Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13
BSI-DSZ-CC-1110-V7-2024
Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
BSI-DSZ-CC-1110-V5-2022
name Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
not_valid_after 07.12.2028 29.04.2027
not_valid_before 30.09.2024 29.04.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V7c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V7a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V7b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5b_pdf.pdf
dgst c9a37b84dce3c739 158dba651191a5b8
heuristics/cert_id BSI-DSZ-CC-1110-V7-2024 BSI-DSZ-CC-1110-V5-2022
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/67, ANSSI-CC-2022/68, NSCIB-CC-0299278-CR, BSI-DSZ-CC-1162-V2-2023, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65, ANSSI-CC-2019/55-R01, BSI-DSZ-CC-1110-V6-2023, ANSSI-CC-2019/57-R01, NSCIB-CC-0299277-CR, ANSSI-CC-2019/56-R01, NSCIB-CC-175887-CR3, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01
heuristics/report_references/directly_referencing BSI-DSZ-CC-1110-V6-2023 BSI-DSZ-CC-1110-V4-2021
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/68, BSI-DSZ-CC-1162-V2-2023, ANSSI-CC-2020/88-R01, BSI-DSZ-CC-1110-V6-2023, ANSSI-CC-2019/57-R01, ANSSI-CC-2019/56-R01, BSI-DSZ-CC-1077-V2-2024, ANSSI-CC-2022/64, BSI-DSZ-CC-1243-2024, ANSSI-CC-2019/58-R01, ANSSI-CC-2022/67, ANSSI-CC-2020/87-R01, NSCIB-CC-0299278-CR, NSCIB-CC-0299277-CR, NSCIB-CC-175887-CR3, BSI-DSZ-CC-1110-V7-2024, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65, ANSSI-CC-2019/55-R01
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0891-2015 BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0891-2015
heuristics/scheme_data
  • category: Smart Cards and similar devices
  • cert_id: BSI-DSZ-CC-1110-V7-2024
  • certification_date: 2024-09-30
  • enhanced:
    • applicant: Infineon Technologies AG Am Campeon 1-15 85579 Neubiberg
    • assurance_level: EAL6+,ALC_FLR.1
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1110V7c_pdf.pdf?__blob=publicationFile&v=3
    • certification_date: 2024-09-30
    • description: The TOE is an integrated circuit (IC), providing a platform for an operating system and application software used in smartcards but also in any other device or form factor requiring a high level of resistance against attackers.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1110-V7-2024 (Ausstellungsdatum / Certification Date 30.09.2024, gültig bis / valid until 06.12.2028) Zertifizierungsreport / Certification Report', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-1110-V6-2023 (Ausstellungsdatum / Certification Date 07.12.2023, gültig bis / valid until 06.12.2028) Zertifizierungsreport / Certification Report', 'description': 'scope changed.'}), frozendict({'id': 'BSI-DSZ-CC-1110-V5-2022-MA-01', 'description': 'Certification Date'}), frozendict({'id': 'BSI-DSZ-CC-1110-V5-2022 (Ausstellungsdatum / Certification Date 29.04.2022, gültig bis / valid until 28.04.2027) Zertifizierungsreport / Certification Report', 'description': 'documentation were conducted.'}), frozendict({'id': 'BSI-DSZ-CC-1110-V4-2021 (Ausstellungsdatum / Certification Date 04.08.2021, gültig bis / valid until 03.08.2026) Zertifizierungsreport / Certification Report', 'description': 'documentation.'}), frozendict({'id': 'BSI-DSZ-CC-1110-V3-2020 (Ausstellungsdatum / Certification Date 13.05.2020, gültig bis / valid until 12.05.2025)', 'description': 'documentation.'}), frozendict({'id': 'BSI-DSZ-CC-1110-V2-2019 (Ausstellungsdatum / Certification Date 18.06.2019, gültig bis / valid until 17.06.2024)', 'description': 'is removed.'}), frozendict({'id': 'BSI-DSZ-CC-1110-2019 (Ausstellungsdatum / Certification Date 07.05.2019, gültig bis / valid until 06.05.2024) Zertifizierungsreport / Certification Report', 'description': 'Certificate'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 2028-12-06
    • product: Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1110V7a_pdf.pdf?__blob=publicationFile&v=3
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1110V7b_pdf.pdf?__blob=publicationFile&v=3
