Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware)
BSI-DSZ-CC-0782-V4-2018
IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance
BSI-DSZ-CC-1126-V4-2025
name Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware) IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance
status archived active
not_valid_after 09.01.2023 25.08.2030
not_valid_before 09.01.2018 25.08.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V4c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126V4c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V4a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126V4a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V4b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126V4b_pdf.pdf
security_level EAL6+, ALC_FLR.1 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst e4d82b11e5cf4bee ed23c1e0f2d3ab99
heuristics/cert_id BSI-DSZ-CC-0782-V4-2018 BSI-DSZ-CC-1126-V4-2025
heuristics/cpe_matches cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* {}
heuristics/extracted_sars ALC_DEL.1, ADV_INT.3, AVA_VAN.5, ASE_INT.1, ADV_SPM.1, ATE_DPT.3, ADV_TDS.5, AGD_OPE.1, ASE_CCL.1, ALC_CMS.5, ADV_ARC.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, ALC_FLR.1, ASE_SPD.1, ATE_IND.2, ATE_COV.3, ALC_CMC.5, ASE_ECD.1, AGD_PRE.1, ASE_TSS.1, ALC_DVS.2, ASE_REQ.2, ADV_IMP.2, ALC_LCD.1, ASE_OBJ.2 ALC_DEL.1, ATE_FUN.1, AVA_VAN.5, ASE_INT.1, ATE_DPT.3, AGD_OPE.1, ADV_COMP.1, ASE_CCL.1, ADV_TDS.4, ALC_CMS.5, ADV_ARC.1, ATE_COV.2, ADV_FSP.5, ASE_SPD.1, ALC_TAT.2, ATE_IND.2, ALC_CMC.4, ASE_ECD.1, AGD_PRE.1, ASE_TSS.1, ADV_IMP.1, ALC_DVS.2, ASE_REQ.2, ADV_INT.2, ALC_LCD.1, ASE_OBJ.2
heuristics/extracted_versions 1.02.013, 2.07.003, 2.02.012, 1.01 01.00.0234, 2.62.7626, 80.301.05.1, 2.04.003
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0782-V5-2020 {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-0782-V3-2017 BSI-DSZ-CC-1126-V3-2023
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0782-V6-2024, BSI-DSZ-CC-0782-V5-2020, KECS-ISIS-1139-2021, KECS-ISIS-1140-2021, KECS-ISIS-1113-2021 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-V3-2017 BSI-DSZ-CC-1126-V2-2021, BSI-DSZ-CC-1126-2019, BSI-DSZ-CC-1126-V3-2023
heuristics/scheme_data
  • category: Smart Cards and similar devices
  • cert_id: BSI-DSZ-CC-1126-V4-2025
  • certification_date: 25.08.2025
  • enhanced:
    • applicant: Infineon Technologies AG Am Campeon 1-12 85579 Neubiberg
    • assurance_level: EAL5+,ALC_DVS.2,AVA_VAN.5
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1126V4c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 25.08.2025
    • description: The TOE (Target of Evaluation) is a SmartCard (Security-IC) by Infineon Technologies AG. The TOE provides a real 32-bit CPU-architecture and is compatible to the ARMv7-M instruction set. The major components of the core system are the 32-bit CPU (Central Processing Unit) based on the ARM SecurCore SC300TM, the NVIC (Nested Vectored Interrupt Controller), and the MPU (Memory Protection Unit). This TOE is intended to be used in smart cards for particularly security relevant applications and for its previous use as developing platform for smart card operating systems
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1126-V4-2025 (Ausstellungsdatum / Certification Date 25.08.2025, gültig bis / valid until 24.08.2030) Zertifizierungsreport / Certification Report', 'description': 'fore runner, documents were changed.'}), frozendict({'id': 'BSI-DSZ-CC-1126-V3-2023 (Ausstellungsdatum / Certification Date 07.07.2023, gültig bis / valid until 06.07.2028) Zertifizierungsreport / Certification Report', 'description': 'fore runner, documents were changed.'}), frozendict({'id': 'BSI-DSZ-CC-1126-V2-2021 (Ausstellungsdatum / Certification Date 12.08.2021, gültig bis / valid until 11.08.2026) Zertifizierungsreport / Certification Report', 'description': 'fore runner, documents were changed.'}), frozendict({'id': 'BSI-DSZ-CC-1126-2019 (Ausstellungsdatum / Certification Date 15.10.2019, gültig bis / valid until 14.10.2024) Zertifizierungsreport / Certification Report', 'description': 'Certificate'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 24.08.2030
    • product: IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1126V4a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1126V4b_pdf.pdf?__blob=publicationFile&v=2
  • product: IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with …
  • subcategory: ICs, Cryptolib
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1126.html
  • vendor: Infineon Technologies AG
heuristics/st_references/directly_referenced_by 21.0.03/TSE-CCCS-51, NSCIB-CC-195748-CR, 21.0.03/TSE-CCCS-49 {}
heuristics/st_references/indirectly_referenced_by 21.0.03/TSE-CCCS-51, NSCIB-CC-195748-CR, 21.0.03/TSE-CCCS-49 {}
heuristics/protection_profiles f6d23054061d72ba cf0f01bcd7be3e9c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename 0782V4c_pdf.pdf 1126V4c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V4-2018: 1
  • DE:
    • BSI-DSZ-CC-1126-V4-2025: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 1
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 5: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
  • EAL:
    • EAL 2: 1
    • EAL 5: 2
    • EAL 5 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/vendor
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 1
  • Infineon:
    • Infineon Technologies AG: 1
pdf_data/cert_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/cert_keywords/crypto_library
  • Infineon:
    • v1.02.013: 4
pdf_data/report_filename 0782V4a_pdf.pdf 1126V4a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 conformant extended
    • cert_id: BSI-DSZ-CC-0782-V4-2018
    • cert_item: Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 valid until: 24 August 2030 SOGIS Recognition Agreement
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1126-V4-2025
    • cert_item: IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC dedicated firmware identifier 80.301.05.1 and user guidance
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V3-2017: 4
    • BSI-DSZ-CC-0782-V4-2018: 19
  • DE:
    • BSI-DSZ-CC-1126-V3-2023: 2
    • BSI-DSZ-CC-1126-V4-2025: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0035-2007: 1
    • BSI-CC-PP-0035-2007: 2
  • BSI:
    • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 4: 1
    • EAL 5: 4
    • EAL 6: 4
    • EAL 6 augmented: 3
    • EAL5+: 1
    • EAL6: 3
    • EAL6 augmented: 3
    • EAL6+: 3
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 1
    • EAL 5: 8
    • EAL 5 augmented: 3
    • EAL5+: 1
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 2
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 3
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 1
  • Infineon:
    • Infineon: 15
    • Infineon Technologies: 1
    • Infineon Technologies AG: 18
  • Infineon:
    • Infineon: 5
    • Infineon Technologies: 1
    • Infineon Technologies AG: 10
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 1
      • Triple-DES: 3
    • DES:
      • DES: 4
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 3
      • Triple-DES: 2
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 1
    • RSA4096: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 16
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 2
  • TRNG:
    • TRNG: 2
  • RNG:
    • RNG: 2
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CFB:
    • CFB: 4
  • CTR:
    • CTR: 4
  • ECB:
    • ECB: 2
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 38
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • physical tampering: 1
  • SCA:
    • DPA: 3
    • SPA: 3
    • physical probing: 1
  • FI:
    • DFA: 1
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
  • BSI:
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 1
    • AIS 26: 1
    • AIS 31: 2
    • AIS 34: 1
    • AIS 35: 1
    • AIS 36: 2
    • AIS1: 1
    • AIS14: 1
    • AIS19: 1
    • AIS20: 1
    • AIS25: 1
    • AIS26: 1
    • AIS31: 1
    • AIS32: 1
    • AIS34: 1
    • AIS35: 1
    • AIS36: 1
    • AIS38: 1
    • AIS46: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 31: 2
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS 47: 1
    • AIS31: 2
  • FIPS:
    • FIPS197: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38B: 3
    • NIST SP 800-67: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies AG (confidential document) 26 / 31 BSI-DSZ-CC-0782-V4-2018 Certification Report C. Excerpts from the Criteria For the: 1
    • 70 Programmer’s Reference Manual, 2017-09-14, Infineon Technologies AG (confidential document) [17] M7892 Errata Sheet, 2017-06-21, Infineon Technologies AG [18] M7892 SOLID FLASH Controller: 1
    • Common Criteria with Evaluation Assurance Level EAL6 augmented (EAL6+) M7892 B11” (confidential document) [12] SCL78 Symmetric Crypto Library for SCPv3 DES / AES 16-bit Security Controller User Interface: 1
    • Controller Family Hardware Reference Manual, Version 1.7.1, 2015-09-21, Infineon Technologies AG (confidential document) [19] AMM Advanced Mode for Mifare-Compatible Technology Addendum to M7892 Hardware Reference: 1
    • Infineon Technologies AG (confidential document) [13] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.02.013), 2017-06-20: 1
    • Infineon Technologies AG (confidential document) [21] M7892 Security Guidelines, 2017-06-28, Infineon Technologies AG (confidential document) [22: 1
    • M7892 B11 Recertification Common Criteria CCv3.1 EAL6 augmented (EAL6+)”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0782-V4-2018, Version 1, 2017-11-15, “Evaluation: 1
    • Report – ETR (Summary)”, Tüv Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9: 1
    • Technologies AG (confidential document) [14] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (2.07.003), 2017-05-15: 1
    • Technologies AG (confidential document) [15] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG [16] 16-bit Controller Family: 1
    • Version 1.1, 2013-09-24, Infineon Technologies AG (confidential document) [20] SLx 70 Family Secure Hash Algorithm SHA-2 (SHA 256/224, SHA 512/384) Library, Version 1.01: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • “Evaluation Technical Report for composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 3.0, 2017-09-29, “Configuration Management Scope ALC: 1
  • ConfidentialDocument:
    • TÜV Informationstechnik GmbH, (confidential document) 6 See section 9.1 for specific AIS. 24 / 29 BSI-DSZ-CC-1126-V4-2025 Certification Report [7: 1
    • 2019-07-10, Infineon Technologies AG (confidential document) [11] See table 2 in section B.2 [12] See table 2 in section B.2 [13] See table 2 in section B.2: 1
    • IFX_CCI_0037h T31 and M31 Security Target”, Version 5.4, 2025-08-14, Infineon Technologies AG (confidential document) [6] Evaluation Technical Report, Version 2, 2025-08-14, “EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
    • Standards Compliance Verification”, Version 1, 2019-07-09, TÜV Informationstechnik GmbH (confidential document). 25 / 29 Certification Report BSI-DSZ-CC-1126-V4-2025 C. Excerpts from the Criteria For the: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • “EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)”, TÜV Informationstechnik GmbH (confidential document) [10] Configuration list for the TOE, “Configuration Management Scope M5270 T31 and M31”, Version 1: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, IFX, Infineon Technologies AG, BSI Smartcard, Security Controller, PP-0084"
  • /Subject: Common Criteria, Certification, Zertifizierung, IFX, Infineon Technologies AG, BSI Smartcard, Security Controller, PP-0084
  • /Title: Certification Report BSI-DSZ-CC-1126-V4-2025
  • pdf_file_size_bytes: 396360
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
pdf_data/st_filename 0782V4b_pdf.pdf 1126V4b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 1
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL 6 augmented: 1
    • EAL4+: 1
    • EAL6: 8
    • EAL6 augmented: 4
    • EAL6+: 4
  • EAL:
    • EAL 5: 3
    • EAL 5 augmented: 3
    • EAL5: 5
    • EAL5 augmented: 1
    • EAL5+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 6
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 3
    • ALC_CMC.5: 3
    • ALC_CMS: 2
    • ALC_CMS.4: 2
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR.1: 11
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 3
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC.1: 2
    • ADV_COMP.1: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 2
    • ADV_FSP.5: 4
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 5
    • ASE_CCL.1: 1
    • ASE_ECD: 4
    • ASE_ECD.1: 1
    • ASE_INT: 14
    • ASE_INT.1: 1
    • ASE_OBJ: 5
    • ASE_OBJ.2: 1
    • ASE_REQ: 22
    • ASE_REQ.2: 1
    • ASE_SPD: 4
    • ASE_SPD.1: 1
    • ASE_TSS: 5
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 72
    • FCS_CKM.1: 41
    • FCS_CKM.2: 6
    • FCS_CKM.4: 39
    • FCS_COP: 100
    • FCS_COP.1: 30
    • FCS_RNG: 4
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 26
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 21
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 17
    • FDP_ITC.1: 34
    • FDP_ITC.2: 34
    • FDP_ITT.1: 18
    • FDP_SDI.1: 16
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 14
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 2
    • FMT_LIM.1: 6
    • FMT_LIM.2: 6
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 19
    • FPT_ITT.1: 18
    • FPT_LIM.2: 1
    • FPT_PHP.3: 25
    • FPT_TST: 3
    • FPT_TST.1: 12
    • FPT_TST.2: 33
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 7
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 7
    • FCS_CKM.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.5: 12
    • FCS_CKM.6: 12
    • FCS_CKM.6.1: 2
    • FCS_COP: 9
    • FCS_COP.1: 9
    • FCS_RBG.1: 1
    • FCS_RNG: 3
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 9
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF: 11
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 7
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_ITT.1: 3
    • FDP_SDC: 3
    • FDP_SDC.1: 5
    • FDP_SDC.1.1: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 3
    • FIA_API.1: 7
    • FIA_API.1.1: 1
  • FMT:
    • FMT_LIM: 16
    • FMT_LIM.1: 14
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 11
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS.1: 5
    • FPT_ITT.1: 3
    • FPT_PHP.3: 3
    • FPT_TST: 5
    • FPT_TST.1: 11
    • FPT_TST.2: 28
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 4
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 1
  • T:
    • T.RND: 1
  • O:
    • O.AES: 1
    • O.RND: 1
    • O.TDES: 1
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 16
    • Infineon Technologies: 2
    • Infineon Technologies AG: 26
  • Infineon:
    • Infineon: 3
    • Infineon Technologies: 7
    • Infineon Technologies AG: 10
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 69
  • DES:
    • 3DES:
      • TDES: 49
      • Triple-DES: 2
    • DES:
      • DES: 16
  • constructions:
    • MAC:
      • CBC-MAC: 6
      • HMAC: 5
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 9
      • Triple-DES: 2
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 16
    • ECDH:
      • ECDH: 13
    • ECDSA:
      • ECDSA: 30
  • FF:
    • DH:
      • Diffie-Hellman: 9
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 1
    • RSA4096: 1
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 70
      • SHA-256: 1
      • SHA-512: 1
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 6
  • RNG:
    • RND: 2
    • RNG: 10
  • TRNG:
    • DTRNG: 1
    • TRNG: 11
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 2
    • RNG: 9
  • TRNG:
    • TRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 13
  • CFB:
    • CFB: 9
  • CTR:
    • CTR: 8
  • ECB:
    • ECB: 13
  • CBC:
    • CBC: 4
  • CFB:
    • CFB: 3
  • CTR:
    • CTR: 3
  • ECB:
    • ECB: 3
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 32
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 9
    • Malfunction: 9
    • fault induction: 1
  • SCA:
    • DPA: 13
    • Leak-Inherent: 11
    • Physical Probing: 2
    • SPA: 7
    • physical probing: 1
    • side channel: 3
    • side-channel: 2
  • FI:
    • DFA: 2
    • Malfunction: 5
  • SCA:
    • DPA: 2
    • Leak-Inherent: 5
    • Physical Probing: 2
    • SPA: 1
    • side channel: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 1: 2
    • BSI TR-02102: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 9
    • AIS32: 6
  • CC:
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 2
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 3
  • ISO:
    • ISO/IEC 10118: 2
    • ISO/IEC 11770-3: 2
    • ISO/IEC 14888-3: 1
    • ISO/IEC 15946-1: 1
    • ISO/IEC 15946-2: 1
    • ISO/IEC 15946-3: 1
    • ISO/IEC 18033: 2
    • ISO/IEC 18092: 4
    • ISO/IEC 7816-3: 1
    • ISO/IEC 97971: 2011: 1
  • NIST:
    • SP 800-38A: 6
    • SP 800-67: 3
  • RFC:
    • RFC 3447: 1
    • RFC 5639: 2
  • BSI:
    • AIS31: 3
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9798-2: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38B: 1
    • NIST SP 800-67: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20171207091616+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Smartcard, Dresden, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0084, 90nm
  • /ModDate: D:20171207092152+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: BSI-DSZ-CC-0782-V4 Common Criteria EAL6+ Security Certification
  • /Title: M7892 B11 Security Target Lite
  • pdf_file_size_bytes: 1375889
  • pdf_hyperlinks: http://www.bsi.bund.de/, http://www.infineon.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 107
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different