Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
BSI-DSZ-CC-0827-2013
S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software (Revision 1 & 2)
ANSSI-CC-2019/22
name Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software (Revision 1 & 2)
scheme DE FR
not_valid_after 09.09.2014 13.05.2024
not_valid_before 22.02.2013 13.05.2019
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019-22fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019-22fr.pdf
manufacturer Infineon Technologies AG Samsung Electronics Co., Ltd.
manufacturer_web https://www.infineon.com/ https://www.samsung.com
security_level AVA_VAN.5, ALC_DVS.2, EAL5+ EAL6+, ASE_TSS.2
dgst cac36ad3c18fbc02 f0530d1f25533d1b
heuristics/cert_id BSI-DSZ-CC-0827-2013 ANSSI-CC-2019/22
heuristics/cert_lab BSI CEA
heuristics/extracted_sars ALC_CMS.5, APE_REQ.2, ASE_INT.1, APE_INT.1, ATE_FUN.1, ADV_IMP.1, ADV_SPM.1, ATE_DPT.3, ASE_TSS.1, APE_SPD.1, APE_ECD.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_FLR.3, ALC_DEL.1, APE_OBJ.2, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, APE_CCL.1, ASE_ECD.1 ASE_TSS.2, AVA_VAN.5
heuristics/extracted_versions 1.01.0008, 1.03.006 16, 1, 2
heuristics/next_certificates BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V8-2020 {}
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0827-V2-2014 ANSSI-CC-2020/06
heuristics/report_references/directly_referencing BSI-DSZ-CC-0791-2012 ANSSI-CC-2018/31
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-V3-2017, BSI-DSZ-CC-0827-V4-2016, ANSSI-CC-2016/60, BSI-DSZ-CC-0827-V7-2018, ANSSI-CC-2019/38, CSEC2014007, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0827-V2-2014 ANSSI-CC-2020/06
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0791-2012 ANSSI-CC-2016/65, ANSSI-CC-2016/01, ANSSI-CC-2014/20, ANSSI-CC-2014/84, ANSSI-CC-2015/60, ANSSI-CC-2018/31
heuristics/scheme_data
  • cert_id: ANSSI-CC-2019/22
  • description: Le produit évalué est « S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software, Revision 1 & 2 » développé par SAMSUNG ELECTRONICS CO. LTD.. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un supp
  • developer: Samsung Electronics Co.Ltd.
  • enhanced:
  • level: EAL6+
  • product: S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software
  • sponsor: Samsung Electronics Co.Ltd.
  • url: https://cyber.gouv.fr/produits-certifies/s3ft9mfs3ft9mts3ft9ms-16-bit-risc-microcontroller-smart-card-optional-secure-0
heuristics/st_references/directly_referencing {} ANSSI-CC-2018/31
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2018/31
maintenance_updates
protection_profiles
pdf_data/report_filename 0827a_pdf.pdf anssi-cc-2019-22fr.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0827-2013
    • cert_item: Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • FR:
    • cc_security_level: EAL 6 augmenté ASE_TSS.2
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2019/22
    • cert_item: S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software
    • cert_item_version: Revision 1 & 2
    • cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0791-2012: 3
    • BSI-DSZ-CC-0827-2013: 23
    • BSI-DSZ-CC-S-0007-2011: 1
    • BSI-DSZ-CC-S-0015-2012: 1
  • FR:
    • ANSSI-CC-2018/31: 2
    • ANSSI-CC-2019/22: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 4
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 5: 8
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 6: 2
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 1
  • Infineon:
    • Infineon: 5
    • Infineon Technologies: 17
    • Infineon Technologies AG: 22
  • Samsung:
    • Samsung: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 3
      • Triple-DES: 3
    • DES:
      • DES: 4
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 4
  • TRNG:
    • DTRNG: 11
pdf_data/report_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 6
    • physical tampering: 1
  • SCA:
    • DPA: 6
    • SPA: 5
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS31: 2
    • AIS32: 1
    • AIS47: 2
  • BSI:
    • AIS 31: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M9900 A21 including optional Software Libraries RSA - EC –: 1
    • Software Libraries RSA - EC – Toolbox – FTL, Version 1.3, 2013-01-22, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900 A21 including optional Software Libraries RSA - EC – Toolbox – FTL: 1
    • for the M9900 A21 with Crypto Libraries, Version 3, 2013-02-08, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M9900 A21, Version 3, 2013-02-08: 1
    • – FTL, Version 0.4, 2013-01-18, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006),2012-08-16: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20130311160734+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG"
  • /ModDate: D:20130311161303+01'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0827-2013
  • pdf_file_size_bytes: 1235472
  • pdf_hyperlinks: https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierung, http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
  • /Author: DUCLOS Charlene
  • /CreationDate: D:20190624113019+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.29
  • /ModDate: D:20190624113019+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software
  • /Title: ANSSI-CC-2019/22
  • pdf_file_size_bytes: 831150
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 0827b_pdf.pdf anssi-cc-2019-22fr.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2018/31: 2
    • ANSSI-CC-2019/22: 18
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 2
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL5: 6
    • EAL5 augmented: 2
  • EAL:
    • EAL 6: 2
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 4
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 11
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 23
    • FCS_CKM.1: 31
    • FCS_CKM.2: 5
    • FCS_CKM.4: 23
    • FCS_COP: 47
    • FCS_COP.1: 27
    • FCS_RNG: 12
    • FCS_RNG.1: 30
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 20
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 10
    • FDP_ITC.1: 17
    • FDP_ITC.2: 17
    • FDP_ITT.1: 13
    • FDP_PHP.3: 1
    • FDP_SDI.1: 17
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 15
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_LIM: 3
    • FMT_LIM.1: 7
    • FMT_LIM.2: 7
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 19
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 16
    • FPT_ITT.1: 13
    • FPT_LIM.2: 1
    • FPT_PHP.3: 14
    • FPT_TST: 7
    • FPT_TST.1: 11
    • FPT_TST.2: 36
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 2
    • Infineon Technologies AG: 19
  • Samsung:
    • Samsung: 2
pdf_data/st_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • CESTI:
    • CESTI: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 25
  • DES:
    • 3DES:
      • 3DES: 17
      • Triple-DES: 3
    • DES:
      • DES: 7
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 17
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 47
  • SHA:
    • SHA1:
      • SHA1: 47
    • SHA2:
      • SHA256: 47
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 10
  • TRNG:
    • TRNG: 14
  • TRNG:
    • DTRNG: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 4
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 7
    • Malfunction: 12
    • malfunction: 1
  • SCA:
    • DPA: 7
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 6
    • Side-channel: 1
    • Timing Attack: 1
    • physical probing: 1
    • side channel: 6
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 7816-3: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 1
    • RFC3447: 11
  • BSI:
    • AIS 31: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/st_metadata
  • /Author: Jürgen Noller
  • /CreationDate: D:20130128081309
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Common Criteria, chip card, secure controller, EAL5+, augmented, AVA_VAM.5, protection profile 0035
  • /ModDate: D:20130128081309
  • /Producer: Microsoft® Office Word 2007
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 885361
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
  • /Author: DUCLOS Charlene
  • /CreationDate: D:20190624113019+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.29
  • /ModDate: D:20190624113019+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software
  • /Title: ANSSI-CC-2019/22
  • pdf_file_size_bytes: 831150
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different