This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software ANSSI-CC-2016/59 |
Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V3-2015 |
|
---|---|---|
name | S3FT9MH/S3FT9MV/S3FT9MG 16-bit RISC Microcontroller for Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software | Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software |
not_valid_before | 2016-08-26 | 2015-11-03 |
not_valid_after | 2021-08-26 | 2020-11-03 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2016_59en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V3b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. / Trusted Labs | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
security_level | ASE_TSS.2, EAL6+ | EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_59fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V3a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
state/report/pdf_hash | db137e34ae91187b2f065c68ead18ed8d8cb485c71ac9ae172e6d28524e714f8 | 152859bde53573b0dcd40d97470caeeb8c1bc4bc01f5ced60ba24571bf766b3d |
state/report/txt_hash | 1b654cd14f977145ddd04c3164fa6e4cea8b8b9e8406a5bc577b564b2549d2c2 | 8048dbf6fd04ed99921cfd83fe85f5fbfca11a46f5b78ec2a85f46c1aeb8e4f6 |
state/st/pdf_hash | d71f81cd92b03aa8dfa99d0ce1d768bc34b072bbb79bcc885cc4e97585a5c329 | 9797219f438a56fd4c679c17ca6a01dff54b960ce15f215a786eb744d62263e3 |
state/st/txt_hash | 63ee0be1a5dcad71b90d001733997d81bda6f0b92d6123c3c2ca19216817bff1 | 91961c6ffe33466532822f8dc8282cb967d030154d1ee4dbefe5cbb99ee5e71a |
heuristics/cert_id | ANSSI-CC-2016/59 | BSI-DSZ-CC-0827-V3-2015 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 16 | 1.01.0008, 1.03.006 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2017/24 | BSI-DSZ-CC-0827-V4-2016 |
heuristics/report_references/directly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0827-V2-2014 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2018/58v2, ANSSI-CC-2019/07, ANSSI-CC-2020/12, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2018/57, ANSSI-CC-2018/33, ANSSI-CC-2018/56v2, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2020/93, ANSSI-CC-2018/57v2, ANSSI-CC-2018/56, ANSSI-CC-2017/24, ANSSI-CC-2018/58 | CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V5-2017 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2015/66 | BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0791-2012 |
heuristics/scheme_data |
|
None |
heuristics/st_references/directly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | None |
heuristics/st_references/indirectly_referenced_by | ANSSI-CC-2019/07, ANSSI-CC-2018/53 | None |
pdf_data/report_filename | ANSSI-CC-2016_59fr.pdf | 0827V3a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 25 | 5 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 2 | 3 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 1 | 6 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 | 2 | 4 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_scheme | |
|
pdf_data/report_keywords/ecc_curve | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/TRNG |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 8 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 3 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/tee_name | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | Coralie | Bundesamt für Sicherheit in der Informationstechnik |
pdf_data/report_metadata//CreationDate | D:20160902171415+02'00' | D:20151120082832+01'00' |
pdf_data/report_metadata//Creator | Microsoft® Word 2010 | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.018 | "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software" |
pdf_data/report_metadata//ModDate | D:20160902171415+02'00' | D:20151120121430+01'00' |
pdf_data/report_metadata//Producer | Microsoft® Word 2010 | LibreOffice 4.2 |
pdf_data/report_metadata//Title | ANSSI-CC-2016/59 | Certification Report BSI-DSZ-CC-xxxx-200x |
pdf_data/report_metadata/pdf_file_size_bytes | 731540 | 1387317 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_number_of_pages | 18 | 46 |
pdf_data/st_filename | ANSSI_cible2016_59en.pdf | 0827V3b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 37 | 20 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 9 | 6 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 3 | 5 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 4 | 1 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 5 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 9 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 | 1 | 4 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 5 | 11 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 2 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 2 | 3 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 8 | 4 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 10 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 16 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 24 | 31 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 11 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 49 | 47 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 27 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 24 | 12 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 16 | 30 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 19 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 11 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 11 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 13 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 1 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 22 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 15 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 15 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 13 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 21 | 14 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 8 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 7 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 3 | 2 |
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/ecc_curve/NIST |
|
|
pdf_data/st_keywords/ecc_curve/NIST/P-192 | 8 | 4 |
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 | 3 | 47 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 | 6 | 47 |
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 17 | 11 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 1 | 14 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 12 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 21 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing | 9 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 1 | 6 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 4 | 1 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 11 | 5 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-001 | 3 | 1 |
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-002 | 3 | 1 |
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-003 | 3 | 1 |
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 22 | 27 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA | 1 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 10 | 4 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 3 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 9 | 5 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Windows 사용자 | Jürgen Noller |
pdf_data/st_metadata//CreationDate | D:20160704161852+09'00' | D:20150930134010 |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//ModDate | D:20160704161852+09'00' | D:20150930134010 |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//Title | ST_Klallam7_Ver1.1 | Security Target Lite |
pdf_data/st_metadata/pdf_file_size_bytes | 1379185 | 921413 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | http://www.bsi.bund.de/, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_number_of_pages | 105 | 85 |
dgst | b970e91a8ee93f36 | ce8e09d43878d381 |