2048: 1
  • ECC:
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
    • ECC:
      • ECC: 7
  • RSA:
    • RSA2048: 2
    • RSA4096: 2
    • RSA-2048: 1
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 4
    • ECC:
      • ECC: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 7 4
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDH/ECDH 3 1
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 7 4
pdf_data/report_keywords/asymmetric_crypto/RSA
  • RSA2048: 2
  • RSA4096: 2
  • RSA-2048: 1
  • RSA2048: 2
  • RSA4096: 2
  • RSA-2048: 1
  • RSA 1024: 1
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0879-V2-2015: 23
  • BSI-DSZ-CC-0879-2014: 3
  • BSI-DSZ-CC-0782-2012: 23
  • BSI-DSZ-CC-0782: 1
  • BSI-DSZ-CC-S-0007-: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0035-2007 4 3
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 3 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 6: 8
  • EAL 5: 10
  • EAL 4: 9
  • EAL 1: 7
  • EAL 2: 4
  • EAL 5+: 1
  • EAL6: 1
  • EAL6+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL 6 augmented: 3
  • EAL6 augmented: 1
  • EAL 6: 4
  • EAL 4: 5
  • EAL 5: 2
  • EAL1: 7
  • EAL4: 6
  • EAL6: 5
  • EAL6+: 1
  • EAL5+: 1
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL 6 augmented: 3
  • EAL6 augmented: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 9 5
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 10 2
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 8 4
pdf_data/report_keywords/cc_security_level/EAL/EAL6 1 5
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • B11 - Including optional Software Libraries RSA - EC - SHA-2 - Toolbox, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, 2, 2015-10-30, ETR Summary, TÜV Informationstechnik: 1
  • B11, 2, 2015-10-30, Evaluation Technical Report for Composite Evaluation, TÜV Informationstechnik (confidential document) [11] Configuration Management Scope ALC Maintenance for Common Criteria with Evaluation Assurance: 1
  • Software Libraries RSA - EC - SHA-2 – Toolbox, Version 0.4, 2014-10-20, Infineon Technologies AG (confidential document) [12] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (v1.03: 1
  • M7892 B11, Version 2, 2012-09- 11, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product M7892 B11, Version 2: 1
  • TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [11] Configuration Management Scope M7892 B11 including optional Software Libraries RSA - EC -: 1
  • - Toolbox, Version 1.4, 2012-08-16, Infineon Technologies AG (confidential document) 10 specifically • AIS 25, Version 7, Anwendung der CC auf Integrierte Schaltungen including JIL: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 33
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-192: 4
    • K-163: 2
pdf_data/report_keywords/hash_function/SHA/SHA2
  • SHA-256: 1
  • SHA-2: 25
  • SHA-2: 25
pdf_data/report_keywords/randomness/RNG/RNG 3 1
pdf_data/report_keywords/side_channel_analysis/FI/DFA 5 3
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 5 3
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 5 3
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS186-4: 5
    • FIPS197: 2
    • FIPS180-4: 3
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
  • PKCS:
    • PKCS #1: 2
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 4
    • AIS 36: 3
    • AIS31: 2
    • AIS 35: 2
    • AIS 14: 1
    • AIS 19: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 2
  • RFC:
    • RFC5639: 5
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 36: 3
    • AIS 35: 2
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 1
  • ISO:
    • ISO/IEC 18092: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 4
  • AIS 36: 3
  • AIS31: 2
  • AIS 35: 2
  • AIS 14: 1
  • AIS 19: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 2
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS 35: 2
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 1
pdf_data/report_keywords/standard_id/BSI/AIS 31 4 2
pdf_data/report_keywords/standard_id/BSI/AIS47 2 1
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
  • ISO/IEC 18092: 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 7 5
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 3
  • TDES: 2
  • TDEA: 1
  • 3DES: 1
  • Triple-DES: 3
  • 3DES: 3
pdf_data/report_keywords/symmetric_crypto/DES/3DES/3DES 1 3
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 4 3
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7148: 1
  • BSI TR-02102: 1
  • BSI 7125: 2
  • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 14
    • Infineon Technologies AG: 20
    • Infineon Technologies: 11
  • Infineon:
    • Infineon: 13
    • Infineon Technologies AG: 21
    • Infineon Technologies: 8
  • GD:
    • G&D: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 14 13
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 11 8
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 20 21
pdf_data/report_metadata//CreationDate D:20151123092937+01'00' D:20121002083001+02'00'
pdf_data/report_metadata//Keywords "BSI-DSZ-CC-0879-V2, Common Criteria, Certification, Zertifizierung, SmartCard IC, Sicherheits-IC" "Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware), Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20151123103448+01'00' D:20121002083257+02'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 LibreOffice 3.5
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0879-V2-2015 Certification Report BSI-DSZ-CC-0782-2012
pdf_data/report_metadata/pdf_file_size_bytes 1368683 1174585
pdf_data/st_filename 0879V2b_pdf.pdf 0782b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 13 19
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 6 4
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 18 12
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 6 5
pdf_data/st_keywords/asymmetric_crypto/RSA
  • RSA2048: 1
  • RSA4096: 1
  • RSA2048: 1
  • RSA4096: 1
  • RSA-2048: 1
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0782-2012: 1
  • BSI-DSZ-CC-0758-2012: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 1 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.5: 3
  • ADV_IMP.2: 2
  • ADV_INT.3: 2
  • ADV_TDS.5: 3
  • ADV_SPM.1: 6
  • ADV_IMP: 1
  • ADV_IMP.1: 2
  • ADV_INT: 1
  • ADV_INT.2: 3
  • ADV_FSP: 1
  • ADV_FSP.4: 4
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_TDS.4: 2
  • ADV_CMC.5: 1
  • ADV_ARC.1: 1
  • ADV_FSP.5: 1
  • ADV_IMP.2: 2
  • ADV_INT.3: 2
  • ADV_TDS.5: 2
  • ADV_SPM.1: 6
  • ADV_IMP.1: 1
  • ADV_SPM: 1
  • ADV_FSP.4: 1
  • ADV_TDS: 1
  • ADV_TDS.4: 1
  • ADV_CMC.5: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 4 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 3 1
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.4 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.5 3 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 2
  • ALC_DVS.2: 4
  • ALC_FLR.1: 12
  • ALC_CMC.5: 2
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 2
  • ALC_CMS: 2
  • ALC_CMS.4: 1
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_DVS.1: 2
  • ALC_TAT: 1
  • ALC_TAT.2: 1
  • ALC_DVS: 2
  • ALC_DVS.2: 3
  • ALC_FLR.1: 12
  • ALC_CMC.5: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 2
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_DVS.1: 1
  • ALC_TAT: 1
  • ALC_TAT.2: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.5 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 3 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 4 3
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 3 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.3 4 2
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 3 1
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.2 3 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 8
  • EAL6+: 109
  • EAL 6: 1
  • EAL6 augmented: 5
  • EAL 6 augmented: 1
  • EAL6: 8
  • EAL6+: 165
  • EAL 6: 1
  • EAL5: 1
  • EAL6 augmented: 5
  • EAL 6 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ 109 165
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 35 34
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 25 24
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 64 58
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 29 28
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 14 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 19 18
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 19 18
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 34 36
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 2 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 9 4
pdf_data/st_keywords/cipher_mode/ECB/ECB 9 4
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 11
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 3 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • K-163: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 7
      • SHA-512: 2
      • SHA-2: 71
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-512: 2
      • SHA-2: 61
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 8
  • SHA2:
    • SHA-256: 7
    • SHA-512: 2
    • SHA-2: 71
  • SHA2:
    • SHA-256: 2
    • SHA-512: 2
    • SHA-2: 61
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-2 71 61
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 7 2
pdf_data/st_keywords/randomness/PRNG/PRNG 6 7
pdf_data/st_keywords/randomness/TRNG/TRNG 11 12
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 7 10
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 11 10
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 6 5
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 7 8
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
    • FIPS PUB 180-4: 4
  • NIST:
    • SP 800-67: 2
    • SP 800-38A: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 9
    • AIS32: 4
  • RFC:
    • RFC3447: 11
    • RFC 5639: 2
  • ISO:
    • ISO/IEC 18092: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9797-1: 3
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 180-4: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 9
    • AIS32: 5
  • RFC:
    • RFC3447: 11
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 18092: 4
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
pdf_data/st_keywords/standard_id/BSI/AIS32 4 5
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-4 4 2
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 3 2
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 18092: 2
  • ISO/IEC 7816-3: 1
  • ISO/IEC 9797-1: 3
  • ISO/IEC 18092: 4
  • ISO/IEC 7816-3: 1
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 18092 2 4
pdf_data/st_keywords/standard_id/RFC/RFC 5639 2 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 27 24
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 6
  • Triple-DES: 1
  • TDES: 1
  • TDEA: 2
  • 3DES: 17
  • Triple-DES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 6 17
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 3
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 22 9
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CBC-MAC: 4
  • HMAC: 4
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/vendor/Infineon/Infineon 6 13
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 24 15
pdf_data/st_metadata//CreationDate D:20151102193054+01'00' D:20120829095426
pdf_data/st_metadata//Creator Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Keywords Dresden, contactless, multi interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, ACLB, USB, GPIO, 90nm Dresden, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, 50MHz, 90nm
pdf_data/st_metadata//ModDate D:20151102193054+01'00' D:20120829095426
pdf_data/st_metadata//Producer Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Subject Security Target Lite M7893 Integrity Guard Security Target M7892 Integrity Guard
pdf_data/st_metadata//Title Public Security Target Lite CC EAL6+ high Certification Security Target
pdf_data/st_metadata/pdf_file_size_bytes 1355244 1068119
pdf_data/st_metadata/pdf_number_of_pages 108 84
dgst aceaef20acc1bffe 4a69ab527a60ab5d