This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software ANSSI-CC-2016/59 |
Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software BSI-DSZ-CC-0626-2009 |
|
---|---|---|
name | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software |
not_valid_before | 2016-08-26 | 2009-11-19 |
not_valid_after | 2021-08-26 | 2019-09-01 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_59en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0626b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. / Trusted Labs | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
security_level | ASE_TSS.2, EAL6+ | EAL5+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_59fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0626a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
state/report/pdf_hash | db137e34ae91187b2f065c68ead18ed8d8cb485c71ac9ae172e6d28524e714f8 | bbef53e635b9909e897d9d59b9a80570fc25906301272488be3c44705c880d65 |
state/report/txt_hash | 1b654cd14f977145ddd04c3164fa6e4cea8b8b9e8406a5bc577b564b2549d2c2 | 16c5fcd9284828d7cda621145647aa173ac12fee17aa14457c4f78ba9b7a7aab |
state/st/pdf_hash | d71f81cd92b03aa8dfa99d0ce1d768bc34b072bbb79bcc885cc4e97585a5c329 | af73a2fd0652815c43d2b73ec89f9a627d54368477271036cc921c416de4393e |
state/st/txt_hash | 63ee0be1a5dcad71b90d001733997d81bda6f0b92d6123c3c2ca19216817bff1 | e3e5f3eda603e1e5fecf1f6e993a0385b322e2b067687cfaa7d6899bfcd0c5df |
heuristics/cert_id | ANSSI-CC-2016/59 | BSI-DSZ-CC-0626-2009 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 16 | 1.1, 1.6, 1.0 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2017/24 | ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/12, ANSSI-CC-2011/16 |
heuristics/report_references/directly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0482-2008 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2018/58v2, ANSSI-CC-2019/07, ANSSI-CC-2020/12, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2018/57, ANSSI-CC-2018/33, ANSSI-CC-2018/56v2, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2020/93, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56, ANSSI-CC-2017/24, ANSSI-CC-2018/58 | ANSSI-CC-2011/79, ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/16, ANSSI-CC-2011/12, ANSSI-CC-2011/80 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
|
None |
heuristics/st_references/directly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/12, ANSSI-CC-2011/16 |
heuristics/st_references/directly_referencing | None | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0482-2008 |
heuristics/st_references/indirectly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/12, ANSSI-CC-2011/16 |
heuristics/st_references/indirectly_referencing | None | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008 |
pdf_data/report_filename | ANSSI-CC-2016_59fr.pdf | 0626a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM | 1 | 2 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 1 | 2 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 2 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 1 | 4 |
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS31 | 2 | 1 |
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 8 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata//Author | Coralie | Bundesamt für Sicherheit in der Informationstechnik |
pdf_data/report_metadata//CreationDate | D:20160902171415+02'00' | D:20091130143833+01'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.018 | "Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software, Infineon, Common Criteria, Certification, Zertifizierung, SmartCard Controller" |
pdf_data/report_metadata//ModDate | D:20160902171415+02'00' | D:20091204071714+01'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | StarOffice 9 |
pdf_data/report_metadata//Subject | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | Common Criteria Certification |
pdf_data/report_metadata//Title | ANSSI-CC-2016/59 | Certification Report BSI-DSZ-CC-0626-2009 |
pdf_data/report_metadata/pdf_file_size_bytes | 731540 | 950135 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | http://www.bsi.bund.de/ |
pdf_data/report_metadata/pdf_number_of_pages | 18 | 42 |
pdf_data/st_filename | ANSSI_cible2016_59en.pdf | 0626b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 37 | 11 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 3 | 4 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 4 | 1 |
pdf_data/st_keywords/cc_cert_id | |
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 | 2 | 3 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 4 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 2 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 2 | 4 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 4 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 24 | 51 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 4 | 7 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 11 | 31 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 53 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 19 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 15 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 11 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 11 | 24 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 3 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 1 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 15 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 15 | 16 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 6 | 9 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 6 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 3 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 21 | 7 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 6 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 13 | 3 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 4 | 3 |
pdf_data/st_keywords/certification_process | |
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 1 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 | 2 | 1 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 | 2 | 1 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 | 2 | 1 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 17 | 8 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 15 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 3 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 21 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 4 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 4 | 2 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 11 | 10 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-3 | 7 | 1 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 3 | 1 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 9 | 11 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC | 2 | 4 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Windows 사용자 | Steffen Heinkel |
pdf_data/st_metadata//CreationDate | D:20160704161852+09'00' | D:20091029135231Z |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//ModDate | D:20160704161852+09'00' | D:20091204071951+01'00' |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//Title | ST_Klallam7_Ver1.1 | Security Target |
pdf_data/st_metadata/pdf_file_size_bytes | 1379185 | 1052429 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | |
pdf_data/st_metadata/pdf_number_of_pages | 105 | 64 |
dgst | b970e91a8ee93f36 | 8e01b1f798f57a26 |