Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software
BSI-DSZ-CC-0410-2007
Infineon Smart Card IC (Security Controller) SLE66CLX320P / m1559b19 and SLE66CLX321P / m1359b19 both with RSA2048 V1.3 and specific IC Dedicated Software
BSI-DSZ-CC-0337-2005
name NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software Infineon Smart Card IC (Security Controller) SLE66CLX320P / m1559b19 and SLE66CLX321P / m1359b19 both with RSA2048 V1.3 and specific IC Dedicated Software
not_valid_before 2007-07-05 2005-12-12
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0337b.pdf
manufacturer NXP Semiconductors Germany GmbH Business Line Identification Infineon Technologies AG
manufacturer_web https://www.nxp.com https://www.infineon.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0337a.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 9, 16), 'maintenance_title': 'NXP Smart Card Controller P5CD080V0B with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma6_pdf.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 11, 6), 'maintenance_title': 'NXP Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B, P5CC073V0B each with IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma7a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma7b_pdf.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 7, 7), 'maintenance_title': 'NXP Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B, P5CC073V0B with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma5a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma5b_pdf.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2008, 7, 29), 'maintenance_title': 'NXP Secure Smart Card Controller P5CD080V0B, P5CC080V0B, P5CN080V0B and P5CC073V0B with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma4.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2008, 7, 18), 'maintenance_title': 'NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B with additional delivery form MOB6 & Inlay', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma3a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma3b.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2007, 7, 6), 'maintenance_title': 'NXP Secure Smart Card Controller P5CC073V0B with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma1a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma1b.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2008, 4, 30), 'maintenance_title': 'NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software (BSI-DSZ-CC-0410-2007-MA-02)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0410_ma2.pdf', 'maintenance_st_link': None}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2005, 2, 6), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX320P/m1559-b22 and SLE66CLX321P/m1359-b22 both with RSA2048 V1.3 and specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0337_ma1.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2007, 9, 21), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX320P/m1559-b23 and SLE66CLX321P/m1359-b23 both with RSA2048 V1.3 and specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0337_ma3.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2007, 2, 9), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX320P/m1559-b23 and SLE66CLX321P/m1359-b23 both with RSA2048 V1.3 and specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0337_ma2.pdf', 'maintenance_st_link': None})
state/report/pdf_hash 8bfa9faa537ab0d79c4c4fea899b555c23a4de03aa876e95608a249a6b7cc510 dc0b5135632359c5136ce5b8e3287f5e3774b0c1e0f0b9decb61d6c5ab3aa0bb
state/report/txt_hash 0fcb736c085abc150e0ee46de70dfbdc0c18c966a81eef7c12926080039b409b 4803be3fa6900cd283ce13839cf2a185a62536633ff9873d4b2aa4361f07a0d6
state/st/pdf_hash 11323e656df03a89c14760ad787cf91e859887a7e51e6929341240bce7983b36 be085072663fdf087bcca837bc10b0df731eea431e494b23bc9596825f554d9c
state/st/txt_hash 6b4a0ba58317011f8a537d4bbf2a2d10d0fe661c20d78b186357d15753db9b37 4d9ed9d390750e1f10a890dc5401fa6799758fceecb2a85b748713d764949562
heuristics/cert_id BSI-DSZ-CC-0410-2007 BSI-DSZ-CC-0337-2005
heuristics/extracted_versions - 1.3
heuristics/indirect_transitive_cves CVE-2021-3011 None
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0643-2010, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0521-2008, ANSSI-CC-2008/14, BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0518-2008, ANSSI-CC-2009/20, BSI-DSZ-CC-0537-2009, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0604-2010, ANSSI-CC-2008/28, BSI-DSZ-CC-0446-2007, ANSSI-CC-2008/45, ANSSI-CC-2008/13, ANSSI-CC-2009/03, BSI-DSZ-CC-0463-2008, BSI-DSZ-CC-0603-2010, ANSSI-CC-2009/48, BSI-DSZ-CC-0567-2009, BSI-DSZ-CC-0680-2010, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0704-2010, BSI-DSZ-CC-0479-2008, BSI-DSZ-CC-0527-2008, BSI-DSZ-CC-0522-2008, BSI-DSZ-CC-0533-2009, BSI-DSZ-CC-0625-2010, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0582-2009, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0571-2008, ANSSI-CC-2009/19, BSI-DSZ-CC-0532-2008, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0506-2008, BSI-DSZ-CC-0658-2010, BSI-DSZ-CC-0575-2009, ANSSI-CC-2012/45, BSI-DSZ-CC-0673-2010, BSI-DSZ-CC-0608-2010, ANSSI-CC-2008/12, BSI-DSZ-CC-0634-2009 None
heuristics/report_references/directly_referencing BSI-DSZ-CC-0404-2007 BSI-DSZ-CC-0266-2005
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0861-2014, BSI-DSZ-CC-0694-2012, ANSSI-CC-2012/10, ANSSI-CC-2008/13, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0463-2008, BSI-DSZ-CC-0567-2009, BSI-DSZ-CC-0704-2010, BSI-DSZ-CC-0479-2008, BSI-DSZ-CC-0522-2008, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0674-2011, ANSSI-CC-2012/46, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, ANSSI-CC-2008/12, BSI-DSZ-CC-0700-2011, BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0744-2011, BSI-DSZ-CC-0609-2010, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0515-2009, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0604-2010, ANSSI-CC-2008/28, BSI-DSZ-CC-0730-2011, BSI-DSZ-CC-0603-2010, ANSSI-CC-2009/48, BSI-DSZ-CC-0680-2010, BSI-DSZ-CC-0798-2012, ANSSI-CC-2010/06, BSI-DSZ-CC-0527-2008, BSI-DSZ-CC-0642-2011, ANSSI-CC-2008/16, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0658-2010, ANSSI-CC-2010/27, ANSSI-CC-2010/59, BSI-DSZ-CC-0673-2010, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0634-2009, BSI-DSZ-CC-0643-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0521-2008, BSI-DSZ-CC-0447-2008, BSI-DSZ-CC-0518-2008, BSI-DSZ-CC-0576-2009, ANSSI-CC-2009/03, BSI-DSZ-CC-0440-2008, BSI-DSZ-CC-0528-2008, ANSSI-CC-2010/39, BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0533-2009, ANSSI-CC-2009/17, ANSSI-CC-2013/70, BSI-DSZ-CC-0532-2008, BSI-DSZ-CC-0506-2008, BSI-DSZ-CC-0575-2009, ANSSI-CC-2012/45, BSI-DSZ-CC-0439-2008, ANSSI-CC-2010/58, BSI-DSZ-CC-0661-2011, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0709-2010, ANSSI-CC-2008/14, BSI-DSZ-CC-0700-V2-2013, ANSSI-CC-2011/21, ANSSI-CC-2012/09, ANSSI-CC-2009/20, BSI-DSZ-CC-0537-2009, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0446-2007, ANSSI-CC-2008/45, BSI-DSZ-CC-0568-2008, ANSSI-CC-2009/08, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0731-2011, ANSSI-CC-2009/07, BSI-DSZ-CC-0625-2010, BSI-DSZ-CC-0582-2009, BSI-DSZ-CC-0571-2008, ANSSI-CC-2009/19, BSI-DSZ-CC-0417-2008 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0404-2007 BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-0643-2010, BSI-DSZ-CC-0521-2008, ANSSI-CC-2011/21, BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0518-2008, BSI-DSZ-CC-0537-2009, BSI-DSZ-CC-0515-2009, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0604-2010, BSI-DSZ-CC-0446-2007, BSI-DSZ-CC-0463-2008, BSI-DSZ-CC-0603-2010, BSI-DSZ-CC-0567-2009, BSI-DSZ-CC-0680-2010, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0704-2010, BSI-DSZ-CC-0527-2008, BSI-DSZ-CC-0522-2008, BSI-DSZ-CC-0533-2009, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0582-2009, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0571-2008, BSI-DSZ-CC-0532-2008, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0506-2008, BSI-DSZ-CC-0673-2010, BSI-DSZ-CC-0634-2009 None
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-0643-2010, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0521-2008, ANSSI-CC-2011/21, BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0518-2008, BSI-DSZ-CC-0537-2009, BSI-DSZ-CC-0515-2009, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0602-2009, BSI-DSZ-CC-0604-2010, BSI-DSZ-CC-0446-2007, BSI-DSZ-CC-0463-2008, BSI-DSZ-CC-0603-2010, BSI-DSZ-CC-0567-2009, BSI-DSZ-CC-0680-2010, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0704-2010, BSI-DSZ-CC-0527-2008, BSI-DSZ-CC-0522-2008, BSI-DSZ-CC-0533-2009, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0582-2009, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0571-2008, BSI-DSZ-CC-0532-2008, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0506-2008, BSI-DSZ-CC-0673-2010, BSI-DSZ-CC-0634-2009 None
pdf_data/report_filename 0410a.pdf 0337a.pdf
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0410-2007 BSI-DSZ-CC-0337-2005
pdf_data/report_frontpage/DE/cert_item NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software Infineon Smart Card IC (Security Controller) SLE66CLX320P / m1559b19 and SLE66CLX321P / m1359b19 both with RSA2048 V1.3 and specific IC Dedicated Software
pdf_data/report_frontpage/DE/developer NXP Semiconductors Germany GmbH Business Line Identification Infineon Technologies AG
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 32
    • RSA 2048: 5
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0410-2007: 24
    • BSI-DSZ-CC-0404-2007: 1
    • BSI-DSZ-CC-0410: 2
  • NL:
    • CC-0404-2007: 1
  • DE:
    • BSI-DSZ-CC-0337-2005: 26
    • BSI-DSZ-CC-0266-2005: 2
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0410-2007: 24
  • BSI-DSZ-CC-0404-2007: 1
  • BSI-DSZ-CC-0410: 2
  • BSI-DSZ-CC-0337-2005: 26
  • BSI-DSZ-CC-0266-2005: 2
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002-2001: 2
  • BSI-PP- 0002-2001: 2
  • BSI-PP-0002-: 1
  • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-PP-0002-2001 2 4
pdf_data/report_keywords/cc_sar/ACM/ACM_SCP 2 3
pdf_data/report_keywords/cc_sar/AVA/AVA_SOF 3 4
pdf_data/report_keywords/cc_sar/AVA/AVA_VLA 3 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL4: 9
  • EAL 5: 3
  • EAL 1: 1
  • EAL 7: 1
  • EAL 4: 2
  • EAL5: 8
  • EAL1: 5
  • EAL3: 4
  • EAL7: 4
  • EAL2: 3
  • EAL6: 3
  • EAL 5 augmented: 3
  • EAL5 augmented: 1
  • EAL4: 10
  • EAL5: 10
  • EAL 1: 1
  • EAL 7: 1
  • EAL 4: 1
  • EAL 5: 1
  • EAL5+: 1
  • EAL1: 5
  • EAL3: 4
  • EAL7: 4
  • EAL2: 3
  • EAL6: 3
  • EAL5 augmented: 3
  • EAL 5 augmented: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 2 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 3 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 augmented 3 1
pdf_data/report_keywords/cc_security_level/EAL/EAL4 9 10
pdf_data/report_keywords/cc_security_level/EAL/EAL5 8 10
pdf_data/report_keywords/cc_security_level/EAL/EAL5 augmented 1 3
pdf_data/report_keywords/cc_sfr/FCS
  • FCS_COP.1: 2
  • FCS_RND.1: 1
  • FCS_CKM.1: 1
  • FCS_CKM.4: 1
  • FCS_COP.1: 2
  • FCS_CKM.1: 1
  • FCS_RND.1: 1
pdf_data/report_keywords/cc_sfr/FDP
  • FDP_ACC.1: 2
  • FDP_ACF.1: 2
  • FDP_IFC.1: 1
  • FDP_ITT.1: 1
  • FDP_ITC.1: 1
  • FDP_ACC.1: 1
  • FDP_ACF.1: 1
  • FDP_IFC.1: 1
  • FDP_ITT.1: 1
  • FDP_SDI.1: 1
pdf_data/report_keywords/cc_sfr/FDP/FDP_ACC.1 2 1
pdf_data/report_keywords/cc_sfr/FDP/FDP_ACF.1 2 1
pdf_data/report_keywords/cc_sfr/FMT
  • FMT_MSA.1: 2
  • FMT_MSA.3: 2
  • FMT_SMF.1: 1
  • FMT_LIM.1: 1
  • FMT_LIM.2: 1
  • FMT_MSA.2: 1
  • FMT_SMR.1: 1
  • FMT_MSA.1: 1
  • FMT_MSA.3: 1
  • FMT_SMF.1: 1
  • FMT_LIM.1: 1
  • FMT_LIM.2: 1
pdf_data/report_keywords/cc_sfr/FMT/FMT_MSA.1 2 1
pdf_data/report_keywords/cc_sfr/FMT/FMT_MSA.3 2 1
pdf_data/report_keywords/cc_sfr/FPT
  • FPT_FLS.1: 1
  • FPT_ITT.1: 1
  • FPT_PHP.3: 1
  • FPT_SEP.1: 2
  • FPT_FLS.1: 1
  • FPT_ITT.1: 1
  • FPT_PHP.3: 1
  • FPT_SEP.1: 1
  • FPT_TST.2: 1
pdf_data/report_keywords/cc_sfr/FPT/FPT_SEP.1 2 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • Card Controllers, NXP Semiconductors, Business Line Identification, Version 1.2, March 7th, 2007 (confidential document) [7] Security Target Lite, Evaluation of the P5CD080V0B, P5CC080V0B, P5CN080V0B Secure Smart Card: 1
  • NXP P5CD080V0B Secure Smart Card Controller, version 1.0, Date from June 08th, 2007, (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German: 1
  • IC (Security Controller) SLE66CLX320P / m1559b19, SLE66CLX321P / m1359b19 both with RSA2048 V1.30 (confidential document) [8] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
  • AG, Security and Chipcard ICs, SLE66CxxxP, Security Controller Family, Data Book Version 08.04, (confidential document) [10] Confidential Errata and Information Sheet- SLE66CxxxP Products and Bondout, Version 05.05: 1
  • Report [11] SLE66CxxxP, Security Controller Family, Confidential Instruction Set, 05.01, (confidential document) [12] RSA 2048 bit Support, SLE66CX322P, RSA Interface Specification for Library V1.30, Version 12: 1
  • confidential document) [13] RSA 2048 bit Support, SLE66CX322P, Arithmetic Library for V1.30, Version 12.04 (confidential: 1
  • Application Note, SLE66CxxxP, Transfer of a ROM Mask from SLE66CxxS to SLE66CxxxP, Version 06.01(confidential document) [15] Confidential Application Note, SLE 66CxxxP and SLE 66CxxxPE, Testing the Random Number: 1
  • Version 11.04 (confidential document) [16] Confidential Application Note, SLE66xxxP, DDES – EC2, Accellerator, Version 02.04: 1
  • Application Note, SLE66CxxxP/ SLE66CxxxPE, Memory Encryption Decryption, Version 11.04 (confidential document) [18] Confidential Application Note, SLE66CxxxP, Using the active shield security feature, Version: 1
  • 02 (confidential document) [19] Confidential Application Note, SLE66CxxxP, Issues concerning EEPROM, Version 08.00: 1
  • document) [20] Confidential Application Note, SLE66CxxxP MMU-Memory Management Unit, Version 08.00 (confidential document) [21] Confidential Application Note, SLE66CxxxP, Fast Switching of PLL, Version 03.03 (confidential: 1
  • Security Advice concerning Program Flow Manipulation – SLE11/22/44/66CxxxS/ 66CxxxP, Version 10.00 (confidential document) [23] Confidential Application Note, SLE66CxxS, Secure Hash Algorithm SHA- 1, Version 01.98: 1
  • document) [24] Confidential Application Note, SLE66CxxxP, UART, Version 10.03 (confidential document) [25] Confidential Application Note, SLE66CxxS, SLE66CxxxP, Using the CRC, Version 03.01: 1
  • document) [26] Application Note, SLE66CxxxP, MMU Security Issues, Version 01,02 (confidential document) [27] Application Note, SLE66CXxxP, Infineon Chipcard Crypto API, Version 05.02 (confidential: 1
  • 28] Application Note, SLE66CLxxxP - Anticollision Type A, 03.03, 03.2003 Infineon (confidential document) [29] Application Note, SLE66CLxxxP - Anticollision Type B, 03.03, 03.2003 Infineon (confidential: 1
  • 30] Application Note, SLE66CLxxxP - Card Coil Design Guide, 09.05, 09.2005 Infineon (confidential document) [31] Application Note, SLE66CLxxxP – Contactless Protocol, 03.03, 03.2003 Infineon (confidential: 1
  • 32] Application Note, SLE66CLxxxP - Optimized CLEnergy performance, 10.05, 10.2005 Infineon (confidential document) [33] Application Note, SLE66CLxxxP - RF Interface Porting from SLE66CL160S, 03.03, 03.2003: 1
  • confidential document) [34] Infineon Technologies AG, Security and Chipcard ICs, SLE66CxxxP/PE, Security Programmers: 1
  • 03.05, 03.2005 (confidential document) [35] Infineon Technologies AG, Secure Mobile Solutions, SLE66CLX320P / m1559-b19, SLE66CLX321P : 1
  • Configuration Management Scope (ACM_SCP), Version 1.0, 5. July 2005 (i.e. TOE Configuration List, confidential document) [36] ETR-lite for composition, according to AIS 36, Version: 3, 6. December 2005 for the Product: 1
  • IC (Security Controller) SLE66CLX320P / m1559b19, SLE66CLX321P / m1359b19 both with RSA2048 V1.30 (confidential document) B-29 BSI-DSZ-CC-0337-2005 Certification Report This page is intentionally left blank. B-30: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 1
  • CBC:
    • CBC: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/randomness/RNG/RNG 4 6
pdf_data/report_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • Malfunction: 1
  • physical tampering: 1
  • malfunction: 1
  • Malfunction: 1
  • DFA: 2
pdf_data/report_keywords/side_channel_analysis/SCA
  • Physical Probing: 1
  • physical probing: 1
  • DPA: 1
  • SPA: 1
  • Physical Probing: 1
  • physical probing: 2
  • side channel: 1
  • DPA: 5
  • SPA: 2
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 1 5
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 1 2
pdf_data/report_keywords/side_channel_analysis/SCA/physical probing 1 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-3: 1
    • FIPS PUB 197: 1
  • BSI:
    • AIS 34: 2
    • AIS 32: 1
    • AIS 36: 4
    • AIS 25: 1
    • AIS 26: 2
    • AIS 31: 3
    • AIS 35: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
    • ISO/IEC15408: 2005: 1
  • BSI:
    • AIS 34: 2
    • AIS 32: 2
    • AIS 36: 4
    • AIS 25: 2
    • AIS 26: 3
    • AIS 31: 3
    • AIS31: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
    • ISO/IEC15408: 1999: 1
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 32: 1
  • AIS 36: 4
  • AIS 25: 1
  • AIS 26: 2
  • AIS 31: 3
  • AIS 35: 1
  • AIS 34: 2
  • AIS 32: 2
  • AIS 36: 4
  • AIS 25: 2
  • AIS 26: 3
  • AIS 31: 3
  • AIS31: 1
pdf_data/report_keywords/standard_id/BSI/AIS 25 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 26 2 3
pdf_data/report_keywords/standard_id/BSI/AIS 32 1 2
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408:2005: 3
  • ISO/IEC15408: 2005: 1
  • ISO/IEC 15408:1999: 1
  • ISO/IEC15408: 1999: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
  • DES:
    • DES:
      • DES: 4
      • DEA: 1
    • 3DES:
      • Triple-DES: 9
      • TDEA: 1
  • DES:
    • DES:
      • DES: 10
    • 3DES:
      • 3DES: 1
      • Triple-DES: 3
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 9
  • TDEA: 1
  • 3DES: 1
  • Triple-DES: 3
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 9 3
pdf_data/report_keywords/symmetric_crypto/DES/DES
  • DES: 4
  • DEA: 1
  • DES: 10
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 4 10
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 27
    • NXP Semiconductors: 19
  • Philips:
    • Philips: 1
  • Infineon:
    • Infineon: 32
    • Infineon Technologies AG: 16
    • Infineon Technologies: 2
  • Philips:
    • Philips: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 305168
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
  • /CreationDate: D:20070712132652+02'00'
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Creator: Acrobat PDFMaker 7.0.7 für Word
  • /Keywords: Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller , NXP Semiconductors Germany GmbH
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20070712143705+02'00'
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /SourceModified: D:20070712090200
  • /Title: Certification Report BSI-DSZ-CC-0410-2007
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 502473
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
  • /CreationDate: D:20060201131225+01'00'
  • /Subject: Certification Report BSI-DSZ-CC-0337-2005
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Creator: Acrobat PDFMaker 7.0.5 für Word
  • /Keywords: SLE66CLX320P / m1559b19 SLE66CLX321P / m1359b19
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20060530155001+02'00'
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /SourceModified: D:20060201121206
  • /Title: Infineon Smart Card IC (Security Controller)
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20070712132652+02'00' D:20060201131225+01'00'
pdf_data/report_metadata//Creator Acrobat PDFMaker 7.0.7 für Word Acrobat PDFMaker 7.0.5 für Word
pdf_data/report_metadata//Keywords Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller , NXP Semiconductors Germany GmbH SLE66CLX320P / m1559b19 SLE66CLX321P / m1359b19
pdf_data/report_metadata//ModDate D:20070712143705+02'00' D:20060530155001+02'00'
pdf_data/report_metadata//SourceModified D:20070712090200 D:20060201121206
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0410-2007 Infineon Smart Card IC (Security Controller)
pdf_data/report_metadata/pdf_file_size_bytes 305168 502473
pdf_data/report_metadata/pdf_number_of_pages 46 52
pdf_data/st_filename 0410b.pdf 0337b.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • RSA:
    • RSA2048: 8
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0410: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 3
  • O.HW_AES: 7
  • O.MF_FW: 7
  • O.MEM_ACCESS: 9
  • O.SFR_ACCESS: 7
  • O.CONFIG: 7
  • O.RND: 1
pdf_data/st_keywords/cc_claims/O/O.RND 3 1
pdf_data/st_keywords/cc_claims/T/T.RND 2 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0002-2001: 1
  • BSI-PP-0002: 2
pdf_data/st_keywords/cc_sar/ACM
  • ACM_AUT.1: 1
  • ACM_CAP.4: 2
  • ACM_SCP.3: 5
  • ACM_SCP.2: 4
  • ACM_SCP: 4
  • ACM_AUT: 1
  • ACM_CAP: 1
  • ACM_AUT.1: 2
  • ACM_CAP.4: 1
  • ACM_SCP.3: 5
  • ACM_SCP: 3
  • ACM_SCP.2: 1
pdf_data/st_keywords/cc_sar/ACM/ACM_AUT.1 1 2
pdf_data/st_keywords/cc_sar/ACM/ACM_CAP.4 2 1
pdf_data/st_keywords/cc_sar/ACM/ACM_SCP 4 3
pdf_data/st_keywords/cc_sar/ACM/ACM_SCP.2 4 1
pdf_data/st_keywords/cc_sar/ADO
  • ADO_DEL.2: 2
  • ADO_IGS.1: 2
  • ADO_IGS: 2
  • ADO_DEL: 2
  • ADO_DEL.2: 2
  • ADO_IGS.1: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.3: 6
  • ADV_HLD.3: 1
  • ADV_IMP.2: 1
  • ADV_INT.1: 1
  • ADV_LLD.1: 1
  • ADV_RCR.2: 1
  • ADV_SPM.3: 1
  • ADV_FSP.2: 4
  • ADV_FSP: 4
  • ADV_RCR: 4
  • ADV_SPM: 1
  • ADV_HLD: 1
  • ADV_LLD: 1
  • ADV_INT: 1
  • ADV_IMP: 1
  • ADV_FSP.3: 5
  • ADV_HLD.3: 3
  • ADV_IMP.2: 3
  • ADV_INT.1: 3
  • ADV_LLD.1: 3
  • ADV_RCR.2: 3
  • ADV_SPM.3: 2
  • ADV_FSP: 1
  • ADV_FSP.2: 1
  • ADV_SPM.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 4 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 4 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.3 6 5
pdf_data/st_keywords/cc_sar/ADV/ADV_HLD.3 1 3
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 1 3
pdf_data/st_keywords/cc_sar/ADV/ADV_INT.1 1 3
pdf_data/st_keywords/cc_sar/ADV/ADV_LLD.1 1 3
pdf_data/st_keywords/cc_sar/ADV/ADV_RCR.2 1 3
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.3 1 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 2
  • AGD_USR.1: 2
  • AGD_ADM: 2
  • AGD_USR: 2
  • AGD_ADM.1: 2
  • AGD_USR.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_LCD.2: 1
  • ALC_TAT.2: 1
  • ALC_DVS: 1
  • ALC_LCD: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 4
  • ALC_LCD.2: 1
  • ALC_TAT.2: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 2 4
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VLA.4: 3
  • AVA_CCA.1: 1
  • AVA_MSU.3: 1
  • AVA_SOF.1: 2
  • AVA_MSU: 2
  • AVA_MSU.3: 3
  • AVA_VLA.4: 4
  • AVA_CCA.1: 2
  • AVA_SOF.1: 2
  • AVA_SOF: 4
pdf_data/st_keywords/cc_sar/AVA/AVA_CCA.1 1 2
pdf_data/st_keywords/cc_sar/AVA/AVA_MSU.3 1 3
pdf_data/st_keywords/cc_sar/AVA/AVA_VLA.4 3 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 34
  • EAL 5: 4
  • EAL4: 4
  • EAL5+: 1
  • EAL4+: 1
  • EAL5 augmented: 1
  • EAL 5 augmented: 2
  • EAL4 augmented: 1
  • EAL5: 4
  • EAL 5: 4
  • EAL5 augmented: 1
  • EAL 5 augmented: 4
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented 2 4
pdf_data/st_keywords/cc_security_level/EAL/EAL5 34 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_RND.1: 5
    • FCS_RND.1.1: 1
    • FCS_COP.1: 26
    • FCS_COP.1.1: 2
    • FCS_CKM.1: 6
    • FCS_CKM.4: 4
    • FCS_CKM: 1
  • FDP:
    • FDP_IFC.1: 10
    • FDP_ITT.1: 6
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_ACC.1: 33
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 30
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_ITC: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MSA.2: 6
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.1: 29
    • FMT_SMR.1: 8
    • FMT_MSA.1.1: 2
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
  • FPT:
    • FPT_FLS.1: 7
    • FPT_ITT.1: 6
    • FPT_PHP.3: 7
    • FPT_SEP.1: 15
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_AMT.1: 1
  • FRU:
    • FRU_FLT.2: 7
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_RND: 2
    • FCS_RND.1: 4
    • FCS_COP.1: 27
    • FCS_CKM.1: 33
    • FCS_COP.1.1: 2
    • FCS_CKM.4: 20
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 4
    • FCS_CKM.4.1: 2
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ITT.1: 3
    • FDP_IFC.1: 11
    • FDP_ACC.1: 22
    • FDP_ACF.1: 15
    • FDP_SDI.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ACF.1.1: 1
    • FDP_ITC.1: 17
    • FDP_ITC.2: 16
    • FDP_SDI.1.1: 1
    • FDP_ITC.1.1: 2
    • FDP_ITC.1.2: 2
    • FDP_ITC.1.3: 2
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_CKM.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MSA.3: 15
    • FMT_MSA.1: 14
    • FMT_SMF.1: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 8
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 21
    • FMT_MSA.2.1: 2
  • FPT:
    • FPT_TST.2: 26
    • FPT_FLS.1: 5
    • FPT_SEP.1: 6
    • FPT_PHP.3: 7
    • FPT_ITT.1: 3
    • FPT_TST.1: 11
    • FPT_TST.2.1: 2
    • FPT_AMT.1: 4
    • FPT_TDC.1: 2
    • FPT_TST: 2
  • FRU:
    • FRU_FLT.2: 5
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND.1: 5
  • FCS_RND.1.1: 1
  • FCS_COP.1: 26
  • FCS_COP.1.1: 2
  • FCS_CKM.1: 6
  • FCS_CKM.4: 4
  • FCS_CKM: 1
  • FCS_RND: 2
  • FCS_RND.1: 4
  • FCS_COP.1: 27
  • FCS_CKM.1: 33
  • FCS_COP.1.1: 2
  • FCS_CKM.4: 20
  • FCS_CKM.1.1: 3
  • FCS_CKM.2: 4
  • FCS_CKM.4.1: 2
  • FCS_RND.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 6 33
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 4 20
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 26 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_RND.1 5 4
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_IFC.1: 10
  • FDP_ITT.1: 6
  • FDP_ITC.1: 6
  • FDP_ITC.2: 6
  • FDP_ACC.1: 33
  • FDP_ACC.1.1: 2
  • FDP_ACF.1: 30
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 2
  • FDP_ITC: 1
  • FDP_SDI.1: 1
  • FDP_ITT.1: 3
  • FDP_IFC.1: 11
  • FDP_ACC.1: 22
  • FDP_ACF.1: 15
  • FDP_SDI.1: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ACF.1.1: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 16
  • FDP_SDI.1.1: 1
  • FDP_ITC.1.1: 2
  • FDP_ITC.1.2: 2
  • FDP_ITC.1.3: 2
  • FDP_ITC.2.1: 2
  • FDP_ITC.2.2: 2
  • FDP_ITC.2.3: 2
  • FDP_ITC.2.4: 2
  • FDP_ITC.2.5: 2
  • FDP_CKM.2: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 33 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 30 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 10 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 6 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 6 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 6 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 1 15
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM.1: 3
  • FMT_LIM.2: 3
  • FMT_MSA.2: 6
  • FMT_MSA.3: 22
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.1: 29
  • FMT_SMR.1: 8
  • FMT_MSA.1.1: 2
  • FMT_SMF.1: 14
  • FMT_SMF.1.1: 1
  • FMT_LIM.1: 4
  • FMT_LIM.2: 4
  • FMT_MSA.3: 15
  • FMT_MSA.1: 14
  • FMT_SMF.1: 8
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 8
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 21
  • FMT_MSA.2.1: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 3 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 3 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 29 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 6 21
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 22 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 14 8
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 7
  • FPT_ITT.1: 6
  • FPT_PHP.3: 7
  • FPT_SEP.1: 15
  • FPT_SEP.1.1: 1
  • FPT_SEP.1.2: 1
  • FPT_AMT.1: 1
  • FPT_TST.2: 26
  • FPT_FLS.1: 5
  • FPT_SEP.1: 6
  • FPT_PHP.3: 7
  • FPT_ITT.1: 3
  • FPT_TST.1: 11
  • FPT_TST.2.1: 2
  • FPT_AMT.1: 4
  • FPT_TDC.1: 2
  • FPT_TST: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_AMT.1 1 4
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 7 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 6 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_SEP.1 15 6
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 7 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • single DES is out of scope of the evaluation: 1
    • key length below 1024 bit are out of scope of the evaluation: 1
    • 2005-06-03 Page: 5/48 • data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation), • data encryption according to RSA standard with 512 to 2048 bits key length: 1
    • length below 1024 bit are out of scope of the evaluation), • security sensors and physical countermeasures (e.g. shielding), • true random: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
  • RNG:
    • RND: 5
    • RNG: 11
  • RNG:
    • RNG: 6
    • RND: 2
pdf_data/st_keywords/randomness/RNG/RND 5 2
pdf_data/st_keywords/randomness/RNG/RNG 11 6
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 14
    • Physical Probing: 2
    • physical probing: 1
    • DPA: 1
    • timing attacks: 2
  • FI:
    • physical tampering: 1
    • Malfunction: 10
    • malfunction: 2
    • fault injection: 4
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 3
    • DPA: 5
  • FI:
    • Malfunction: 12
    • malfunction: 2
    • DFA: 3
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • Malfunction: 10
  • malfunction: 2
  • fault injection: 4
  • Malfunction: 12
  • malfunction: 2
  • DFA: 3
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 10 12
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 14
  • Physical Probing: 2
  • physical probing: 1
  • DPA: 1
  • timing attacks: 2
  • Leak-Inherent: 10
  • Physical Probing: 2
  • SPA: 3
  • DPA: 5
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 1 5
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 14 10
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-3: 3
    • FIPS PUB 197: 3
    • FIPS PUB 46: 1
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS PUB 46-3: 2
  • BSI:
    • AIS31: 7
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 14443: 4
    • ISO/IEC 9796-1: 3
    • ISO/IEC 7816: 4
pdf_data/st_keywords/standard_id/BSI/AIS31 3 7
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 46-3: 3
  • FIPS PUB 197: 3
  • FIPS PUB 46: 1
  • FIPS PUB 46-3: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 3 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 38
  • DES:
    • DES:
      • DES: 29
      • DEA: 2
    • 3DES:
      • Triple-DES: 10
      • TDEA: 3
      • Triple-DEA: 1
  • DES:
    • DES:
      • DES: 11
    • 3DES:
      • 3DES: 19
      • Triple-DES: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 10
  • TDEA: 3
  • Triple-DEA: 1
  • 3DES: 19
  • Triple-DES: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 10 1
pdf_data/st_keywords/symmetric_crypto/DES/DES
  • DES: 29
  • DEA: 2
  • DES: 11
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 29 11
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 85
    • NXP Semiconductors: 16
  • Philips:
    • Philips: 3
  • Infineon:
    • Infineon Technologies AG: 7
    • Infineon: 3
pdf_data/st_metadata
  • pdf_file_size_bytes: 650521
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 74
  • /ModDate: D:20070326103009+02'00'
  • /CreationDate: D:20070326102811+02'00'
  • /Title: Microsoft Word - st-lite_p5cd080v0b_v1_0.doc
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Author:
  • /SourceModified: D:20070326081846
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 493931
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 48
  • /CreationDate: D:20050729151612+02'00'
  • /_EmailSubject: STs für die CL-P Varianten
  • /Author: H.-J. Novinsky, H.-U. Buchmüller
  • /Version: 1.2
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /_AuthorEmailDisplayName: Buchmueller Hans-Ulrich (AIM CC SCM PS)
  • /Dokument: Security Target
  • /BausteinLangName1: SLE66CLX320P / m1559-b19
  • /BausteinLangName2: SLE66CLX321P / m1359-b19
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Jahr: 2005
  • /_AuthorEmail: [email protected]
  • /M-Nr.1: m1559
  • /M-Nr.2: m1359
  • /Datum: 2005-06-03
  • /BausteinVersion1: b19
  • /BausteinVersion2: b19
  • /ModDate: D:20050729151659+02'00'
  • /_AdHocReviewCycleID: 899612774
  • /Company: Infineon Technologies AG
  • /Classification: Public
  • /Baustein1: SLE66CLX320P
  • /Baustein2: SLE66CLX321P
  • /SourceModified: D:20050728142504
  • /Title: Security Target
  • pdf_hyperlinks:
pdf_data/st_metadata//Author H.-J. Novinsky, H.-U. Buchmüller
pdf_data/st_metadata//CreationDate D:20070326102811+02'00' D:20050729151612+02'00'
pdf_data/st_metadata//Creator Acrobat PDFMaker 6.0 for Word Acrobat PDFMaker 7.0 for Word
pdf_data/st_metadata//ModDate D:20070326103009+02'00' D:20050729151659+02'00'
pdf_data/st_metadata//Producer Acrobat Distiller 6.0 (Windows) Acrobat Distiller 7.0 (Windows)
pdf_data/st_metadata//SourceModified D:20070326081846 D:20050728142504
pdf_data/st_metadata//Title Microsoft Word - st-lite_p5cd080v0b_v1_0.doc Security Target
pdf_data/st_metadata/pdf_file_size_bytes 650521 493931
pdf_data/st_metadata/pdf_number_of_pages 74 48
dgst bcd0e4e3bb198e0b e0316cb21f31c5cb