This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software ANSSI-CC-2016/59 |
Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software BSI-DSZ-CC-0946-2014 |
|
---|---|---|
name | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | Infineon Technologies Smart Card IC (Security Controller) M5072 G11 with optional RSA v1.03.006, EC v1.03.006 and Toolbox v1.03.006 with specific IC dedicated software |
not_valid_before | 2016-08-26 | 2014-10-28 |
not_valid_after | 2021-08-26 | 2019-10-29 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_59en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. / Trusted Labs | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
security_level | ASE_TSS.2, EAL6+ | EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_59fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0946a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
state/report/pdf_hash | db137e34ae91187b2f065c68ead18ed8d8cb485c71ac9ae172e6d28524e714f8 | 935acee1b7156673697a64b3e7e79cb2c707efa8b477ef11ab60d4b393220df4 |
state/report/txt_hash | 1b654cd14f977145ddd04c3164fa6e4cea8b8b9e8406a5bc577b564b2549d2c2 | 587e8bc97292c35fbe9c9d2a7eb916a12301efbc24227634101a50a7cfec5ab9 |
state/st/pdf_hash | d71f81cd92b03aa8dfa99d0ce1d768bc34b072bbb79bcc885cc4e97585a5c329 | 8bbaf6734819db0bbcf35b3d39b3fa4b60a3e083da8a8107d674c92321ee0c71 |
state/st/txt_hash | 63ee0be1a5dcad71b90d001733997d81bda6f0b92d6123c3c2ca19216817bff1 | 8e23f90986159345a4eab7f550d51564dd3a323ae222477aaa79755734406bbd |
heuristics/cert_id | ANSSI-CC-2016/59 | BSI-DSZ-CC-0946-2014 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 16 | 1.03.006 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2017/24 | BSI-DSZ-CC-0946-V2-2015, ANSSI-CC-2016/60 |
heuristics/report_references/directly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0827-V2-2014 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2018/58v2, ANSSI-CC-2019/07, ANSSI-CC-2020/12, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2018/57, ANSSI-CC-2018/33, ANSSI-CC-2018/56v2, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2020/93, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56, ANSSI-CC-2017/24, ANSSI-CC-2018/58 | BSI-DSZ-CC-0946-V3-2017, BSI-DSZ-CC-0946-V2-2015, ANSSI-CC-2019/38, ANSSI-CC-2016/60 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0791-2012 |
heuristics/scheme_data |
|
None |
heuristics/st_references/directly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | ANSSI-CC-2016/60 |
heuristics/st_references/indirectly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | ANSSI-CC-2019/38, ANSSI-CC-2016/60 |
pdf_data/report_filename | ANSSI-CC-2016_59fr.pdf | 0946a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 25 | 5 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 2 | 3 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 1 | 6 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 2 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 1 | 4 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_scheme | |
|
pdf_data/report_keywords/ecc_curve | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/TRNG |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS31 | 2 | 3 |
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 9 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 4 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/tee_name | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata//Author | Coralie | Bundesamt für Sicherheit in der Informationstechnik |
pdf_data/report_metadata//CreationDate | D:20160902171415+02'00' | D:20141113145040+01'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.018 | "Common Criteria, Certification, Zertifizierung" |
pdf_data/report_metadata//ModDate | D:20160902171415+02'00' | D:20141113145650+01'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | LibreOffice 4.2 |
pdf_data/report_metadata//Subject | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | M5072 G11, Smart Card |
pdf_data/report_metadata//Title | ANSSI-CC-2016/59 | Certification Report BSI-DSZ-CC-0946-2014 |
pdf_data/report_metadata/pdf_file_size_bytes | 731540 | 990476 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_number_of_pages | 18 | 44 |
pdf_data/st_filename | ANSSI_cible2016_59en.pdf | 0946b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 37 | 20 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 9 | 6 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 3 | 5 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 4 | 1 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 5 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 9 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 | 1 | 4 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 5 | 11 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 2 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 2 | 3 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 8 | 4 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 10 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 16 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 24 | 31 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 11 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 49 | 47 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 27 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 24 | 12 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 16 | 30 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 19 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 11 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 11 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 13 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 1 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 22 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 15 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 15 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 13 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 21 | 14 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 8 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 7 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 3 | 2 |
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/ecc_curve/NIST |
|
|
pdf_data/st_keywords/ecc_curve/NIST/P-192 | 8 | 4 |
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 | 3 | 46 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 | 6 | 46 |
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 17 | 10 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 1 | 14 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 12 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 21 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing | 9 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 1 | 6 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 4 | 1 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 11 | 5 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-001 | 3 | 1 |
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-002 | 3 | 1 |
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-003 | 3 | 1 |
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 22 | 27 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA | 1 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 10 | 4 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 3 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 9 | 5 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Windows 사용자 | Jürgen Noller |
pdf_data/st_metadata//CreationDate | D:20160704161852+09'00' | D:20140919112831+02'00' |
pdf_data/st_metadata//ModDate | D:20160704161852+09'00' | D:20141113155002+01'00' |
pdf_data/st_metadata//Title | ST_Klallam7_Ver1.1 | Security Target Lite |
pdf_data/st_metadata/pdf_file_size_bytes | 1379185 | 998321 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | http://www.bsi.bund.de/, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_number_of_pages | 105 | 82 |
dgst | b970e91a8ee93f36 | 367e0760557d990d |