Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance
BSI-DSZ-CC-1126-V4-2025
Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
BSI-DSZ-CC-0926-V2-2017
name IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
status active archived
not_valid_after 25.08.2030 04.09.2022
not_valid_before 25.08.2025 05.09.2017
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126V4c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126V4a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1126V4b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0926V2b_pdf.pdf
dgst ed23c1e0f2d3ab99 a6b4ebcac512f88e
heuristics/cert_id BSI-DSZ-CC-1126-V4-2025 BSI-DSZ-CC-0926-V2-2017
heuristics/cpe_matches {} cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2017-15361
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ADV_COMP.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2
heuristics/extracted_versions 80.301.05.1, 2.04.003, 2.62.7626, 01.00.0234 2.00.002, 1.02.013
heuristics/report_references/directly_referencing BSI-DSZ-CC-1126-V3-2023 BSI-DSZ-CC-0926-2014
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1126-V2-2021, BSI-DSZ-CC-1126-V3-2023, BSI-DSZ-CC-1126-2019 BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0907-2013, BSI-DSZ-CC-0757-2011
heuristics/scheme_data
  • category: Smart Cards and similar devices
  • cert_id: BSI-DSZ-CC-1126-V4-2025
  • certification_date: 25.08.2025
  • enhanced:
    • applicant: Infineon Technologies AG Am Campeon 1-12 85579 Neubiberg
    • assurance_level: EAL5+,ALC_DVS.2,AVA_VAN.5
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1126V4c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 25.08.2025
    • description: The TOE (Target of Evaluation) is a SmartCard (Security-IC) by Infineon Technologies AG. The TOE provides a real 32-bit CPU-architecture and is compatible to the ARMv7-M instruction set. The major components of the core system are the 32-bit CPU (Central Processing Unit) based on the ARM SecurCore SC300TM, the NVIC (Nested Vectored Interrupt Controller), and the MPU (Memory Protection Unit). This TOE is intended to be used in smart cards for particularly security relevant applications and for its previous use as developing platform for smart card operating systems
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1126-V4-2025 (Ausstellungsdatum / Certification Date 25.08.2025, gültig bis / valid until 24.08.2030) Zertifizierungsreport / Certification Report', 'description': 'fore runner, documents were changed.'}), frozendict({'id': 'BSI-DSZ-CC-1126-V3-2023 (Ausstellungsdatum / Certification Date 07.07.2023, gültig bis / valid until 06.07.2028) Zertifizierungsreport / Certification Report', 'description': 'fore runner, documents were changed.'}), frozendict({'id': 'BSI-DSZ-CC-1126-V2-2021 (Ausstellungsdatum / Certification Date 12.08.2021, gültig bis / valid until 11.08.2026) Zertifizierungsreport / Certification Report', 'description': 'fore runner, documents were changed.'}), frozendict({'id': 'BSI-DSZ-CC-1126-2019 (Ausstellungsdatum / Certification Date 15.10.2019, gültig bis / valid until 14.10.2024) Zertifizierungsreport / Certification Report', 'description': 'Certificate'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 24.08.2030
    • product: IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC-dedicated firmware identifier 80.301.05.1 and user guidance
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1126V4a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1126V4b_pdf.pdf?__blob=publicationFile&v=2
  • product: IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with …
  • subcategory: ICs, Cryptolib
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1126.html
  • vendor: Infineon Technologies AG
heuristics/protection_profiles cf0f01bcd7be3e9c f6d23054061d72ba
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/cert_filename 1126V4c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1126-V4-2025: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 5: 2
    • EAL 5 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, IFX, Infineon Technologies AG, BSI Smartcard, Security Controller, PP-0084"
  • /Subject: Common Criteria, Certification, Zertifizierung, IFX, Infineon Technologies AG, BSI Smartcard, Security Controller, PP-0084
  • /Title: Certificate BSI-DSZ-CC-1126-V4-2025
  • pdf_file_size_bytes: 234567
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1126V4a_pdf.pdf 0926V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 valid until: 24 August 2030 SOGIS Recognition Agreement
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1126-V4-2025
    • cert_item: IFX_CCI_000Dh, IFX_CCI_0020h, IFX_CCI_0031h, IFX_CCI_0032h, IFX_CCI_0034h, IFX_CCI_0037h design step T31 and M31 with optional HSL v2.62.7626, optional SCL version v2.04.003, UMSLC lib v01.00.0234 with specific IC dedicated firmware identifier 80.301.05.1 and user guidance
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0926-V2-2017
    • cert_item: Infineon Technologies Security Controller M7793 A12 and G12 with optional RSA2048/4096 v1.02.013 or v2.00.002, EC v1.02.013 or v2.00.002 and Toolbox v1.02.013 or v2.00.002 libraries and with specific IC-dedicated software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1126-V3-2023: 2
