| name |
fiskaly Cloud Crypto Service Provider 1.3.0 |
Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
DE |
DE |
| status |
active |
archived |
| not_valid_after |
17.12.2026 |
03.11.2020 |
| not_valid_before |
17.12.2021 |
03.11.2015 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1153V3c_pdf.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1153V3a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V3a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1153V3b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V3b_pdf.pdf |
| manufacturer |
fiskaly GmbH |
Infineon Technologies AG |
| manufacturer_web |
https://fiskaly.com |
https://www.infineon.com/ |
| security_level |
ALC_CMS.3, EAL2+, ALC_LCD.1 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
e1d1ca5cd50f4b26 |
ce8e09d43878d381 |
| heuristics/cert_id |
BSI-DSZ-CC-1153-V3-2021 |
BSI-DSZ-CC-0827-V3-2015 |
| heuristics/cert_lab |
BSI |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_LCD.1, ATE_IND.2, ALC_CMS.3, ADV_ARC.1 |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2 |
| heuristics/extracted_versions |
1.3.0 |
1.01.0008, 1.03.006 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1153-V5-2025, BSI-DSZ-CC-1153-V4-2025 |
BSI-DSZ-CC-0827-V4-2016 |
| heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1153-V2-2021 |
BSI-DSZ-CC-0827-V2-2014 |
| heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1153-V5-2025, BSI-DSZ-CC-1153-V4-2025 |
BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-1069-2018, CSEC2014007, BSI-DSZ-CC-1158-V4-2025, BSI-DSZ-CC-1158-V3-2025, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-0827-V9-2024, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V5-2017 |
| heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1153-V2-2021, BSI-DSZ-CC-1153-2021 |
BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012, BSI-DSZ-CC-0827-V2-2014 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
f6d23054061d72ba |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
| pdf_data/cert_filename |
1153V3c_pdf.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1153-V3-2021: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0111-: 1
- BSI-CC-PP-0112-2020: 1
- BSI-CC-PP-0113-2020: 1
|
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
|
|
| pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_CMS.3: 1
- ALC_FLR: 1
- ALC_LCD.1: 1
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220117155259+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BSI, CSPL"
- /ModDate: D:20220117155617+01'00'
- /Producer: LibreOffice 6.3
- /Subject: fiskaly Cloud Crypto Service Provider
- /Title: Certificate BSI-DSZ-CC-1153-V3-2021
- pdf_file_size_bytes: 240385
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
1153V3a_pdf.pdf |
0827V3a_pdf.pdf |
| pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 2 augmented by ALC_CMS.3, ALC_LCD.1
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1153-V3-2021
- cert_item: fiskaly Cloud Crypto Service Provider, Version 1.3.0
- cert_lab: BSI
- developer: fiskaly GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile Cryptographic Service Provider Light (CSPL) Version 1.0, 12 November 2019, BSI-CC-PP-0111- 2019, Common Criteria Protection Profile Configuration Cryptographic Service Provider Light – Time Stamp Service and Audit (PPC-CSPLight-TS-Au) Version 1.0, 26 February 2020, BSI-CC-PP-0112-2020, Common Criteria Protection Profile Configuration Cryptographic Service Provider Light - Time Stamp Service and Audit – Clustering (PPC-CSPLight-TS-Au-Cl), Version 1.0, 26 February 2020, BSI-CC-PP-0113-2020
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0827-V3-2015
- cert_item: Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1153-V2-: 1
- BSI-DSZ-CC-1153-V2-2021: 2
- BSI-DSZ-CC-1153-V3-2021: 14
|
- DE:
- BSI-DSZ-CC-0827-V2-2014: 3
- BSI-DSZ-CC-0827-V3-2015: 25
|
| pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0111-: 2
- BSI-CC-PP-0111-2019: 2
- BSI-CC-PP-0112-2020: 4
- BSI-CC-PP-0113-2020: 4
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 6
- EAL 2 augmented: 3
- EAL 2+: 1
- EAL 4: 1
|
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 9
- EAL 5: 14
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMS.3: 4
- ALC_FLR: 3
- ALC_LCD.1: 4
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 13
- Infineon Technologies: 9
- Infineon Technologies AG: 21
|
| pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 2
|
- TUV:
- TÜV Informationstechnik: 4
|
| pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 3
- Triple-DES: 3
- DES:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 2
- RSA4096: 2
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
- SHA:
- SHA2:
- SHA-2: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 6
- physical tampering: 1
- SCA:
- DPA: 6
- SPA: 5
- physical probing: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
- BSI:
- BSI 7125: 2
- BSI 7138: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- BSI:
- AIS 14: 1
- AIS 19: 1
- AIS 20: 2
- AIS 31: 1
- AIS 32: 1
- AIS 38: 1
- AIS 46: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 1
- FIPS PUB 186-4: 4
- FIPS197: 2
- ICAO:
- ISO:
- ISO/IEC 14888-2: 2
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- ISO/IEC18033-3: 1
- PKCS:
- X509:
|
- BSI:
- AIS 19: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS31: 2
- AIS32: 1
- AIS47: 1
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 186-4: 1
- FIPS186-4: 4
- FIPS197: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2021, CL_CSPL_1.3.0.zip, SHA256: 933A9478025A93D5AE3BD4C4A19587FFA0716A0FE3EDC5A5AAFFE8EA2B275 EC0 (confidential document) [10] Guidance documentation for the TOE, Version 1.3.3, 28 July 2021, Preparative Procedures &: 1
- August 2021, Evaluation Technical Report (ETR) – Summary, SRC Security Research & Consulting GmbH (confidential document) 7 specifically • AIS 14, Version 7, Anforderungen an Aufbau und Inhalt von Einzelprüfberichten für: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
- ConfidentialDocument:
- Software Libraries RSA - EC – Toolbox – FTL, Version 1.8, 2015-09-30, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900, M9905, M9906 including optional Software Libraries RSA – EC –: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- the M9900 A22 and G11, M9905 A11, M9906 A11, version 6, 2015-10-09, TÜV Informationstechnik GmbH, (confidential document) 11 specifically • AIS 19, Version 9, Anwendungshinweise und Interpretationen zum Schema (AIS) •: 1
- to AIS 36 for the Product M9900 A22 and G11, Version 6, 2015-10-09, TÜV Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M9900 A22 and G11 including optional Software Libraries RSA -: 1
- – Toolbox – FTL, Version 0.7, 2015-06-09, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006), 2012-08-16: 1
|
| pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220117144037+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, BSI, CSPL"
- /ModDate: D:20220117154706+01'00'
- /Producer: LibreOffice 6.3
- /Subject: fiskaly Cloud Crypto Service Provider
- /Title: Certification Report BSI-DSZ-CC-1153-V3-2021
- pdf_file_size_bytes: 657573
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20151120082832+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software"
- /ModDate: D:20151120121430+01'00'
- /Producer: LibreOffice 4.2
- /Title: Certification Report BSI-DSZ-CC-xxxx-200x
- pdf_file_size_bytes: 1387317
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
| pdf_data/st_filename |
1153V3b_pdf.pdf |
0827V3b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0105-V2-2020: 1
- BSI-CC-PP- 0113-2020: 1
- BSI-CC-PP-0105-V2-2020: 1
- BSI-CC-PP-0111-2019: 4
- BSI-CC-PP-0112-2020: 2
- BSI-CC-PP-0113-2019: 1
- BSI-CC-PP-0113-2020: 2
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 5
- EAL2 augmented: 3
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 3
- EAL5: 7
- EAL5 augmented: 3
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ALC:
- ALC_CMS: 1
- ALC_CMS.3: 6
- ALC_LCD.1: 4
- ATE:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 12
- FAU_GEN.1: 16
- FAU_GEN.1.1: 5
- FAU_GEN.1.2: 2
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 6
- FCS:
- FCS_ACC: 3
- FCS_ACF: 2
- FCS_CKM: 171
- FCS_CKM.1: 49
- FCS_CKM.2: 27
- FCS_CKM.4: 96
- FCS_CKM.4.1: 1
- FCS_CKM.5: 17
- FCS_CKM.5.1: 1
- FCS_COP: 218
- FCS_COP.1: 45
- FCS_DAU: 2
- FCS_ETC.1: 1
- FCS_ETC.2: 1
- FCS_ITC: 2
- FCS_RIP: 1
- FCS_RNG: 2
- FCS_RNG.1: 14
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 48
- FDP_ACC.1: 52
- FDP_ACF: 21
- FDP_ACF.1: 22
- FDP_DAU: 24
- FDP_DAU.1: 3
- FDP_DAU.2: 7
- FDP_ETC: 9
- FDP_ETC.1: 5
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 10
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 42
- FDP_ITC: 28
- FDP_ITC.1: 37
- FDP_ITC.2: 49
- FDP_RIP: 4
- FDP_RIP.1: 1
- FDP_UCT: 1
- FDP_UIT: 1
- FIA:
- FIA_AFI: 2
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 23
- FIA_API.1: 7
- FIA_API.1.1: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_TCT.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 11
- FIA_UAU.5.2: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 4
- FIA_UID.1: 24
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_FPT.1: 1
- FMT_ISA: 1
- FMT_ITC.1: 1
- FMT_MOF: 10
- FMT_MOF.1: 18
- FMT_MOF.1.1: 10
- FMT_MSA: 33
- FMT_MSA.1: 18
- FMT_MSA.2: 7
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.4: 12
- FMT_MTD: 76
- FMT_MTD.1: 35
- FMT_MTD.3: 32
- FMT_MTD.3.1: 1
- FMT_SAE: 2
- FMT_SAE.1: 7
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 9
- FMT_SMF.1: 29
- FMT_SMF.1.1: 1
- FMT_SMR: 14
- FMT_SMR.1: 46
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_STM.1: 1
- FMT_TCT: 1
- FMT_TIT: 2
- FPT:
- FPT_ESA: 20
- FPT_ESA.1: 16
- FPT_ESA.1.1: 1
- FPT_ESA.1.2: 1
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_ISA: 33
