This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
S3K250A /S3K232A /S3K212A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software ANSSI-CC-2017/13 |
Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V2-2014 |
|
---|---|---|
name | S3K250A /S3K232A /S3K212A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software | Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software |
not_valid_before | 2017-03-17 | 2014-04-30 |
not_valid_after | 2022-03-17 | 2019-09-01 |
scheme | FR | DE |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_13en.pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_13fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V2a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
state/report/pdf_hash | 6b9f981765815edc941319d9d8eab39145f40f6257d99957c0ba317711e5292a | 73e1e36ac72df9017049ff5ab8e33e80dd1e25214a4ec4a8af40d094af3f3357 |
state/report/txt_hash | 8f5f7ff8ca34de9f10d96469c52f482ba199d1bec0b9a239a8aef41bd57945c9 | 8f78cd6183c4d8f47c68b63a8435382a0a4267dea897d90aa83107a82140d853 |
state/st/pdf_hash | a95414ff2dc792d9d02eb7f2465173cf545d384fc4ce4da29a7bc3e03b09d525 | 36c632f0e7e97ad990a45b8a94dfa9f36d1535b9b87537d8da20ce9156ae76fe |
state/st/txt_hash | 5a4852bb3483636e5c123e8eccdff17825aabd707250df52a0366a6540162148 | 91b00be9da132d9f06300e5b6e13f667a810a9760bfb8e06324d9d0aaa59034d |
heuristics/cert_id | ANSSI-CC-2017/13 | BSI-DSZ-CC-0827-V2-2014 |
heuristics/cert_lab | CEA | BSI |
heuristics/extracted_versions | 32 | 1.01.0008, 1.03.006 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2018/14 | BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-2014 |
heuristics/report_references/directly_referencing | ANSSI-CC-2017/11 | BSI-DSZ-CC-0827-2013 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2019/03, ANSSI-CC-2019/61, ANSSI-CC-2018/14, ANSSI-CC-2021/05 | CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-1069-2018, ANSSI-CC-2019/38, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V7-2018 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2017/11 | BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012 |
heuristics/scheme_data |
|
None |
pdf_data/report_filename | ANSSI-CC-2017_13fr.pdf | 0827V2a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 7 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 2 | 1 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 3 | 6 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 3 | 8 |
pdf_data/report_keywords/cc_security_level/EAL/EAL2 | 2 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL7 | 1 | 4 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/certification_process | |
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/crypto_scheme | |
|
pdf_data/report_keywords/ecc_curve | |
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/TRNG |
|
|
pdf_data/report_keywords/side_channel_analysis | |
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 8 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 3 |
pdf_data/report_keywords/technical_report_id | |
|
pdf_data/report_keywords/tee_name | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | |
pdf_data/report_metadata//CreationDate | D:20140519170621+02'00' | |
pdf_data/report_metadata//Creator | PDFCreator Version 1.2.1 | Writer |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG" | |
pdf_data/report_metadata//ModDate | D:20140519171035+02'00' | |
pdf_data/report_metadata//Producer | GPL Ghostscript 9.02 | LibreOffice 3.6 |
pdf_data/report_metadata//Subject | Common Criteria Certification | |
pdf_data/report_metadata//Title | ANSSI-CC-2017_13fr | Certification Report BSI-DSZ-CC-0827-V2-2014 |
pdf_data/report_metadata/pdf_file_size_bytes | 240945 | 1267084 |
pdf_data/report_metadata/pdf_hyperlinks | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ | |
pdf_data/report_metadata/pdf_number_of_pages | 18 | 44 |
pdf_data/st_filename | ANSSI_cible2017_13en.pdf.pdf | 0827V2b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 30 | 20 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 15 | 6 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 21 | 14 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 4 | 5 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 6 | 1 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 6 | 1 |
pdf_data/st_keywords/cc_claims/T/T.RND | 5 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 | 6 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 7 | 9 |
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 | 1 | 4 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 13 | 11 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 2 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 augmented | 2 | 3 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 6 | 7 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 3 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 8 | 4 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 10 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 13 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 26 | 31 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 17 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 51 | 47 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 27 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 17 | 12 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 14 | 30 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 18 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 17 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 21 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 13 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 13 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 13 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 2 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 8 | 15 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 22 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 28 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 32 | 7 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 12 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 16 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 9 | 15 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 22 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 13 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 20 | 14 |
pdf_data/st_keywords/cc_sfr/FRU |
|
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 17 | 8 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB | 3 | 7 |
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 3 | 2 |
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/ecc_curve/NIST |
|
|
pdf_data/st_keywords/ecc_curve/NIST/P-192 | 8 | 4 |
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 | 3 | 47 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 | 6 | 47 |
pdf_data/st_keywords/randomness/RNG/RND | 11 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 8 | 11 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 1 | 14 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 4 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 26 | 12 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 13 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 8 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 23 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 4 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 7 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing | 9 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 2 | 6 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 5 | 1 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-001 | 3 | 1 |
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-002 | 3 | 1 |
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-003 | 3 | 1 |
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 28 | 27 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA | 1 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 13 | 4 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 6 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 10 | 5 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Windows 사용자 | Jürgen Noller |
pdf_data/st_metadata//CreationDate | D:20161126075616+09'00' | D:20140305150457Z |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//ModDate | D:20161201203347+09'00' | D:20140520092728+02'00' |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Microsoft® Office Word 2007 |
pdf_data/st_metadata//Title | ST_Klallam7_Ver1.1 | Security Target Lite |
pdf_data/st_metadata/pdf_file_size_bytes | 1034685 | 964080 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ecc-brainpool.org/, mailto:[email protected] | http://www.bsi.bund.de/, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_is_encrypted | True | False |
pdf_data/st_metadata/pdf_number_of_pages | 110 | 84 |
dgst | dd769c19a40d1a27 | 5d83a59f8c44527c |