This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software ANSSI-CC-2016/59 |
Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software BSI-DSZ-CC-0523-2008 |
|
---|---|---|
name | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software |
not_valid_before | 2016-08-26 | 2008-11-06 |
not_valid_after | 2021-08-26 | 2019-09-01 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_59en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523b.pdf |
manufacturer | Samsung Electronics Co., Ltd. / Trusted Labs | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
security_level | ASE_TSS.2, EAL6+ | EAL5+, ALC_DVS.2, AVA_VLA.4, AVA_MSU.3 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_59fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523a.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 6, 9), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a13, SLE66CLX1600PE / m1596-a13, SLE66CLX1600PES / m1597-a13, SLE66CX1600PE / m1598-a13, SLE66CLX1440PEM / m2090-a13, SLE66CLX1440PE / m2091-a13, SLE66CLX1440PES / m2092-a13, SLE66CX1440PE / m2093-a13, SLE66CLX1280PEM / m2094-a13, SLE66CLX1280PE / m2095-a13,SLE66CLX1280PES / m2096-a13, SLE66CX1280PE / m2097-a13 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523_ma1.pdf', 'maintenance_st_link': None}) | |
state/report/pdf_hash | db137e34ae91187b2f065c68ead18ed8d8cb485c71ac9ae172e6d28524e714f8 | 836c4ed42f5227f6ba526bc232f151077b64a66f6956313d8e4fb8713f01b894 |
state/report/txt_hash | 1b654cd14f977145ddd04c3164fa6e4cea8b8b9e8406a5bc577b564b2549d2c2 | a71f16256c05ed9983050e1b7b1d49213e6de7c78defd6df929f30e3348a7cb0 |
state/st/pdf_hash | d71f81cd92b03aa8dfa99d0ce1d768bc34b072bbb79bcc885cc4e97585a5c329 | ca4d30daecee6150e7980d6237727848302823a11650164bb0923c7a532ec92c |
state/st/txt_hash | 63ee0be1a5dcad71b90d001733997d81bda6f0b92d6123c3c2ca19216817bff1 | 900db4392c40ea5514bb1e1cabb1d1d44826de2eb07eafd1bb54f8205c603981 |
heuristics/cert_id | ANSSI-CC-2016/59 | BSI-DSZ-CC-0523-2008 |
heuristics/cert_lab | CEA | None |
heuristics/extracted_versions | 16 | 1.1, 1.5 |
heuristics/indirect_transitive_cves | None | CVE-2021-3011 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2017/24 | ANSSI-CC-2011/79, ANSSI-CC-2011/10, BSI-DSZ-CC-0593-2009, ANSSI-CC-2011/13, ANSSI-CC-2011/16, ANSSI-CC-2011/12, BSI-DSZ-CC-0630-2010, ANSSI-CC-2011/80 |
heuristics/report_references/directly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2018/58v2, ANSSI-CC-2019/07, ANSSI-CC-2020/12, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2018/57, ANSSI-CC-2018/33, ANSSI-CC-2018/56v2, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2020/93, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56, ANSSI-CC-2017/24, ANSSI-CC-2018/58 | ANSSI-CC-2011/79, ANSSI-CC-2011/10, BSI-DSZ-CC-0593-2009, ANSSI-CC-2011/13, ANSSI-CC-2011/16, ANSSI-CC-2011/12, BSI-DSZ-CC-0630-2010, ANSSI-CC-2011/80, BSI-DSZ-CC-0784-2013 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
|
None |
heuristics/st_references/directly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | BSI-DSZ-CC-0630-2010 |
heuristics/st_references/directly_referencing | None | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0430-2008, BSI-DSZ-CC-0482-2008 |
heuristics/st_references/indirectly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | BSI-DSZ-CC-0630-2010 |
heuristics/st_references/indirectly_referencing | None | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0430-2008, BSI-DSZ-CC-0482-2008 |
pdf_data/report_filename | ANSSI-CC-2016_59fr.pdf | 0523a.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 25 | 52 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM | 1 | 2 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 1 | 2 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 2 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 1 | 4 |
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 9 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata//Author | Coralie | Bundesamt für Sicherheit in der Informationstechnik |
pdf_data/report_metadata//CreationDate | D:20160902171415+02'00' | D:20081117105441+01'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.018 | "Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12,SLE66CLX1600PE / m1596-a12,SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12,SLE66CLX1440PEM / m2090-a12,SLE66CLX1440PE / m2091-a12,SLE66CLX1440PES / m2092-a12,SLE66CX1440PE / m2093-a12,SLE66CLX1280PEM / m2094-a12,SLE66CLX1280PE / m2095-a12,SLE66CLX1280PES / m2096-a12,SLE66CX1280PE / m2097-a12all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software, Infineon Technologies AG, BSI-DSZ-CC-0523-2008, SmartCard Controller" |
pdf_data/report_metadata//ModDate | D:20160902171415+02'00' | D:20081120082435+01'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | StarOffice 8 |
pdf_data/report_metadata//Subject | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | Common Criteria Certification |
pdf_data/report_metadata//Title | ANSSI-CC-2016/59 | Certification Report BSI-DSZ-CC-0523-2008 |
pdf_data/report_metadata/pdf_file_size_bytes | 731540 | 551749 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | http://www.bsi.bund.de/ |
pdf_data/report_metadata/pdf_number_of_pages | 18 | 42 |
pdf_data/st_filename | ANSSI_cible2016_59en.pdf | 0523b.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 37 | 47 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 3 | 4 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 4 | 1 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_cert_id | |
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 | 2 | 3 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 4 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 2 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 2 | 4 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 4 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 24 | 49 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 4 | 7 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 11 | 30 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 45 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 19 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 15 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 11 | 24 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 11 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 3 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 1 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 15 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 15 | 16 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 6 | 9 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 6 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 3 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 21 | 7 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 6 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 13 | 3 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 4 | 3 |
pdf_data/st_keywords/certification_process | |
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 3 | 1 |
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 17 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 15 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 3 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 21 | 11 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 4 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 4 | 2 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 11 | 9 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 3 | 1 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 9 | 11 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Windows 사용자 | Buchmueller Hans-Ulrich |
pdf_data/st_metadata//CreationDate | D:20160704161852+09'00' | D:20081030093245Z |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Security Target_SLE66CLX1600PEx_a12_Derivates_1.2_03.doc - Microsoft Word |
pdf_data/st_metadata//ModDate | D:20160704161852+09'00' | D:20081120082822+01'00' |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Acrobat PDFWriter 5.0 for Windows NT |
pdf_data/st_metadata//Title | ST_Klallam7_Ver1.1 | CC EAL5+ Certification Security Target |
pdf_data/st_metadata/pdf_file_size_bytes | 1379185 | 442657 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | |
pdf_data/st_metadata/pdf_number_of_pages | 105 | 60 |
dgst | b970e91a8ee93f36 | 4befd70d36bd82c3 |