    • BSI-DSZ-CC-1126-V4-2025: 18
  • DE:
    • BSI-DSZ-CC-0926-2014: 3
    • BSI-DSZ-CC-0926-V2-2017: 25
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 4
  • BSI:
    • BSI-CC-PP- 0035-2007: 1
    • BSI-CC-PP-0035-2007: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 1
    • EAL 5: 8
    • EAL 5 augmented: 3
    • EAL5+: 1
    • EAL6: 1
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 9
    • EAL 5: 14
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 5
    • ALC_FLR: 3
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • AVA:
    • AVA_VAN.5: 5
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 1
  • R:
    • R.O: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 5
    • Infineon Technologies: 1
    • Infineon Technologies AG: 10
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 1
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 18
    • Infineon Technologies AG: 21
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 5
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 3
      • Triple-DES: 2
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 3
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
    • DES:
      • DES: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 1
    • RSA4096: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
  • TRNG:
    • TRNG: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 2
  • TRNG:
    • TRNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CFB:
    • CFB: 4
  • CTR:
    • CTR: 4
  • ECB:
    • ECB: 2
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 29
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
  • FI:
    • DFA: 6
    • physical tampering: 1
  • SCA:
    • DPA: 6
    • SPA: 5
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 31: 2
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS 47: 1
    • AIS31: 2
  • FIPS:
    • FIPS197: 2
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38B: 3
    • NIST SP 800-67: 1
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 37: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • TÜV Informationstechnik GmbH, (confidential document) 6 See section 9.1 for specific AIS. 24 / 29 BSI-DSZ-CC-1126-V4-2025 Certification Report [7: 1
    • 2019-07-10, Infineon Technologies AG (confidential document) [11] See table 2 in section B.2 [12] See table 2 in section B.2 [13] See table 2 in section B.2: 1
    • IFX_CCI_0037h T31 and M31 Security Target”, Version 5.4, 2025-08-14, Infineon Technologies AG (confidential document) [6] Evaluation Technical Report, Version 2, 2025-08-14, “EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
    • Standards Compliance Verification”, Version 1, 2019-07-09, TÜV Informationstechnik GmbH (confidential document). 25 / 29 Certification Report BSI-DSZ-CC-1126-V4-2025 C. Excerpts from the Criteria For the: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • “EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)”, TÜV Informationstechnik GmbH (confidential document) [10] Configuration list for the TOE, “Configuration Management Scope M5270 T31 and M31”, Version 1: 1
  • ConfidentialDocument:
    • / ECC / Toolbox User Interface (1.02.013), Version 1.02.013, 2017-05-10, Infineon Technologies AG (confidential document) [17] SLE77 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (2.00.002: 1
    • 13] M7790 & M7793 Hardware Reference Manual, Version 1.2, 2014-09-05, Infineon Technologies AG (confidential document) [14] 16-bit Security Controller Family SLE 70 Programmer’s Reference Manual, Version 9.5: 1
    • 3, 2017-08-28, “Evaluation Technical Report for Composite Evaluation”, TÜV Informationstechnik (confidential document) [11] “Configuration Management Scope M7793 A12 and G12 including optional Software Libraries RSA –: 1
    • A12 and G12 Including optional Software Libraries RSA - EC - Toolbox”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0926-V2-2017, Version 3, 2017-08-28, “Evaluation: 1
    • Infineon Technologies AG (confidential document) [15] Crypto@2304T User Manual, 2010-03-23, Infineon Technologies AG (confidential document) [16: 1
    • Report (ETR Sumamry)”, TÜV Informationstechnik GmbH, (confidential document) 8 specifically • AIS 19, Version 9, Anwendungshinweise und Interpretationen zum Schema (AIS) • AIS: 1
    • Version 2.00.002, 2017-05-10, Infineon Technologies AG (confidential document) [18] SLx 70 Family Production and Personalization User’s Manual, 2015-04-01, Infineon Technologies: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • confidential document) [19] SLE 77 Controller Family Errata Sheet, Version 6.1, 2017-06-21, Infineon Technologies AG: 1
    • – Toolbox”, Version 1.3, 2013-11-11, Infineon Technologies AG (confidential document) [12] M7793 Security Guidelines User’s Manual, 2017-06-28, Infineon Technologies AG (confidential: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, IFX, Infineon Technologies AG, BSI Smartcard, Security Controller, PP-0084"
  • /Subject: Common Criteria, Certification, Zertifizierung, IFX, Infineon Technologies AG, BSI Smartcard, Security Controller, PP-0084
  • /Title: Certification Report BSI-DSZ-CC-1126-V4-2025
  • pdf_file_size_bytes: 396360
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
pdf_data/st_filename 1126V4b_pdf.pdf 0926V2b_pdf.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • BSI:
    • BSI-PP-0035: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 3
    • EAL 5 augmented: 3
    • EAL5: 5
    • EAL5 augmented: 1
    • EAL5+: 3
  • EAL:
    • EAL 5: 3
    • EAL 5 augmented: 3
    • EAL5: 5
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_COMP.1: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 2
    • ADV_FSP.5: 4
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 5
    • ASE_CCL.1: 1
    • ASE_ECD: 4
    • ASE_ECD.1: 1
    • ASE_INT: 14
    • ASE_INT.1: 1
    • ASE_OBJ: 5
    • ASE_OBJ.2: 1
    • ASE_REQ: 22
    • ASE_REQ.2: 1
    • ASE_SPD: 4
    • ASE_SPD.1: 1
    • ASE_TSS: 5
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 10
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 4
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 7
    • FCS_CKM.1: 11
    • FCS_CKM.2: 1
    • FCS_CKM.4: 3
    • FCS_CKM.5: 12
    • FCS_CKM.6: 12
    • FCS_CKM.6.1: 2
    • FCS_COP: 9
    • FCS_COP.1: 9
    • FCS_RBG.1: 1
    • FCS_RNG: 3
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 9
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF: 11
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 7
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_ITT.1: 3
    • FDP_SDC: 3
    • FDP_SDC.1: 5
    • FDP_SDC.1.1: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 3
    • FIA_API.1: 7
    • FIA_API.1.1: 1
  • FMT:
    • FMT_LIM: 16
    • FMT_LIM.1: 14
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 11
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS.1: 5
    • FPT_ITT.1: 3
    • FPT_PHP.3: 3
    • FPT_TST: 5
    • FPT_TST.1: 11
    • FPT_TST.2: 28
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 4
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 8
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 22
    • FCS_CKM.2: 3
    • FCS_CKM.4: 20
    • FCS_COP: 31
    • FCS_COP.1: 30
    • FCS_RNG: 14
    • FCS_RNG.1: 26
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 6
    • FDP_ITC.1: 14
    • FDP_ITC.2: 14
    • FDP_ITT.1: 4
    • FDP_SDI.1: 12
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 12
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_LIM: 3
    • FMT_LIM.1: 5
    • FMT_LIM.2: 5
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 3
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 5
    • FPT_ITT.1: 4
    • FPT_PHP.3: 4
    • FPT_TST: 7
    • FPT_TST.1: 11
    • FPT_TST.2: 31
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 5
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 1
    • O.RND: 1
    • O.TDES: 1
  • T:
    • T.RND: 1
  • O:
    • O.RND: 3
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 3
    • Infineon Technologies: 7
    • Infineon Technologies AG: 10
  • Infineon:
    • Infineon: 3
    • Infineon Technologies: 12
    • Infineon Technologies AG: 16
  • Microsoft:
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 9
      • Triple-DES: 2
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CMAC: 4
  • AES_competition:
    • AES:
      • AES: 17
  • DES:
    • 3DES:
      • 3DES: 9
      • TDEA: 1
      • TDES: 5
      • Triple-DES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CBC-MAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • ECC:
    • ECC:
      • ECC: 10
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 1
    • RSA4096: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 2
  • MD:
    • MD5:
      • MD5: 10
  • SHA:
    • SHA1:
      • SHA1: 10
    • SHA2:
      • SHA256: 10
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 2
    • RNG: 9
  • TRNG:
    • TRNG: 3
  • PRNG:
    • PRNG: 5
  • RNG:
    • RND: 6
    • RNG: 9
  • TRNG:
    • TRNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CFB:
    • CFB: 3
  • CTR:
    • CTR: 3
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 6
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 5
  • SCA:
    • DPA: 2
    • Leak-Inherent: 5
    • Physical Probing: 2
    • SPA: 1
    • side channel: 1
  • FI:
    • DFA: 6
    • Malfunction: 12
    • malfunction: 1
  • SCA:
    • DPA: 6
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 4
    • side channel: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 3
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9798-2: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38B: 1
    • NIST SP 800-67: 1
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 97971: 2011: 1
  • NIST:
    • SP 800-38A: 1
  • RFC:
    • RFC 5639: 1
    • RFC3447: 4
pdf_data/st_metadata
  • /Author: Steffen Heinkel
  • /CreationDate: D:20170804113341+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: M7793, EAL5+, attack potential high, AVA_VAN.5
  • /ModDate: D:20170804113341+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Security Target Lite M7793
  • /Title: Public Security Target Lite
  • pdf_file_size_bytes: 1016215
  • pdf_hyperlinks: http://www.infineon.com/, http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different