name |
X0mail |
Infineon Technologies Security Controller M7794 A12 and G12 with specific IC-dedicated firmware identifier V77.017.12.0 or V77.017.12.2 or V77.017.13.2 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
DE |
status |
archived |
active |
not_valid_after |
01.09.2019 |
07.07.2026 |
not_valid_before |
23.02.2010 |
07.07.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0964v5c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20100223_SERTIT-008CR_issue201.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0964V5a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0964V5b_pdf.pdf |
manufacturer |
Thales Norway AS |
Infineon Technologies AG |
manufacturer_web |
https://www.thales.no/ |
https://www.infineon.com/ |
security_level |
EAL4 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
f310fe4b0c9c7eb1 |
6348414cdde149c0 |
heuristics/cert_id |
SERTIT-014 |
BSI-DSZ-CC-0964-V5-2021 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, ALC_CMC.4, AVA_SOF.1, ADV_IMP.1, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, AGD_ADM.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_DVS.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ASE_CCL.1, ADV_SPM.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
77.017.12.2, 77.017.13.2, 77.017.12.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0964-V4-2019 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0964-V3-2017, BSI-DSZ-CC-0964-V4-2019 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
|
0964v5c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0964-V5-2021: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies: 1
- Infineon Technologies AG: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210709081947+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SmartCard, Security IC, Infineon"
- /ModDate: D:20210709082503+02'00'
- /Producer: LibreOffice 6.3
- /Subject: BSI-DSZ-CC-0964-V5-2021, Infineon Technologies Security Controller M7794A12 and G12 with specific IC-dedicated firmwareidentifier V77.017.12.0 or V77.017.12.2 or V77.017.13.2, Infineon Technologies AG
- /Title: Certificate BSI-DSZ-CC-0964-V5-2021
- pdf_file_size_bytes: 241330
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
20100223_SERTIT-008CR_issue201.0.pdf |
0964V5a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0964-V5-2021
- cert_item: Infineon Technologies Security Controller M7794 A12 and G12 with specific IC-dedicated firmware identifier V77.017.12.0 or V77.017.12.2 or V77.017.13.2
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0964-V4-: 1
- BSI-DSZ-CC-0964-V4-2019: 1
- BSI-DSZ-CC-0964-V5-2021: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 3
- EAL 4 augmented: 1
- EAL 4+: 17
- EAL1: 1
- EAL4+: 3
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 8
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_IFC.2: 2
- FDP_IFF.1: 2
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 1
- Giesecke & Devrient: 1
- Infineon:
- Infineon: 3
- Infineon Technologies: 7
- Infineon Technologies AG: 7
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 1
- AIS 23: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- AIS 46: 1
- AIS31: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- A12 and G12” (confidential document) [12] See [Sec] in table 2 (chapter B.2 “Identification of the TOE”) [13] See [HRM] in table 2: 1
- Evaluation Technical Report for Composite Evaluation (ETR-COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, Version 2.2, 2021-04-15, “Configuration Management Scope: 1
- Report Summary”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- “M7794 A12 and G12 with specific IC-dedicated software Security Target”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0964-V5-2021, Version 2, 2021-06-15, “Evaluation: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20100315130843
- /ModDate: D:20100315130843
- pdf_file_size_bytes: 542517
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210709065901+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SmartCard, Security IC, Infineon"
- /ModDate: D:20210709072156+02'00'
- /Producer: LibreOffice 6.3
- /Subject: BSI-DSZ-CC-0964-V5-2021, Infineon Technologies Security Controller M7794A12 and G12 with specific IC-dedicated firmwareidentifier V77.017.12.0 or V77.017.12.2 or V77.017.13.2, Infineon Technologies AG
- /Title: Certification Report BSI-DSZ-CC-0964-V5-2021
- pdf_file_size_bytes: 643034
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf |
0964V5b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL5: 5
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 10
- ACM_AUT.1.1: 1
- ACM_CAP.3: 1
- ACM_CAP.4: 20
- ACM_SCP.2: 7
- ADO:
- ADO_DEL.1: 1
- ADO_DEL.2: 11
- ADO_IGS.1: 13
- ADV:
- ADV_DVS.1: 1
- ADV_FSP.1: 7
- ADV_FSP.2: 12
- ADV_HLD.1: 2
- ADV_HLD.2: 17
- ADV_IMP.1: 11
- ADV_LLD.1: 18
- ADV_RCR.1: 9
- ADV_SPM.1: 15
- AGD:
- AGD_ADM.1: 22
- AGD_USR.1: 16
- ALC:
- ALC_DVS.1: 9
- ALC_LCD.1: 9
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 8
- ATE_DPT.1: 7
- ATE_FUN.1: 15
- ATE_IND.2: 10
- AVA:
- AVA_MSU.2: 15
- AVA_SOF.1: 10
- AVA_VLA.2: 15
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 4
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 5
- ASE_CCL.1: 1
- ASE_ECD: 5
- ASE_ECD.1: 1
- ASE_INT: 5
- ASE_INT.1: 1
- ASE_OBJ: 5
- ASE_OBJ.2: 1
- ASE_REQ: 17
- ASE_REQ.2: 1
- ASE_SPD: 6
- ASE_SPD.1: 1
- ASE_TSS: 5
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_GEN.1: 33
- FAU_GEN.1.1: 1
- FAU_GEN.2: 16
- FAU_GEN.2.1: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 20
- FAU_SAR.2: 15
- FAU_STG.1: 21
- FAU_STG.3: 15
- FAU_STG.4: 9
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.2: 10
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 4
- FDP_IFC.2: 9
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.2: 10
- FDP_IFF.2.1: 1
- FDP_IFF.2.2: 2
- FDP_IFF.2.3: 1
- FDP_IFF.2.4: 1
- FDP_IFF.2.5: 1
- FDP_IFF.2.6: 1
- FDP_IFF.2.7: 1
- FDP_ITC.2: 10
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 5
- FDP_ITT.1.1: 1
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU.2: 17
- FIA_UAU.2.1: 2
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 24
- FIA_USB.1: 13
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 2
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 5
- FPT_ITT.1.1: 1
- FPT_RCV.1: 8
- FPT_RCV.1.1: 1
- FPT_RCV.2: 11
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_RCV.4: 9
- FPT_RCV.4.1: 1
- FPT_RVM.1: 9
- FPT_RVM.1.1: 1
- FPT_SEP.3: 10
- FPT_SEP.3.1: 1
- FPT_SEP.3.2: 1
- FPT_SEP.3.3: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TDC.1: 14
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TSE.1: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_TSE.1: 19
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 8
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 9
- FCS_CKM.2: 1
- FCS_CKM.4: 10
- FCS_COP: 12
- FCS_COP.1: 15
- FCS_RNG: 14
- FCS_RNG.1: 27
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 6
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_ITT.1: 4
- FDP_SDI.1: 12
- FDP_SDI.1.1: 1
- FDP_SDI.2: 12
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 2
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 2
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 5
- FPT_ITT.1: 4
- FPT_PHP.3: 4
- FPT_TST: 7
- FPT_TST.1: 11
- FPT_TST.2: 31
- FPT_TST.2.1: 1
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADM_TRAINING: 4
- A.AUDIT_REVIEW: 3
- A.CONFIDENCE: 4
- A.INVALIDATE: 3
- A.NETWORK: 4
- A.NOTIFY: 3
- A.OS: 5
- A.PHYSICAL: 4
- A.PHYSICAL_LOC: 3
- A.USR_TRAINING: 3
- O:
- O.ACCESS_HIST: 13
- O.AUDIT: 13
- O.AUTO_LOGOUT: 10
- O.CMD_ACL: 7
- O.CMD_LOG: 16
- O.DAC: 8
- O.DIG_SIGN: 3
- O.ID_AUTH: 14
- O.LABELLING: 8
- O.LOCK: 8
- O.MAC: 9
- O.MAC_INTEGRITY: 10
- O.MANAGE: 6
- O.MESSAGING: 8
- O.RECOVER: 9
- O.REF_MONITOR: 8
- O.RESOURCE_SHARE: 7
- O.REUSE: 9
- O.ROLES: 10
- O.ROLE_MNG: 7
- O.SELF_TEST: 8
- OE:
- OE.ACCOUNTABLE: 11
- OE.AUDIT: 13
- OE.ID_AUTH: 8
- OE.NETWORK: 17
- OE.PHYSICAL: 1
- OE.TRAF_SEPARATION: 11
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies: 13
- Infineon Technologies AG: 11
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 11
- TDES: 6
- Triple-DES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 12
- malfunction: 1
- SCA:
- DPA: 2
- Leak-Inherent: 11
- Physical Probing: 2
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- ISO:
- RFC:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- ISO:
- ISO/IEC 18092: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 97971: 2011: 1
- NIST:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Thales Norway AS
- /CreationDate: D:20090430154245+02'00'
- /Creator: PDFCreator Version 0.9.3
- /Keywords:
- /ModDate: D:20090430154245
- /Producer: AFPL Ghostscript 8.13
- /Subject:
- /Title: XOmail Version 14.2 Security Target ed 10-public
- pdf_file_size_bytes: 2346280
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 111
|
- /Author: Jürgen Noller
- /CreationDate: D:20210318092227+01'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20210318092227+01'00'
- /Producer: Microsoft® Word 2016
- /Title: IFX A4 Word Template
- pdf_file_size_bytes: 1397646
- pdf_hyperlinks: http://www.infineon.com/, http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 51
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |