Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Workspace ONE Boxer Email Client 5.4
CCEVS-VR-VID-10840
Infineon IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional ACL v3.04.001, optional ACL v3.05.002, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC-dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001
NSCIB-CC-2200060-02-CR
name VMware Workspace ONE Boxer Email Client 5.4 Infineon IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional ACL v3.04.001, optional ACL v3.05.002, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC-dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US NL
status archived active
not_valid_after 27.06.2021 30.08.2029
not_valid_before 27.06.2019 30.08.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10840-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200060-02-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10840-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200060-02-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10840-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200060-02-ST_lite_v2.6.pdf
manufacturer VMware Inc. Infineon Technologies AG
manufacturer_web https://www.vmware.com https://www.infineon.com/
security_level {} EAL6+, ALC_FLR.1
dgst ba98236dc7090775 6b6c005285b16441
heuristics/cert_id CCEVS-VR-VID-10840 NSCIB-CC-2200060-02-CR
heuristics/cert_lab US
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 5.4 2.13.001, 1.13.001, 3.04.001, 2.01.6198, 8.06.001, 1.10.006, 3.05.002, 80.203.00.3, 3.03.003
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-1158-V3-2025
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-1158-V3-2025
heuristics/scheme_data
  • category: Application Software, Email Client
  • certification_date: 27.06.2019
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 27.06.2021
  • id: CCEVS-VR-VID10840
  • product: VMware Workspace ONE Boxer Email Client 5.4
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10840
  • vendor: VMware, LLC
heuristics/protection_profiles 1aeebf1c5963b606 cf0f01bcd7be3e9c
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_v1.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename st_vid10840-ci.pdf NSCIB-CC-2200060-02-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10840-2019: 1
  • NL:
    • NSCIB-2200060-02: 1
    • NSCIB-CC-2200060-02: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.3: 1
pdf_data/cert_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190703103801-04'00'
  • /ModDate: D:20190703103936-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 188325
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Valerie
  • /CreationDate: D:20240902124133+01'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20240902124133+01'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 88337
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10840-vr.pdf NSCIB-CC-2200060-02-CR.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID10840
    • cert_item: VMware Workspace ONE Boxer Email Client 5.4
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-2200060-02-CR
    • cert_item: IFX_CCI_00003Fh IFX_CCI_000059h IFX_CCI_00005Bh IFX_CCI_00003Ch IFX_CCI_00003Dh IFX_CCI_00005Ah design step G11 and H11 with optional HSL v2.01.6198, optional SCL v2.13.001, optional ACL v3.03.003, optional ACL v3.04.001, optional ACL v3.05.002, optional HCL v1.13.001, optional RCL v1.10.006 and with specific IC- dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001 v1.13.001, optional RCL v1.10.006 and with specific IC- dedicated firmware identifier 80.203.00.3 and Flash Loader v8.06.001
    • cert_lab:
    • developer: Infineon Technologies AG
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10840: 1
  • NL:
    • NSCIB-2200060-02: 3
    • NSCIB-CC-2200060-02-CR: 13
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_TSU_EXT.1: 1
  • ALC:
    • ALC_FLR.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM_EXT.5.3: 1
    • FCS_COP.1: 1
    • FCS_RBG_EXT.1.1: 1
    • FCS_STO_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.FLAWED_ADDON: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Samsung:
    • Samsung: 1
  • Infineon:
    • Infineon Technologies AG: 3
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • TDES: 6
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 8
      • TLS v1.2: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RNG: 7
pdf_data/report_keywords/cipher_mode
  • CTR:
    • CTR: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 3
    • JIL-AM: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • following proprietary or non-standard algorithms, protocols and implementations: none, which are out of scope as there are no security claims relating to these. Not all key sizes specified in the [ST] have: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20190703073405-04'00'
