This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Samsung S3FV9QM/S3FV9QK 32-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software Référence : S3FV9QM_20200504 ANSSI-CC-2021/02 |
Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software BSI-DSZ-CC-0523-2008 |
|
---|---|---|
name | Samsung S3FV9QM/S3FV9QK 32-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software Référence : S3FV9QM_20200504 | Infineon Smart Card IC (Security Controller) SLE66CLX1600PEM / m1590-a12, SLE66CLX1600PE / m1596-a12, SLE66CLX1600PES / m1597-a12,SLE66CX1600PE / m1598-a12, SLE66CLX1440PEM / m2090-a12, SLE66CLX1440PE / m2091-a12, SLE66CLX1440PES / m2092-a12, SLE66CX1440PE / m2093-a12, SLE66CLX1280PEM / m2094-a12, SLE66CLX1280PE / m2095-a12, SLE66CLX1280PES / m2096-a12, SLE66CX1280PE / m2097-a12 all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software |
scheme | FR | DE |
status | active | archived |
not_valid_after | 28.09.2026 | 01.09.2019 |
not_valid_before | 15.01.2021 | 06.11.2008 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_ANSSI-CC-2021_02-S01fr.pdf | None |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2021-02fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523a.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021-02en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0523b.pdf |
manufacturer | Samsung Electronics Co., Ltd. | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
security_level | AVA_VAN.5, ALC_DVS.2, EAL5+ | AVA_MSU.3, AVA_VLA.4, ALC_DVS.2, EAL5+ |
dgst | e059facf5ce470c3 | 4befd70d36bd82c3 |
heuristics/cert_id | ANSSI-CC-2021/02 | BSI-DSZ-CC-0523-2008 |
heuristics/extracted_sars | ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 | ADV_LLD.1, AVA_VLA.4, ALC_DVS.2, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ADV_INT.1, ADV_IMP.2, ADV_SPM.3, ALC_LCD.2, ATE_COV.2, AVA_SOF.1, ADV_HLD.3, AGD_USR.1, AVA_MSU.3, AGD_ADM.1, ADV_RCR.2, AVA_CCA.1, ATE_DPT.2, ADV_FSP.3 |
heuristics/extracted_versions | 32 | 1.1, 1.5 |
heuristics/indirect_transitive_cves | {} | CVE-2021-3011 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2021/02-R01 | BSI-DSZ-CC-0630-2010, ANSSI-CC-2011/79, ANSSI-CC-2011/16, ANSSI-CC-2011/10, ANSSI-CC-2011/13, ANSSI-CC-2011/12, ANSSI-CC-2011/80, BSI-DSZ-CC-0593-2009 |
heuristics/report_references/directly_referencing | ANSSI-CC-2018/43 | BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0322-2005 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2021/02-R01, ANSSI-CC-2021/02-R02 | BSI-DSZ-CC-0630-2010, ANSSI-CC-2011/79, ANSSI-CC-2011/16, ANSSI-CC-2011/10, ANSSI-CC-2011/13, BSI-DSZ-CC-0784-2013, ANSSI-CC-2011/12, ANSSI-CC-2011/80, BSI-DSZ-CC-0593-2009 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2014/75, ANSSI-CC-2018/43, ANSSI-CC-2014/22, ANSSI-CC-2017/16 | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0399-2007 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by | {} | BSI-DSZ-CC-0630-2010 |
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0430-2008 |
heuristics/st_references/indirectly_referenced_by | {} | BSI-DSZ-CC-0630-2010 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0430-2008 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename | certificat_ANSSI-CC-2021_02-S01fr.pdf | None |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | ANSSI-CC-2021-02fr.pdf | 0523a.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | anssi-cible-2021-02en.pdf | 0523b.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |