This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software ANSSI-CC-2016/59 |
Infineon smart card IC (Security Controller) M7820 M11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0695-2011 |
|
---|---|---|
name | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | Infineon smart card IC (Security Controller) M7820 M11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software |
not_valid_before | 2016-08-26 | 2011-05-11 |
not_valid_after | 2021-08-26 | 2019-09-01 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_59en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0695b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. / Trusted Labs | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
security_level | ASE_TSS.2, EAL6+ | EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_59fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0695a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2013, 6, 24), 'maintenance_title': 'Infineon smart card IC (Security Controller) M7820 M11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0695_ma2a_pdf.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 8, 8), 'maintenance_title': 'Infineon smart card IC (Security Controller) M7820 M11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0695_ma1a_pdf.pdf', 'maintenance_st_link': None}) | |
state/report/pdf_hash | db137e34ae91187b2f065c68ead18ed8d8cb485c71ac9ae172e6d28524e714f8 | c85d99fbd1a1953b918e37f3a5850a7a82ed2a12f0754920668ec236d882f487 |
state/report/txt_hash | 1b654cd14f977145ddd04c3164fa6e4cea8b8b9e8406a5bc577b564b2549d2c2 | b2e984883500f81d130961477d9e31f59752cbcd0f9ec60ff773badaa2adcc43 |
state/st/pdf_hash | d71f81cd92b03aa8dfa99d0ce1d768bc34b072bbb79bcc885cc4e97585a5c329 | fa78486bc283fa01dd64f532a3687ed64a128a6de6405b6fa834c6d81ab16b8f |
state/st/txt_hash | 63ee0be1a5dcad71b90d001733997d81bda6f0b92d6123c3c2ca19216817bff1 | 066009fd03e28a1d0d4aa5ed2c28bc6b7a421fc232a29d53b554abf4b2110d29 |
heuristics/cert_id | ANSSI-CC-2016/59 | BSI-DSZ-CC-0695-2011 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 16 | 1.01, 1.02.008 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2017/24 | None |
heuristics/report_references/directly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0640-2010 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2018/58v2, ANSSI-CC-2019/07, ANSSI-CC-2020/12, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2018/57, ANSSI-CC-2018/33, ANSSI-CC-2018/56v2, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2020/93, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56, ANSSI-CC-2017/24, ANSSI-CC-2018/58 | None |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
|
None |
heuristics/st_references/directly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/50, ANSSI-CC-2014/49, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/14 |
heuristics/st_references/indirectly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | ANSSI-CC-2014/11, BSI-DSZ-CC-0904-2015, BSI-DSZ-CC-0829-2012, OCSI/CERT/SYS/06/2017/RC, ANSSI-CC-2016/75, ANSSI-CC-2014/12, OCSI/CERT/CCL/02/2020/RC, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2014/62, ANSSI-CC-2013/35, ANSSI-CC-2014/48, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2014/50, ANSSI-CC-2014/49, ANSSI-CC-2013/32, ANSSI-CC-2013/34, BSI-DSZ-CC-0898-2014, ANSSI-CC-2014/06, ANSSI-CC-2014/13 |
pdf_data/report_filename | ANSSI-CC-2016_59fr.pdf | 0695a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 25 | 4 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 2 | 1 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 1 | 6 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 2 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 1 | 4 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/TRNG |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS31 | 2 | 1 |
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 4 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 3 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata//Author | Coralie | Bundesamt für Sicherheit in der Informationstechnik |
pdf_data/report_metadata//CreationDate | D:20160902171415+02'00' | D:20110519081442+02'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.018 | "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 M11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software, Infineon Technologie AG" |
pdf_data/report_metadata//ModDate | D:20160902171415+02'00' | D:20110519082250+02'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | OpenOffice.org 3.2 |
pdf_data/report_metadata//Subject | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | Common Criteria Certification |
pdf_data/report_metadata//Title | ANSSI-CC-2016/59 | Certification Report BSI-DSZ-CC-0695-2011 |
pdf_data/report_metadata/pdf_file_size_bytes | 731540 | 1107406 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_number_of_pages | 18 | 42 |
pdf_data/st_filename | ANSSI_cible2016_59en.pdf | 0695b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 37 | 11 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 9 | 4 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 14 | 12 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 3 | 5 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 4 | 1 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_cert_id | |
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 5 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 9 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 5 | 11 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 2 | 3 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 2 | 3 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 8 | 4 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 10 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 16 | 24 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 24 | 33 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 11 | 24 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 49 | 58 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 28 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 24 | 4 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 16 | 11 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 19 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 22 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 15 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 11 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 11 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 1 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 22 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 20 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 15 | 21 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 16 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 19 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 21 | 25 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 7 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 2 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 3 | 1 |
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 17 | 3 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 1 | 13 |
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 12 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 21 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 5 |
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing | 9 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 1 | 6 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 11 | 5 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-3 | 7 | 2 |
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 22 | 24 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 3 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 9 | 6 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC | 2 | 4 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Windows 사용자 | Hans-Ulrich Buchmüller |
pdf_data/st_metadata//CreationDate | D:20160704161852+09'00' | D:20110418122011 |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | SecurityTarget_SLE78_M7820_M11.doc - Microsoft Word |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Acrobat PDFWriter 5.0 für Windows NT |
pdf_data/st_metadata//Title | ST_Klallam7_Ver1.1 | CC EAL5+ Certification Security Target |
pdf_data/st_metadata/pdf_file_size_bytes | 1379185 | 543441 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | |
pdf_data/st_metadata/pdf_number_of_pages | 105 | 78 |
dgst | b970e91a8ee93f36 | 08de495c6b87baec |