- FPT_ISA.1: 19
- FPT_ISA.1.1: 1
- FPT_ISA.1.2: 1
- FPT_STM.1: 22
- FPT_STM.1.1: 4
- FPT_TCT: 25
- FPT_TCT.1: 6
- FPT_TDC: 35
- FPT_TDC.1: 27
- FPT_TIT: 37
- FPT_TIT.1: 12
- FPT_TIT.1.1: 2
- FPT_TIT.1.2: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 21
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 6
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 23
- FCS_CKM.1: 31
- FCS_CKM.2: 5
- FCS_CKM.4: 23
- FCS_COP: 47
- FCS_COP.1: 27
- FCS_RNG: 12
- FCS_RNG.1: 30
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.1.1: 1
- FDP_ACF.1: 20
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 10
- FDP_ITC.1: 17
- FDP_ITC.2: 17
- FDP_ITT.1: 13
- FDP_PHP.3: 1
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 2
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 7
- FMT_LIM.2: 7
- FMT_MSA.1: 18
- FMT_MSA.1.1: 1
- FMT_MSA.3: 19
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 1
- FPT_FLS.1: 16
- FPT_ITT.1: 13
- FPT_LIM.2: 1
- FPT_PHP.3: 14
- FPT_TST: 7
- FPT_TST.1: 11
- FPT_TST.2: 36
- FPT_TST.2.1: 1
- FRU:
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 7
- Infineon Technologies: 7
- Infineon Technologies AG: 21
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 30
- AES-: 1
- AES-128: 11
- AES-256: 8
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 17
- TDEA: 2
- TDES: 4
- Triple-DES: 2
- DES:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 2
- RSA4096: 2
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 4
- SHA-512: 3
|
|
| pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 2
- Key agreement: 10
- KEX:
- MAC:
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- GCM:
- OFB:
|
|
| pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP256r1: 3
- brainpoolP384r1: 2
- brainpoolP512r1: 2
- Edwards:
- NIST:
- Curve P-256: 2
- Curve P-384: 1
- Curve P-521: 1
- P-256: 2
- P-384: 1
- P-521: 1
- SECP256r1: 1
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- SCA:
- physical probing: 1
- side channel: 2
|
- FI:
- DFA: 7
- Malfunction: 12
- malfunction: 1
- SCA:
- DPA: 7
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 6
- Side-channel: 1
- Timing Attack: 1
- physical probing: 1
- side channel: 6
- other:
|
| pdf_data/st_keywords/technical_report_id |
- BSI:
- BSI TR-03110: 1
- BSI TR-03151: 2
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 186-4: 9
- ICAO:
- ISO:
- ISO/IEC 10116: 2
- ISO/IEC 14888-2: 4
- ISO/IEC 18033-3: 1
- ISO/IEC 19790: 6
- ISO/IEC 9797-2: 1
- ISO/IEC18033-3: 1
- PKCS:
- RFC:
- RFC2104: 2
- RFC5639: 4
- RFC5903: 4
- RFC6954: 4
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- ISO:
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: fiskaly GmbH
- /CreationDate: D:20210709063555Z
- /Creator: LaTeX with hyperref
- /Keywords: Common Criteria, CSPL, TSE, fiskaly, Security Target
- /ModDate: D:20210709063555Z
- /PTEX.Fullbanner: This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Debian) kpathsea version 6.3.2
- /Producer: pdfTeX-1.40.21
- /Subject: Security Target, TOE-Version: 1.3.0, Document-Version: 1.2.3
- /Title: Security Target, fiskaly Cloud Crypto Service Provider
- /Trapped: /False
- pdf_file_size_bytes: 949509
- pdf_hyperlinks: https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr03151/index_htm.html, https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-2.pdf, https://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf, https://jedisct1.github.io/minisign/, https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/PP/aktuell/PP_0113.html, https://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf, https://busybox.net/, https://www.primekey.com/products/hardware/see/, https://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, https://www.openbsd.org/papers/bsdcan-signify.html, https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/fido-ecdaa-algorithm-v1.2-ps20170411.html, https://pkgs.alpinelinux.org/package/v3.12/community/x86_64/openjdk11-jre-headless, https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/PP/aktuell/PP_0112.html, https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/PP/aktuell/PP_0111.html, https://www.postgresql.org/, https://chrony.tuxfamily.org/, https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/PP/aktuell/PP_0105_0105_V2.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 163
|
- /Author: Jürgen Noller
- /CreationDate: D:20150930134010
- /Creator: Microsoft® Office Word 2007
- /Keywords: Dresden, TSMC, Infineon, RSA, Eliptic Curve, Library, multi interface, high end security controler, ARM CPU, ARM Core, robust, CCv3.1, EAL5+, secure controller, EAL5+, augmented, high attack potential, AVA_VAN.5, PP0035
- /ModDate: D:20150930134010
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target Lite M9900, M9905, M9906
- /Title: Security Target Lite
- pdf_file_size_bytes: 921413
- pdf_hyperlinks: http://www.infineon.com/, http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |