Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware)
BSI-DSZ-CC-0879-V2-2015
Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
BSI-DSZ-CC-0827-V2-2014
name Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware) Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
not_valid_before 2015-11-13 2014-04-30
not_valid_after 2020-11-13 2019-09-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2b_pdf.pdf
security_level ALC_FLR.1, EAL6+ EAL5+, AVA_VAN.5, ALC_DVS.2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2a_pdf.pdf
state/report/pdf_hash da11b379dff81087d1d15bd3009d5d6ed7fc2ecff81ec38dae827add9897112e 73e1e36ac72df9017049ff5ab8e33e80dd1e25214a4ec4a8af40d094af3f3357
state/report/txt_hash 59d7022a2ff2aac725e9c9450a279e8b767ea58b1c12f54f28d1a8ea3fcbbb4b 8f78cd6183c4d8f47c68b63a8435382a0a4267dea897d90aa83107a82140d853
state/st/pdf_hash 65e7dd8d8eaa553369685ed7609af0e6e1a00b1d3de17e8c834f0280d6f55653 36c632f0e7e97ad990a45b8a94dfa9f36d1535b9b87537d8da20ce9156ae76fe
state/st/txt_hash 60544dc1659f382805f1b901c8eb922808bbbe404f54d157625d34da25632db8 91b00be9da132d9f06300e5b6e13f667a810a9760bfb8e06324d9d0aaa59034d
heuristics/cert_id BSI-DSZ-CC-0879-V2-2015 BSI-DSZ-CC-0827-V2-2014
heuristics/report_references/directly_referenced_by ANSSI-CC-2017/09, ANSSI-CC-2017/08, ANSSI-CC-2016/67, BSI-DSZ-CC-0879-V3-2018, ANSSI-CC-2016/70 BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-2014
heuristics/report_references/directly_referencing BSI-DSZ-CC-0879-2014 BSI-DSZ-CC-0827-2013
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0879-V5-2022, BSI-DSZ-CC-1071-2019, ANSSI-CC-2018/22, ANSSI-CC-2017/08, ANSSI-CC-2017/09, BSI-DSZ-CC-0879-V3-2018, ANSSI-CC-2016/67, BSI-DSZ-CC-1071-V6-2023, BSI-DSZ-CC-1071-V4-2020, BSI-DSZ-CC-1071-V5-2021, BSI-DSZ-CC-1071-V3-2020, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-1084-2019, BSI-DSZ-CC-1071-V7-2023, ANSSI-CC-2016/70 CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1069-2018, ANSSI-CC-2019/38, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V7-2018
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0879-2014 BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012
heuristics/st_references/directly_referenced_by ANSSI-CC-2016/67, ANSSI-CC-2016/66, ANSSI-CC-2017/08, ANSSI-CC-2017/09 None
heuristics/st_references/directly_referencing BSI-DSZ-CC-0782-2012 None
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2016/67, ANSSI-CC-2016/66, ANSSI-CC-2017/08, ANSSI-CC-2017/09 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0758-2012 None
pdf_data/report_filename 0879V2a_pdf.pdf 0827V2a_pdf.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0879-V2-2015
  • cert_item: Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
  • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 SOGIS Recognition Agreement
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0827-V2-2014
  • cert_item: Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0879-V2-2015 BSI-DSZ-CC-0827-V2-2014
pdf_data/report_frontpage/DE/cert_item Infineon Security Controller M7893 B11 with optional RSA2048/4096 v1.03.006, EC v1.03.006, SHA-2 v1.01 libraries and Toolbox v1.03.006 and with specific IC dedicated software (firmware Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 2
    • RSA4096: 2
    • RSA-2048: 1
  • ECC:
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
    • ECC:
      • ECC: 7
  • RSA:
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
  • ECC:
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 7
    • ECC:
      • ECC: 5
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC 7 5
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0879-V2-2015: 23
  • BSI-DSZ-CC-0879-2014: 3
  • BSI-DSZ-CC-0827-V2-2014: 23
  • BSI-DSZ-CC-0827-2013: 3
  • BSI-DSZ-CC-S-0023-2013: 1
  • BSI-DSZ-CC-S-0015-2012: 1
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP.2 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.2 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.3 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM.1 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.4 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.5 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.4 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 3 7
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 6 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 3 1
pdf_data/report_keywords/cc_sar/ATE/ATE_COV.3 2 1
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN.2 2 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 2 6
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 6: 8
  • EAL 5: 10
  • EAL 4: 9
  • EAL 1: 7
  • EAL 2: 4
  • EAL 5+: 1
  • EAL6: 1
  • EAL6+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL 6 augmented: 3
  • EAL6 augmented: 1
  • EAL 5: 8
  • EAL 4: 2
  • EAL1: 7
  • EAL4: 7
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL 5 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 9 2
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 10 8
pdf_data/report_keywords/cc_security_level/EAL/EAL6 1 4
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • B11 - Including optional Software Libraries RSA - EC - SHA-2 - Toolbox, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report, 2, 2015-10-30, ETR Summary, TÜV Informationstechnik: 1
  • B11, 2, 2015-10-30, Evaluation Technical Report for Composite Evaluation, TÜV Informationstechnik (confidential document) [11] Configuration Management Scope ALC Maintenance for Common Criteria with Evaluation Assurance: 1
  • Software Libraries RSA - EC - SHA-2 – Toolbox, Version 0.4, 2014-10-20, Infineon Technologies AG (confidential document) [12] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (v1.03: 1
  • Software Libraries RSA - EC – Toolbox – FTL, Version 1.6, 2014-02-21, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900 A22 and G11 including optional Software Libraries RSA – EC –: 1
  • the M9900 A22 and G11 with Crypto Libraries, Version 4, 2014-04-02, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M9900 A21, Version 4, 2014-04-02: 1
  • Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
  • optional Software Libraries RSA - EC – Toolbox – FTL, Version 0.6, 2014-01-27, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006),2012-08-16: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-2: 25
pdf_data/report_keywords/side_channel_analysis/FI/DFA 5 6
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 5 6
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS186-4: 5
    • FIPS197: 2
    • FIPS180-4: 3
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
  • PKCS:
    • PKCS #1: 2
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 4
    • AIS 36: 3
    • AIS31: 2
    • AIS 35: 2
    • AIS 14: 1
    • AIS 19: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 2
  • RFC:
    • RFC5639: 5
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
  • FIPS:
    • FIPS186-4: 4
    • FIPS197: 3
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • BSI:
    • AIS32: 1
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 36: 3
    • AIS31: 2
    • AIS 35: 2
    • AIS 20: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS47: 2
  • RFC:
    • RFC5639: 5
    • RFC 5639: 1
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 4
  • AIS 36: 3
  • AIS31: 2
  • AIS 35: 2
  • AIS 14: 1
  • AIS 19: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 2
  • AIS32: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 3
  • AIS 36: 3
  • AIS31: 2
  • AIS 35: 2
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS47: 2
pdf_data/report_keywords/standard_id/BSI/AIS 31 4 3
pdf_data/report_keywords/standard_id/FIPS
  • FIPS186-4: 5
  • FIPS197: 2
  • FIPS180-4: 3
  • FIPS PUB 180-4: 1
  • FIPS PUB 186-4: 1
  • FIPS186-4: 4
  • FIPS197: 3
  • FIPS 186-4: 1
  • FIPS PUB 186-4: 1
pdf_data/report_keywords/standard_id/FIPS/FIPS186-4 5 4
pdf_data/report_keywords/standard_id/FIPS/FIPS197 2 3
pdf_data/report_keywords/standard_id/PKCS
  • PKCS #1: 2
  • PKCS #1: 2
  • PKCS#1: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 7 8
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES 2 3
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 4 3
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7148: 1
  • BSI TR-02102: 1
  • BSI 7125: 2
  • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/vendor/Infineon/Infineon 14 5
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies 11 17
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG 20 21
pdf_data/report_metadata//CreationDate D:20151123092937+01'00' D:20140519170621+02'00'
pdf_data/report_metadata//Keywords "BSI-DSZ-CC-0879-V2, Common Criteria, Certification, Zertifizierung, SmartCard IC, Sicherheits-IC" "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG"
pdf_data/report_metadata//ModDate D:20151123103448+01'00' D:20140519171035+02'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 LibreOffice 3.6
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0879-V2-2015 Certification Report BSI-DSZ-CC-0827-V2-2014
pdf_data/report_metadata/pdf_file_size_bytes 1368683 1267084
pdf_data/st_filename 0879V2b_pdf.pdf 0827V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 13 20
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 18 14
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 6 5
pdf_data/st_keywords/asymmetric_crypto/RSA
  • RSA2048: 1
  • RSA4096: 1
  • RSA2048: 2
  • RSA4096: 2
  • RSA-2048: 1
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 1 2
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 1 2
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-2012: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 1 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.5: 3
  • ADV_IMP.2: 2
  • ADV_INT.3: 2
  • ADV_TDS.5: 3
  • ADV_SPM.1: 6
  • ADV_IMP: 1
  • ADV_IMP.1: 2
  • ADV_INT: 1
  • ADV_INT.2: 3
  • ADV_FSP: 1
  • ADV_FSP.4: 4
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_TDS.4: 2
  • ADV_CMC.5: 1
  • ADV_ARC.1: 2
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 4 1
pdf_data/st_keywords/cc_sar/ADV/ADV_INT.2 3 1
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.4 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 1 2
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 1 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 2
  • ALC_DVS.2: 4
  • ALC_FLR.1: 12
  • ALC_CMC.5: 2
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 2
  • ALC_CMS: 2
  • ALC_CMS.4: 1
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_DVS.1: 2
  • ALC_TAT: 1
  • ALC_TAT.2: 1
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 3
  • ALC_CMS: 1
  • ALC_TAT: 1
  • ALC_CMS.4: 1
  • ALC_TAT.1: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 4 9
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 1 3
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.3: 4
  • ATE_DPT.3: 1
  • ATE_FUN.2: 3
  • ATE_IND.2: 1
  • ATE_COV: 1
  • ATE_COV.2: 3
  • ATE_FUN: 1
  • ATE_FUN.1: 3
  • ATE_COV.2: 1
  • ATE_DPT.3: 4
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 3 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 1 4
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 3 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 3
  • AVA_VAN: 2
  • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 3 11
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 8
  • EAL6+: 109
  • EAL 6: 1
  • EAL6 augmented: 5
  • EAL 6 augmented: 1
  • EAL5: 7
  • EAL5+: 1
  • EAL 5: 4
  • EAL5 augmented: 3
  • EAL 5 augmented: 3
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 11 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 24 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 35 31
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 25 23
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 64 47
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 29 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 14 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 29 30
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 26
  • FDP_ACF.1: 23
  • FDP_SDI.1: 18
  • FDP_SDI.2: 16
  • FDP_ITT.1: 19
  • FDP_IFC.1: 16
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 19
  • FDP_ITC.2: 19
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_ACC.1: 23
  • FDP_ACF.1: 20
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ITT.1: 13
  • FDP_IFC.1: 10
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 17
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_PHP.3: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 26 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 23 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 16 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 19 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 19 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 19 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 18 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 16 15
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 21
  • FMT_MSA.3: 22
  • FMT_SMF.1: 17
  • FMT_LIM: 3
  • FMT_LIM.1: 8
  • FMT_LIM.2: 8
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 1
  • FMT_CKM.4: 1
  • FMT_MSA.1: 18
  • FMT_MSA.3: 19
  • FMT_SMF.1: 15
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 8 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 8 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 21 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 17 15
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST: 7
  • FPT_TST.2: 34
  • FPT_TST.1: 11
  • FPT_TST.2.1: 2
  • FPT_FLS.1: 20
  • FPT_PHP.3: 26
  • FPT_ITT.1: 17
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_TST: 7
  • FPT_TST.2: 36
  • FPT_TST.1: 11
  • FPT_FLS.1: 16
  • FPT_PHP.3: 14
  • FPT_ITT.1: 13
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_FLS: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 20 16
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 17 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 26 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 34 36
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 2 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 9
  • CBC:
    • CBC: 9
  • CFB:
    • CFB: 5
  • ECB:
    • ECB: 7
  • CBC:
    • CBC: 7
pdf_data/st_keywords/cipher_mode/CBC/CBC 9 7
pdf_data/st_keywords/cipher_mode/ECB/ECB 9 7
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 3 2
pdf_data/st_keywords/ecc_curve/NIST
  • K-163: 2
  • P-192: 4
  • K-163: 2
pdf_data/st_keywords/hash_function/MD/MD5/MD5 1 47
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 8
  • SHA1: 47
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-256: 7
  • SHA-512: 2
  • SHA-2: 71
  • SHA256: 47
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 11
  • PRNG:
    • PRNG: 6
  • RNG:
    • RND: 2
    • RNG: 10
  • TRNG:
    • TRNG: 14
  • RNG:
    • RNG: 11
    • RND: 2
pdf_data/st_keywords/randomness/RNG/RNG 10 11
pdf_data/st_keywords/randomness/TRNG/TRNG 11 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 11
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 7
    • SPA: 6
    • DPA: 7
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
    • fault induction: 1
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 6
    • Side-channel: 1
    • SPA: 6
    • DPA: 7
    • Timing Attack: 1
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
  • fault induction: 1
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 11
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 7
  • SPA: 6
  • DPA: 7
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 6
  • Side-channel: 1
  • SPA: 6
  • DPA: 7
  • Timing Attack: 1
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 11 10
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 7 6
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
    • FIPS PUB 180-4: 4
  • NIST:
    • SP 800-67: 2
    • SP 800-38A: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 9
    • AIS32: 4
  • RFC:
    • RFC3447: 11
    • RFC 5639: 2
  • ISO:
    • ISO/IEC 18092: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9797-1: 3
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS PUB 197: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • RFC:
    • RFC3447: 11
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/BSI/AIS31 9 5
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-001 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-002 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-003 2 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 3
  • FIPS PUB 180-4: 4
  • FIPS PUB 197: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 3 2
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 18092: 2
  • ISO/IEC 7816-3: 1
  • ISO/IEC 9797-1: 3
  • ISO/IEC 7816-3: 1
pdf_data/st_keywords/standard_id/RFC/RFC 5639 2 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • DES:
      • DES: 22
    • 3DES:
      • 3DES: 6
      • Triple-DES: 1
      • TDES: 1
      • TDEA: 2
  • constructions:
    • MAC:
      • CBC-MAC: 4
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • 3DES: 17
      • Triple-DES: 2
      • TDES: 4
      • TDEA: 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES 6 17
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 1 4
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 2
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 22 5
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 24
    • Infineon Technologies: 10
    • Infineon: 6
  • Infineon:
    • Infineon Technologies AG: 20
    • Infineon Technologies: 7
    • Infineon: 6
  • Microsoft:
    • Microsoft Corporation: 1
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies 10 7
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG 24 20
pdf_data/st_metadata//Author Hans-Ulrich Buchmüller Jürgen Noller
pdf_data/st_metadata//CreationDate D:20151102193054+01'00' D:20140305150457Z
pdf_data/st_metadata//Creator Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Keywords Dresden, contactless, multi interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, ACLB, USB, GPIO, 90nm Dresden, TSMC, Infineon, RSA, Eliptic Curve, Library, multi interface, high end security controler, ARM CPU, ARM Core, robust, CCv3.1, EAL5+, secure controller, EAL5+, augmented, high attack potential, AVA_VAN.5, PP0035
pdf_data/st_metadata//ModDate D:20151102193054+01'00' D:20140520092728+02'00'
pdf_data/st_metadata//Producer Microsoft® Word 2010 Microsoft® Office Word 2007
pdf_data/st_metadata//Subject Security Target Lite M7893 Integrity Guard Security Target Lite A22 and G11
pdf_data/st_metadata//Title Public Security Target Lite Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 1355244 964080
pdf_data/st_metadata/pdf_number_of_pages 108 84
dgst aceaef20acc1bffe 5d83a59f8c44527c