  • product: Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, …
  • subcategory: ICs, Cryptolib
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1110.html
  • vendor: Infineon Technologies AG
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2022/67, ANSSI-CC-2022/68, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65, ANSSI-CC-2019/55-R01, ANSSI-CC-2019/57-R01, ANSSI-CC-2019/56-R01, NSCIB-CC-175887-CR3, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2022/67, ANSSI-CC-2022/68, BSI-DSZ-CC-1176-2023, ANSSI-CC-2022/65, ANSSI-CC-2019/55-R01, ANSSI-CC-2019/57-R01, ANSSI-CC-2019/56-R01, NSCIB-CC-175887-CR3, ANSSI-CC-2022/64, ANSSI-CC-2019/58-R01
maintenance_updates
  • maintenance_date: 09.09.2022
  • maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1110V5ma1a_pdf.pdf
  • maintenance_st_link: None
  • maintenance_title: Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
pdf_data/cert_filename 1110V7c_pdf.pdf 1110V5c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1110-V7-2024: 1
  • DE:
    • BSI-DSZ-CC-1110-V5-2022: 1
pdf_data/cert_metadata
  • /Author: Federal Office for Information Security
  • /Subject: CC-Zertifizierung einer SmartCard der Infineon Technologies AG
  • /Title: Certification Report BSI-DSZ-CC-1110-V7-2024
  • pdf_file_size_bytes: 233278
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20220512164627+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, PP-0084, Security IC, Infineon Technologies AG"
  • /ModDate: D:20220512164813+02'00'
  • /Producer: LibreOffice 6.3
  • /Subject: Common Criteria Certification
  • /Title: Certificate BSI-DSZ-CC-1110-V5-2022
  • pdf_file_size_bytes: 257848
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1110V7a_pdf.pdf 1110V5a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 6 December 2028
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1110-V7-2024
    • cert_item: Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1110-V5-2022
    • cert_item: Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1110-V6-2023: 2
    • BSI-DSZ-CC-1110-V7-2024: 22
  • DE:
    • BSI-DSZ-CC-1110-: 1
    • BSI-DSZ-CC-1110-V4-2021: 1
    • BSI-DSZ-CC-1110-V5-2022: 23
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 6
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 2
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 3
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 3
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 6
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 9
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 27: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 1
    • AIS 38: 1
    • AIS 41: 1
    • AIS 46: 1
    • AIS 47: 1
    • AIS20: 2
    • AIS31: 3
  • FIPS:
    • FIPS180-4: 7
    • FIPS186-4: 2
    • FIPS197: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS #1: 7
  • RFC:
    • RFC 5639: 1
    • RFC5639: 3
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 27: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 1
    • AIS 38: 1
    • AIS 41: 1
    • AIS 46: 1
    • AIS 47: 1
    • AIS20: 1
    • AIS31: 2
  • FIPS:
    • FIPS 180-4: 7
    • FIPS186-4: 6
    • FIPS197: 3
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS #1: 16
  • RFC:
    • RFC 5639: 1
    • RFC5639: 5
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • IFX_CCI_00001Dh, IFX_CCI_000021h, IFX_CCI_000022h design step H13”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for the Product BSI-DSZ-CC-1110-V7-2024, Version 3, 2024-09-20: 1
    • Standards Compliance Verification”, Version 1, 2023-09-06, TÜV Informationstechnik GmbH (confidential document) [22] See table 2 in section B.2 33 / 36 Certification Report BSI-DSZ-CC-1110-V7-2024 C. Excerpts: 1
    • Technical Report - Summary”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • Version 3, 2023-12-01, ETR for composite evaluation (EFC), TÜV Informationstechnik GmbH (confidential document) and Addendum to ETR for composite Version 3, 2024-09-20, TÜV Informationstechnik GmbH: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • Table 2: Deliverables of the TOE Please note that NRG functionality, RFAPI and toolbox are out of scope of this evaluation, hence no evaluated TOE guidance documentation applies. However, respective: 1
