This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure RSA/SHA Library including specific IC Dedicated software ANSSI-CC-2018/40 |
Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V2-2014 |
|
---|---|---|
name | S3FV9RR/S3FV9RQ/S3FV9RP/S3FV9RK 32-bit RISC Microcontroller for Smart Card with optional AE1 Secure RSA/SHA Library including specific IC Dedicated software | Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software |
category | Trusted Computing | ICs, Smart Cards and Smart Card-Related Devices and Systems |
not_valid_before | 2018-10-19 | 2014-04-30 |
not_valid_after | 2023-10-19 | 2019-09-01 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2018_40en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
security_level | ASE_TSS.2, EAL6+ | EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018-40fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
state/report/pdf_hash | 1f64352e80d64c32e87f39529fb4e837b4d09f5a4cb4036642b67657c383dc0e | 73e1e36ac72df9017049ff5ab8e33e80dd1e25214a4ec4a8af40d094af3f3357 |
state/report/txt_hash | 19b853140319a796f3312f9f57e7fca154a2c6f0bd0cfc594404283908f31293 | 8f78cd6183c4d8f47c68b63a8435382a0a4267dea897d90aa83107a82140d853 |
state/st/pdf_hash | e2c3d4b6940617c7af8adf8aa639ec9fea3b68b09acf661f79da1db67a73b28f | 36c632f0e7e97ad990a45b8a94dfa9f36d1535b9b87537d8da20ce9156ae76fe |
state/st/txt_hash | f4d5251bc4c9f14e932224955e90d39c34a328ea73518b1eea5c807e09a3c08e | 91b00be9da132d9f06300e5b6e13f667a810a9760bfb8e06324d9d0aaa59034d |
heuristics/cert_id | ANSSI-CC-2018/40 | BSI-DSZ-CC-0827-V2-2014 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 32 | 1.01.0008, 1.03.006 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2020/71 | BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-2014 |
heuristics/report_references/directly_referencing | None | BSI-DSZ-CC-0827-2013 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2021/09, ANSSI-CC-2021/34, ANSSI-CC-2020/71 | CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1069-2018, ANSSI-CC-2019/38, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V7-2018 |
heuristics/report_references/indirectly_referencing | None | BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012 |
heuristics/scheme_data |
|
None |
pdf_data/report_filename | anssi-cc-2018-40fr.pdf | 0827V2a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 1 | 5 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 2 | 1 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 1 | 6 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 2 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 1 | 4 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/crypto_scheme | |
|
pdf_data/report_keywords/ecc_curve | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/TRNG |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 2 | 3 |
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 8 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 3 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/tee_name | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//CreationDate | D:20181023181503+02'00' | D:20140519170621+02'00' |
pdf_data/report_metadata//Creator | Acrobat PDFMaker 11 pour Word | Writer |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.026 | "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG" |
pdf_data/report_metadata//ModDate | D:20181024165829+02'00' | D:20140519171035+02'00' |
pdf_data/report_metadata//Producer | Adobe PDF Library 11.0 | LibreOffice 3.6 |
pdf_data/report_metadata//Subject | Common Criteria Certification | |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0827-V2-2014 | |
pdf_data/report_metadata/pdf_file_size_bytes | 399195 | 1267084 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_number_of_pages | 17 | 44 |
pdf_data/st_filename | anssi-cible-2018_40en.pdf | 0827V2b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 5 | 20 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 5 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 9 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 | 1 | 4 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 5 | 11 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 8 | 4 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 10 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 7 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 16 | 31 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 2 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 11 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 31 | 47 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 15 | 27 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 17 | 12 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 14 | 30 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 20 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 23 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 7 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 7 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 13 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 2 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 22 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 16 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 15 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 13 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 20 | 14 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 8 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 7 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme | |
|
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 | 2 | 47 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 | 5 | 47 |
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 8 | 11 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 1 | 14 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 2 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 12 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 11 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 23 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 5 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing | 9 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 3 | 6 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 5 | 1 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 1 | 5 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA | 1 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 13 | 4 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 6 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 9 | 5 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//CreationDate | D:20180629150319+09'00' | D:20140305150457Z |
pdf_data/st_metadata//Creator | Word용 Acrobat PDFMaker 10.1 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//ModDate | D:20181024165807+02'00' | D:20140520092728+02'00' |
pdf_data/st_metadata//Producer | Adobe PDF Library 10.0 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//Title | Security Target Lite | |
pdf_data/st_metadata/pdf_file_size_bytes | 1383258 | 964080 |
pdf_data/st_metadata/pdf_hyperlinks | mailto:[email protected] | http://www.bsi.bund.de/, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_number_of_pages | 107 | 84 |
dgst | d0129e268feeb6c9 | 5d83a59f8c44527c |