  • /ModDate: D:20190703073405-04'00'
  • pdf_file_size_bytes: 972360
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename st_vid10840-st.pdf NSCIB-CC-2200060-02-ST_lite_v2.6.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL6: 125
    • EAL6 augmented: 122
    • EAL6+: 123
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 5
    • ALC_CMS.1: 6
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN.1: 7
  • ADV:
    • ADV_ARC.1: 1
    • ADV_CMC.5: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 7
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 3
    • ALC_CMC.5: 2
    • ALC_CMS: 2
    • ALC_CMS.4: 2
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.1: 2
    • ALC_DVS.2: 4
    • ALC_FLR.1: 11
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 10
    • ASE_CCL.1: 1
    • ASE_ECD: 4
    • ASE_ECD.1: 1
    • ASE_INT: 25
    • ASE_INT.1: 1
    • ASE_OBJ: 9
    • ASE_OBJ.2: 1
    • ASE_REQ: 48
    • ASE_REQ.2: 1
    • ASE_SPD: 8
    • ASE_SPD.1: 1
    • ASE_TSS: 17
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 3
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_AEX_EXT.1.1: 1
    • FCS_CKM: 3
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 6
    • FCS_CKM_EXT: 6
    • FCS_CKM_EXT.1: 6
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.3: 4
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.4: 6
    • FCS_CKM_EXT.5: 10
    • FCS_CKM_EXT.5.1: 3
    • FCS_CKM_EXT.5.3: 2
    • FCS_COP.1: 28
    • FCS_COP.1.1: 4
    • FCS_COP_EXT: 2
    • FCS_COP_EXT.2: 9
    • FCS_COP_EXT.2.1: 2
    • FCS_IVG_EXT: 2
    • FCS_IVG_EXT.1: 4
    • FCS_IVG_EXT.1.1: 1
    • FCS_KYC_EXT: 2
    • FCS_KYC_EXT.1: 5
    • FCS_KYC_EXT.1.1: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 3
    • FCS_RBG_EXT.2: 3
    • FCS_RBG_EXT.2.1: 1
    • FCS_RBG_EXT.2.2: 1
    • FCS_STO_EXT.1: 22
    • FCS_STO_EXT.1.1: 5
    • FCS_TLSC_EXT: 6
    • FCS_TLSC_EXT.1: 12
    • FCS_TLSC_EXT.1.1: 5
    • FCS_TLSC_EXT.1.2: 5
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.1.4: 2
    • FCS_TLSC_EXT.2: 4
    • FCS_TLSC_EXT.2.1: 4
    • FCS_TLSC_EXT.4: 5
    • FCS_TLSC_EXT.4.1: 2
    • FCS_TLSS_EXT.1: 1
    • FCS_TLSS_EXT.1.1: 4
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.1.4: 1
    • FCS_TLSS_EXT.1.5: 1
    • FCS_TLSS_EXT.2.4: 1
    • FCS_TLS_EXT.2.1: 1
    • FCS_TLS_EXT.4.1: 1
  • FDP:
    • FDP_DAR_EXT: 3
    • FDP_DAR_EXT.1: 4
    • FDP_DEC_EXT.1: 8
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 2
    • FDP_NET_EXT: 2
    • FDP_NET_EXT.1: 3
    • FDP_NET_EXT.1.1: 1
    • FDP_NOT_EXT: 2
    • FDP_NOT_EXT.1: 3
    • FDP_NOT_EXT.1.1: 1
  • FIA:
    • FIA_SASL_EXT.1: 3
  • FMT:
    • FMT_CFG_EXT: 2
    • FMT_CFG_EXT.1: 4
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT: 2
    • FMT_MEC_EXT.1: 6
    • FMT_MEC_EXT.1.1: 3
    • FMT_MOD_EXT.1: 2
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 3
  • FPR:
    • FPR_ANO_EXT: 2
    • FPR_ANO_EXT.1: 3
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT: 2
    • FPT_AEX_EXT.1: 3
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 3
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 2
    • FPT_AON_EXT: 2
    • FPT_AON_EXT.1: 3
    • FPT_AON_EXT.1.1: 1
    • FPT_API_EXT: 2
    • FPT_API_EXT.1: 3
    • FPT_API_EXT.1.1: 1
    • FPT_LIB_EXT: 2
    • FPT_LIB_EXT.1: 3
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.1.6: 1
  • FTP:
    • FTP_DIT_EXT.1: 12
    • FTP_DIT_EXT.1.1: 2
    • FTP_ITC_EXT: 2
    • FTP_ITC_EXT.1: 4
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
  • FAU:
    • FAU_SAS: 3
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 106
    • FCS_CKM.1: 33
    • FCS_CKM.2: 4
    • FCS_CKM.4: 29
    • FCS_COP: 191
    • FCS_COP.1: 30
    • FCS_RNG: 61
    • FCS_RNG.1: 18
  • FDP:
    • FDP_ACC: 17
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 1
    • FDP_ACF: 17
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_AFC: 1
    • FDP_IFC.1: 16
    • FDP_ITC.1: 23
    • FDP_ITC.2: 23
    • FDP_ITT.1: 14
    • FDP_PHP.3: 1
    • FDP_SDC: 2
    • FDP_SDC.1: 12
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 14
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 16
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 16
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 3
    • FIA_API.1: 13
    • FIA_API.1.1: 1
    • FIA_SOS.2: 2
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
  • FMT:
    • FMT_ACF: 1
    • FMT_LIM: 29
    • FMT_LIM.1: 12
    • FMT_LIM.2: 11
    • FMT_MSA.1: 17
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS.1: 22
    • FPT_ITC.1: 2
    • FPT_ITT.1: 15
    • FPT_PHP.3: 19
    • FPT_TST: 5
    • FPT_TST.1: 11
    • FPT_TST.2: 31
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 9
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ADDON_INTEGRITY: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.FLAWED_ADDON: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • O:
    • O.AES: 4
    • O.RND: 4
    • O.TDES: 4
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Samsung:
    • Samsung: 10
  • Infineon:
    • Infineon: 12
    • Infineon Technologies: 21
    • Infineon Technologies AG: 31
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
      • AES-128: 1
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 4
  • AES_competition:
    • AES:
      • AES: 43
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 28
      • Triple-DES: 2
    • DES:
      • DES: 18
  • constructions:
    • MAC:
      • CBC-MAC: 9
      • CMAC: 7
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • Diffie-Hellman: 7
    • DSA:
      • DSA: 1
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
    • SHA2:
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 4
  • MD:
    • MD5:
      • MD5: 13
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 14
    • SHA2:
      • SHA-2: 1
      • SHA256: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
    • Key agreement: 2
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 48
      • TLS 1.2: 2
      • TLS v1.2: 6
      • TLSv1.2: 2
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 16
  • RNG:
    • RBG: 1
    • RNG: 1
  • PRNG:
    • DRBG: 20
    • PRNG: 1
  • RNG:
    • RND: 5
    • RNG: 34
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 15
  • CFB:
    • CFB: 7
  • CTR:
    • CTR: 9
  • ECB:
    • ECB: 17
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 2
  • OpenSSL:
    • OpenSSL: 18
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • Malfunction: 11
    • malfunction: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 11
    • Physical Probing: 2
    • SPA: 1
    • physical probing: 1
    • side channel: 7
    • side-channel: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-009-001: 1
    • CCMB-2012-009-002: 1
    • CCMB-2012-009-003: 1
    • CCMB-2012-009-004: 1
  • FIPS:
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 6
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-132: 2
    • NIST SP 800-38A: 1
    • NIST SP 800-38F: 4
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 3
    • SP 800-56B: 1
  • RFC:
    • RFC 2560: 2
    • RFC 5246: 6
    • RFC 5280: 5
    • RFC 5289: 16
    • RFC 5751: 2
    • RFC 6125: 3
    • RFC5280: 1
    • RFC5759: 1
  • X509:
    • X.509: 9
  • BSI:
    • AIS20: 1
    • AIS31: 9
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 4
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-4: 2
  • ISO:
    • ISO/IEC 11770-3: 1
    • ISO/IEC 14888-3: 6
    • ISO/IEC 15946-1: 1
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9797-1: 2
    • ISO/IEC 9798-2: 1
  • NIST:
    • SP 800-108: 1
    • SP 800-38A: 9
    • SP 800-38B: 5
    • SP 800-67: 5
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 8
  • RFC:
    • RFC 5639: 1
pdf_data/st_keywords/javacard_packages
  • com:
    • com.android: 26
    • com.android.support: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • SFRs related to the TOE authentication are regarded as not applicable, due to the fact that it is out of scope of the intended use-case and the authentication functionality is no longer available. End of note: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Jürgen Noller
  • /CreationDate: D:20240816140000+02'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /Keywords: Infineon, EAL6 +, EAL6 plus, PP0084, SmartCard
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_ActionId: d341d1f5-358b-49ec-b185-c3480f3a71fb
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_ContentBits: 0
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Enabled: true
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Method: Standard
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_Name: a15a25aa-e944-415d-b7a7-40f6b9180b6b
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_SetDate: 2024-08-16T08:21:51Z
  • /MSIP_Label_a15a25aa-e944-415d-b7a7-40f6b9180b6b_SiteId: eeb8d0e8-3544-41d3-aac6-934c309faf5a
  • /ModDate: D:20240816140000+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: Public Security Target
  • pdf_file_size_bytes: 1233413
  • pdf_hyperlinks: mailto:[email protected];[email protected]?subject=Document%20question%20, http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html, http://www.ietf.org/rfc/rfc5639.txt, http://www.infineon.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 121
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different