    • out of scope: 1
  • ConfidentialDocument:
    • IFX_CCI_00001Dh, IFX_CCI_000021h, IFX_CCI_000022h design step H13”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for the Product BSI-DSZ-CC-1110-V5-2022, Version 1, 2022-03-29: 1
    • Standards Compliance Verification”, Version 1, 2022-01-21, TÜV Informationstechnik GmbH (confidential document) [22] See table 2 in section B.2 35 / 38 Certification Report BSI-DSZ-CC-1110-V5-2022 C. Excerpts: 1
    • Technical Report - Summary”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • Version 1, 2022-03-29, ETR for composite evaluation (EFC), TÜV Informationstechnik GmbH (confidential document) [11] See table 2 in section B.2 [12] See table 2 in section B.2 [13] See table 2 in section B.2: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • Table 2: Deliverables of the TOE Please note that NRG functionality, RFAPI and toolbox are out of scope of this evaluation, hence no evaluated TOE guidance documentation applies. However, respective: 1
    • and symmetric cryptography libraries and the supporting Toolbox libraries (note: Toolbox library is out of scope of the certification). The Flash Loader is a firmware located in the ROM and enables the download: 1
    • note: Toolbox library is out of scope of the certification: 1
    • out of scope: 2
pdf_data/report_metadata
pdf_data/st_filename 1110V7b_pdf.pdf 1110V5b_pdf.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL6: 164
    • EAL6 augmented: 160
    • EAL6+: 160
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL6: 169
    • EAL6 augmented: 165
    • EAL6+: 165
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_CMC.5: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 10
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 2
    • ALC_CMS: 2
    • ALC_CMS.4: 3
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 3
    • ALC_FLR.1: 10
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 6
    • ASE_CCL.1: 1
    • ASE_ECD: 3
    • ASE_ECD.1: 1
    • ASE_INT: 20
    • ASE_INT.1: 1
    • ASE_OBJ: 12
    • ASE_OBJ.2: 1
    • ASE_REQ: 60
    • ASE_REQ.2: 1
    • ASE_SPD: 7
    • ASE_SPD.1: 1
    • ASE_TSS: 24
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 3
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_CMC.5: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 10
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 2
    • ALC_CMS: 2
    • ALC_CMS.4: 3
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 3
    • ALC_FLR.1: 10
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 7
    • ASE_CCL.1: 1
    • ASE_ECD: 4
    • ASE_ECD.1: 1
    • ASE_INT: 22
    • ASE_INT.1: 1
    • ASE_OBJ: 13
    • ASE_OBJ.2: 1
    • ASE_REQ: 64
    • ASE_REQ.2: 1
    • ASE_SPD: 8
    • ASE_SPD.1: 1
    • ASE_TSS: 26
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 3
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 3
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 188
    • FCS_CKM.1: 43
    • FCS_CKM.2: 6
    • FCS_CKM.4: 50
    • FCS_COP: 287
    • FCS_COP.1: 54
    • FCS_RNG: 38
    • FCS_RNG.1: 15
  • FDP:
    • FDP_ACC: 15
    • FDP_ACC.1: 29
    • FDP_ACC.1.1: 1
    • FDP_ACF: 15
    • FDP_ACF.1: 26
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 19
    • FDP_ITC.1: 39
    • FDP_ITC.2: 39
    • FDP_ITT.1: 21
    • FDP_SDC: 1
    • FDP_SDC.1: 12
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 26
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 12
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 12
    • FDP_UIT.1.1: 1
  • FIA:
    • FIA_API: 3
    • FIA_API.1: 14
    • FIA_API.1.1: 1
  • FMT:
    • FMT_LIM: 35
    • FMT_LIM.1: 9
    • FMT_LIM.2: 8
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS.1: 35
    • FPT_ITT.1: 22
    • FPT_PHP.3: 34
    • FPT_TST: 5
    • FPT_TST.1: 11
    • FPT_TST.2: 30
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ACF: 1
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 3
  • FAU:
    • FAU_SAS: 3
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 228
    • FCS_CKM.1: 54
    • FCS_CKM.2: 8
    • FCS_CKM.4: 50
    • FCS_COP: 295
    • FCS_COP.1: 54
    • FCS_RNG: 38
    • FCS_RNG.1: 15
  • FDP:
    • FDP_ACC: 15
    • FDP_ACC.1: 29
    • FDP_ACC.1.1: 1
    • FDP_ACF: 15
    • FDP_ACF.1: 26
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 19
    • FDP_ITC.1: 39
    • FDP_ITC.2: 39
    • FDP_ITT.1: 21
    • FDP_SDC: 1
    • FDP_SDC.1: 12
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 26
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 12
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 12
    • FDP_UIT.1.1: 1
  • FIA:
    • FIA_API: 3
    • FIA_API.1: 14
    • FIA_API.1.1: 1
  • FMT:
    • FMT_LIM: 35
    • FMT_LIM.1: 9
    • FMT_LIM.2: 8
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 4
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS.1: 35
    • FPT_ITT.1: 22
    • FPT_PHP.3: 34
    • FPT_TST: 5
    • FPT_TST.1: 11
    • FPT_TST.2: 31
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ACF: 1
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 18
    • Infineon Technologies: 22
    • Infineon Technologies AG: 20
  • Infineon:
    • Infineon: 20
    • Infineon Technologies: 23
    • Infineon Technologies AG: 19
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 95
      • AES-128: 4
  • DES:
    • 3DES:
      • 3DES: 7
      • TDEA: 3
      • TDES: 66
      • Triple-DES: 3
      • TripleDES: 2
    • DES:
      • DES: 32
  • constructions:
    • MAC:
      • CBC-MAC: 6
      • CMAC: 42
  • AES_competition:
    • AES:
      • AES: 97
      • AES-128: 4
  • DES:
    • 3DES:
      • 3DES: 7
      • TDEA: 3
      • TDES: 67
      • Triple-DES: 3
      • TripleDES: 2
    • DES:
      • DES: 32
  • constructions:
    • MAC:
      • CBC-MAC: 6
      • CMAC: 42
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 40
  • SHA:
    • SHA1:
      • SHA-1: 31
      • SHA1: 11
    • SHA2:
      • SHA-2: 1
      • SHA-256: 29
      • SHA256: 11
  • MD:
    • MD5:
      • MD5: 40
  • SHA:
    • SHA1:
      • SHA-1: 31
      • SHA1: 11
    • SHA2:
      • SHA-2: 1
      • SHA-256: 29
      • SHA256: 10
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • Malfunction: 13
    • fault induction: 1
    • fault injection: 5
    • malfunction: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 13
    • Physical Probing: 2
    • SPA: 1
    • physical probing: 1
    • side channel: 20
  • other:
    • reverse engineering: 1
  • FI:
    • DFA: 3
    • Malfunction: 13
    • fault induction: 1
    • fault injection: 5
    • malfunction: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 12
    • Physical Probing: 2
    • SPA: 1
    • physical probing: 1
    • side channel: 19
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 1
    • AIS31: 24
    • AIS32: 10
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 197: 2
    • FIPS PUB 180-4: 2
    • FIPS PUB 186-4: 1
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 11770-3: 1
    • ISO/IEC 14443-4: 4
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18033: 2
    • ISO/IEC 18033-3: 8
    • ISO/IEC 18092: 2
    • ISO/IEC 9797-1: 7
    • ISO/IEC 9798-2: 2
    • ISO/IEC14443-3: 1
  • NIST:
    • SP 800-22: 1
    • SP 800-38A: 16
    • SP 800-38B: 4
    • SP 800-67: 4
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 2
  • BSI:
    • AIS 31: 1
    • AIS31: 24
    • AIS32: 10
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 197: 2
    • FIPS PUB 180-4: 2
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 11770-3: 1
    • ISO/IEC 14443-4: 4
    • ISO/IEC 14888-3: 1
    • ISO/IEC 18033: 2
    • ISO/IEC 18033-3: 8
    • ISO/IEC 18092: 2
    • ISO/IEC 9797-1: 7
    • ISO/IEC 9798-2: 2
    • ISO/IEC14443-3: 1
  • NIST:
    • SP 800-22: 1
    • SP 800-38A: 16
    • SP 800-38B: 4
    • SP 800-67: 4
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 2
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different