name |
IFX_CCI_000068h, 000077h, 000080h design step G12 with firmware version 80.505.04.1, optional HSL version 04.05.0040, optional UMSLC version 02.01.0040, optional NRG™ version 06.10.0002 and user guidance documents |
Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèqueWear Levelling version 06.03.02.02 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
FR |
status |
active |
active |
not_valid_after |
20.10.2028 |
06.04.2025 |
not_valid_before |
20.10.2023 |
29.01.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_02-s01.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_02fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_02en.pdf |
manufacturer |
Infineon Technologies AG |
Wisekey |
manufacturer_web |
https://www.infineon.com/ |
https://www.wisekey.com |
security_level |
EAL6+, ALC_FLR.1 |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
e454d94b9326a399 |
ff1e497a4f732f43 |
heuristics/cert_id |
BSI-DSZ-CC-1206-2023 |
ANSSI-CC-2018/02 |
heuristics/cert_lab |
BSI |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ADV_ARC.1, ADV_IMP.2, ASE_TSS.1, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ASE_INT.1, ADV_TDS.5, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2 |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 |
heuristics/extracted_versions |
80.505.04.1, 02.01.0040, 06.10.0002, 04.05.0040 |
06.04.01.07, 06.03.02.02 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1206-V2-2024 |
ANSSI-CC-2020/20 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2016/16 |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1206-V3-2024, BSI-DSZ-CC-1206-V2-2024 |
ANSSI-CC-2020/20 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2016/16 |
heuristics/scheme_data |
|
- cert_id: ANSSI-CC-2018/02
- description: Le site de production certifié est un site de test de microcircuits. L’activité rentrant dans le cadre de cette certification est la fabrication de microcircuits. Cette activité s’incrit dans la phase 3 du cycle de vie défini dans [PP0084].
- developer: NXP Semiconductors
- enhanced:
- augmented: ALC_CMC.5, ALC_CMS.5, ALC_DVS.2
- category: Sites certifiés
- cc_version: Critères Communs version 3.1r4
- cert_id: ANSSI-CC-2018/02
- certification_date: 2018-03-07
- developer: NXP Semiconductors
- evaluation_facility: Serma Safety & Security
- level: EAL5+
- mutual_recognition:
- protection_profile:
- report_link: https://cyber.gouv.fr/sites/default/files/2018/03/anssi-cc-site-2018_02fr.pdf
- sponsor: NXP Semiconductors
- target_link: https://cyber.gouv.fr/sites/default/files/2018/03/anssi-cible-site-2018_02en.pdf
- level: EAL5+
- product: NXP Chandler Test
- sponsor: NXP Semiconductors
- url: https://cyber.gouv.fr/produits-certifies/nxp-chandler-test
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
1206c_pdf.pdf |
certificat-anssi-cc-2018_02-s01.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Infineon:
- Infineon Technologies AG: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, Smartcard Controller
- /Subject: Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, Smartcard Controller
- /Title: Certificate BSI-DSZ-CC-1206-2023
- pdf_file_size_bytes: 235015
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: jchuzel
- /CreationDate: D:20220906094656+02'00'
- /ModDate: D:20220906094656+02'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - PS-certificat-ANSSI-CC-2018_02-S01
- pdf_file_size_bytes: 1258024
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
1206a_pdf.pdf |
anssi-cc-2018_02fr.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 19 October 2028
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1206-2023
- cert_item: IFX_CCI_000068h, 000077h, 000080h design step G12 with firmware version 80.505.04.1, optional HSL version 04.05.0040, optional UMSLC version 02.01.0040, optional NRG™ version 06.10.0002 and user guidance documents
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/02
- cert_item: Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèque Wear Levelling version 06.03.02.02
- cert_item_version: Part number 0x44, hardware revision E, Toolbox Library version 0x06040107, Wear Levelling Library version 0x06030202
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Wisekey Semiconductors Arteparc Bachasson, Bât. A, rue de la carrière de Bachasson, 13590 Meyreuil, France. Commanditaire Wisekey Semiconductors Arteparc Bachasson, Bât. A, rue de la carrière de Bachasson, 13590 Meyreuil, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014, le 19 février 2014 avec conformité au “ Package 1 : Loader dedicated for usage by authorized users only
- DE:
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2016/16: 3
- ANSSI-CC-2018/02: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 3
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL 5: 4
- EAL 6: 4
- EAL 6 augmented: 3
- EAL5+: 1
- EAL6: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_HRM: 3
- AGD_PPM: 5
- AGD_PRM: 5
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 1
- FCS_COP.1: 1
- FDP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon: 1
- Infineon Technologies: 1
- Infineon Technologies AG: 12
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 5
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 1
- AIS 23: 1
- AIS 25: 1
- AIS 26: 1
- AIS 27: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- AIS 39: 1
- AIS 41: 1
- AIS 46: 1
- AIS 47: 1
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 1, 2023-01-30, TÜV Informationstechnik GmbH (confidential document) 26 / 29 BSI-DSZ-CC-1206-2023 Certification Report C. Excerpts from the Criteria For the meaning: 1
- 1, 2023-09-12, “EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY)”, TÜV Informationstechnik, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- 1.00-3001, 2023.07-26, Infineon Technologies AG (confidential document) [15] also referred to as [AGD_PPM], “SLC21 (32-bit Security Controller – V24), Production and: 1
- 1.1, 2023-02.27, Infineon Technologies AG (confidential document) [18] “SINGLE EVALUATION REPORT ADDENDUM to ETR-Part ADV Cryptographic Standards Compliance: 1
- Controller – V24), Hardware Reference Manual”, Version 4.2, 2023-08-04, Infineon Technologies AG (confidential document) [13] also referred to as [AGD_PRM], “SLx2 security controller family, Programmer's Reference: 1
- SLx2_DFP”, Version 1.2.0, 2023-07-05, Infineon Technologies AG (confidential document) [14] also referred to as [AGD_SG], “SLC21, 32-bit Security Controller – V24, Security Guidelines: 1
- Technologies AG (confidential document) [17] also referred to as [AGD_ES], “SLC21 (32-bit Security Controller – V24) Errata sheet: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- manual, Flash Loader V10”, Version 10.01, 2023-06- 28, Infineon Technologies AG (confidential document) [16] also referred to as [AGD_CryptoUM], “Crypto2304T V4, User Manual”, Version 2.0, 2023-07-14: 1
- the Product, Version 1, 2023- 09-12, “ETR for Composite Evaluation”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 0.2, 2023-07-20, “M5362 ALC” (confidential document: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, Smartcard Controller
- /Subject: Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, Smartcard Controller
- /Title: Certification Report BSI-DSZ-CC-1206-2023
- pdf_file_size_bytes: 428797
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierungsreporte, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
|
pdf_data/st_filename |
1206b_pdf.pdf |
anssi-cible-cc-2018_02en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6: 2
- EAL6: 3
- EAL6 augmented: 1
|
- EAL:
- EAL4: 2
- EAL4+: 1
- EAL5: 9
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 2
- ADV_FSP.5: 4
- ADV_IMP.1: 1
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_SPM.1: 2
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMC.5: 3
- ALC_CMS.4: 2
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 4
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL: 3
- ASE_CCL.1: 1
- ASE_ECD: 3
- ASE_ECD.1: 1
- ASE_INT: 9
- ASE_INT.1: 1
- ASE_OBJ: 4
- ASE_OBJ.2: 1
- ASE_REQ: 19
- ASE_REQ.2: 1
- ASE_SPD: 4
- ASE_SPD.1: 1
- ASE_TSS: 6
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 4
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_COP: 6
- FCS_RNG: 7
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 6
- FDP_ACC.2: 2
- FDP_ACF: 14
- FDP_ACF.1: 12
- FDP_IFC.1: 8
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT.1: 6
- FDP_SDC.1: 5
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 3
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 3
- FDP_UIT.1: 3
- FIA:
- FIA_API: 1
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_UID: 8
- FIA_UID.1: 5
- FIA_UID.2: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MSA: 21
- FMT_MSA.1: 4
- FMT_MSA.3: 5
- FMT_MTD: 9
- FMT_MTD.1: 1
- FMT_SMF: 19
- FMT_SMF.1: 5
- FMT_SMR: 14
- FMT_SMR.1: 11
- FPT:
- FPT_FLS.1: 8
- FPT_ITT.1: 6
- FPT_PHP.3: 11
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_SAS: 1
- FAU_SAS.1: 13
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.4: 12
- FCS_COP: 17
- FCS_COP.1: 15
- FCS_COP.1.1: 13
- FCS_RNG.1: 19
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 22
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_ITT.1: 22
- FDP_ITT.1.1: 1
- FDP_SDC: 1
- FDP_SDC.1: 11
- FDP_SDC.1.1: 1
- FDP_SDI.1: 3
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_API: 1
- FIA_API.1: 11
- FIA_API.1.1: 1
- FMT:
- FMT_LIM: 17
- FMT_LIM.1: 28
- FMT_LIM.1.1: 1
- FMT_LIM.2: 29
- FMT_LIM.2.1: 1
- FPT:
- FPT_FLS.1: 24
- FPT_FLS.1.1: 1
- FPT_ITT.1: 20
- FPT_ITT.1.1: 1
- FPT_PHP.3: 25
- FPT_PHP.3.1: 1
- FPT_SDI.2: 2
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 20
- FRU_FLT.2.1: 1
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon: 4
- Infineon Technologies: 7
- Infineon Technologies AG: 9
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- miscellaneous:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA-384: 3
- SHA-512: 3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- Leak-Inherent: 2
- Physical Probing: 2
- physical probing: 1
- side channel: 1
- side-channel: 5
- other:
|
- FI:
- Fault Injection: 1
- Malfunction: 19
- malfunction: 8
- physical tampering: 2
- SCA:
- Leak-Inherent: 14
- Physical Probing: 1
- Physical probing: 1
- physical probing: 4
- side channel: 2
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 3
- FIPS PUB 197: 1
- NIST:
- SP 800-108: 3
- SP 800-38A: 3
- SP 800-38B: 2
- SP 800-38C: 2
|
- BSI:
- FIPS:
- FIPS 180-4: 5
- FIPS 186-4: 4
- FIPS 197: 1
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 2
- SP 800-38A: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Urian Rainer (IFAG DSS SQM PS CERT)
- /Keywords: Infineon
- /Title: IFX_CCI_00068h_SecurityTarget
- pdf_file_size_bytes: 1051801
- pdf_hyperlinks: http://www.infineon.com/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 43
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |