Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02
JISEC-CC-CRP-C0536
Infineon Smart Card IC (Security Controller) SLE66CX162PE /m1531-a24 and SLE66CX80PE / m1533-a24 both optional with RSA2048 V1.5 and ECC V1.1 and both with specific IC dedicated software
BSI-DSZ-CC-0470-2008
name Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02 Infineon Smart Card IC (Security Controller) SLE66CX162PE /m1531-a24 and SLE66CX80PE / m1533-a24 both optional with RSA2048 V1.5 and ECC V1.1 and both with specific IC dedicated software
category Access Control Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 13.02.2022 01.09.2019
not_valid_before 13.02.2017 08.08.2008
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0470a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0470b.pdf
manufacturer Hitachi, Ltd. Infineon Technologies AG
manufacturer_web https://www.hitachi.com/ https://www.infineon.com/
security_level EAL2+, ALC_FLR.1 EAL5+, AVA_VLA.4, AVA_MSU.3, ALC_DVS.2
dgst bd28ac0feda9039e fabb14269f06c080
heuristics/cert_id JISEC-CC-CRP-C0536 BSI-DSZ-CC-0470-2008
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ADV_INT.1, ATE_FUN.1, ADV_LLD.1, ADV_IMP.2, ADV_RCR.2, ATE_IND.2, AGD_USR.1, ADV_HLD.3, ADV_FSP.3, ALC_DVS.2, ATE_DPT.2, AVA_VLA.4, ATE_COV.2, AVA_MSU.3, ALC_LCD.2, ADV_SPM.3, AGD_ADM.1, AVA_SOF.1, ALC_TAT.2, AVA_CCA.1
heuristics/extracted_versions 8.0.1 1.5, 1.1
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0554-2009, BSI-DSZ-CC-0629-2010
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0344-2005
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0629-2010, BSI-DSZ-CC-0554-2009, BSI-DSZ-CC-0627-2009
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0344-2005, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0536
  • certification_date: 01.02.2017
  • claim: EAL2+ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0536_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is Hitachi Device Manager software and Hitachi Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). TOE security functionality The TOE provides the following security functionality: - Identification/authentication functionality(The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) - Access control functionality for storage resource information and for warning banner information - Warning banner functionality
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software
    • product_type: Access Control Device and Systems
    • report_link: https://www.ipa.go.jp/en/security/c0536_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0536_est.pdf
    • toe_version: 8.0.1-02
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.03.2022
  • supplier: Hitachi, Ltd.
  • toe_japan_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0536_it5576.html
  • toe_overseas_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0629-2010
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0629-2010
maintenance_updates
pdf_data/cert_filename c0536_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20170911161211+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /ModDate: D:20170911161350+09'00'
  • /Producer: Adobe PDF Library 11.0
  • /Title:
  • pdf_file_size_bytes: 453124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 1
pdf_data/report_filename c0536_erpt.pdf 0470a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0470-2008
    • cert_item: Infineon Smart Card IC (Security Controller) SLE66CX162PE /m1531-a24 and SLE66CX80PE / m1533-a24 both optional with RSA2048 V1.5 and ECC V1.1 and both with specific IC dedicated software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0536-01: 1
    • Certification No. C0536: 1
  • DE:
    • BSI-DSZ-CC-0344-2005: 5
    • BSI-DSZ-CC-0470: 2
    • BSI-DSZ-CC-0470-2008: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 2
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 3
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 2
    • ALC_TAT.2: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 1
    • A.CLIENTS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 2
    • A.SECURE_CHANNEL: 1
    • A.SRV_MGMT: 1
  • T:
    • T.ILLEGAL_ACCESS: 1
    • T.UNAUTHORISED_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Infineon:
    • Infineon: 12
    • Infineon AG: 21
    • Infineon Technologies: 5
    • Infineon Technologies AG: 11
  • Philips:
    • Philips: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • Triple-DES: 4
    • DES:
      • DES: 9
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 28
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 2048: 8
    • RSA2048: 19
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 5
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • BSI:
    • AIS 25: 3
    • AIS 26: 2
    • AIS 31: 4
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 1
    • AIS 36: 1
    • AIS 38: 1
    • AIS31: 1
  • FIPS:
    • FIPS140: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Test Laboratory: Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] Data Book – SLE66CxxxPE / MicroSlim, Security Controller Family incl. the errata sheet: 1
    • with RSA2048 V1.5 and ECC 1.1, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [8] Configuration Management Scope (ACM_SCP), SLE66CX162PE / m1531a24, SLE66CX80PE / m1533a24: 1
    • with optional libraries RSA2048, V1.5 and ECC V1.1, Version 1.3, from 2008-06-12, Infineon AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
pdf_data/report_metadata
  • /CreationDate: D:20171211090255+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20171211090339+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 207872
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 34
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20080827073603+02'00'
  • /Creator: Writer
  • /Keywords: "Infineon Smart Card IC (Security Controller) SLE66CX162PE /m1531-a24 and SLE66CX80PE / m1533-a24 both optional with RSA2048 V1.5 and ECC V1.1 and both with specific IC dedicated software, Infineon Technologies AG, Common Criteria, SmartCard, BSI-DSZ-CC-0470-2008"
  • /ModDate: D:20080827083027+02'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria Zertifizierung
  • /Title: Zertifizierungsreport BSI-DSZ-CC-0470-2008
  • pdf_file_size_bytes: 618906
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename c0536_est.pdf 0470b.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 8
    • EAL2 augmented: 3
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 4
    • EAL5: 4
    • EAL5 augmented: 1
    • EAL5+: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 3
    • ACM_SCP.2: 1
    • ACM_SCP.3: 5
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 5
    • ADV_HLD.3: 3
    • ADV_IMP.2: 3
    • ADV_INT.1: 3
    • ADV_LLD.1: 3
    • ADV_RCR.2: 3
    • ADV_SPM.1: 3
    • ADV_SPM.3: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.2: 4
    • ALC_LCD.2: 1
    • ALC_TAT.2: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_CCA.1: 2
    • AVA_MSU.3: 3
    • AVA_SOF: 4
    • AVA_SOF.1: 2
    • AVA_VLA.4: 4
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM.1: 49
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 7
    • FCS_CKM.4: 30
    • FCS_CKM.4.1: 3
    • FCS_COP.1: 45
    • FCS_COP.1.1: 4
    • FCS_RND: 2
    • FCS_RND.1: 4
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_CKM.2: 1
    • FDP_IFC.1: 14
    • FDP_ITC.1: 24
    • FDP_ITC.1.1: 3
    • FDP_ITC.1.2: 3
    • FDP_ITC.1.3: 3
    • FDP_ITC.2: 23
    • FDP_ITC.2.1: 3
    • FDP_ITC.2.2: 3
    • FDP_ITC.2.3: 3
    • FDP_ITC.2.4: 3
    • FDP_ITC.2.5: 3
    • FDP_ITT.1: 3
    • FDP_SDI.1: 17
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 15
    • FDP_SDI.2.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 32
    • FMT_MSA.2.1: 3
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
  • FPT:
    • FPT_AMT.1: 4
    • FPT_FLS.1: 6
    • FPT_ITT.1: 3
    • FPT_PHP.3: 7
    • FPT_SEP.1: 6
    • FPT_TDC.1: 3
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.2: 26
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 6
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 4
    • A.CLIENTS: 3
    • A.NETWORKS: 3
    • A.PASSWORD: 4
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.SRV_MGMT: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 9
    • O.PASSWORD: 7
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
  • O:
    • O.RND: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 4
  • Infineon:
    • Infineon: 2
    • Infineon Technologies AG: 8
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 21
      • Triple-DES: 1
    • DES:
      • DES: 11
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 45
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 13
  • FF:
    • DH:
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 2048: 2
    • RSA2048: 18
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 4
    • Malfunction: 15
    • malfunction: 3
  • SCA:
    • DPA: 6
    • Leak-Inherent: 11
    • Physical Probing: 2
    • SPA: 4
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • BSI:
    • AIS31: 10
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS PUB 46-3: 2
  • ISO:
    • ISO/IEC 7816: 6
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796-1: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • key length below 1024 bit are out of scope of the evaluation: 1
    • length below 1024 bit are out of scope of the evaluation), • Signature creation and verification according to ECDSA standard and key: 1
    • out of scope: 2
    • single DES is out of scope of the evaluation: 1
    • smart card applications, • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation), • Data encryption according to RSA standard with 1280 to 2048 bits key length: 1
pdf_data/st_metadata
  • /CreationDate: D:20171130192201+09'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20171130192201+09'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1103262
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
  • /Author: Hans-Ulrich Buchmüller
  • /CreationDate: D:20080820082557Z
  • /Creator: ST_SLE66CX162PE+CX80PE_a24_with_Libs_1.3_04.doc - Microsoft Word
  • /Keywords: Security Target, contact-based, Security Controller, public, document, resistance to attackers with high attack potential, Infineon Technologies
  • /ModDate: D:20080827083102+02'00'
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Subject: CC EAL5+ Certification Security Target
  • /Title: Security Target SLE66CX162PE, SLE66CX80PE a24
  • pdf_file_size_bytes: 321356
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 59
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different